20:4c:03:33:fb:74# debug pkt dump If UDP or TCP source or destination port is 80 AND packet is of type TCP Press 'q' to quit. Received packet from aruba002 (timestamp (2020-4-1 12:45:28:126913)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54633, cksum 7304, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 8b7, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 1 opcode 4, snat none] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9341):slowpath section: opcode 4] len 66, vlan 3333, egress CP, ingress aruba002: [sp_ipv4_firewall(8031):nat inside(app snat 0) with vlan ip 501a8c0, opcode 3] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9438):slowpath match acl se 34(151:2) re 0 rt 0 dpi 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9650):back to fastpath, opcode 4] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 4, snat by nat-outside] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54633, cksum 71eb, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 4/4.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54633, cksum 72eb, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:28:128850)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54634, cksum 7303, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7e74, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 1 opcode 4, snat none] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9341):slowpath section: opcode 4] len 66, vlan 3333, egress CP, ingress aruba002: [sp_ipv4_firewall(8031):nat inside(app snat 0) with vlan ip 501a8c0, opcode 3] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9438):slowpath match acl se 34(151:2) re 0 rt 0 dpi 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9650):back to fastpath, opcode 4] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 4, snat by nat-outside] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54634, cksum 71ea, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 4/4.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54634, cksum 72ea, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:28:377549)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54635, cksum 7302, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum de25, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 1 opcode 4, snat none] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9341):slowpath section: opcode 4] len 66, vlan 3333, egress CP, ingress aruba002: [sp_ipv4_firewall(8031):nat inside(app snat 0) with vlan ip 501a8c0, opcode 3] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9438):slowpath match acl se 34(151:2) re 0 rt 0 dpi 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9650):back to fastpath, opcode 4] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 4, snat by nat-outside] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54635, cksum 71e9, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 4/4.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54635, cksum 72e9, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:29:127226)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54636, cksum 7301, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 8b7, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54636, cksum 71e8, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54636, cksum 72e8, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:29:129406)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54637, cksum 7300, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7e74, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54637, cksum 71e7, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54637, cksum 72e7, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:29:378067)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54638, cksum 72ff, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum de25, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54638, cksum 71e6, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54638, cksum 72e6, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:31:127433)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54639, cksum 72fe, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 8b7, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54639, cksum 71e5, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54639, cksum 72e5, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:31:129581)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54640, cksum 72fd, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7e74, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54640, cksum 71e4, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54640, cksum 72e4, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:31:377525)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54641, cksum 72fc, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum de25, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54641, cksum 71e3, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54641, cksum 72e3, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:35:127658)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54642, cksum 72fb, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 8b7, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54642, cksum 71e2, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54642, cksum 72e2, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:35:129892)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54643, cksum 72fa, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7e74, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54643, cksum 71e1, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54643, cksum 72e1, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:35:378890)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54644, cksum 72f9, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum de25, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54644, cksum 71e0, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54644, cksum 72e0, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:43:127805)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54645, cksum 72f8, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 8b7, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54645, cksum 71df, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54645, cksum 72df, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58397 dport 80, seq 477870121, ack 0, cksum 79e, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:43:130162)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54646, cksum 72f7, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7e74, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54646, cksum 71de, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54646, cksum 72de, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58398 dport 80, seq 1041572049, ack 0, cksum 7d5b, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: Received packet from aruba002 (timestamp (2020-4-1 12:45:43:378744)) [asap_firewall_forward(7583):firewall entry] len 66, vlan 0, egress CP, ingress aruba002: #mac: etype 0800 smac 74:df:bf:ba:dc:45 dmac 90:4c:81:5b:72:a1 #ip: sip 172.20.20.128, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54647, cksum 72f6, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum de25, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(7816):vlan decision, tags 0] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8347):looking up pkt ingress/src bridge entry 74:df:bf:ba:dc:45] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8397):Found ingress/src bridge entry 74:df:bf:ba:dc:45 rechable via aruba002] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(8752):bridge section, looking for dst bridge entry 90:4c:81:5b:72:a1] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9041):session section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(9325):fastpath session returned 0 opcode 0] len 66, vlan 3333, egress CP, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 90:4c:81:5b:72:a1 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54647, cksum 71dd, ttl 128, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10023):l2switchmode 0 session yes] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10027):route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10087):cp route section] len 66, vlan 3333, egress CP, ingress aruba002: [asap_firewall_forward(10161):fastpath route returned 0 opcode 0/55401.] len 66, vlan 1, egress aruba101, ingress aruba002: #mac: etype 0800 smac 90:4c:81:5b:72:a1 dmac 50:0f:f5:87:ab:38 #ip: sip 192.168.1.5, dip 166.62.75.131, proto 6 hdr len 20 len 52, id 54647, cksum 72dd, ttl 127, dscp 0 dont fragment, last fragment, frag off 0 #tcp: sport 58399 dport 80, seq 4195353891, ack 0, cksum dd0c, hdr len 32, syn #tcp: option type 2 len 4 1460 #tcp: option type 3 len 3 8 #tcp: option type 4 len 2 [asap_firewall_forward(10561):forward section] len 66, vlan 1, egress aruba101, ingress aruba002: [asap_firewall_forward(11028):forwarding packet to aruba101 tags 0] len 66, vlan 1, egress aruba101, ingress aruba101: