Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
16 views

Console Output CLI Console

Uploaded by

desai.preyas7
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Console Output CLI Console

Uploaded by

desai.preyas7
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Panipat_FW # get router infi ro

command parse error before 'infi'

Panipat_FW # get router info routing-table details 172.16.34.36

Routing table for VRF=0


Routing entry for 172.16.32.0/22
Known via "static", distance 10, metric 0, best
* via Panipat to HO tunnel 122.15.253.45 vrf 0

Panipat_FW # diag de flow filter saddr 172.16.34.36

Panipat_FW # di de fl filter daddr 172.16.152.200

Panipat_FW # di de fl sh function-name en
show function name

Panipat_FW # di de fl trace start 99

Panipat_FW # di de en

Panipat_FW # id=65308 trace_id=1 func=print_pkt_detail line=5779 msg="vd-root:0


received a packet(proto=6, 172.16.34.36:17020->172.16.15
2.200:2000) tun_id=122.15.253.45 from Panipat to HO. flag [S], seq 1233807970, ack
0, win 65535"
id=65308 trace_id=1 func=init_ip_session_common line=5964 msg="allocate a new
session-001cf660, tun_id=122.15.253.45"
id=65308 trace_id=1 func=vf_ip_route_input_common line=2605 msg="find a route:
flag=00000000 gw-172.16.152.200 via VLAN18"
id=65308 trace_id=1 func=__iprope_tree_check line=539 msg="gnum-100004, use
addr/intf hash, len=2"
id=65308 trace_id=1 func=fw_forward_handler line=990 msg="Allowed by Policy-3: AV"
id=65308 trace_id=1 func=av_receive line=443 msg="send to application layer"
id=65308 trace_id=2 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=122.15.253.45 from Panipat to HO. flag [.], seq 1233807971, ack 4187988648,
win 128"
id=65308 trace_id=2 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=2 func=npu_handle_session44 line=1199 msg="Trying to offloading
session from Panipat to HO to VLAN18, skb.npu_flag=000
00400 ses.state=00110306 ses.npu_state=0x04000000"
id=65308 trace_id=2 func=fw_forward_dirty_handler line=436 msg="state=00110306,
state2=00000001, npu_state=04000000"
id=65308 trace_id=2 func=av_receive line=443 msg="send to application layer"
id=65308 trace_id=3 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=0.0.0.0 from local. flag [S], seq 1532528381, ack 0, win 65535"
id=65308 trace_id=3 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=4 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=0.0.0.0 from local. flag [.], seq 1532528382, ack 382931179, win 85"
id=65308 trace_id=4 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=5 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=0.0.0.0 from local. flag [.], seq 1532528382, ack 382931205, win 85"
id=65308 trace_id=5 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=6 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=122.15.253.45 from Panipat to HO. flag [.], seq 1233807971, ack 4187988648,
win 128"
id=65308 trace_id=6 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=6 func=npu_handle_session44 line=1199 msg="Trying to offloading
session from Panipat to HO to VLAN18, skb.npu_flag=000
00400 ses.state=00110306 ses.npu_state=0x06000000"
id=65308 trace_id=6 func=fw_forward_dirty_handler line=436 msg="state=00110306,
state2=00000001, npu_state=06000000"
id=65308 trace_id=6 func=av_receive line=443 msg="send to application layer"
id=65308 trace_id=7 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=0.0.0.0 from local. flag [.], seq 1532528382, ack 382931206, win 85"
id=65308 trace_id=7 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"

You might also like