Hello Fortinet Community
So under the main network hood we have a FGT100F with a specific subnet policy towards the sd-wan interfaces with APP Control,WEB Filter and AV modules enabled.
More specifically on the APP Control module we have enabled between others HTTP/HTTPS.Browser as allowed
SSL also allowed
and Web Browsers category as allowed.
Certificate Inspection Enabled
The problem now is that SPECIFICALY the Vivaldi browser wont reach any wabpage from ANY PC on the targeted subnet.Furthermore in inserted both in the PC and the certificate store of the browser the FGT SSL Cert. Disabled all of the track privacy settings of the Vivaldi browser,no webpage reached still.
I also tried to disable all of the above mentioned modules in the policy,restarted the browser on a test PC with no avail.
Any ideas?
Thanks in advance!
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello @chrispng ,
First of all, can you apply the security profiles you have applied for wifi within this rule?
Alternatively, the problem may be caused by mss settings. Can you enter the following mtu settings only for the relevant rule?
config firewall policy
edit <policy id>
set tcp-mss-sender 1300
set tcp-mss-receiver 1300
Yes, all other browsers as stated above work perfecly fine.
Hello @chrispng ,
Can you run debug commands again? But on this time, can you try to access the internet with other browsers?
Vivaldi And chome opened. Chrome works fine Vivaldi doesnt open anything
HRS_Firewall # diagnose debug disable
HRS_Firewall # diagnose debug flow trace stop
HRS_Firewall # diagnose debug flow filter clear
HRS_Firewall # diagnose debug reset
HRS_Firewall # diagnose debug flow filter saddr 172.16.35.28
HRS_Firewall # diagnose debug flow show console enable
command parse error before 'console'
Command fail. Return code -61
HRS_Firewall # diagnose debug console timestamp enable
HRS_Firewall # diagnose debug flow trace start 100
HRS_Firewall # diagnose debug enable
HRS_Firewall # diagnose debug flow show consol2024-05-14 16:47:44 id=65308 trace_id=204 func=print_pkt_detail line=5824 msg="vd-root:0 r
eceived a packet(proto=6, 172.16.35.28:50474->216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1080721753, ack 319
7191819, win 1025"
2024-05-14 16:47:44 id=65308 trace_id=204 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d8, original dire
ction"
2024-05-14 16:47:44 id=65308 trace_id=204 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:44 id=65308 trace_id=204 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:44 id=65308 trace_id=204 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50474"
2024-05-14 16:47:44 id=65308 trace_id=204 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 10949, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:44 id=65308 trace_id=205 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50475->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2687829513, ack 2870298232, win 1026"
2024-05-14 16:47:44 id=65308 trace_id=205 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d9, original dire
ction"
2024-05-14 16:47:44 id=65308 trace_id=205 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:44 id=65308 trace_id=205 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:44 id=65308 trace_id=205 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50475"
2024-05-14 16:47:44 id=65308 trace_id=205 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11205, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:44 id=65308 trace_id=206 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50473->
31.209.137.46:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2724668348, ack 4292721124, win 1026"
2024-05-14 16:47:44 id=65308 trace_id=206 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d7, original dire
ction"
2024-05-14 16:47:44 id=65308 trace_id=206 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:44 id=65308 trace_id=206 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:44 id=65308 trace_id=206 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50473"
2024-05-14 16:47:44 id=65308 trace_id=206 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 10693, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:44 id=65308 trace_id=207 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50475->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2687829513, ack 2870298232, win 1026"
2024-05-14 16:47:44 id=65308 trace_id=207 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d9, original dire
ction"
2024-05-14 16:47:44 id=65308 trace_id=207 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:44 id=65308 trace_id=207 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:44 id=65308 trace_id=207 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50475"
2024-05-14 16:47:44 id=65308 trace_id=207 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11205, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:44 id=65308 trace_id=208 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50473->
31.209.137.46:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2724668348, ack 4292721124, win 1026"
2024-05-14 16:47:44 id=65308 trace_id=208 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d7, original dire
ction"
2024-05-14 16:47:44 id=65308 trace_id=208 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:44 id=65308 trace_id=208 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:44 id=65308 trace_id=208 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50473"
2024-05-14 16:47:44 id=65308 trace_id=208 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 10693, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:45 id=65308 trace_id=209 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50475->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2687829513, ack 2870298232, win 1026"
2024-05-14 16:47:45 id=65308 trace_id=209 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d9, original dire
ction"
2024-05-14 16:47:45 id=65308 trace_id=209 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:45 id=65308 trace_id=209 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:45 id=65308 trace_id=209 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50475"
2024-05-14 16:47:45 id=65308 trace_id=209 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11205, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:45 id=65308 trace_id=210 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50473->
31.209.137.46:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2724668348, ack 4292721124, win 1026"
2024-05-14 16:47:45 id=65308 trace_id=210 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d7, original dire
ction"
2024-05-14 16:47:45 id=65308 trace_id=210 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:45 id=65308 trace_id=210 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:45 id=65308 trace_id=210 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50473"
2024-05-14 16:47:45 id=65308 trace_id=210 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 10693, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:45 id=65308 trace_id=211 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50480->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 624794579, ack 0, win 64240"
2024-05-14 16:47:45 id=65308 trace_id=211 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bc2e, tun_id=0.0.0.0"
2024-05-14 16:47:45 id=65308 trace_id=211 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 216.58.213.100
via ifindex-7"
2024-05-14 16:47:45 id=65308 trace_id=211 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:47:45 id=65308 trace_id=211 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:47:45 id=65308 trace_id=211 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50480"
2024-05-14 16:47:45 id=65308 trace_id=211 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:47:45 id=65308 trace_id=211 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50480"
2024-05-14 16:47:45 id=65308 trace_id=211 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12485, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:45 id=65308 trace_id=212 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50480->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 624794580, ack 3614795978, win 1025"
2024-05-14 16:47:45 id=65308 trace_id=212 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bc2e, original dire
ction"
2024-05-14 16:47:45 id=65308 trace_id=212 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:47:45 id=65308 trace_id=212 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:47:45 id=65308 trace_id=212 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:47:45 id=65308 trace_id=212 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:45 id=65308 trace_id=212 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50480"
2024-05-14 16:47:45 id=65308 trace_id=212 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12485, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:47:46 id=65308 trace_id=213 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50475->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2687829513, ack 2870298232, win 1026"
2024-05-14 16:47:46 id=65308 trace_id=213 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d9, original dire
ction"
2024-05-14 16:47:46 id=65308 trace_id=213 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:46 id=65308 trace_id=213 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:46 id=65308 trace_id=213 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50475"
2024-05-14 16:47:46 id=65308 trace_id=213 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11205, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:46 id=65308 trace_id=214 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50473->
31.209.137.46:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2724668348, ack 4292721124, win 1026"
2024-05-14 16:47:46 id=65308 trace_id=214 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d7, original dire
ction"
2024-05-14 16:47:46 id=65308 trace_id=214 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:46 id=65308 trace_id=214 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:46 id=65308 trace_id=214 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50473"
2024-05-14 16:47:46 id=65308 trace_id=214 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 10693, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:47 id=65308 trace_id=215 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50476->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 275166982, ack 3240482661, win 1026"
2024-05-14 16:47:47 id=65308 trace_id=215 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b52e, original dire
ction"
2024-05-14 16:47:47 id=65308 trace_id=215 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:47 id=65308 trace_id=215 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:47 id=65308 trace_id=215 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50476"
2024-05-14 16:47:47 id=65308 trace_id=215 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11461, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:47 id=65308 trace_id=216 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50476->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 275166982, ack 3240482661, win 1026"
2024-05-14 16:47:47 id=65308 trace_id=216 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b52e, original dire
ction"
2024-05-14 16:47:47 id=65308 trace_id=216 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:47 id=65308 trace_id=216 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:47 id=65308 trace_id=216 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50476"
2024-05-14 16:47:47 id=65308 trace_id=216 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11461, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:48 id=65308 trace_id=217 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50476->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 275166982, ack 3240482661, win 1026"
2024-05-14 16:47:48 id=65308 trace_id=217 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b52e, original dire
ction"
2024-05-14 16:47:48 id=65308 trace_id=217 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:48 id=65308 trace_id=217 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:48 id=65308 trace_id=217 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50476"
2024-05-14 16:47:48 id=65308 trace_id=217 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11461, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:48 id=65308 trace_id=218 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50475->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2687829513, ack 2870298232, win 1026"
2024-05-14 16:47:48 id=65308 trace_id=218 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d9, original dire
ction"
2024-05-14 16:47:48 id=65308 trace_id=218 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:48 id=65308 trace_id=218 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:48 id=65308 trace_id=218 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50475"
2024-05-14 16:47:48 id=65308 trace_id=218 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11205, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:48 id=65308 trace_id=219 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50473->
31.209.137.46:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2724668348, ack 4292721124, win 1026"
2024-05-14 16:47:48 id=65308 trace_id=219 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d7, original dire
ction"
2024-05-14 16:47:48 id=65308 trace_id=219 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:48 id=65308 trace_id=219 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:48 id=65308 trace_id=219 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50473"
2024-05-14 16:47:48 id=65308 trace_id=219 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 10693, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:49 id=65308 trace_id=220 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50476->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 275166982, ack 3240482661, win 1026"
2024-05-14 16:47:49 id=65308 trace_id=220 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b52e, original dire
ction"
2024-05-14 16:47:49 id=65308 trace_id=220 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:49 id=65308 trace_id=220 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:49 id=65308 trace_id=220 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50476"
2024-05-14 16:47:49 id=65308 trace_id=220 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11461, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:49 id=65308 trace_id=221 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50478->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1407834998, ack 1467848386, win 1024"
2024-05-14 16:47:49 id=65308 trace_id=221 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b5cb, original dire
ction"
2024-05-14 16:47:49 id=65308 trace_id=221 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:49 id=65308 trace_id=221 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:49 id=65308 trace_id=221 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50478"
2024-05-14 16:47:49 id=65308 trace_id=221 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11973, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:50 id=65308 trace_id=222 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50478->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1407834998, ack 1467848386, win 1024"
2024-05-14 16:47:50 id=65308 trace_id=222 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b5cb, original dire
ction"
2024-05-14 16:47:50 id=65308 trace_id=222 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:50 id=65308 trace_id=222 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:50 id=65308 trace_id=222 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50478"
2024-05-14 16:47:50 id=65308 trace_id=222 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11973, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:50 id=65308 trace_id=223 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50478->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1407834998, ack 1467848386, win 1024"
2024-05-14 16:47:50 id=65308 trace_id=223 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b5cb, original dire
ction"
2024-05-14 16:47:50 id=65308 trace_id=223 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:50 id=65308 trace_id=223 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:50 id=65308 trace_id=223 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50478"
2024-05-14 16:47:50 id=65308 trace_id=223 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11973, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:51 id=65308 trace_id=224 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50476->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 275166982, ack 3240482661, win 1026"
2024-05-14 16:47:51 id=65308 trace_id=224 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b52e, original dire
ction"
2024-05-14 16:47:51 id=65308 trace_id=224 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:51 id=65308 trace_id=224 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:51 id=65308 trace_id=224 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50476"
2024-05-14 16:47:51 id=65308 trace_id=224 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11461, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:52 id=65308 trace_id=225 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50478->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1407834998, ack 1467848386, win 1024"
2024-05-14 16:47:52 id=65308 trace_id=225 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b5cb, original dire
ction"
2024-05-14 16:47:52 id=65308 trace_id=225 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:52 id=65308 trace_id=225 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:52 id=65308 trace_id=225 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50478"
2024-05-14 16:47:52 id=65308 trace_id=225 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11973, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:52 id=65308 trace_id=226 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 2219909556, ack 0, win 64240"
2024-05-14 16:47:52 id=65308 trace_id=226 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bd4c, tun_id=0.0.0.0"
2024-05-14 16:47:52 id=65308 trace_id=226 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 151.101.66.137
via ifindex-7"
2024-05-14 16:47:52 id=65308 trace_id=226 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:47:52 id=65308 trace_id=226 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:47:52 id=65308 trace_id=226 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50481"
2024-05-14 16:47:52 id=65308 trace_id=226 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:47:52 id=65308 trace_id=226 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:47:52 id=65308 trace_id=226 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:52 id=65308 trace_id=227 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 2219909557, ack 3602733773, win 1026"
2024-05-14 16:47:52 id=65308 trace_id=227 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bd4c, original dire
ction"
2024-05-14 16:47:52 id=65308 trace_id=227 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:47:52 id=65308 trace_id=227 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:47:52 id=65308 trace_id=227 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:47:52 id=65308 trace_id=227 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:52 id=65308 trace_id=227 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:47:52 id=65308 trace_id=227 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:47:53 id=65308 trace_id=228 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50475->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2687829513, ack 2870298232, win 1026"
2024-05-14 16:47:53 id=65308 trace_id=228 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d9, original dire
ction"
2024-05-14 16:47:53 id=65308 trace_id=228 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:53 id=65308 trace_id=228 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:53 id=65308 trace_id=228 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50475"
2024-05-14 16:47:53 id=65308 trace_id=228 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11205, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:53 id=65308 trace_id=229 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50473->
31.209.137.46:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2724668348, ack 4292721124, win 1026"
2024-05-14 16:47:53 id=65308 trace_id=229 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d7, original dire
ction"
2024-05-14 16:47:53 id=65308 trace_id=229 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:53 id=65308 trace_id=229 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:53 id=65308 trace_id=229 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50473"
2024-05-14 16:47:53 id=65308 trace_id=229 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 10693, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:54 id=65308 trace_id=230 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50478->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1407834998, ack 1467848386, win 1024"
2024-05-14 16:47:54 id=65308 trace_id=230 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b5cb, original dire
ction"
2024-05-14 16:47:54 id=65308 trace_id=230 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:54 id=65308 trace_id=230 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:54 id=65308 trace_id=230 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50478"
2024-05-14 16:47:54 id=65308 trace_id=230 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11973, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:54 id=65308 trace_id=231 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 524499130, ack 0, win 64240"
2024-05-14 16:47:54 id=65308 trace_id=231 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bda0, tun_id=0.0.0.0"
2024-05-14 16:47:54 id=65308 trace_id=231 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 31.209.137.5 v
ia ifindex-7"
2024-05-14 16:47:54 id=65308 trace_id=231 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:47:54 id=65308 trace_id=231 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:47:54 id=65308 trace_id=231 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50482"
2024-05-14 16:47:54 id=65308 trace_id=231 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:47:54 id=65308 trace_id=231 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:47:54 id=65308 trace_id=231 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:54 id=65308 trace_id=232 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:63817-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:47:54 id=65308 trace_id=232 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bda1, tun_id=0.0.0.0"
2024-05-14 16:47:54 id=65308 trace_id=232 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:47:54 id=65308 trace_id=232 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:47:54 id=65308 trace_id=232 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:47:54 id=65308 trace_id=232 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:47:54 id=65308 trace_id=232 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 73, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:54 id=65308 trace_id=233 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:64988-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:47:54 id=65308 trace_id=233 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bda2, tun_id=0.0.0.0"
2024-05-14 16:47:54 id=65308 trace_id=233 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:47:54 id=65308 trace_id=233 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:47:54 id=65308 trace_id=233 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:47:54 id=65308 trace_id=233 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:47:54 id=65308 trace_id=233 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 71, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:54 id=65308 trace_id=234 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 524499131, ack 3531082260, win 1024"
2024-05-14 16:47:54 id=65308 trace_id=234 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bda0, original dire
ction"
2024-05-14 16:47:54 id=65308 trace_id=234 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:47:54 id=65308 trace_id=234 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:47:54 id=65308 trace_id=234 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:47:54 id=65308 trace_id=234 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:54 id=65308 trace_id=234 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:47:54 id=65308 trace_id=234 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:47:56 id=65308 trace_id=235 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50476->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 275166982, ack 3240482661, win 1026"
2024-05-14 16:47:56 id=65308 trace_id=235 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b52e, original dire
ction"
2024-05-14 16:47:56 id=65308 trace_id=235 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:56 id=65308 trace_id=235 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:56 id=65308 trace_id=235 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50476"
2024-05-14 16:47:56 id=65308 trace_id=235 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11461, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:59 id=65308 trace_id=236 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50478->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1407834998, ack 1467848386, win 1024"
2024-05-14 16:47:59 id=65308 trace_id=236 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b5cb, original dire
ction"
2024-05-14 16:47:59 id=65308 trace_id=236 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:59 id=65308 trace_id=236 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:59 id=65308 trace_id=236 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50478"
2024-05-14 16:47:59 id=65308 trace_id=236 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11973, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:47:59 id=65308 trace_id=237 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50479->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1088069462, ack 1564803944, win 1025"
2024-05-14 16:47:59 id=65308 trace_id=237 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b779, original dire
ction"
2024-05-14 16:47:59 id=65308 trace_id=237 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:47:59 id=65308 trace_id=237 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:47:59 id=65308 trace_id=237 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50479"
2024-05-14 16:47:59 id=65308 trace_id=237 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12229, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:03 id=65308 trace_id=238 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50475->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [R.], seq 2687829514, ack 2870298232, win 0"
2024-05-14 16:48:03 id=65308 trace_id=238 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d9, original dire
ction"
2024-05-14 16:48:03 id=65308 trace_id=238 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:03 id=65308 trace_id=238 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:03 id=65308 trace_id=238 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50475"
2024-05-14 16:48:03 id=65308 trace_id=238 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11205, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:03 id=65308 trace_id=239 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50473->
31.209.137.46:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [R.], seq 2724668349, ack 4292721124, win 0"
2024-05-14 16:48:03 id=65308 trace_id=239 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b3d7, original dire
ction"
2024-05-14 16:48:03 id=65308 trace_id=239 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:03 id=65308 trace_id=239 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:03 id=65308 trace_id=239 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50473"
2024-05-14 16:48:03 id=65308 trace_id=239 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 10693, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:04 id=65308 trace_id=240 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50483->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 1551100519, ack 0, win 64240"
2024-05-14 16:48:04 id=65308 trace_id=240 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bef1, tun_id=0.0.0.0"
2024-05-14 16:48:04 id=65308 trace_id=240 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 216.58.213.100
via ifindex-7"
2024-05-14 16:48:04 id=65308 trace_id=240 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:04 id=65308 trace_id=240 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:04 id=65308 trace_id=240 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50483"
2024-05-14 16:48:04 id=65308 trace_id=240 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:04 id=65308 trace_id=240 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50483"
2024-05-14 16:48:04 id=65308 trace_id=240 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13253, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:04 id=65308 trace_id=241 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50483->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 1551100520, ack 2695636803, win 1025"
2024-05-14 16:48:04 id=65308 trace_id=241 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bef1, original dire
ction"
2024-05-14 16:48:04 id=65308 trace_id=241 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:04 id=65308 trace_id=241 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:04 id=65308 trace_id=241 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:04 id=65308 trace_id=241 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:04 id=65308 trace_id=241 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50483"
2024-05-14 16:48:04 id=65308 trace_id=241 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13253, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:04 id=65308 trace_id=242 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:56159-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:04 id=65308 trace_id=242 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bef3, tun_id=0.0.0.0"
2024-05-14 16:48:04 id=65308 trace_id=242 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:04 id=65308 trace_id=242 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:04 id=65308 trace_id=242 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:04 id=65308 trace_id=242 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:04 id=65308 trace_id=242 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 77, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:04 id=65308 trace_id=243 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:61356-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:04 id=65308 trace_id=243 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bef4, tun_id=0.0.0.0"
2024-05-14 16:48:04 id=65308 trace_id=243 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:04 id=65308 trace_id=243 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:04 id=65308 trace_id=243 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:04 id=65308 trace_id=243 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:04 id=65308 trace_id=243 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 71, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:06 id=65308 trace_id=244 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50484->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 3537096015, ack 0, win 64240"
2024-05-14 16:48:06 id=65308 trace_id=244 func=init_ip_session_common line=6009 msg="allocate a new session-05a6bf58, tun_id=0.0.0.0"
2024-05-14 16:48:06 id=65308 trace_id=244 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 216.58.213.100
via ifindex-7"
2024-05-14 16:48:06 id=65308 trace_id=244 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:06 id=65308 trace_id=244 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:06 id=65308 trace_id=244 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50484"
2024-05-14 16:48:06 id=65308 trace_id=244 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:06 id=65308 trace_id=244 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50484"
2024-05-14 16:48:06 id=65308 trace_id=244 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13509, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:06 id=65308 trace_id=245 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50484->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 3537096016, ack 690953018, win 1025"
2024-05-14 16:48:06 id=65308 trace_id=245 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bf58, original dire
ction"
2024-05-14 16:48:06 id=65308 trace_id=245 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:06 id=65308 trace_id=245 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:06 id=65308 trace_id=245 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:06 id=65308 trace_id=245 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:06 id=65308 trace_id=245 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50484"
2024-05-14 16:48:06 id=65308 trace_id=245 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13509, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:06 id=65308 trace_id=246 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50476->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [R.], seq 275166983, ack 3240482661, win 0"
2024-05-14 16:48:06 id=65308 trace_id=246 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b52e, original dire
ction"
2024-05-14 16:48:06 id=65308 trace_id=246 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:06 id=65308 trace_id=246 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:06 id=65308 trace_id=246 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50476"
2024-05-14 16:48:06 id=65308 trace_id=246 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11461, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:08 id=65308 trace_id=247 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50478->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [R.], seq 1407834999, ack 1467848386, win 0"
2024-05-14 16:48:08 id=65308 trace_id=247 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b5cb, original dire
ction"
2024-05-14 16:48:08 id=65308 trace_id=247 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:08 id=65308 trace_id=247 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:08 id=65308 trace_id=247 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50478"
2024-05-14 16:48:08 id=65308 trace_id=247 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 11973, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:12 id=65308 trace_id=248 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:49853-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:12 id=65308 trace_id=248 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c110, tun_id=0.0.0.0"
2024-05-14 16:48:12 id=65308 trace_id=248 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:12 id=65308 trace_id=248 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:12 id=65308 trace_id=248 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:12 id=65308 trace_id=248 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:12 id=65308 trace_id=248 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 73, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:12 id=65308 trace_id=249 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:52624-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:12 id=65308 trace_id=249 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c111, tun_id=0.0.0.0"
2024-05-14 16:48:12 id=65308 trace_id=249 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:12 id=65308 trace_id=249 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:12 id=65308 trace_id=249 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:12 id=65308 trace_id=249 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:12 id=65308 trace_id=249 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 74, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:12 id=65308 trace_id=250 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50485->
142.250.187.99:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 4018789478, ack 0, win 65340"
2024-05-14 16:48:12 id=65308 trace_id=250 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c113, tun_id=0.0.0.0"
2024-05-14 16:48:12 id=65308 trace_id=250 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 142.250.187.99
via ifindex-7"
2024-05-14 16:48:12 id=65308 trace_id=250 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:12 id=65308 trace_id=250 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:12 id=65308 trace_id=250 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50485"
2024-05-14 16:48:12 id=65308 trace_id=250 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:12 id=65308 trace_id=250 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50485"
2024-05-14 16:48:12 id=65308 trace_id=250 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13765, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:12 id=65308 trace_id=251 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50485->
142.250.187.99:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 4018789479, ack 892276087, win 1026"
2024-05-14 16:48:12 id=65308 trace_id=251 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c113, original dire
ction"
2024-05-14 16:48:12 id=65308 trace_id=251 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:12 id=65308 trace_id=251 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:12 id=65308 trace_id=251 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:12 id=65308 trace_id=251 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:12 id=65308 trace_id=251 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50485"
2024-05-14 16:48:12 id=65308 trace_id=251 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13765, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:15 id=65308 trace_id=252 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50480->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 624796400, ack 3614795978, win 1025"
2024-05-14 16:48:15 id=65308 trace_id=252 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bc2e, original dire
ction"
2024-05-14 16:48:15 id=65308 trace_id=252 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:15 id=65308 trace_id=252 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:15 id=65308 trace_id=252 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50480"
2024-05-14 16:48:15 id=65308 trace_id=252 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12485, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:16 id=65308 trace_id=253 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50486->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 474079713, ack 0, win 64240"
2024-05-14 16:48:16 id=65308 trace_id=253 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c203, tun_id=0.0.0.0"
2024-05-14 16:48:16 id=65308 trace_id=253 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 216.58.213.100
via ifindex-7"
2024-05-14 16:48:16 id=65308 trace_id=253 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:16 id=65308 trace_id=253 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:16 id=65308 trace_id=253 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50486"
2024-05-14 16:48:16 id=65308 trace_id=253 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:16 id=65308 trace_id=253 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50486"
2024-05-14 16:48:16 id=65308 trace_id=253 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14021, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:16 id=65308 trace_id=254 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50486->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 474079714, ack 1547751662, win 1025"
2024-05-14 16:48:16 id=65308 trace_id=254 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c203, original dire
ction"
2024-05-14 16:48:16 id=65308 trace_id=254 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:16 id=65308 trace_id=254 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:16 id=65308 trace_id=254 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:16 id=65308 trace_id=254 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:16 id=65308 trace_id=254 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50486"
2024-05-14 16:48:16 id=65308 trace_id=254 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14021, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:22 id=65308 trace_id=255 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2219911288, ack 3602733773, win 1026"
2024-05-14 16:48:22 id=65308 trace_id=255 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bd4c, original dire
ction"
2024-05-14 16:48:22 id=65308 trace_id=255 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:22 id=65308 trace_id=255 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:22 id=65308 trace_id=255 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:48:22 id=65308 trace_id=255 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:22 id=65308 trace_id=256 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2219911288, ack 3602733773, win 1026"
2024-05-14 16:48:22 id=65308 trace_id=256 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bd4c, original dire
ction"
2024-05-14 16:48:22 id=65308 trace_id=256 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:22 id=65308 trace_id=256 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:22 id=65308 trace_id=256 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:48:22 id=65308 trace_id=256 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:23 id=65308 trace_id=257 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2219911288, ack 3602733773, win 1026"
2024-05-14 16:48:23 id=65308 trace_id=257 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bd4c, original dire
ction"
2024-05-14 16:48:23 id=65308 trace_id=257 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:23 id=65308 trace_id=257 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:23 id=65308 trace_id=257 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:48:23 id=65308 trace_id=257 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:24 id=65308 trace_id=258 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2219911288, ack 3602733773, win 1026"
2024-05-14 16:48:24 id=65308 trace_id=258 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bd4c, original dire
ction"
2024-05-14 16:48:24 id=65308 trace_id=258 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:24 id=65308 trace_id=258 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:24 id=65308 trace_id=258 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:48:24 id=65308 trace_id=258 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:24 id=65308 trace_id=259 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 524500955, ack 3531082260, win 1024"
2024-05-14 16:48:24 id=65308 trace_id=259 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bda0, original dire
ction"
2024-05-14 16:48:24 id=65308 trace_id=259 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:24 id=65308 trace_id=259 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:24 id=65308 trace_id=259 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:48:24 id=65308 trace_id=259 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:25 id=65308 trace_id=260 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 524500955, ack 3531082260, win 1024"
2024-05-14 16:48:25 id=65308 trace_id=260 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bda0, original dire
ction"
2024-05-14 16:48:25 id=65308 trace_id=260 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:25 id=65308 trace_id=260 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:25 id=65308 trace_id=260 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:48:25 id=65308 trace_id=260 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:25 id=65308 trace_id=261 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 524500955, ack 3531082260, win 1024"
2024-05-14 16:48:25 id=65308 trace_id=261 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bda0, original dire
ction"
2024-05-14 16:48:25 id=65308 trace_id=261 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:25 id=65308 trace_id=261 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:25 id=65308 trace_id=261 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:48:25 id=65308 trace_id=261 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:26 id=65308 trace_id=262 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50487->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 4190926761, ack 0, win 64240"
2024-05-14 16:48:26 id=65308 trace_id=262 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c38a, tun_id=0.0.0.0"
2024-05-14 16:48:26 id=65308 trace_id=262 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 216.58.213.100
via ifindex-7"
2024-05-14 16:48:26 id=65308 trace_id=262 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:26 id=65308 trace_id=262 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:26 id=65308 trace_id=262 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50487"
2024-05-14 16:48:26 id=65308 trace_id=262 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:26 id=65308 trace_id=262 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50487"
2024-05-14 16:48:26 id=65308 trace_id=262 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14277, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:26 id=65308 trace_id=263 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50487->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 4190926762, ack 2081903190, win 1025"
2024-05-14 16:48:26 id=65308 trace_id=263 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c38a, original dire
ction"
2024-05-14 16:48:26 id=65308 trace_id=263 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:26 id=65308 trace_id=263 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:26 id=65308 trace_id=263 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:26 id=65308 trace_id=263 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:26 id=65308 trace_id=263 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50487"
2024-05-14 16:48:26 id=65308 trace_id=263 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14277, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:26 id=65308 trace_id=264 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 524500955, ack 3531082260, win 1024"
2024-05-14 16:48:26 id=65308 trace_id=264 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bda0, original dire
ction"
2024-05-14 16:48:26 id=65308 trace_id=264 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:26 id=65308 trace_id=264 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:26 id=65308 trace_id=264 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:48:26 id=65308 trace_id=264 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:26 id=65308 trace_id=265 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2219911288, ack 3602733773, win 1026"
2024-05-14 16:48:26 id=65308 trace_id=265 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bd4c, original dire
ction"
2024-05-14 16:48:26 id=65308 trace_id=265 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:26 id=65308 trace_id=265 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:26 id=65308 trace_id=265 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:48:26 id=65308 trace_id=265 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:29 id=65308 trace_id=266 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 524500955, ack 3531082260, win 1024"
2024-05-14 16:48:29 id=65308 trace_id=266 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bda0, original dire
ction"
2024-05-14 16:48:29 id=65308 trace_id=266 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:29 id=65308 trace_id=266 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:29 id=65308 trace_id=266 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:48:29 id=65308 trace_id=266 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:31 id=65308 trace_id=267 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2219911288, ack 3602733773, win 1026"
2024-05-14 16:48:31 id=65308 trace_id=267 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bd4c, original dire
ction"
2024-05-14 16:48:31 id=65308 trace_id=267 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:31 id=65308 trace_id=267 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:31 id=65308 trace_id=267 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:48:31 id=65308 trace_id=267 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:31 id=65308 trace_id=268 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:65091-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:31 id=65308 trace_id=268 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c529, tun_id=0.0.0.0"
2024-05-14 16:48:31 id=65308 trace_id=268 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:31 id=65308 trace_id=268 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:31 id=65308 trace_id=268 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:31 id=65308 trace_id=268 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:31 id=65308 trace_id=268 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 77, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:31 id=65308 trace_id=269 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:59211-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:31 id=65308 trace_id=269 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c52b, tun_id=0.0.0.0"
2024-05-14 16:48:31 id=65308 trace_id=269 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:31 id=65308 trace_id=269 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:31 id=65308 trace_id=269 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:31 id=65308 trace_id=269 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:31 id=65308 trace_id=269 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 77, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:31 id=65308 trace_id=270 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50488->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 1237142430, ack 0, win 64240"
2024-05-14 16:48:31 id=65308 trace_id=270 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c52d, tun_id=0.0.0.0"
2024-05-14 16:48:31 id=65308 trace_id=270 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 151.101.2.137
via ifindex-7"
2024-05-14 16:48:31 id=65308 trace_id=270 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:31 id=65308 trace_id=270 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:31 id=65308 trace_id=270 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50488"
2024-05-14 16:48:31 id=65308 trace_id=270 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:31 id=65308 trace_id=270 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50488"
2024-05-14 16:48:31 id=65308 trace_id=270 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14533, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:31 id=65308 trace_id=271 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50488->
151.101.2.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 1237142431, ack 1880953123, win 1026"
2024-05-14 16:48:31 id=65308 trace_id=271 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c52d, original dire
ction"
2024-05-14 16:48:31 id=65308 trace_id=271 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:31 id=65308 trace_id=271 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:31 id=65308 trace_id=271 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:31 id=65308 trace_id=271 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:31 id=65308 trace_id=271 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50488"
2024-05-14 16:48:32 id=65308 trace_id=271 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14533, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:33 id=65308 trace_id=272 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50489->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 4217745971, ack 0, win 64240"
2024-05-14 16:48:33 id=65308 trace_id=272 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c570, tun_id=0.0.0.0"
2024-05-14 16:48:33 id=65308 trace_id=272 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 31.209.137.5 v
ia ifindex-7"
2024-05-14 16:48:33 id=65308 trace_id=272 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:33 id=65308 trace_id=272 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:33 id=65308 trace_id=272 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50489"
2024-05-14 16:48:33 id=65308 trace_id=272 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:33 id=65308 trace_id=272 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50489"
2024-05-14 16:48:33 id=65308 trace_id=272 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14789, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:34 id=65308 trace_id=273 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50489->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 4217745972, ack 3941667768, win 1024"
2024-05-14 16:48:34 id=65308 trace_id=273 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c570, original dire
ction"
2024-05-14 16:48:34 id=65308 trace_id=273 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:34 id=65308 trace_id=273 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:34 id=65308 trace_id=273 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:34 id=65308 trace_id=273 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:34 id=65308 trace_id=273 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50489"
2024-05-14 16:48:34 id=65308 trace_id=273 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14789, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:34 id=65308 trace_id=274 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 524500955, ack 3531082260, win 1024"
2024-05-14 16:48:34 id=65308 trace_id=274 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bda0, original dire
ction"
2024-05-14 16:48:34 id=65308 trace_id=274 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:34 id=65308 trace_id=274 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:34 id=65308 trace_id=274 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:48:34 id=65308 trace_id=274 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:34 id=65308 trace_id=275 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50483->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 1551102244, ack 2695636803, win 1025"
2024-05-14 16:48:34 id=65308 trace_id=275 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bef1, original dire
ction"
2024-05-14 16:48:34 id=65308 trace_id=275 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:34 id=65308 trace_id=275 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:34 id=65308 trace_id=275 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50483"
2024-05-14 16:48:34 id=65308 trace_id=275 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13253, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:35 id=65308 trace_id=276 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50490->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 1164220576, ack 0, win 64240"
2024-05-14 16:48:35 id=65308 trace_id=276 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c5a9, tun_id=0.0.0.0"
2024-05-14 16:48:35 id=65308 trace_id=276 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 216.58.213.100
via ifindex-7"
2024-05-14 16:48:35 id=65308 trace_id=276 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:35 id=65308 trace_id=276 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:35 id=65308 trace_id=276 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50490"
2024-05-14 16:48:35 id=65308 trace_id=276 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:35 id=65308 trace_id=276 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50490"
2024-05-14 16:48:35 id=65308 trace_id=276 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 15045, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:35 id=65308 trace_id=277 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50490->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 1164220577, ack 2104329749, win 1025"
2024-05-14 16:48:35 id=65308 trace_id=277 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c5a9, original dire
ction"
2024-05-14 16:48:35 id=65308 trace_id=277 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:35 id=65308 trace_id=277 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:35 id=65308 trace_id=277 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:35 id=65308 trace_id=277 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:35 id=65308 trace_id=277 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50490"
2024-05-14 16:48:35 id=65308 trace_id=277 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 15045, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:36 id=65308 trace_id=278 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50484->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 3537097740, ack 690953018, win 1025"
2024-05-14 16:48:36 id=65308 trace_id=278 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bf58, original dire
ction"
2024-05-14 16:48:36 id=65308 trace_id=278 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:36 id=65308 trace_id=278 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:36 id=65308 trace_id=278 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50484"
2024-05-14 16:48:36 id=65308 trace_id=278 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13509, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:38 id=65308 trace_id=279 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50444->
20.82.9.214:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2192886137, ack 3255064452, win 1023"
2024-05-14 16:48:38 id=65308 trace_id=279 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a69f75, original dire
ction"
2024-05-14 16:48:38 id=65308 trace_id=279 func=ipv4_fast_cb line=53 msg="enter fast path"
2024-05-14 16:48:38 id=65308 trace_id=279 func=ip_session_run_all_tuple line=7129 msg="SNAT 172.16.35.28->62.1.70.18:50444"
2024-05-14 16:48:38 id=65308 trace_id=280 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50444->
20.82.9.214:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2192886137, ack 3255064452, win 1023"
2024-05-14 16:48:38 id=65308 trace_id=280 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a69f75, original dire
ction"
2024-05-14 16:48:38 id=65308 trace_id=280 func=ipv4_fast_cb line=53 msg="enter fast path"
2024-05-14 16:48:38 id=65308 trace_id=280 func=ip_session_run_all_tuple line=7129 msg="SNAT 172.16.35.28->62.1.70.18:50444"
2024-05-14 16:48:41 id=65308 trace_id=281 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50491->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 304211671, ack 0, win 64240"
2024-05-14 16:48:41 id=65308 trace_id=281 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c659, tun_id=0.0.0.0"
2024-05-14 16:48:41 id=65308 trace_id=281 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 216.58.213.100
via ifindex-7"
2024-05-14 16:48:41 id=65308 trace_id=281 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:41 id=65308 trace_id=281 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:41 id=65308 trace_id=281 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50491"
2024-05-14 16:48:41 id=65308 trace_id=281 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:41 id=65308 trace_id=281 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50491"
2024-05-14 16:48:41 id=65308 trace_id=281 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 15301, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:41 id=65308 trace_id=282 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50491->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 304211672, ack 2259077030, win 1025"
2024-05-14 16:48:41 id=65308 trace_id=282 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c659, original dire
ction"
2024-05-14 16:48:41 id=65308 trace_id=282 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:41 id=65308 trace_id=282 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:41 id=65308 trace_id=282 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:41 id=65308 trace_id=282 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:41 id=65308 trace_id=282 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50491"
2024-05-14 16:48:41 id=65308 trace_id=282 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 15301, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:41 id=65308 trace_id=283 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50481->
151.101.66.137:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [R.], seq 2219911289, ack 3602733773, win 0"
2024-05-14 16:48:41 id=65308 trace_id=283 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bd4c, original dire
ction"
2024-05-14 16:48:41 id=65308 trace_id=283 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:41 id=65308 trace_id=283 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:41 id=65308 trace_id=283 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50481"
2024-05-14 16:48:41 id=65308 trace_id=283 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12741, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:42 id=65308 trace_id=284 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50485->
142.250.187.99:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 4018791210, ack 892276087, win 1026"
2024-05-14 16:48:42 id=65308 trace_id=284 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c113, original dire
ction"
2024-05-14 16:48:42 id=65308 trace_id=284 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:42 id=65308 trace_id=284 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:42 id=65308 trace_id=284 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50485"
2024-05-14 16:48:42 id=65308 trace_id=284 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 13765, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:42 id=65308 trace_id=285 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:54188-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:42 id=65308 trace_id=285 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c6d5, tun_id=0.0.0.0"
2024-05-14 16:48:42 id=65308 trace_id=285 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:42 id=65308 trace_id=285 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:42 id=65308 trace_id=285 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:42 id=65308 trace_id=285 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:42 id=65308 trace_id=285 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 71, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:42 id=65308 trace_id=286 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:55856-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:42 id=65308 trace_id=286 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c6d6, tun_id=0.0.0.0"
2024-05-14 16:48:42 id=65308 trace_id=286 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:42 id=65308 trace_id=286 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:42 id=65308 trace_id=286 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:42 id=65308 trace_id=286 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:42 id=65308 trace_id=286 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 74, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:42 id=65308 trace_id=287 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50492->
142.250.187.99:80) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 823887477, ack 0, win 65340"
2024-05-14 16:48:42 id=65308 trace_id=287 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c6d7, tun_id=0.0.0.0"
2024-05-14 16:48:42 id=65308 trace_id=287 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 142.250.187.99
via ifindex-7"
2024-05-14 16:48:42 id=65308 trace_id=287 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:42 id=65308 trace_id=287 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:42 id=65308 trace_id=287 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50492"
2024-05-14 16:48:42 id=65308 trace_id=287 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:42 id=65308 trace_id=287 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50492"
2024-05-14 16:48:42 id=65308 trace_id=287 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 15557, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:42 id=65308 trace_id=288 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50492->
142.250.187.99:80) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 823887478, ack 155168809, win 1025"
2024-05-14 16:48:42 id=65308 trace_id=288 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c6d7, original dire
ction"
2024-05-14 16:48:42 id=65308 trace_id=288 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:42 id=65308 trace_id=288 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:42 id=65308 trace_id=288 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:42 id=65308 trace_id=288 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:42 id=65308 trace_id=288 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50492"
2024-05-14 16:48:42 id=65308 trace_id=288 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 15557, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:43 id=65308 trace_id=289 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50482->
31.209.137.5:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [R.], seq 524500956, ack 3531082260, win 0"
2024-05-14 16:48:43 id=65308 trace_id=289 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6bda0, original dire
ction"
2024-05-14 16:48:43 id=65308 trace_id=289 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:43 id=65308 trace_id=289 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:43 id=65308 trace_id=289 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50482"
2024-05-14 16:48:43 id=65308 trace_id=289 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 12997, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:46 id=65308 trace_id=290 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50486->
216.58.213.100:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 474081502, ack 1547751662, win 1025"
2024-05-14 16:48:46 id=65308 trace_id=290 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c203, original dire
ction"
2024-05-14 16:48:46 id=65308 trace_id=290 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000000 ses.state=00012204 ses.npu_state=0x00003c94"
2024-05-14 16:48:46 id=65308 trace_id=290 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:46 id=65308 trace_id=290 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50486"
2024-05-14 16:48:46 id=65308 trace_id=290 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 14021, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:47 id=65308 trace_id=291 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50472->
52.175.242.169:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [F.], seq 2789885589, ack 3635396352, win 1026"
2024-05-14 16:48:47 id=65308 trace_id=291 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6b249, original dire
ction"
2024-05-14 16:48:47 id=65308 trace_id=291 func=ipv4_fast_cb line=53 msg="enter fast path"
2024-05-14 16:48:47 id=65308 trace_id=291 func=ip_session_run_all_tuple line=7129 msg="SNAT 172.16.35.28->62.1.70.18:50472"
2024-05-14 16:48:48 id=65308 trace_id=292 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50493->
172.16.20.26:445) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 1745229285, ack 0, win 64240"
2024-05-14 16:48:48 id=65308 trace_id=292 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c7ff, tun_id=0.0.0.0"
2024-05-14 16:48:48 id=65308 trace_id=292 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.26 via I
nfrastructure"
2024-05-14 16:48:48 id=65308 trace_id=292 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:48 id=65308 trace_id=292 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:48 id=65308 trace_id=292 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 71, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:48 id=65308 trace_id=293 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50493->
172.16.20.26:445) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 1745229286, ack 2470032492, win 1026"
2024-05-14 16:48:48 id=65308 trace_id=293 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c7ff, original dire
ction"
2024-05-14 16:48:48 id=65308 trace_id=293 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to I
nfrastructure, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:48 id=65308 trace_id=293 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:48 id=65308 trace_id=293 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:48 id=65308 trace_id=293 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:48 id=65308 trace_id=293 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 71, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 0, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:52 id=65308 trace_id=294 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=17, 172.16.35.28:61746-
>172.16.20.25:53) tun_id=0.0.0.0 from HRS_Mobile_Usr. "
2024-05-14 16:48:52 id=65308 trace_id=294 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c89d, tun_id=0.0.0.0"
2024-05-14 16:48:52 id=65308 trace_id=294 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-172.16.20.25 via I
nfrastructure"
2024-05-14 16:48:52 id=65308 trace_id=294 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=46, len=2"
2024-05-14 16:48:52 id=65308 trace_id=294 func=fw_forward_handler line=979 msg="Allowed by Policy-36:"
2024-05-14 16:48:52 id=65308 trace_id=294 func=__ip_session_run_tuple line=3460 msg="run helper-dns-udp(dir=original)"
2024-05-14 16:48:52 id=65308 trace_id=294 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 70, vta
g->vid 20
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1532, vtag->flags 10, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:52 id=65308 trace_id=295 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50496->
173.222.107.27:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 2821860218, ack 0, win 64240"
2024-05-14 16:48:52 id=65308 trace_id=295 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c89e, tun_id=0.0.0.0"
2024-05-14 16:48:52 id=65308 trace_id=295 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 173.222.107.27
via ifindex-7"
2024-05-14 16:48:52 id=65308 trace_id=295 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:52 id=65308 trace_id=295 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:52 id=65308 trace_id=295 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50496"
2024-05-14 16:48:52 id=65308 trace_id=295 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:52 id=65308 trace_id=295 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50496"
2024-05-14 16:48:52 id=65308 trace_id=295 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 16581, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:52 id=65308 trace_id=296 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50496->
173.222.107.27:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 2821860219, ack 3366918263, win 1026"
2024-05-14 16:48:52 id=65308 trace_id=296 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c89e, original dire
ction"
2024-05-14 16:48:52 id=65308 trace_id=296 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:52 id=65308 trace_id=296 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:52 id=65308 trace_id=296 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:52 id=65308 trace_id=296 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:52 id=65308 trace_id=296 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50496"
2024-05-14 16:48:52 id=65308 trace_id=296 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 16581, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
2024-05-14 16:48:52 id=65308 trace_id=297 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50496->
173.222.107.27:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 2821860736, ack 3366921481, win 1026"
2024-05-14 16:48:52 id=65308 trace_id=297 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c89e, original dire
ction"
2024-05-14 16:48:52 id=65308 trace_id=297 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00010204 ses.npu_state=0x00003c08"
2024-05-14 16:48:52 id=65308 trace_id=297 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:52 id=65308 trace_id=297 func=fw_forward_dirty_handler line=437 msg="state=00010204, state2=00000001, npu_state=00003c0
8"
2024-05-14 16:48:52 id=65308 trace_id=297 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50496"
2024-05-14 16:48:53 id=65308 trace_id=298 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50496->
173.222.107.27:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [R.], seq 2821862018, ack 3366999780, win 0"
2024-05-14 16:48:53 id=65308 trace_id=298 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c89e, original dire
ction"
2024-05-14 16:48:53 id=65308 trace_id=298 func=ipv4_fast_cb line=53 msg="enter fast path"
2024-05-14 16:48:53 id=65308 trace_id=298 func=ip_session_run_all_tuple line=7129 msg="SNAT 172.16.35.28->62.1.70.18:50496"
2024-05-14 16:48:53 id=65308 trace_id=299 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50499->
173.222.107.27:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [S], seq 453328451, ack 0, win 64240"
2024-05-14 16:48:53 id=65308 trace_id=299 func=init_ip_session_common line=6009 msg="allocate a new session-05a6c8e3, tun_id=0.0.0.0"
2024-05-14 16:48:53 id=65308 trace_id=299 func=rpdb_srv_match_input line=1046 msg="Match policy routing id=2130837507: to 173.222.107.27
via ifindex-7"
2024-05-14 16:48:53 id=65308 trace_id=299 func=vf_ip_route_input_common line=2611 msg="find a route: flag=04000000 gw-62.1.70.17 via wan
1"
2024-05-14 16:48:53 id=65308 trace_id=299 func=__iprope_tree_check line=528 msg="gnum-100004, use int hash, slot=7, len=15"
2024-05-14 16:48:53 id=65308 trace_id=299 func=get_new_addr line=1205 msg="find SNAT: IP-62.1.70.18(from IPPOOL), port-50499"
2024-05-14 16:48:53 id=65308 trace_id=299 func=fw_forward_handler line=979 msg="Allowed by Policy-37: SNAT"
2024-05-14 16:48:53 id=65308 trace_id=299 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50499"
2024-05-14 16:48:53 id=65308 trace_id=299 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 17349, vtag->mtu 1400, vtag->flags 12, vtag->np6_flag 0x0, skb->npu_flag=0xc0880"
2024-05-14 16:48:53 id=65308 trace_id=300 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.16.35.28:50499->
173.222.107.27:443) tun_id=0.0.0.0 from HRS_Mobile_Usr. flag [.], seq 453328452, ack 1649111358, win 1026"
2024-05-14 16:48:53 id=65308 trace_id=300 func=resolve_ip_tuple_fast line=5912 msg="Find an existing session, id-05a6c8e3, original dire
ction"
2024-05-14 16:48:53 id=65308 trace_id=300 func=npu_handle_session44 line=1206 msg="Trying to offloading session from HRS_Mobile_Usr to w
an1, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003894"
2024-05-14 16:48:53 id=65308 trace_id=300 func=np6xlite_fos_set_nturbo_ips_fwd_session line=620 msg="push nturbo session oid 16"
2024-05-14 16:48:53 id=65308 trace_id=300 func=ip_session_install_npu_session line=358 msg="npu session installation succeeded"
2024-05-14 16:48:53 id=65308 trace_id=300 func=fw_forward_dirty_handler line=437 msg="state=00012204, state2=00000001, npu_state=00003c9
4"
2024-05-14 16:48:53 id=65308 trace_id=300 func=__ip_session_run_tuple line=3406 msg="SNAT 172.16.35.28->62.1.70.18:50499"
2024-05-14 16:48:53 id=65308 trace_id=300 func=np6xlite_hif_nturbo_build_vtag line=1224 msg="vtag->magic d153beef, vtag->coretag 66, vta
g->vid 0
vtag->sip[0] 1246013e, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 17349, vtag->mtu 1400, vtag->flags 2, vtag->np6_flag 0x0, skb->npu_flag=0xc0c80"
command parse error before 'consoe'
Command fail. Return code -61
HRS_Firewall #
Hello @chrispng ,
I can't find anything in debug output. The last thing on my mind would be to try it with security profiles turned off. If it works we can focus on them.
i will further search for vivaldi logs
Provided below are two screenshots from a really basic test policy.it still wont work
Let me add i also have a wifi AP on a different policy on the same floor. From the wifi it works fine.
Hello @chrispng ,
First of all, can you apply the security profiles you have applied for wifi within this rule?
Alternatively, the problem may be caused by mss settings. Can you enter the following mtu settings only for the relevant rule?
config firewall policy
edit <policy id>
set tcp-mss-sender 1300
set tcp-mss-receiver 1300
I think its the APP control module. On previous trials it probably took some time to implepent the changes so i didnt notice in time any behavior changes.
I will play with the cattegory filters since its not registered in fortinet
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1632 | |
1063 | |
749 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.