Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
ghuffran
New Contributor

URL Not accesable without any error.

I am having problem with one URL which is not accessable, all other URLs are are working fine.
In Forward Traffic I receive this error Action: TCP reset from server
I have removed the firewall policy of AV, IPS, SSL Inspection is no-inspection however still cannot access this particular URL https://i-care.globemedkuwait.com:8034
In policy all ports are allowed, at this point I have removed all security from this particular policy.

This URL is accessable if I bypass the firewall to the router directly. I tried with various other DNS as well in the firewall.

Thanks

 

Fortigate 300D

Firmware 6.4.10

Fortinet.png

3 REPLIES 3
Yurisk
Valued Contributor

Hi, by the log message alone it looks like the remote server resets the connection for some reason. To be sure I'd advise to run diagnose debug flow on the Fortigate, see details in Step 4 here:  https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-First-steps-to-troubleshoot-connecti... 

Yuri https://yurisk.info/  blog: All things Fortinet, no ads.
Yuri https://yurisk.info/ blog: All things Fortinet, no ads.
ghuffran


2023-03-09 20:18:25 id=20085 trace_id=180 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.1:8023->127.0.0.2:6391) from local. flag [.], seq 1518558428, ack 2611461049, win 10"
2023-03-09 20:18:25 id=20085 trace_id=180 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=180 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=181 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.2:6391->127.0.0.1:8023) from local. flag [.], seq 2611461049, ack 1518559973, win 9"
2023-03-09 20:18:25 id=20085 trace_id=181 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, original direction"
2023-03-09 20:18:25 id=20085 trace_id=181 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=182 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.1.8.47:54978->104.208.16.94:443) from local. flag [.], seq 1560304973, ack 790195169, win 664"
2023-03-09 20:18:25 id=20085 trace_id=182 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001b4e6c, original direction"
2023-03-09 20:18:25 id=20085 trace_id=182 func=__ip_session_run_tuple line=3519 msg="SNAT 10.1.8.47->62.215.108.66:54978"
2023-03-09 20:18:25 id=20085 trace_id=182 func=ipd_post_route_handler line=490 msg="out port1 vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=183 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.1:8023->127.0.0.2:6391) from local. flag [.], seq 1518559973, ack 2611461049, win 10"
2023-03-09 20:18:25 id=20085 trace_id=183 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=183 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=184 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.2:6391->127.0.0.1:8023) from local. flag [.], seq 2611461049, ack 1518561364, win 9"
2023-03-09 20:18:25 id=20085 trace_id=184 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, original direction"
2023-03-09 20:18:25 id=20085 trace_id=184 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=185 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.2.3.36:56214->192.168.1.3:443) from port8. flag [.], seq 2722074149, ack 2038565855, win 4106"
2023-03-09 20:18:25 id=20085 trace_id=185 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7c, original direction"
2023-03-09 20:18:25 id=20085 trace_id=186 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 192.168.1.3:443->10.2.3.36:56214) from local. flag [.], seq 2038573155, ack 2722074149, win 11"
2023-03-09 20:18:25 id=20085 trace_id=186 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7c, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=186 func=ipd_post_route_handler line=490 msg="out port8 vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=187 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 192.168.1.3:443->10.2.3.36:56214) from local. flag [.], seq 2038574615, ack 2722074149, win 11"
2023-03-09 20:18:25 id=20085 trace_id=187 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7c, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=187 func=ipd_post_route_handler line=490 msg="out port8 vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=188 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 192.168.1.3:443->10.2.3.36:56214) from local. flag [.], seq 2038576075, ack 2722074149, win 11"
2023-03-09 20:18:25 id=20085 trace_id=188 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7c, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=188 func=ipd_post_route_handler line=490 msg="out port8 vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=189 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 192.168.1.3:443->10.2.3.36:56214) from local. flag [.], seq 2038577535, ack 2722074149, win 11"
2023-03-09 20:18:25 id=20085 trace_id=189 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7c, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=189 func=ipd_post_route_handler line=490 msg="out port8 vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=190 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 192.168.1.3:443->10.2.3.36:56214) from local. flag [.], seq 2038578995, ack 2722074149, win 11"
2023-03-09 20:18:25 id=20085 trace_id=190 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7c, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=190 func=ipd_post_route_handler line=490 msg="out port8 vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=191 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 192.168.1.3:443->10.2.3.36:56214) from local. flag [.], seq 2038580455, ack 2722074149, win 11"
2023-03-09 20:18:25 id=20085 trace_id=191 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7c, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=191 func=ipd_post_route_handler line=490 msg="out port8 vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=192 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 192.168.1.3:443->10.2.3.36:56214) from local. flag [.], seq 2038581915, ack 2722074149, win 11"
2023-03-09 20:18:25 id=20085 trace_id=192 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7c, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=192 func=ipd_post_route_handler line=490 msg="out port8 vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=193 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.1:8023->127.0.0.2:6391) from local. flag [.], seq 1518561364, ack 2611461049, win 10"
2023-03-09 20:18:25 id=20085 trace_id=193 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=193 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=194 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.2:6391->127.0.0.1:8023) from local. flag [.], seq 2611461049, ack 1518562814, win 10"
2023-03-09 20:18:25 id=20085 trace_id=194 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, original direction"
2023-03-09 20:18:25 id=20085 trace_id=194 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=195 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.1:8023->127.0.0.2:6391) from local. flag [.], seq 1518562814, ack 2611461049, win 10"
2023-03-09 20:18:25 id=20085 trace_id=195 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=195 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=196 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.2:6391->127.0.0.1:8023) from local. flag [.], seq 2611461049, ack 1518563678, win 10"
2023-03-09 20:18:25 id=20085 trace_id=196 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, original direction"
2023-03-09 20:18:25 id=20085 trace_id=196 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=197 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.1:8023->127.0.0.2:6391) from local. flag [.], seq 1518563678, ack 2611461049, win 10"
2023-03-09 20:18:25 id=20085 trace_id=197 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=197 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=198 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.2:6391->127.0.0.1:8023) from local. flag [.], seq 2611461049, ack 1518564511, win 10"
2023-03-09 20:18:25 id=20085 trace_id=198 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, original direction"
2023-03-09 20:18:25 id=20085 trace_id=198 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=199 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.1:8023->127.0.0.2:6391) from local. flag [.], seq 1518564511, ack 2611461049, win 10"
2023-03-09 20:18:25 id=20085 trace_id=199 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, reply direction"
2023-03-09 20:18:25 id=20085 trace_id=199 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"
2023-03-09 20:18:25 id=20085 trace_id=200 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 127.0.0.2:6391->127.0.0.1:8023) from local. flag [.], seq 2611461049, ack 1518565277, win 10"
2023-03-09 20:18:25 id=20085 trace_id=200 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001ada7e, original direction"
2023-03-09 20:18:25 id=20085 trace_id=200 func=ipd_post_route_handler line=490 msg="out root vwl_zone_id 0, state2 0x0, quality 0.
"

FGT-HC-2 #

ghuffran

This is the URL which is inaccessable.

 

FGT-HC-2 # diagnose debug flow filter daddr 185.54.96.64

FGT-HC-2 # diag debug flow trace start 300

FGT-HC-2 # 2023-03-09 20:37:06 id=20085 trace_id=5906 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.2.3.36:57198->185.54.96.64:8034) from port8. flag [S], seq 1051796467, ack 0, win 64240"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=init_ip_session_common line=5995 msg="allocate a new session-001d57af"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=iprope_dnat_check line=5121 msg="in-[port8], out-[]"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=iprope_dnat_tree_check line=823 msg="len=0"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=iprope_dnat_check line=5134 msg="result: skb_flags-02000000, vid-0, ret-no-match, act-accept, flag-00000000"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=vf_ip_route_input_common line=2615 msg="find a route: flag=00000000 gw-62.215.108.65 via port1"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=iprope_fwd_check line=765 msg="in-[port8], out-[port1], skb_flags-02000000, vid-0, app_id: 0, url_cat_id: 0"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_tree_check line=546 msg="gnum-100004, use svc hash, slot=2, len=30"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-4294967295, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-20, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-48, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-65, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-1, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-42, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-2, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-7, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-36, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-71, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_user_identity_check line=1777 msg="ret-matched"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=get_new_addr line=1193 msg="find SNAT: IP-62.215.108.66(from IPPOOL), port-57198"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__iprope_check_one_policy line=2174 msg="policy-71 is matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=iprope_fwd_check line=806 msg="after iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-71"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=iprope_fwd_auth_check line=825 msg="after iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-71"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=iprope_reverse_dnat_check line=1269 msg="in-[port8], out-[port1], skb_flags-02000000, vid-0"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=iprope_reverse_dnat_tree_check line=915 msg="len=0"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=fw_forward_handler line=811 msg="Allowed by Policy-71: SNAT"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=__ip_session_run_tuple line=3519 msg="SNAT 10.2.3.36->62.215.108.66:57198"
2023-03-09 20:37:06 id=20085 trace_id=5906 func=ipd_post_route_handler line=490 msg="out port1 vwl_zone_id 0, state2 0x1, quality 0.
"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.2.3.36:57199->185.54.96.64:8034) from port8. flag [S], seq 3824440288, ack 0, win 64240"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=init_ip_session_common line=5995 msg="allocate a new session-001d57b0"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=iprope_dnat_check line=5121 msg="in-[port8], out-[]"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=iprope_dnat_tree_check line=823 msg="len=0"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=iprope_dnat_check line=5134 msg="result: skb_flags-02000000, vid-0, ret-no-match, act-accept, flag-00000000"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=vf_ip_route_input_common line=2615 msg="find a route: flag=00000000 gw-62.215.108.65 via port1"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=iprope_fwd_check line=765 msg="in-[port8], out-[port1], skb_flags-02000000, vid-0, app_id: 0, url_cat_id: 0"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_tree_check line=546 msg="gnum-100004, use svc hash, slot=2, len=30"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-4294967295, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-20, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-48, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-65, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-1, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-42, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-2, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-7, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-36, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-71, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_user_identity_check line=1777 msg="ret-matched"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=get_new_addr line=1193 msg="find SNAT: IP-62.215.108.66(from IPPOOL), port-57199"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__iprope_check_one_policy line=2174 msg="policy-71 is matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=iprope_fwd_check line=806 msg="after iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-71"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=iprope_fwd_auth_check line=825 msg="after iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-71"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=iprope_reverse_dnat_check line=1269 msg="in-[port8], out-[port1], skb_flags-02000000, vid-0"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=iprope_reverse_dnat_tree_check line=915 msg="len=0"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=fw_forward_handler line=811 msg="Allowed by Policy-71: SNAT"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=__ip_session_run_tuple line=3519 msg="SNAT 10.2.3.36->62.215.108.66:57199"
2023-03-09 20:37:06 id=20085 trace_id=5907 func=ipd_post_route_handler line=490 msg="out port1 vwl_zone_id 0, state2 0x1, quality 0.
"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.2.3.36:57200->185.54.96.64:8034) from port8. flag [S], seq 725539116, ack 0, win 64240"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=init_ip_session_common line=5995 msg="allocate a new session-001d57c6"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=iprope_dnat_check line=5121 msg="in-[port8], out-[]"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=iprope_dnat_tree_check line=823 msg="len=0"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=iprope_dnat_check line=5134 msg="result: skb_flags-02000000, vid-0, ret-no-match, act-accept, flag-00000000"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=vf_ip_route_input_common line=2615 msg="find a route: flag=00000000 gw-62.215.108.65 via port1"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=iprope_fwd_check line=765 msg="in-[port8], out-[port1], skb_flags-02000000, vid-0, app_id: 0, url_cat_id: 0"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_tree_check line=546 msg="gnum-100004, use svc hash, slot=2, len=30"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-4294967295, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-20, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-48, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-65, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-1, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-42, ret-no-match, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-2, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-7, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-36, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_user_identity_check line=1777 msg="ret-no-match"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=1960 msg="checked gnum-100004 policy-71, ret-matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_user_identity_check line=1777 msg="ret-matched"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=get_new_addr line=1193 msg="find SNAT: IP-62.215.108.66(from IPPOOL), port-57200"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__iprope_check_one_policy line=2174 msg="policy-71 is matched, act-accept"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=iprope_fwd_check line=806 msg="after iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-71"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=iprope_fwd_auth_check line=825 msg="after iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-71"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=iprope_reverse_dnat_check line=1269 msg="in-[port8], out-[port1], skb_flags-02000000, vid-0"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=iprope_reverse_dnat_tree_check line=915 msg="len=0"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=fw_forward_handler line=811 msg="Allowed by Policy-71: SNAT"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=__ip_session_run_tuple line=3519 msg="SNAT 10.2.3.36->62.215.108.66:57200"
2023-03-09 20:37:06 id=20085 trace_id=5908 func=ipd_post_route_handler line=490 msg="out port1 vwl_zone_id 0, state2 0x1, quality 0.
"
2023-03-09 20:37:06 id=20085 trace_id=5909 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.2.3.36:57198->185.54.96.64:8034) from port8. flag [.], seq 1051796468, ack 569856183, win 513"
2023-03-09 20:37:06 id=20085 trace_id=5909 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001d57af, original direction"
2023-03-09 20:37:06 id=20085 trace_id=5909 func=npu_handle_session44 line=1217 msg="Trying to offloading session from port8 to port1, skb.npu_flag=00000400 ses.state=00010204 ses.npu_state=0x00000800"
2023-03-09 20:37:06 id=20085 trace_id=5909 func=ip_session_install_npu_session line=359 msg="npu session installation succeeded"
2023-03-09 20:37:06 id=20085 trace_id=5909 func=fw_forward_dirty_handler line=397 msg="state=00010204, state2=00000001, npu_state=00000c00"
2023-03-09 20:37:06 id=20085 trace_id=5909 func=__ip_session_run_tuple line=3519 msg="SNAT 10.2.3.36->62.215.108.66:57198"
2023-03-09 20:37:06 id=20085 trace_id=5909 func=ipd_post_route_handler line=490 msg="out port1 vwl_zone_id 0, state2 0x1, quality 0.
"
2023-03-09 20:37:06 id=20085 trace_id=5910 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.2.3.36:57199->185.54.96.64:8034) from port8. flag [.], seq 3824440289, ack 1141060160, win 513"
2023-03-09 20:37:06 id=20085 trace_id=5910 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001d57b0, original direction"
2023-03-09 20:37:06 id=20085 trace_id=5910 func=npu_handle_session44 line=1217 msg="Trying to offloading session from port8 to port1, skb.npu_flag=00000400 ses.state=00010204 ses.npu_state=0x00000800"
2023-03-09 20:37:06 id=20085 trace_id=5910 func=ip_session_install_npu_session line=359 msg="npu session installation succeeded"
2023-03-09 20:37:06 id=20085 trace_id=5910 func=fw_forward_dirty_handler line=397 msg="state=00010204, state2=00000001, npu_state=00000c00"
2023-03-09 20:37:06 id=20085 trace_id=5910 func=__ip_session_run_tuple line=3519 msg="SNAT 10.2.3.36->62.215.108.66:57199"
2023-03-09 20:37:06 id=20085 trace_id=5910 func=ipd_post_route_handler line=490 msg="out port1 vwl_zone_id 0, state2 0x1, quality 0.
"
2023-03-09 20:37:06 id=20085 trace_id=5911 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.2.3.36:57200->185.54.96.64:8034) from port8. flag [.], seq 725539117, ack 2646993259, win 513"
2023-03-09 20:37:06 id=20085 trace_id=5911 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001d57c6, original direction"
2023-03-09 20:37:06 id=20085 trace_id=5911 func=npu_handle_session44 line=1217 msg="Trying to offloading session from port8 to port1, skb.npu_flag=00000400 ses.state=00010204 ses.npu_state=0x00000800"
2023-03-09 20:37:06 id=20085 trace_id=5911 func=ip_session_install_npu_session line=359 msg="npu session installation succeeded"
2023-03-09 20:37:06 id=20085 trace_id=5911 func=fw_forward_dirty_handler line=397 msg="state=00010204, state2=00000001, npu_state=00000c00"
2023-03-09 20:37:06 id=20085 trace_id=5911 func=__ip_session_run_tuple line=3519 msg="SNAT 10.2.3.36->62.215.108.66:57200"
2023-03-09 20:37:06 id=20085 trace_id=5911 func=ipd_post_route_handler line=490 msg="out port1 vwl_zone_id 0, state2 0x1, quality 0.
"
2023-03-09 20:37:06 id=20085 trace_id=5912 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 10.2.3.36:57199->185.54.96.64:8034) from port8. flag [F.], seq 3824441649, ack 1141068018, win 512"
2023-03-09 20:37:06 id=20085 trace_id=5912 func=resolve_ip_tuple_fast line=5905 msg="Find an existing session, id-001d57b0, original direction"
2023-03-09 20:37:06 id=20085 trace_id=5912 func=npu_handle_session44 line=1217 msg="Trying to offloading session from port8 to port1, skb.npu_flag=00000000 ses.state=00010204 ses.npu_state=0x00000c00"
2023-03-09 20:37:06 id=20085 trace_id=5912 func=fw_forward_dirty_handler line=397 msg="state=00010204, state2=00000001, npu_state=00000c00"
2023-03-09 20:37:06 id=20085 trace_id=5912 func=__ip_session_run_tuple line=3519 msg="SNAT 10.2.3.36->62.215.108.66:57199"
2023-03-09 20:37:06 id=20085 trace_id=5912 func=ipd_post_route_handler line=490 msg="out port1 vwl_zone_id 0, state2 0x1, quality 0.
"

Labels
Top Kudoed Authors