Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
MightyBob
New Contributor

IPSec + software switch issue

Hi Folks,

 

I'm looking for any help from the community. I've connected my 2 private homes with 2 old (support expired) fortigate/fortiwifi and I'm facing a very strange behavior...

 

Situation Site A : FortiGate 60D (6.0.12)   - Freebox Revolution (FTTH), mode bridge on "wan1"   - Mode NAT (Flow-based)   - uplink to core switch on LAN1 "internal"

  - wifi provided by UniFi APs   Site B : FortiWifi 60D (6.0.12)   - Freebox Crystal (xDSL), mode bridge on "wan1"   - Mode NAT (Flow-based)   - uplink to core switch on LAN1 "internal"   - Software Switch "lan" including "internal" and "wifi"   - 3 FAP221C managed by this FortiWifi   - 1 SSID published on "wifi"   IPSec Tunnel LAN-to-LAN between Site A and Site B What's working

Everything from site B to any on wan1 ping from site A IP to site B ping from site B IP to site A SSH connexion from site B to a server on site A SSH connexion from site A to a server on site B snmpwalk from site A to site B snmpwalk from site B to site A HTTP/HTTPS session from site B to site A, but only if computer on site B is connected by wire to the LAN SMB session from site B to site A, but only if computer on site B is connected by wire to the LAN What's NOT working HTTP/HTTPS session from site B to site A, but only if computer on site B is connected by wifi to the LAN SMB session from site B to site A, but only if computer on site B is connected by wifi to the LAN

 

I'm stuck here... I would highly appreciate community help. Feel free to ask more details/logs/paket capture, etc.

 

Thanks in advance.

 

Regards,

Bruno

3 REPLIES 3
emnoc
Esteemed Contributor III

You need to do proper diagnostic

 

 

https://docs.fortinet.com/document/fortigate/6.2.3/cookbook/54688/debugging-the-packet-flow

https://kb.fortinet.com/kb/documentLink.do?externalID=11186

 

 

  diag debug flow 

  diag  sniffer   packet  < ipsec tunnel phase1 name >

 

https://help.fortinet.com/fadc/4-8-1/cli/Content/FortiADC/cli-ref/get_router_info_routing_table.htm

 

Also check the route table on both units and for the networks ( wire wireless)

 

Ken Felix

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
MightyBob
New Contributor

Below the first results of diags.

 

Test Environment: - PC (MS Windows 10) on site B connecting to Synology web interface on site A - PC identification: MAC=a2:fb:e9:a9:4d / IP=192.168.3.104 - Synology identification: MAC=00:11:32:85:4a:2b / IP=192.168.153.8

 

SiteB FGT config extracts:

config wireless-controller vap
    edit "wifi"
        set vdom "root"
        set ssid "wifi_xxxxxx"
        set schedule "always"
        set quarantine disable
        set passphrase ENC xxxxxxxxx
    next
end
config system switch-interface
    edit "lan"
        set vdom "root"
        set member "internal" "wifi"
    next
end
config system interface
    edit "wifi"
        set vdom "root"
        set type vap-switch
        set role lan
        set snmp-index 7
    next
 edit "wan1"
        set vdom "root"
        set mode dhcp
        set allowaccess ping https http
        set type physical
        set alias "Freebox"
        set role wan
        set snmp-index 2
        set dns-server-override disable
    next
    edit "lan"
        set vdom "root"
        set ip 192.168.3.254 255.255.255.0
        set allowaccess ping https ssh snmp http fgfm radius-acct capwap ftm
        set type switch
        set device-identification enable
        set device-identification-active-scan enable
        set fortiheartbeat enable
        set role lan
        set snmp-index 8
    next
    edit "internal"
        set vdom "root"
        set type hard-switch
        set stp enable
        set role lan
        set snmp-index 6
    next
    edit "VPNIPSEC-SITEA"
        set vdom "root"
        set type tunnel
        set snmp-index 9
        set interface "wan1"
    next
end
config system physical-switch
    edit "sw0"
        set age-val 0
    next
end
config system virtual-switch
    edit "internal"
        set physical-switch "sw0"
        config port
            edit "internal1"
            next
            edit "internal2"
            next
            edit "internal3"
            next
            edit "internal4"
            next
            edit "internal5"
            next
            edit "internal6"
            next
            edit "internal7"
            next
        end
    next
end
config vpn ipsec phase1-interface
    edit "VPNIPSEC-SITEA"
        set type ddns
        set interface "wan1"
        set peertype any
        set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
        set comments "VPN: VPNIPSEC-SITEA (Created by VPN wizard)"
        set wizard-type static-fortigate
        set remotegw-ddns "sitea.domain.fqdn"
        set psksecret ENC xxxxxxxxx
    next
end
config vpn ipsec phase2-interface
    edit "VPNIPSEC-SITEA"
        set phase1name "VPNIPSEC-SITEA"
        set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256
        set comments "VPN: VPNIPSEC-SITEA (Created by VPN wizard)"
        set src-addr-type name
        set dst-addr-type name
        set src-name "VPNIPSEC-SITEA_local"
        set dst-name "VPNIPSEC-SITEA_remote"
    next
end
config firewall policy
    edit 1
        set name "OPENBAR"
        set srcintf "lan"
        set dstintf "wan1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
        set fsso disable
        set nat enable
    next
    edit 3
        set name "vpn_VPNIPSEC-SITEA_local"
        set srcintf "lan"
        set dstintf "VPNIPSEC-SITEA"
        set srcaddr "VPNIPSEC-SITEA_local"
        set dstaddr "VPNIPSEC-SITEA_remote"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
        set fsso disable
        set comments "VPN: VPNIPSEC-SITEA (Created by VPN wizard)"
    next
    edit 4
        set name "vpn_VPNIPSEC-SITEA_remote"
        set srcintf "VPNIPSEC-SITEA"
        set dstintf "lan"
        set srcaddr "VPNIPSEC-SITEA_remote"
        set dstaddr "VPNIPSEC-SITEA_local"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
        set fsso disable
        set comments "VPN: VPNIPSEC-SITEA (Created by VPN wizard)"
    next
end
config wireless-controller wtp-profile
    edit "FAP221C-default"
        config platform
            set type 221C
        end
        set handoff-sta-thresh 30
        set ap-country FR
        set allowaccess http https ssh
        config radio-1
            set band 802.11n
            set auto-power-level enable
            set auto-power-high 20
            set channel-utilization enable
            set frequency-handoff enable
            set ap-handoff enable
            set channel "1" "6" "11"
        end
        config radio-2
            set band 802.11ac
            set channel-bonding 40MHz
            set auto-power-level enable
            set auto-power-high 18
            set channel-utilization enable
            set frequency-handoff enable
            set ap-handoff enable
        end
        config lbs
            set station-locate enable
        end
    next
end
config router static
    edit 1
        set device "VPNIPSEC-SITEA"
        set comment "VPN: VPNIPSEC-SITEA (Created by VPN wizard)"
        set dstaddr "VPNIPSEC-SITEA_remote"
    next
    edit 2
        set distance 254
        set comment "VPN: VPNIPSEC-SITEA (Created by VPN wizard)"
        set blackhole enable
        set dstaddr "VPNIPSEC-SITEA_remote"
    next
end

 

FGT Console dump:

FGT-SITEB # get router info routing-table all

Routing table for VRF=0
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
       O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
       * - candidate default

S* 0.0.0.0/0 [5/0] via 82.65.26.254, wan1
C 82.65.26.0/24 is directly connected, wan1
C 192.168.3.0/24 is directly connected, lan
S 192.168.153.0/24 [10/0] is directly connected, VPNIPSEC-SITEA

and

FGT-SITEB # diagnose debug enable

FGT-SITEB # diagnose debug flow filter addr 192.168.153.8

FGT-SITEB # diagnose debug flow show function-name enable
show function name

FGT-SITEB # diagnose debug flow trace start 100

id=20085 trace_id=102 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.113:61566) from VPNIPSEC-SITEA. flag [.], seq 3381790935, ack 1913369428, win 235"
id=20085 trace_id=102 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064b93, reply direction"
id=20085 trace_id=102 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=103 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.113:61596) from VPNIPSEC-SITEA. flag [.], seq 2341588845, ack 1498626729, win 235"
id=20085 trace_id=103 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064bd3, reply direction"
id=20085 trace_id=103 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=104 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag , seq 1544671373, ack 0, win 64240"
id=20085 trace_id=104 func=init_ip_session_common line=5692 msg="allocate a new session-00064c1d"
id=20085 trace_id=104 func=vf_ip4_route_input line=1604 msg="find a route: flags=00000000 gw-192.168.153.8 via VPNIPSEC-SITEA"
id=20085 trace_id=104 func=fw_forward_handler line=754 msg="Allowed by Policy-3:"
id=20085 trace_id=104 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=104 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=104 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=105 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [S.], seq 3126491548, ack 1544671374, win 26880"
id=20085 trace_id=105 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=105 func=vf_ip4_route_input line=1604 msg="find a route: flags=00000000 gw-192.168.3.104 via lan"
id=20085 trace_id=105 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=105 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=106 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544671374, ack 3126491549, win 514"
id=20085 trace_id=106 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=106 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=106 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=106 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=106 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=107 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544671374, ack 3126491549, win 514"
id=20085 trace_id=107 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=107 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=107 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=107 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=107 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=108 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491549, ack 1544671891, win 219"
id=20085 trace_id=108 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=108 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=108 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=109 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491549, ack 1544671891, win 219"
id=20085 trace_id=109 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=109 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=109 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=110 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544671891, ack 3126491695, win 513"
id=20085 trace_id=110 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=110 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=110 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=110 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=110 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=111 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544671942, ack 3126491695, win 513"
id=20085 trace_id=111 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=111 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=111 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=111 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=111 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=112 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544672119, ack 3126491695, win 513"
id=20085 trace_id=112 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=112 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=112 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=112 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=112 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=113 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491695, ack 1544671942, win 219"
id=20085 trace_id=113 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=113 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=113 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=114 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491764, ack 1544672119, win 227"
id=20085 trace_id=114 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=114 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=114 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=115 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544672409, ack 3126491802, win 513"
id=20085 trace_id=115 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=115 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=115 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=115 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=115 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=116 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672409, win 236"
id=20085 trace_id=116 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=116 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=116 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=117 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672447, win 236"
id=20085 trace_id=117 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=117 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=117 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=118 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672447, win 236"
id=20085 trace_id=118 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=118 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=119 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126493196, ack 1544672447, win 236"
id=20085 trace_id=119 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=119 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=119 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=120 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126493608, ack 1544672447, win 236"
id=20085 trace_id=120 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=120 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=120 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=121 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126494631, ack 1544672447, win 236"
id=20085 trace_id=121 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=121 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=121 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=122 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126495153, ack 1544672447, win 236"
id=20085 trace_id=122 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=122 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=122 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-1a:a2:fb:e9:a9:4d"
id=20085 trace_id=123 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544672447, ack 3126491802, win 513"
id=20085 trace_id=123 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=123 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=123 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=123 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=123 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=124 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544672447, ack 3126491802, win 513"
id=20085 trace_id=124 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=124 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=124 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=124 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=124 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=125 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544672447, ack 3126491802, win 513"
id=20085 trace_id=125 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=125 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=125 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=125 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=125 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=126 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.104:62994->192.168.153.8:5001) from lan. flag [.], seq 1544672447, ack 3126491802, win 513"
id=20085 trace_id=126 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, original direction"
id=20085 trace_id=126 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=126 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=126 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=126 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=127 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672447, win 236"
id=20085 trace_id=127 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=127 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=128 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672447, win 236"
id=20085 trace_id=128 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=128 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=129 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.113:61613) from VPNIPSEC-SITEA. flag [.], seq 3464269332, ack 2583186077, win 235"
id=20085 trace_id=129 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064bfa, reply direction"
id=20085 trace_id=129 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=130 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672447, win 236"
id=20085 trace_id=130 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=130 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=131 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672447, win 236"
id=20085 trace_id=131 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=131 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=132 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672447, win 236"
id=20085 trace_id=132 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=132 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=133 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64312) from VPNIPSEC-SITEA. flag [.], seq 356333696, ack 3009927514, win 235"
id=20085 trace_id=133 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064b43, reply direction"
id=20085 trace_id=133 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=134 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=1, 192.168.3.104:0->192.168.153.8:2817) from lan. type=11, code=1, id=0, seq=0."
id=20085 trace_id=135 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64312->192.168.153.8:6690) from lan. flag [F.], seq 3009927514, ack 356333696, win 2048"
id=20085 trace_id=135 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064b43, original direction"
id=20085 trace_id=135 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000000 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=135 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=135 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=135 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=136 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64312->192.168.153.8:6690) from lan. flag [R.], seq 3009927515, ack 356333696, win 2048"
id=20085 trace_id=136 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064b43, original direction"
id=20085 trace_id=136 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000000 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=136 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=136 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=136 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=137 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64312) from VPNIPSEC-SITEA. flag [F.], seq 356337750, ack 3009927515, win 235"
id=20085 trace_id=137 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064b43, reply direction"
id=20085 trace_id=137 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000000 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=137 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=138 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64312->192.168.153.8:6690) from lan. flag , seq 3009927515, ack 0, win 0"
id=20085 trace_id=138 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064b43, original direction"
id=20085 trace_id=138 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000000 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=138 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=138 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=138 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=139 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:5001->192.168.3.104:62994) from VPNIPSEC-SITEA. flag [.], seq 3126491802, ack 1544672447, win 236"
id=20085 trace_id=139 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c1d, reply direction"
id=20085 trace_id=139 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=140 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.113:61613) from VPNIPSEC-SITEA. flag [.], seq 3464269332, ack 2583186077, win 235"
id=20085 trace_id=140 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064bfa, reply direction"
id=20085 trace_id=140 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=141 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.113:61583) from VPNIPSEC-SITEA. flag [.], seq 1943285821, ack 183904114, win 235"
id=20085 trace_id=141 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064bbc, reply direction"
id=20085 trace_id=141 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=142 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64390->192.168.153.8:6690) from lan. flag , seq 3439803865, ack 0, win 65535"
id=20085 trace_id=142 func=init_ip_session_common line=5692 msg="allocate a new session-00064c34"
id=20085 trace_id=142 func=vf_ip4_route_input line=1604 msg="find a route: flags=00000000 gw-192.168.153.8 via VPNIPSEC-SITEA"
id=20085 trace_id=142 func=fw_forward_handler line=754 msg="Allowed by Policy-3:"
id=20085 trace_id=142 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=142 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=142 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=143 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64390) from VPNIPSEC-SITEA. flag [S.], seq 2049574762, ack 3439803866, win 26844"
id=20085 trace_id=143 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, reply direction"
id=20085 trace_id=143 func=vf_ip4_route_input line=1604 msg="find a route: flags=00000000 gw-192.168.3.114 via lan"
id=20085 trace_id=143 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=143 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=144 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64390->192.168.153.8:6690) from lan. flag [.], seq 3439803866, ack 2049574763, win 2061"
id=20085 trace_id=144 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, original direction"
id=20085 trace_id=144 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=144 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=144 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=144 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=145 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64390->192.168.153.8:6690) from lan. flag [.], seq 3439803866, ack 2049574763, win 2061"
id=20085 trace_id=145 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, original direction"
id=20085 trace_id=145 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=145 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=145 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=145 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=146 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64390) from VPNIPSEC-SITEA. flag [.], seq 2049574763, ack 3439803874, win 210"
id=20085 trace_id=146 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, reply direction"
id=20085 trace_id=146 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=146 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=147 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64390) from VPNIPSEC-SITEA. flag [.], seq 2049574763, ack 3439803874, win 210"
id=20085 trace_id=147 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, reply direction"
id=20085 trace_id=147 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=147 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=148 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64390) from VPNIPSEC-SITEA. flag [.], seq 2049574773, ack 3439803874, win 210"
id=20085 trace_id=148 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, reply direction"
id=20085 trace_id=148 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=148 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=149 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64390->192.168.153.8:6690) from lan. flag [.], seq 3439803874, ack 2049574822, win 2060"
id=20085 trace_id=149 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, original direction"
id=20085 trace_id=149 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=149 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=149 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=149 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=150 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64390->192.168.153.8:6690) from lan. flag [F.], seq 3439803874, ack 2049574822, win 2060"
id=20085 trace_id=150 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, original direction"
id=20085 trace_id=150 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000000 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=150 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=150 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=150 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=151 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64390) from VPNIPSEC-SITEA. flag [.], seq 2049574822, ack 3439803875, win 210"
id=20085 trace_id=151 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, reply direction"
id=20085 trace_id=151 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000000 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=151 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=152 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64390) from VPNIPSEC-SITEA. flag [F.], seq 2049574822, ack 3439803875, win 210"
id=20085 trace_id=152 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, reply direction"
id=20085 trace_id=152 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000000 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=152 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=153 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64390->192.168.153.8:6690) from lan. flag [.], seq 3439803875, ack 2049574823, win 2060"
id=20085 trace_id=153 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c34, original direction"
id=20085 trace_id=153 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000000 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=153 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=153 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=153 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=154 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag , seq 1952299979, ack 0, win 65535"
id=20085 trace_id=154 func=init_ip_session_common line=5692 msg="allocate a new session-00064c38"
id=20085 trace_id=154 func=vf_ip4_route_input line=1604 msg="find a route: flags=00000000 gw-192.168.153.8 via VPNIPSEC-SITEA"
id=20085 trace_id=154 func=fw_forward_handler line=754 msg="Allowed by Policy-3:"
id=20085 trace_id=154 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=154 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=154 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=155 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64395) from VPNIPSEC-SITEA. flag [S.], seq 815216535, ack 1952299980, win 26844"
id=20085 trace_id=155 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, reply direction"
id=20085 trace_id=155 func=vf_ip4_route_input line=1604 msg="find a route: flags=00000000 gw-192.168.3.114 via lan"
id=20085 trace_id=155 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=155 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=156 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952299980, ack 815216536, win 2061"
id=20085 trace_id=156 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=156 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=156 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=156 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=156 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=157 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952299980, ack 815216536, win 2061"
id=20085 trace_id=157 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=157 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00040204 ses.npu_state=0x00040000"
id=20085 trace_id=157 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=157 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=157 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=158 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64395) from VPNIPSEC-SITEA. flag [.], seq 815216536, ack 1952300115, win 219"
id=20085 trace_id=158 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, reply direction"
id=20085 trace_id=158 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=158 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=159 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64395) from VPNIPSEC-SITEA. flag [.], seq 815216536, ack 1952300115, win 219"
id=20085 trace_id=159 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, reply direction"
id=20085 trace_id=159 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=159 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=160 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300115, ack 815216841, win 2056"
id=20085 trace_id=160 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=160 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=160 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=160 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=160 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=161 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300115, ack 815216841, win 2056"
id=20085 trace_id=161 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=161 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=161 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=161 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=161 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=162 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64395) from VPNIPSEC-SITEA. flag [.], seq 815216841, ack 1952300279, win 227"
id=20085 trace_id=162 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, reply direction"
id=20085 trace_id=162 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=162 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=163 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300279, ack 815217726, win 2042"
id=20085 trace_id=163 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=163 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=163 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=163 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=163 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=164 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300279, ack 815217726, win 2048"
id=20085 trace_id=164 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=164 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=164 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=164 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=164 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=165 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.153.8:6690->192.168.3.114:64395) from VPNIPSEC-SITEA. flag [.], seq 815217726, ack 1952300597, win 235"
id=20085 trace_id=165 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, reply direction"
id=20085 trace_id=165 func=npu_handle_session44 line=921 msg="Trying to offloading session from VPNIPSEC-SITEA to lan, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=165 func=__if_queue_push_xmit line=421 msg="send out via dev-wifi, dst-mac-f4:5c:89:ac:3d:03"
id=20085 trace_id=166 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300597, ack 815217952, win 2044"
id=20085 trace_id=166 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=166 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=166 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=166 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=166 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=167 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300597, ack 815217952, win 2048"
id=20085 trace_id=167 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=167 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=167 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=167 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=167 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=168 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300630, ack 815217952, win 2048"
id=20085 trace_id=168 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=168 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=168 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=168 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=168 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=169 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300660, ack 815217952, win 2048"
id=20085 trace_id=169 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=169 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=169 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=169 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=169 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=170 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300690, ack 815217952, win 2048"
id=20085 trace_id=170 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=170 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=170 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=170 func=esp_output4id=20085 trace_id=171 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=171 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=171 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=171 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=171 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=172 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300751, ack 815217952, win 2048"
id=20085 trace_id=172 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=172 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=172 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=172 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=172 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=173 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300781, ack 815217952, win 2048"
id=20085 trace_id=173 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=173 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=173 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=173 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=173 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=174 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300812, ack 815217952, win 2048"
id=20085 trace_id=174 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=174 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=174 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=174 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=174 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=175 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300847, ack 815217952, win 2048"
id=20085 trace_id=175 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=175 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=175 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=175 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=175 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=176 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300877, ack 815217952, win 2048"
id=20085 trace_id=176 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=176 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=176 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=176 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=176 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=177 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300907, ack 815217952, win 2048"
id=20085 trace_id=177 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=177 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=177 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=177 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=177 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=178 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300938, ack 815217952, win 2048"
id=20085 trace_id=178 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=178 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=178 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=178 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=178 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=179 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952300980, ack 815217952, win 2048"
id=20085 trace_id=179 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=179 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=179 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=179 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=179 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=180 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301010, ack 815217952, win 2048"
id=20085 trace_id=180 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=180 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=180 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=180 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=180 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=181 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301040, ack 815217952, win 2048"
id=20085 trace_id=181 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=181 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=181 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=181 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=181 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=182 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301070, ack 815217952, win 2048"
id=20085 trace_id=182 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=182 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=182 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=182 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=182 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=183 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301100, ack 815217952, win 2048"
id=20085 trace_id=183 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=183 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=183 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=183 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=183 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=184 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301131, ack 815217952, win 2048"
id=20085 trace_id=184 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=184 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=184 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=184 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=184 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=185 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301164, ack 815217952, win 2048"
id=20085 trace_id=185 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=185 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=185 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=185 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=185 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=186 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301194, ack 815217952, win 2048"
id=20085 trace_id=186 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=186 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=186 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=186 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=186 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=187 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301224, ack 815217952, win 2048"
id=20085 trace_id=187 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=187 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=187 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=187 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=187 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=188 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301257, ack 815217952, win 2048"
id=20085 trace_id=188 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=188 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=188 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=188 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=188 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=189 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301287, ack 815217952, win 2048"
id=20085 trace_id=189 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=189 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=189 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=189 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=189 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=190 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301318, ack 815217952, win 2048"
id=20085 trace_id=190 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=190 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=190 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=190 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=190 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=191 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301351, ack 815217952, win 2048"
id=20085 trace_id=191 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=191 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=191 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=191 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=191 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=192 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301381, ack 815217952, win 2048"
id=20085 trace_id=192 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=192 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=192 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=192 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=192 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=193 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301412, ack 815217952, win 2048"
id=20085 trace_id=193 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=193 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=193 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=193 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=193 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=194 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301447, ack 815217952, win 2048"
id=20085 trace_id=194 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=194 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=194 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=194 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=194 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=195 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301477, ack 815217952, win 2048"
id=20085 trace_id=195 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=195 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=195 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=195 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=195 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=196 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301508, ack 815217952, win 2048"
id=20085 trace_id=196 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=196 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=196 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=196 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=196 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=197 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301544, ack 815217952, win 2048"
id=20085 trace_id=197 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=197 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=197 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=197 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=197 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=198 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301574, ack 815217952, win 2048"
id=20085 trace_id=198 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=198 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=198 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=198 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=198 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=199 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301604, ack 815217952, win 2048"
id=20085 trace_id=199 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=199 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=199 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=199 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=199 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=200 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301635, ack 815217952, win 2048"
id=20085 trace_id=200 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=200 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=200 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=200 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=200 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"
id=20085 trace_id=201 func=print_pkt_detail line=5528 msg="vd-root received a packet(proto=6, 192.168.3.114:64395->192.168.153.8:6690) from lan. flag [.], seq 1952301669, ack 815217952, win 2048"
id=20085 trace_id=201 func=resolve_ip_tuple_fast line=5608 msg="Find an existing session, id-00064c38, original direction"
id=20085 trace_id=201 func=npu_handle_session44 line=921 msg="Trying to offloading session from lan to VPNIPSEC-SITEA, skb.npu_flag=00000400 ses.state=00000204 ses.npu_state=0x00040000"
id=20085 trace_id=201 func=ipsecdev_hard_start_xmit line=631 msg="enter IPsec interface-VPNIPSEC-SITEA"
id=20085 trace_id=201 func=esp_output4 line=1181 msg="IPsec encrypt/auth"
id=20085 trace_id=201 func=ipsec_output_finish line=534 msg="send to 82.65.26.254 via intf-wan1"

 

I'll dump some traffic on phase1 now, so more to follow!

MightyBob
New Contributor

Here is the dump of the packet sniffer for the same test:

FGT-SITEB # diagnose sniffer packet VPNIPSEC-SITEA
interfaces=[VPNIPSEC-SITEA]
filters=[none]
pcap_lookupnet: VPNIPSEC-SITEA: no IPv4 address assigned
0.265162 192.168.153.8.6690 -> 192.168.3.113.52142: 2731922178 ack 2883504556 (frag 63032:1400@0+)
0.265243 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 63032:14@1400)
0.525589 192.168.153.8.6690 -> 192.168.3.114.53311: 116107439 ack 2513633153 (frag 14739:1400@0+)
0.525674 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 14739:14@1400)
1.013539 192.168.153.8.6690 -> 192.168.3.113.52190: 1196616365 ack 3028508935 (frag 28668:1400@0+)
1.013630 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 28668:14@1400)
1.140203 192.168.3.122.58466 -> 192.168.153.8.6690: syn 498099211
1.171362 192.168.153.8.6690 -> 192.168.3.122.58466: syn 3578142471 ack 498099212
1.174712 192.168.3.122.58466 -> 192.168.153.8.6690: ack 3578142472
1.175631 192.168.3.122.58466 -> 192.168.153.8.6690: psh 498099212 ack 3578142472
1.208073 192.168.153.8.6690 -> 192.168.3.122.58466: ack 498099220
1.209616 192.168.153.8.6690 -> 192.168.3.122.58466: psh 3578142472 ack 498099220
1.209762 192.168.153.8.6690 -> 192.168.3.122.58466: psh 3578142482 ack 498099220
1.215080 192.168.3.122.58466 -> 192.168.153.8.6690: ack 3578142482
1.215536 192.168.3.122.58466 -> 192.168.153.8.6690: ack 3578142531
1.218178 192.168.3.122.58466 -> 192.168.153.8.6690: fin 498099220 ack 3578142531
1.287662 192.168.153.8.6690 -> 192.168.3.122.58466: ack 498099221
2.209097 192.168.153.8.6690 -> 192.168.3.122.58466: fin 3578142531 ack 498099221
2.211880 192.168.3.122.58466 -> 192.168.153.8.6690: ack 3578142532
2.633399 192.168.153.8.6690 -> 192.168.3.122.58457: 2617382962 ack 2179899319 (frag 43978:1400@0+)
2.633486 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 43978:14@1400)
2.748612 192.168.3.122.58471 -> 192.168.153.8.6690: syn 3628932318
2.780295 192.168.153.8.6690 -> 192.168.3.122.58471: syn 725304216 ack 3628932319
2.783348 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725304217
2.783801 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628932319 ack 725304217
2.836184 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628932454
2.836722 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725304217 ack 3628932454
2.840968 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725304522
2.865011 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628932454 ack 725304522
2.898934 192.168.153.8.6690 -> 192.168.3.113.52190: 1196616365 ack 3028508935 (frag 28669:1400@0+)
2.898993 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 28669:14@1400)
2.904275 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725304522 ack 3628932618
2.908011 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725305407
2.908526 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628932618 ack 725305407
2.964134 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725305407 ack 3628932936
2.967698 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725305633
2.968311 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628932936 ack 725305633
2.970920 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628932969 ack 725305633
2.971242 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628932999 ack 725305633
2.971482 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933029 ack 725305633
2.971707 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933060 ack 725305633
2.971929 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933090 ack 725305633
2.972145 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933120 ack 725305633
2.972363 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933151 ack 725305633
2.972579 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933186 ack 725305633
2.972794 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933216 ack 725305633
2.973010 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933246 ack 725305633
2.973227 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933277 ack 725305633
2.973446 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933319 ack 725305633
2.973662 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933349 ack 725305633
2.973879 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933379 ack 725305633
2.974096 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933409 ack 725305633
2.974311 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933439 ack 725305633
2.974528 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933470 ack 725305633
2.974742 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933503 ack 725305633
2.974957 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933533 ack 725305633
2.975173 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933563 ack 725305633
2.975387 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933596 ack 725305633
2.975604 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933626 ack 725305633
2.975815 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933657 ack 725305633
2.976029 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933690 ack 725305633
2.976243 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933720 ack 725305633
2.976457 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933751 ack 725305633
2.976670 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933786 ack 725305633
2.976886 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933816 ack 725305633
2.977100 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933847 ack 725305633
2.977313 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933883 ack 725305633
2.977525 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933913 ack 725305633
2.977741 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933943 ack 725305633
2.977956 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628933974 ack 725305633
2.978174 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934008 ack 725305633
2.978390 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934038 ack 725305633
2.978607 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934068 ack 725305633
2.978822 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934098 ack 725305633
2.979037 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934128 ack 725305633
2.979253 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934159 ack 725305633
2.979471 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934193 ack 725305633
2.979685 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934223 ack 725305633
2.979499 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934253 ack 725305633
2.979717 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934283 ack 725305633
2.979935 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934313 ack 725305633
2.980151 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934343 ack 725305633
2.980368 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934373 ack 725305633
2.980583 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934404 ack 725305633
2.980797 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934439 ack 725305633
2.981015 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934469 ack 725305633
2.981232 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934500 ack 725305633
2.981448 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934546 ack 725305633
2.981667 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934576 ack 725305633
2.981886 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934607 ack 725305633
2.982103 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934641 ack 725305633
2.982318 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934671 ack 725305633
2.982534 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934701 ack 725305633
2.982749 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934732 ack 725305633
2.982964 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934769 ack 725305633
2.983179 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934799 ack 725305633
2.983395 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934830 ack 725305633
2.983610 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934862 ack 725305633
2.983828 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934892 ack 725305633
2.984043 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934923 ack 725305633
2.987002 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934956 ack 725305633
2.987308 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934986 ack 725305633
2.987538 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935017 ack 725305633
2.987762 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935051 ack 725305633
2.987982 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935081 ack 725305633
2.988201 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935112 ack 725305633
2.988418 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935148 ack 725305633
2.988634 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935178 ack 725305633
2.988852 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935208 ack 725305633
2.989069 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935239 ack 725305633
2.989284 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935273 ack 725305633
2.989498 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935303 ack 725305633
2.989710 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935333 ack 725305633
2.989526 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935364 ack 725305633
2.989744 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935394 ack 725305633
2.989960 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935425 ack 725305633
2.990178 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935459 ack 725305633
2.990390 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935489 ack 725305633
2.990604 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935519 ack 725305633
2.990819 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935549 ack 725305633
2.991033 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935579 ack 725305633
2.991246 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935610 ack 725305633
2.991460 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935643 ack 725305633
2.991674 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935673 ack 725305633
2.991888 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935703 ack 725305633
2.992100 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935733 ack 725305633
2.992315 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935763 ack 725305633
2.992528 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935794 ack 725305633
2.992741 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935828 ack 725305633
2.992956 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935858 ack 725305633
2.993172 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935888 ack 725305633
2.993387 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935918 ack 725305633
2.993602 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935948 ack 725305633
2.993813 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628935978 ack 725305633
2.994026 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628936008 ack 725305633
2.994242 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628936039 ack 725305633
2.994458 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628936075 ack 725305633
2.994671 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628936105 ack 725305633
2.994886 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628936135 ack 725305633
2.995099 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628936165 ack 725305633
3.054247 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628932999
3.061095 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933060
3.063321 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933120
3.064403 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933186
3.064942 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933246
3.067467 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933319
3.068101 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933379
3.068237 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933439
3.068322 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933503
3.068396 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933563
3.068809 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933626
3.068988 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933690
3.069069 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933751
3.069217 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933816
3.069293 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933883
3.113724 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628933943
3.117320 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934008
3.118900 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934068
3.124062 192.168.3.122.58471 -> 192.168.153.8.6690: psh 3628934821 ack 725305633
3.129508 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934128
3.129601 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934193
3.129676 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934253
3.130382 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934313
3.173127 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934343
3.175213 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934373
3.176705 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934404
3.178739 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934439
3.179881 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934469
3.181154 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934500
3.183783 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934546
3.185251 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934576
3.187385 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934607
3.194610 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934641
3.197167 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934671
3.198715 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934701
3.200346 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934732
3.202106 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934769
3.204161 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934799
3.206062 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934830
3.207351 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934862
3.220591 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934892
3.222679 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934923
3.224401 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934956
3.225691 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628934986
3.227477 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935017
3.229906 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935051
3.230644 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935081
3.232339 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935112
3.235418 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935148
3.237889 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935178
3.239418 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935208
3.241309 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935239
3.242807 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935273
3.243854 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935303
3.246653 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935333
3.252500 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935364
3.254958 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935394
3.256255 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935425
3.257238 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935459
3.259846 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935489
3.260774 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935519
3.262510 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935549
3.265088 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935579
3.270211 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935610
3.271593 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935643
3.272869 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935673
3.275323 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935703
3.276717 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935733
3.277736 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935763
3.279912 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935794
3.283503 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935828
3.284531 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935858
3.286315 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935888
3.288432 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935918
3.289505 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935948
3.292587 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628935978
3.295134 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628936008
3.296697 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628936039
3.298479 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628936075
3.299779 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628936105
3.301904 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628936135
3.302913 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628936165
3.305498 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628936195
3.319208 192.168.153.8.6690 -> 192.168.3.122.58471: ack 3628936195
3.342991 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725305633 ack 3628936195
3.343229 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725305663 ack 3628936195
3.343661 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725305693 ack 3628936195
3.343939 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725305922 ack 3628936195
3.344469 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725306359 ack 3628936195
3.344697 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725306856 ack 3628936195
3.345474 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725307169 ack 3628936195
3.345764 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725307659 ack 3628936195
3.346491 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725308153 ack 3628936195
3.346812 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725308613 ack 3628936195
3.353776 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725305663
3.354127 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725305693
3.363341 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725305922
3.363782 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725306359
3.364030 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725306856
3.364249 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725307169
3.364777 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725307659
3.365202 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725308153
3.365447 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725308613
3.365727 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725309158
3.386664 192.168.153.8.6690 -> 192.168.3.122.58471: 725309158 ack 3628936195 (frag 36402:1400@0+)
3.386731 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36402:14@1400)
3.388196 192.168.153.8.6690 -> 192.168.3.122.58471: 725310540 ack 3628936195 (frag 36403:1400@0+)
3.388259 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36403:14@1400)
3.389153 192.168.153.8.6690 -> 192.168.3.122.58471: 725311922 ack 3628936195 (frag 36404:1400@0+)
3.389419 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36404:14@1400)
3.389665 192.168.153.8.6690 -> 192.168.3.122.58471: psh 725313304 ack 3628936195
3.393074 192.168.3.122.58471 -> 192.168.153.8.6690: ack 725309158
3.424529 192.168.153.8.6690 -> 192.168.3.122.58471: 725309158 ack 3628936195 (frag 36406:1400@0+)
3.424594 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36406:14@1400)
3.677203 192.168.153.8.6690 -> 192.168.3.122.58471: 725309158 ack 3628936195 (frag 36407:1400@0+)
3.677278 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36407:14@1400)
3.924303 192.168.3.104.59447 -> 192.168.153.8.5001: syn 2301491512
3.954927 192.168.153.8.5001 -> 192.168.3.104.59447: syn 767614019 ack 2301491513
3.958922 192.168.3.104.59447 -> 192.168.153.8.5001: ack 767614020
3.960481 192.168.3.104.59447 -> 192.168.153.8.5001: psh 2301491513 ack 767614020
4.015410 192.168.153.8.5001 -> 192.168.3.104.59447: ack 2301492030
4.019655 192.168.153.8.5001 -> 192.168.3.104.59447: psh 767614020 ack 2301492030
4.032288 192.168.3.104.59447 -> 192.168.153.8.5001: psh 2301492030 ack 767615287
4.032606 192.168.3.104.59447 -> 192.168.153.8.5001: psh 2301492156 ack 767615287
4.032877 192.168.3.104.59447 -> 192.168.153.8.5001: psh 2301492333 ack 767615287
4.089773 192.168.153.8.5001 -> 192.168.3.104.59447: psh 767615287 ack 2301492156
4.090444 192.168.153.8.5001 -> 192.168.3.104.59447: psh 767615338 ack 2301492156
4.092275 192.168.153.8.5001 -> 192.168.3.104.59447: psh 767615407 ack 2301492333
4.097641 192.168.3.104.59447 -> 192.168.153.8.5001: ack 767615445
4.098138 192.168.3.104.59447 -> 192.168.153.8.5001: psh 2301492623 ack 767615445
4.135779 192.168.153.8.5001 -> 192.168.3.104.59447: ack 2301492623
4.145378 192.168.153.8.5001 -> 192.168.3.104.59447: ack 2301492661
4.183798 192.168.153.8.6690 -> 192.168.3.122.58471: 725309158 ack 3628936195 (frag 36408:1400@0+)
4.183857 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36408:14@1400)
4.296981 192.168.153.8.6690 -> 192.168.3.114.53311: 116107439 ack 2513633153 (frag 14740:1400@0+)
4.297042 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 14740:14@1400)
4.367719 192.168.153.8.5001 -> 192.168.3.104.59447: 767615445 ack 2301492661 (frag 3757:1400@0+)
4.367899 192.168.153.8 -> 192.168.3.104: ip-proto-6 (frag 3757:14@1400)
4.368244 192.168.153.8.5001 -> 192.168.3.104.59447: psh 767616839 ack 2301492661
4.369204 192.168.153.8.5001 -> 192.168.3.104.59447: psh 767617251 ack 2301492661
4.373574 192.168.3.104.59447 -> 192.168.153.8.5001: ack 767615445
4.374448 192.168.3.104.59447 -> 192.168.153.8.5001: ack 767615445
4.378888 192.168.153.8.5001 -> 192.168.3.104.59447: psh 767618276 ack 2301492661
4.380558 192.168.153.8.5001 -> 192.168.3.104.59447: psh 767618798 ack 2301492661
4.383383 192.168.3.104.59447 -> 192.168.153.8.5001: ack 767615445
4.383696 192.168.3.104.59447 -> 192.168.153.8.5001: ack 767615445
4.432343 192.168.153.8.5001 -> 192.168.3.104.59447: 767615445 ack 2301492661 (frag 3762:1400@0+)
4.432405 192.168.153.8 -> 192.168.3.104: ip-proto-6 (frag 3762:14@1400)
4.692001 192.168.153.8.5001 -> 192.168.3.104.59447: 767615445 ack 2301492661 (frag 3763:1400@0+)
4.692069 192.168.153.8 -> 192.168.3.104: ip-proto-6 (frag 3763:14@1400)
5.197790 192.168.153.8.6690 -> 192.168.3.122.58471: 725309158 ack 3628936195 (frag 36409:1400@0+)
5.197858 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36409:14@1400)
5.207101 192.168.153.8.5001 -> 192.168.3.104.59447: 767615445 ack 2301492661 (frag 3764:1400@0+)
5.207161 192.168.153.8 -> 192.168.3.104: ip-proto-6 (frag 3764:14@1400)
6.236917 192.168.153.8.5001 -> 192.168.3.104.59447: 767615445 ack 2301492661 (frag 3765:1400@0+)
6.236977 192.168.153.8 -> 192.168.3.104: ip-proto-6 (frag 3765:14@1400)
6.665587 192.168.153.8.6690 -> 192.168.3.113.52190: 1196616365 ack 3028508935 (frag 28670:1400@0+)
6.665651 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 28670:14@1400)
6.920626 192.168.153.8.6690 -> 192.168.3.122.58447: 2789826739 ack 1288745217 (frag 60773:1400@0+)
6.920699 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 60773:14@1400)
7.224772 192.168.153.8.6690 -> 192.168.3.122.58471: 725309158 ack 3628936195 (frag 36410:1400@0+)
7.224835 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36410:14@1400)
7.369653 192.168.153.8.6690 -> 192.168.3.113.52155: 2564087958 ack 2327953705 (frag 41595:1400@0+)
7.369739 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 41595:14@1400)
7.801162 192.168.153.8.6690 -> 192.168.3.113.52177: 3443357803 ack 1123576894 (frag 64700:1400@0+)
7.801234 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 64700:14@1400)
8.297626 192.168.153.8.5001 -> 192.168.3.104.59447: 767615445 ack 2301492661 (frag 3766:1400@0+)
8.297693 192.168.153.8 -> 192.168.3.104: ip-proto-6 (frag 3766:14@1400)
10.360710 192.168.153.8.6690 -> 192.168.3.122.58457: 2617382962 ack 2179899319 (frag 43979:1400@0+)
10.360770 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 43979:14@1400)
11.281101 192.168.153.8.6690 -> 192.168.3.122.58471: 725309158 ack 3628936195 (frag 36411:1400@0+)
11.281164 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36411:14@1400)
11.832602 192.168.153.8.6690 -> 192.168.3.114.53311: 116107439 ack 2513633153 (frag 14741:1400@0+)
11.832679 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 14741:14@1400)
12.424918 192.168.153.8.5001 -> 192.168.3.104.59447: 767615445 ack 2301492661 (frag 3767:1400@0+)
12.424986 192.168.153.8 -> 192.168.3.104: ip-proto-6 (frag 3767:14@1400)
14.200373 192.168.153.8.6690 -> 192.168.3.113.52190: 1196616365 ack 3028508935 (frag 28671:1400@0+)
14.200442 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 28671:14@1400)
15.719634 192.168.3.104.56308 -> 192.168.153.8.445: 4075849181 ack 1879829987
15.749598 192.168.153.8.445 -> 192.168.3.104.56308: ack 4075849182
19.400229 192.168.153.8.6690 -> 192.168.3.122.58471: 725309158 ack 3628936195 (frag 36412:1400@0+)
19.400292 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 36412:14@1400)
20.680615 192.168.153.8.5001 -> 192.168.3.104.59447: 767615445 ack 2301492661 (frag 3768:1400@0+)
20.680683 192.168.153.8 -> 192.168.3.104: ip-proto-6 (frag 3768:14@1400)
20.769409 192.168.3.113.52123 -> 192.168.153.8.6690: fin 1156847537 ack 142328636
20.769803 192.168.3.113.52123 -> 192.168.153.8.6690: rst 1156847538 ack 142328636
20.805120 192.168.153.8.6690 -> 192.168.3.113.52123: fin 142331169 ack 1156847538
20.808389 192.168.3.113.52123 -> 192.168.153.8.6690: rst 1156847538
20.809158 192.168.153.8.6690 -> 192.168.3.114.53251: 1726542943 ack 4224921239 (frag 62136:1400@0+)
20.809224 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 62136:14@1400)
22.028323 192.168.3.104.54889 -> 192.168.153.8.53: udp 39
22.105290 192.168.153.8.53 -> 192.168.3.104.54889: udp 339
22.504412 192.168.153.8.6690 -> 192.168.3.122.58447: 2789826739 ack 1288745217 (frag 60774:1400@0+)
22.504487 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 60774:14@1400)
23.689120 192.168.153.8.6690 -> 192.168.3.113.52177: 3443357803 ack 1123576894 (frag 64701:1400@0+)
23.689182 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 64701:14@1400)
23.705376 192.168.3.114.53251 -> 192.168.153.8.6690: fin 4224921239 ack 1726542943
23.705829 192.168.3.114.53251 -> 192.168.153.8.6690: rst 4224921240 ack 1726542943
23.734791 192.168.153.8.6690 -> 192.168.3.114.53251: fin 1726545537 ack 4224921240
23.738058 192.168.3.114.53251 -> 192.168.153.8.6690: rst 4224921240
24.904039 192.168.153.8.6690 -> 192.168.3.113.52135: 3623878003 ack 402857170 (frag 53457:1400@0+)
24.904107 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 53457:14@1400)
25.035321 192.168.3.113.52235 -> 192.168.153.8.6690: syn 390080773
25.065348 192.168.153.8.6690 -> 192.168.3.113.52235: syn 1341102767 ack 390080774
25.068787 192.168.3.113.52235 -> 192.168.153.8.6690: ack 1341102768
25.069246 192.168.3.113.52235 -> 192.168.153.8.6690: psh 390080774 ack 1341102768
25.100958 192.168.153.8.6690 -> 192.168.3.113.52235: ack 390080782
25.101263 192.168.153.8.6690 -> 192.168.3.113.52235: psh 1341102768 ack 390080782
25.101476 192.168.153.8.6690 -> 192.168.3.113.52235: psh 1341102778 ack 390080782
25.105917 192.168.3.113.52235 -> 192.168.153.8.6690: ack 1341102827
25.106328 192.168.3.113.52235 -> 192.168.153.8.6690: fin 390080782 ack 1341102827
25.176586 192.168.153.8.6690 -> 192.168.3.113.52235: ack 390080783
25.843372 192.168.153.8.6690 -> 192.168.3.122.58457: 2617382962 ack 2179899319 (frag 43980:1400@0+)
25.843436 192.168.153.8 -> 192.168.3.122: ip-proto-6 (frag 43980:14@1400)
26.149746 192.168.153.8.6690 -> 192.168.3.113.52235: fin 1341102827 ack 390080783
26.234449 192.168.3.113.52235 -> 192.168.153.8.6690: ack 1341102828
26.658045 192.168.3.113.52240 -> 192.168.153.8.6690: syn 2992242248
26.709611 192.168.153.8.6690 -> 192.168.3.113.52240: syn 2223603653 ack 2992242249
26.713978 192.168.3.113.52240 -> 192.168.153.8.6690: ack 2223603654
26.714537 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992242249 ack 2223603654
26.772607 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992242384
26.772949 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223603654 ack 2992242384
26.776474 192.168.3.113.52240 -> 192.168.153.8.6690: ack 2223603959
26.788542 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992242384 ack 2223603959
26.846056 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223603959 ack 2992242548
26.849432 192.168.3.113.52240 -> 192.168.153.8.6690: ack 2223604844
26.850206 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992242548 ack 2223604844
26.908423 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223604844 ack 2992242866
26.910567 192.168.153.8.6690 -> 192.168.3.114.53311: 116107439 ack 2513633153 (frag 14742:1400@0+)
26.910628 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 14742:14@1400)
26.911900 192.168.3.113.52240 -> 192.168.153.8.6690: ack 2223605070
26.912434 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992242866 ack 2223605070
26.912796 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992242899 ack 2223605070
26.913032 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992242929 ack 2223605070
26.915761 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992242959 ack 2223605070
26.916074 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992242990 ack 2223605070
26.916312 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243020 ack 2223605070
26.916537 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243050 ack 2223605070
26.916755 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243081 ack 2223605070
26.916973 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243116 ack 2223605070
26.917190 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243146 ack 2223605070
26.917408 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243176 ack 2223605070
26.917624 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243207 ack 2223605070
26.917839 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243249 ack 2223605070
26.918054 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243279 ack 2223605070
26.918272 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243309 ack 2223605070
26.918488 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243339 ack 2223605070
26.918705 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243369 ack 2223605070
26.918920 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243400 ack 2223605070
26.919135 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243433 ack 2223605070
26.919349 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243463 ack 2223605070
26.919563 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243493 ack 2223605070
26.919775 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243526 ack 2223605070
26.919598 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243556 ack 2223605070
26.919816 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243587 ack 2223605070
26.920031 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243620 ack 2223605070
26.920246 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243650 ack 2223605070
26.920462 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243681 ack 2223605070
26.920674 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243716 ack 2223605070
26.920887 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243746 ack 2223605070
26.921098 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243777 ack 2223605070
26.921314 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243813 ack 2223605070
26.921528 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243843 ack 2223605070
26.921742 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243873 ack 2223605070
26.921955 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243904 ack 2223605070
26.922169 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243938 ack 2223605070
26.922382 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243968 ack 2223605070
26.922596 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992243998 ack 2223605070
26.922809 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244028 ack 2223605070
26.923026 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244058 ack 2223605070
26.923242 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244089 ack 2223605070
26.923458 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244123 ack 2223605070
26.923671 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244153 ack 2223605070
26.923886 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244183 ack 2223605070
26.924103 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244213 ack 2223605070
26.924319 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244243 ack 2223605070
26.924535 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244273 ack 2223605070
26.924751 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244303 ack 2223605070
26.924967 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244334 ack 2223605070
26.925184 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244369 ack 2223605070
26.925401 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244399 ack 2223605070
26.925617 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244430 ack 2223605070
26.925834 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244476 ack 2223605070
26.926049 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244506 ack 2223605070
26.926262 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244537 ack 2223605070
26.926475 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244571 ack 2223605070
26.926691 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244601 ack 2223605070
26.926905 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244631 ack 2223605070
26.927118 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244662 ack 2223605070
26.927330 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244699 ack 2223605070
26.927545 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244729 ack 2223605070
26.927759 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244760 ack 2223605070
26.927973 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244792 ack 2223605070
26.928189 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244822 ack 2223605070
26.928404 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244853 ack 2223605070
26.928617 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244886 ack 2223605070
26.931280 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244916 ack 2223605070
26.931595 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244947 ack 2223605070
26.931828 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992244981 ack 2223605070
26.932054 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245011 ack 2223605070
26.932277 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245042 ack 2223605070
26.932498 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245078 ack 2223605070
26.932715 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245108 ack 2223605070
26.932935 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245138 ack 2223605070
26.933151 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245169 ack 2223605070
26.933367 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245203 ack 2223605070
26.933586 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245233 ack 2223605070
26.933805 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245263 ack 2223605070
26.934021 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245294 ack 2223605070
26.934236 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245324 ack 2223605070
26.934450 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245355 ack 2223605070
26.934670 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245389 ack 2223605070
26.934886 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245419 ack 2223605070
26.935102 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245449 ack 2223605070
26.935321 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245479 ack 2223605070
26.935539 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245509 ack 2223605070
26.935757 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245540 ack 2223605070
26.935972 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245573 ack 2223605070
26.936187 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245603 ack 2223605070
26.936401 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245633 ack 2223605070
26.936617 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245663 ack 2223605070
26.936833 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245693 ack 2223605070
26.937048 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245724 ack 2223605070
26.937263 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245758 ack 2223605070
26.937478 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245788 ack 2223605070
26.937692 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245818 ack 2223605070
26.937906 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245848 ack 2223605070
26.938120 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245878 ack 2223605070
26.938334 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245908 ack 2223605070
26.938549 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245938 ack 2223605070
26.938762 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992245969 ack 2223605070
26.938977 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992246005 ack 2223605070
26.939191 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992246035 ack 2223605070
26.939403 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992246065 ack 2223605070
26.939619 192.168.3.113.52240 -> 192.168.153.8.6690: psh 2992246095 ack 2223605070
26.974707 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992242929
26.974885 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992242990
26.975943 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243050
26.976103 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243116
26.976245 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243176
26.976322 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243249
26.976394 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243309
26.976465 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243369
26.977248 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243433
26.978218 192.168.3.114.53345 -> 192.168.153.8.6690: syn 1308165815
26.980246 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243493
26.985454 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243556
26.989443 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243620
26.991867 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243681
26.995435 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243746
26.998846 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243813
27.005055 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243873
27.007142 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243938
27.009994 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992243998
27.013074 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244058
27.016676 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244123
27.041915 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244183
27.042014 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244243
27.046961 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244303
27.051368 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244369
27.051453 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244430
27.056023 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244506
27.060972 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244571
27.061082 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244631
27.071402 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244699
27.071498 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244760
27.077276 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244822
27.082731 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244886
27.092134 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992244947
27.097173 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245011
27.101368 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245078
27.105891 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245138
27.124047 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245203
27.129398 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245263
27.129484 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245324
27.138169 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245389
27.156438 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245449
27.165524 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245509
27.165644 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245573
27.182796 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245633
27.191595 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245693
27.191693 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245758
27.191768 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245818
27.205655 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245878
27.210562 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992245938
27.215303 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992246005
27.216283 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992246065
27.228911 192.168.153.8.6690 -> 192.168.3.113.52240: ack 2992246125
27.233667 192.168.153.8.6690 -> 192.168.3.114.53345: syn 3641938926 ack 1308165816
27.237556 192.168.3.114.53345 -> 192.168.153.8.6690: ack 3641938927
27.238104 192.168.3.114.53345 -> 192.168.153.8.6690: psh 1308165816 ack 3641938927
27.279642 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223605070 ack 2992246125
27.279901 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223605100 ack 2992246125
27.280002 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223605130 ack 2992246125
27.280582 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223605359 ack 2992246125
27.281133 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223605761 ack 2992246125
27.281670 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223606203 ack 2992246125
27.281909 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223606353 ack 2992246125
27.282380 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223606760 ack 2992246125
27.282944 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223607281 ack 2992246125
27.283191 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223607710 ack 2992246125
27.286688 192.168.3.113.52240 -> 192.168.153.8.6690: ack 2223608146
27.287501 192.168.3.113.52240 -> 192.168.153.8.6690: ack 2223608146
27.300317 192.168.153.8.6690 -> 192.168.3.114.53345: ack 1308165824
27.303955 192.168.153.8.6690 -> 192.168.3.114.53345: psh 3641938927 ack 1308165824
27.304042 192.168.153.8.6690 -> 192.168.3.114.53345: psh 3641938937 ack 1308165824
27.307963 192.168.3.114.53345 -> 192.168.153.8.6690: ack 3641938986
27.308431 192.168.3.114.53345 -> 192.168.153.8.6690: fin 1308165824 ack 3641938986
27.317866 192.168.153.8.6690 -> 192.168.3.113.52240: 2223608146 ack 2992246125 (frag 21686:1400@0+)
27.317926 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 21686:14@1400)
27.319150 192.168.153.8.6690 -> 192.168.3.113.52240: 2223609528 ack 2992246125 (frag 21687:1400@0+)
27.319212 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 21687:14@1400)
27.319649 192.168.153.8.6690 -> 192.168.3.113.52240: 2223610910 ack 2992246125 (frag 21688:1400@0+)
27.319895 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 21688:14@1400)
27.320747 192.168.153.8.6690 -> 192.168.3.113.52240: psh 2223612292 ack 2992246125
27.324275 192.168.3.113.52240 -> 192.168.153.8.6690: ack 2223608146
27.356744 192.168.153.8.6690 -> 192.168.3.113.52240: 2223608146 ack 2992246125 (frag 21690:1400@0+)
27.356810 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 21690:14@1400)
27.381094 192.168.153.8.6690 -> 192.168.3.114.53345: ack 1308165825
27.611075 192.168.153.8.6690 -> 192.168.3.113.52240: 2223608146 ack 2992246125 (frag 21691:1400@0+)
27.611137 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 21691:14@1400)
27.822726 192.168.3.113.52135 -> 192.168.153.8.6690: fin 402857170 ack 3623878003
27.823143 192.168.3.113.52135 -> 192.168.153.8.6690: rst 402857171 ack 3623878003
28.122257 192.168.153.8.6690 -> 192.168.3.113.52240: 2223608146 ack 2992246125 (frag 21692:1400@0+)
28.122322 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 21692:14@1400)
28.272038 192.168.153.8.6690 -> 192.168.3.114.53345: fin 3641938986 ack 1308165825
28.385108 192.168.3.114.53345 -> 192.168.153.8.6690: ack 3641938987
28.585407 192.168.3.114.53350 -> 192.168.153.8.6690: syn 1325910871
28.615866 192.168.153.8.6690 -> 192.168.3.114.53350: syn 21641983 ack 1325910872
28.619249 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21641984
28.619710 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325910872 ack 21641984
28.651647 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911007
28.652660 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21641984 ack 1325911007
28.654809 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21642289
28.665778 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911007 ack 21642289
28.697866 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21642289 ack 1325911171
28.701119 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21643174
28.701747 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911171 ack 21643174
28.740123 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21643174 ack 1325911489
28.743626 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21643400
28.744054 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911489 ack 21643400
28.745206 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911522 ack 21643400
28.745480 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911552 ack 21643400
28.745709 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911582 ack 21643400
28.745931 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911613 ack 21643400
28.746148 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911643 ack 21643400
28.746364 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911673 ack 21643400
28.746586 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911704 ack 21643400
28.746805 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911739 ack 21643400
28.747018 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911769 ack 21643400
28.747233 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911799 ack 21643400
28.747450 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911830 ack 21643400
28.747664 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911872 ack 21643400
28.747878 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911902 ack 21643400
28.748092 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911932 ack 21643400
28.748306 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911962 ack 21643400
28.748519 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325911992 ack 21643400
28.748731 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912023 ack 21643400
28.748943 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912056 ack 21643400
28.749155 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912086 ack 21643400
28.749367 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912116 ack 21643400
28.749578 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912149 ack 21643400
28.749386 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912179 ack 21643400
28.749605 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912210 ack 21643400
28.749821 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912243 ack 21643400
28.752437 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912273 ack 21643400
28.752737 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912304 ack 21643400
28.752968 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912339 ack 21643400
28.753198 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912369 ack 21643400
28.753418 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912400 ack 21643400
28.753635 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912436 ack 21643400
28.753853 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912466 ack 21643400
28.754068 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912496 ack 21643400
28.754283 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912527 ack 21643400
28.754497 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912561 ack 21643400
28.754709 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912591 ack 21643400
28.754925 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912621 ack 21643400
28.755142 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912651 ack 21643400
28.755357 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912681 ack 21643400
28.755569 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912712 ack 21643400
28.755781 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912746 ack 21643400
28.755994 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912776 ack 21643400
28.756206 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912806 ack 21643400
28.756420 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912836 ack 21643400
28.756632 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912866 ack 21643400
28.756845 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912896 ack 21643400
28.757059 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912926 ack 21643400
28.757270 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912957 ack 21643400
28.757483 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325912992 ack 21643400
28.757698 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913022 ack 21643400
28.757912 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913053 ack 21643400
28.758125 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913099 ack 21643400
28.758341 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913129 ack 21643400
28.758558 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913160 ack 21643400
28.758771 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913194 ack 21643400
28.758985 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913224 ack 21643400
28.759198 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913254 ack 21643400
28.759410 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913285 ack 21643400
28.759621 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913322 ack 21643400
28.759431 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913352 ack 21643400
28.759647 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913383 ack 21643400
28.759862 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913415 ack 21643400
28.760077 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913445 ack 21643400
28.760291 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913476 ack 21643400
28.760503 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913509 ack 21643400
28.760715 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913539 ack 21643400
28.760927 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913570 ack 21643400
28.761138 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913604 ack 21643400
28.761351 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913634 ack 21643400
28.761567 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913665 ack 21643400
28.761781 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913701 ack 21643400
28.761996 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913731 ack 21643400
28.762212 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913761 ack 21643400
28.762426 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913792 ack 21643400
28.762637 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913826 ack 21643400
28.762853 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913856 ack 21643400
28.763073 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913886 ack 21643400
28.763286 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913917 ack 21643400
28.763501 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913947 ack 21643400
28.763717 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325913978 ack 21643400
28.763933 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914012 ack 21643400
28.764149 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914042 ack 21643400
28.764363 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914072 ack 21643400
28.764578 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914102 ack 21643400
28.764791 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914132 ack 21643400
28.765007 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914163 ack 21643400
28.765222 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914196 ack 21643400
28.765438 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914226 ack 21643400
28.765656 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914256 ack 21643400
28.766605 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914286 ack 21643400
28.766880 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914316 ack 21643400
28.767108 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914347 ack 21643400
28.767325 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914381 ack 21643400
28.767539 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914411 ack 21643400
28.767754 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914441 ack 21643400
28.767970 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914471 ack 21643400
28.768184 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914501 ack 21643400
28.768397 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914531 ack 21643400
28.768611 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914561 ack 21643400
28.768822 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914592 ack 21643400
28.769034 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914628 ack 21643400
28.769245 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914658 ack 21643400
28.769455 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914688 ack 21643400
28.769666 192.168.3.114.53350 -> 192.168.153.8.6690: psh 1325914718 ack 21643400
28.778306 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911552
28.781522 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911613
28.784275 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911673
28.788393 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911739
28.793098 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911799
28.796739 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911872
28.800638 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911932
28.802683 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325911992
28.807123 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912056
28.812291 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912116
28.815370 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912179
28.818776 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912243
28.822136 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912304
28.825753 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912369
28.830951 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912436
28.834594 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912496
28.837884 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912561
28.840718 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912621
28.843623 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912681
28.849064 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912746
28.852249 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912806
28.856563 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912866
28.859670 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912926
28.864407 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325912992
28.867493 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913053
28.870635 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913129
28.875038 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913194
28.878037 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913254
28.883044 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913322
28.886689 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913383
28.889577 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913445
28.893905 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913509
28.896467 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913570
28.901445 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913634
28.905035 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913701
28.908987 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913761
28.912055 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913826
28.915653 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913886
28.920102 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325913947
28.923694 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914012
28.927542 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914072
28.930108 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914132
28.933574 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914196
28.938957 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914256
28.942122 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914316
28.945186 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914381
28.948774 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914441
28.953747 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914501
28.958132 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914561
28.962884 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914628
28.966140 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914688
28.969760 192.168.153.8.6690 -> 192.168.3.114.53350: ack 1325914748
29.005857 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21643400 ack 1325914748
29.006774 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21643430 ack 1325914748
29.007028 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21643460 ack 1325914748
29.007462 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21643749 ack 1325914748
29.007991 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21644187 ack 1325914748
29.009106 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21643430
29.009393 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21644653 ack 1325914748
29.009779 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21645766 ack 1325914748
29.010261 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21646256 ack 1325914748
29.010646 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21647356 ack 1325914748
29.011901 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21643460
29.012176 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21647831 ack 1325914748
29.014096 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21644187
29.016020 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21648818
29.016357 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21648818
29.041455 192.168.153.8.6690 -> 192.168.3.114.53350: 21648818 ack 1325914748 (frag 2148:1400@0+)
29.041519 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 2148:14@1400)
29.042595 192.168.153.8.6690 -> 192.168.3.114.53350: psh 21650200 ack 1325914748
29.045163 192.168.3.114.53350 -> 192.168.153.8.6690: ack 21648818
29.084972 192.168.153.8.6690 -> 192.168.3.114.53350: 21648818 ack 1325914748 (frag 2150:1400@0+)
29.085038 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 2150:14@1400)
29.144072 192.168.153.8.6690 -> 192.168.3.113.52240: 2223608146 ack 2992246125 (frag 21693:1400@0+)
29.144163 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 21693:14@1400)
29.256271 192.168.153.8.6690 -> 192.168.3.113.52190: 1196616365 ack 3028508935 (frag 28672:1400@0+)
29.256343 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 28672:14@1400)
29.321347 192.168.153.8.6690 -> 192.168.3.114.53350: 21648818 ack 1325914748 (frag 2151:1400@0+)
29.321411 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 2151:14@1400)
29.795018 192.168.153.8.6690 -> 192.168.3.114.53350: 21648818 ack 1325914748 (frag 2152:1400@0+)
29.795103 192.168.153.8 -> 192.168.3.114: ip-proto-6 (frag 2152:14@1400)
30.408609 192.168.153.8.6690 -> 192.168.3.113.52142: 2731922178 ack 2883504556 (frag 63033:1400@0+)
30.408671 192.168.153.8 -> 192.168.3.113: ip-proto-6 (frag 63033:14@1400)

765 packets received by filter
0 packets dropped by kernel

 

I have to add that ssh session are getting frozen in certain conditions like lot of output or large paste in the PuTTY session...

 

This blows my mind up.........

Help, please, help !

Labels
Top Kudoed Authors