-> get ffilter -> set ffilter dst-ip 10.51.1.205 filter added -> set ffilter src-ip 10.51.1.205 filter added -> clear db -> debug flow basic -> undebug all -> get db str ****** 242101.0: packet received [72]****** ipid = 35399(8a47), @022b4b14 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:10.51.1.4/23->10.51.1.205/1435,6 existing session found. sess token 8 flow got session. flow session id 127553 skip ttl adjust for packet from self. post addr xlation: 10.51.1.4->10.51.1.205. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 001c230a8ee4 through ethernet0/0 ****** 242101.0: packet received [40]****** ipid = 7947(1f0b), @2e55d110 packet passed sanity check. ethernet0/0:10.51.1.205/1435->10.51.1.4/23,6 existing session found. sess token 4 flow got session. flow session id 127553 post addr xlation: 10.51.1.205->10.51.1.4. packet is for self, copy packet to self copy packet to us. ****** 242103.0: packet received [60]****** ipid = 7948(1f0c), @2e564110 packet passed sanity check. ethernet0/0:10.51.1.205/512->192.168.1.108/40962,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 127887 existing vector list 5-710532c. post addr xlation: 10.51.1.205->192.168.1.108. skipping pre-frag going into tunnel 40000014. flow_encrypt: pipeline. chip info: PIO. Tunnel id 00000014 (vn2) doing ESP encryption and size =64 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec auth done ipsec encrypt engine released ipsec encrypt done put packet(5f5ab90) into flush queue. remove packet(5f5ab90) out from flush queue. **** jump to packet:xxx.xxx.224.226->125.239.53.75 out encryption tunnel 40000014 gw:xxx.xxx.224.225 no more encapping needed send out through normal path. flow_ip_send: 8a49:xxx.xxx.224.226->125.239.53.75,50 => ethernet0/2(112) flag 0x0, vlan 0 mac 009069f3747e in session **** pak processing end. ****** 242109.0: packet received [60]****** ipid = 7949(1f0d), @2e6fc910 packet passed sanity check. ethernet0/0:10.51.1.205/512->192.168.1.108/41218,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 127887 existing vector list 5-710532c. post addr xlation: 10.51.1.205->192.168.1.108. skipping pre-frag going into tunnel 40000014. flow_encrypt: pipeline. chip info: PIO. Tunnel id 00000014 (vn2) doing ESP encryption and size =64 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec auth done ipsec encrypt engine released ipsec encrypt done put packet(5f5ab90) into flush queue. remove packet(5f5ab90) out from flush queue. **** jump to packet:xxx.xxx.224.226->125.239.53.75 out encryption tunnel 40000014 gw:xxx.xxx.224.225 no more encapping needed send out through normal path. flow_ip_send: 8a4a:xxx.xxx.224.226->125.239.53.75,50 => ethernet0/2(112) flag 0x0, vlan 0 mac 009069f3747e in session **** pak processing end. existing vector list 5-710532c. existing vector list 5-710532c. ****** 242114.0: packet received [60]****** ipid = 7953(1f11), @2e48a910 packet passed sanity check. ethernet0/0:10.51.1.205/512->192.168.1.108/41474,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 127887 existing vector list 5-710532c. post addr xlation: 10.51.1.205->192.168.1.108. skipping pre-frag going into tunnel 40000014. flow_encrypt: pipeline. chip info: PIO. Tunnel id 00000014 (vn2) doing ESP encryption and size =64 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec auth done ipsec encrypt engine released ipsec encrypt done put packet(5f5ab90) into flush queue. remove packet(5f5ab90) out from flush queue. **** jump to packet:xxx.xxx.224.226->125.239.53.75 out encryption tunnel 40000014 gw:xxx.xxx.224.225 no more encapping needed send out through normal path. flow_ip_send: 8a4b:xxx.xxx.224.226->125.239.53.75,50 => ethernet0/2(112) flag 0x0, vlan 0 mac 009069f3747e in session **** pak processing end. existing vector list 5-710532c. existing vector list 5-710532c. existing vector list 5-710532c. existing vector list 5-710532c. existing vector list 5-710532c. ****** 242120.0: packet received [60]****** ipid = 7954(1f12), @2e428910 packet passed sanity check. ethernet0/0:10.51.1.205/512->192.168.1.108/41730,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 127887 existing vector list 5-710532c. post addr xlation: 10.51.1.205->192.168.1.108. skipping pre-frag going into tunnel 40000014. flow_encrypt: pipeline. chip info: PIO. Tunnel id 00000014 (vn2) doing ESP encryption and size =64 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec auth done ipsec encrypt engine released ipsec encrypt done put packet(5f5ab90) into flush queue. remove packet(5f5ab90) out from flush queue. **** jump to packet:xxx.xxx.224.226->125.239.53.75 out encryption tunnel 40000014 gw:xxx.xxx.224.225 no more encapping needed send out through normal path. flow_ip_send: 8a4c:xxx.xxx.224.226->125.239.53.75,50 => ethernet0/2(112) flag 0x0, vlan 0 mac 009069f3747e in session **** pak processing end. existing vector list 5-710532c. existing vector list 5-710532c. ****** 242129.0: packet received [51]****** ipid = 7955(1f13), @2e458110 packet passed sanity check. ethernet0/0:10.51.1.205/1435->10.51.1.4/23,6 existing session found. sess token 4 flow got session. flow session id 127553 post addr xlation: 10.51.1.205->10.51.1.4. packet is for self, copy packet to self copy packet to us. ****** 242129.0: packet received [42]****** ipid = 7956(1f14), @2e732110 packet passed sanity check. ethernet0/0:10.51.1.205/1435->10.51.1.4/23,6 existing session found. sess token 4 flow got session. flow session id 127553 post addr xlation: 10.51.1.205->10.51.1.4. packet is for self, copy packet to self copy packet to us. ****** 242129.0: packet received [40]****** ipid = 35404(8a4c), @022b4d04 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:10.51.1.4/23->10.51.1.205/1435,6 existing session found. sess token 8 flow got session. flow session id 127553 skip ttl adjust for packet from self. post addr xlation: 10.51.1.4->10.51.1.205. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 001c230a8ee4 through ethernet0/0 ****** 242129.0: packet received [40]****** ipid = 35405(8a4d), @022b4b14 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:10.51.1.4/23->10.51.1.205/1435,6 existing session found. sess token 8 flow got session. flow session id 127553 skip ttl adjust for packet from self. post addr xlation: 10.51.1.4->10.51.1.205. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 001c230a8ee4 through ethernet0/0