undebug all ns25-> get db stream  m ****** 3591092.0: packet received [49]****** ipid = 60699(ed1b), @024c4324 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591092.0: packet received [40]****** ipid = 31552(7b40), @c7d15910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: f7cb:61.238.239.19->192.168.1.154,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: f7cc:61.238.239.19->192.168.1.154,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591094.0: packet received [60]****** ipid = 31553(7b41), @c7d13910 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/512,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31407 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d4. flow_encrypt: enc vector=d8601c. l2tp outbound tid=1, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255986736 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: ed46:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. flow_ip_send: 9e0b:74.125.11.81->192.168.1.137,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591099.0: packet received [60]****** ipid = 31554(7b42), @c7d0f910 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/768,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31382 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d4. flow_encrypt: enc vector=d8601c. l2tp outbound tid=1, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255986528 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: ed6a:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3591104.0: packet received [60]****** ipid = 31555(7b43), @c7d19110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/1024,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31278 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d4. flow_encrypt: enc vector=d8601c. l2tp outbound tid=1, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255985976 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: edae:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. flow_ip_send: 9eef:74.125.11.81->192.168.1.137,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591109.0: packet received [60]****** ipid = 31560(7b48), @c7d04110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/1280,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31243 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d4. flow_encrypt: enc vector=d8601c. l2tp outbound tid=1, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255985768 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: ef61:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. flow_ip_send: fa80:61.238.239.19->192.168.1.154,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591128.0: packet received [41]****** ipid = 31612(7b7c), @c7d05910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591128.0: packet received [40]****** ipid = 27(001b), @024c7394 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591128.0: packet received [41]****** ipid = 28(001c), @024c7394 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591128.0: packet received [41]****** ipid = 31613(7b7d), @c7d11110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591128.0: packet received [40]****** ipid = 39(0027), @024c5a64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: ca71:74.125.209.52->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591128.0: packet received [41]****** ipid = 40(0028), @024b4554 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: ca72:74.125.209.52->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591128.0: packet received [40]****** ipid = 31614(7b7e), @c7d1a110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 30e0:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591129.0: packet received [41]****** ipid = 31618(7b82), @c7d04910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 30e3:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591129.0: packet received [40]****** ipid = 42(002a), @024b4554 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591129.0: packet received [41]****** ipid = 43(002b), @024b4554 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591129.0: packet received [40]****** ipid = 31619(7b83), @c7d07110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591129.0: packet received [41]****** ipid = 31620(7b84), @c7d07910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591129.0: packet received [40]****** ipid = 99(0063), @024b4554 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591129.0: packet received [41]****** ipid = 100(0064), @024b4554 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591129.0: packet received [40]****** ipid = 31621(7b85), @c7d1d110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: a0c4:74.125.11.81->192.168.1.137,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591129.0: packet received [41]****** ipid = 31622(7b86), @c7d09110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: a0ca:74.125.11.81->192.168.1.137,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591129.0: packet received [40]****** ipid = 134(0086), @024c7394 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591129.0: packet received [41]****** ipid = 135(0087), @024c7394 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591129.0: packet received [41]****** ipid = 31623(7b87), @c7d0d110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591129.0: packet received [40]****** ipid = 136(0088), @024c5a64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591129.0: packet received [41]****** ipid = 137(0089), @024c5a64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591130.0: packet received [41]****** ipid = 31624(7b88), @c7d13910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591130.0: packet received [40]****** ipid = 142(008e), @024c12b4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591130.0: packet received [41]****** ipid = 31625(7b89), @c7d15910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 30f3:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. ****** 3591130.0: packet received [40]****** ipid = 143(008f), @024c7394 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591130.0: packet received [42]****** ipid = 144(0090), @024c5a64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 30f5:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: 30f6:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591130.0: packet received [40]****** ipid = 31626(7b8a), @c7d1c910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 30f8:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591130.0: packet received [41]****** ipid = 31627(7b8b), @c7d1f910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591130.0: packet received [40]****** ipid = 146(0092), @024c7394 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591130.0: packet received [41]****** ipid = 147(0093), @024c7394 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: fc45:61.238.239.19->192.168.1.154,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591130.0: packet received [40]****** ipid = 31628(7b8c), @c7d04910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 30fc:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591130.0: packet received [41]****** ipid = 31629(7b8d), @c7d0d110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: ca96:74.125.209.52->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591130.0: packet received [40]****** ipid = 148(0094), @024c5a64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591130.0: packet received [41]****** ipid = 149(0095), @024c12b4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591130.0: packet received [40]****** ipid = 31630(7b8e), @c7d14910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591130.0: packet received [41]****** ipid = 31631(7b8f), @c7d15110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591130.0: packet received [40]****** ipid = 151(0097), @024c5a64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591130.0: packet received [41]****** ipid = 152(0098), @024c5a64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: fc4f:61.238.239.19->192.168.1.154,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591131.0: packet received [40]****** ipid = 31634(7b92), @c7d1e110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591131.0: packet received [41]****** ipid = 31635(7b93), @c7d00110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591131.0: packet received [40]****** ipid = 155(009b), @024c7394 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: a0f6:74.125.11.81->192.168.1.137,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ns25-> unget db stream ns25-> ****** 3591566.0: packet received [49]****** ipid = 12603(313b), @024c4324 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591566.0: packet received [40]****** ipid = 32438(7eb6), @c7d09910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591577.0: packet received [60]****** ipid = 32462(7ece), @c7d16110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/256,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31864 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d6. flow_encrypt: enc vector=d8601c. l2tp outbound tid=3, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255996608 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 31c4:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. flow_ip_send: 14cd:202.177.192.221->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: 14ce:202.177.192.221->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591582.0: packet received [60]****** ipid = 32464(7ed0), @c7d0b910 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/512,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31969 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d6. flow_encrypt: enc vector=d8601c. l2tp outbound tid=3, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255994960 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 31e7:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3591587.0: packet received [60]****** ipid = 32465(7ed1), @c7d0c910 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/768,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31745 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d6. flow_encrypt: enc vector=d8601c. l2tp outbound tid=3, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255993960 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 3228:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3591592.0: packet received [60]****** ipid = 32469(7ed5), @c7d00910 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/1024,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31495 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d6. flow_encrypt: enc vector=d8601c. l2tp outbound tid=3, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255992680 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 3244:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3591599.0: packet received [41]****** ipid = 32474(7eda), @c7d10910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591599.0: packet received [40]****** ipid = 12935(3287), @024b8924 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591599.0: packet received [41]****** ipid = 12936(3288), @024b8924 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 73dd:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591600.0: packet received [40]****** ipid = 32475(7edb), @c7d1e110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. ****** 3591600.0: packet received [41]****** ipid = 32476(7edc), @c7d1e910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591600.0: packet received [40]****** ipid = 12940(328c), @024ba064 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591600.0: packet received [41]****** ipid = 12941(328d), @024cabc4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591600.0: packet received [40]****** ipid = 32477(7edd), @c7d0d110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 73e7:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591600.0: packet received [41]****** ipid = 32478(7ede), @c7d0d910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591600.0: packet received [40]****** ipid = 12943(328f), @024c1e54 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591600.0: packet received [41]****** ipid = 12944(3290), @024c1e54 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591600.0: packet received [41]****** ipid = 32479(7edf), @c7d1b110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591600.0: packet received [40]****** ipid = 12945(3291), @024c0904 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591600.0: packet received [41]****** ipid = 12946(3292), @024c0904 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 73ee:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591600.0: packet received [40]****** ipid = 32480(7ee0), @c7d00910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: fea2:203.129.71.168->192.168.1.104,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591600.0: packet received [41]****** ipid = 32481(7ee1), @c7d0b110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 73f6:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591600.0: packet received [40]****** ipid = 12947(3293), @024c0904 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591600.0: packet received [41]****** ipid = 12948(3294), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 73f7:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: bb88:203.112.92.29->192.168.1.198,6 => ethernet1(205) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (219) ****** 3591600.0: packet received [40]****** ipid = 32482(7ee2), @c7d0f910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 73fc:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591600.0: packet received [41]****** ipid = 32483(7ee3), @c7d10910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591601.0: packet received [40]****** ipid = 12949(3295), @024b35d4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591601.0: packet received [41]****** ipid = 12954(329a), @024cabc4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591601.0: packet received [41]****** ipid = 32484(7ee4), @c7d15910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591601.0: packet received [40]****** ipid = 12955(329b), @024cabc4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: f2fb:202.85.162.80->192.168.1.177,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591601.0: packet received [41]****** ipid = 12956(329c), @024cabc4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591601.0: packet received [40]****** ipid = 32485(7ee5), @c7d00910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591602.0: packet received [41]****** ipid = 32486(7ee6), @c7d0d910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591602.0: packet received [40]****** ipid = 12968(32a8), @024c0904 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591602.0: packet received [41]****** ipid = 12969(32a9), @024c0904 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 8d33:210.0.146.33->192.168.1.127,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591602.0: packet received [41]****** ipid = 32487(7ee7), @c7d16910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 7415:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591602.0: packet received [40]****** ipid = 12972(32ac), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 1b7e:38.99.73.4->192.168.1.143,6 => ethernet1(265) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (279) ****** 3591602.0: packet received [41]****** ipid = 12973(32ad), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591602.0: packet received [40]****** ipid = 32488(7ee8), @c7d1a910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591602.0: packet received [41]****** ipid = 32489(7ee9), @c7d1c110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591602.0: packet received [40]****** ipid = 12976(32b0), @024ba064 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591602.0: packet received [41]****** ipid = 12977(32b1), @024ba064 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: effe:210.0.146.33->192.168.1.127,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591602.0: packet received [41]****** ipid = 32490(7eea), @c7d02110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591602.0: packet received [40]****** ipid = 12978(32b2), @024b35d4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 8d42:210.0.146.33->192.168.1.127,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591602.0: packet received [41]****** ipid = 12979(32b3), @024b35d4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3591602.0: packet received [40]****** ipid = 32491(7eeb), @c7d06910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 741a:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3591602.0: packet received [41]****** ipid = 32492(7eec), @c7d09110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3591602.0: packet received [40]****** ipid = 12980(32b4), @024b35d4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 8d4b:210.0.146.33->192.168.1.127,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ns25-> unset ffilt 0 filter 0 removed ns25-> undebug all ns25-> clre    ear db ns25-> set ffilt dst_  -ip 192.168.1.101 filter added ns25-> debug basic flow ^--------unknown keyword basic ns25-> debug basic flow ^--------unknown keyword basic ns25-> debug flow basic ns25-> undebug all ns25-> get dbst     stream ****** 3592387.0: packet received [49]****** ipid = 34643(8753), @024bf5a4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 0c78:74.125.209.86->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592387.0: packet received [40]****** ipid = 36831(8fdf), @c7d0f910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 0c8a:74.125.209.86->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592405.0: packet received [60]****** ipid = 36844(8fec), @c7d04110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/256,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31904 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d7. flow_encrypt: enc vector=d8601c. l2tp outbound tid=4, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255994928 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 8821:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3592410.0: packet received [60]****** ipid = 36850(8ff2), @c7d03110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/512,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31397 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d7. flow_encrypt: enc vector=d8601c. l2tp outbound tid=4, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255993920 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 886a:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3592415.0: packet received [60]****** ipid = 36853(8ff5), @c7d1c110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/768,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31892 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d7. flow_encrypt: enc vector=d8601c. l2tp outbound tid=4, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255992912 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 88ac:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. flow_ip_send: cb5d:119.247.59.137->192.168.1.125,6 => ethernet1(867) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (881) flow_ip_send: cb5e:119.247.59.137->192.168.1.125,6 => ethernet1(473) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (487) ****** 3592420.0: packet received [60]****** ipid = 36854(8ff6), @c7d19110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/1024,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31602 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d7. flow_encrypt: enc vector=d8601c. l2tp outbound tid=4, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255991896 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 88de:218.189.189.121->203.184.161.18,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3592428.0: packet received [41]****** ipid = 36858(8ffa), @c7d04110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592428.0: packet received [40]****** ipid = 35146(894a), @024bcb04 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592428.0: packet received [41]****** ipid = 35147(894b), @024bcb04 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592428.0: packet received [41]****** ipid = 36859(8ffb), @c7d0d110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592428.0: packet received [40]****** ipid = 35148(894c), @024bcb04 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592428.0: packet received [41]****** ipid = 35149(894d), @024bcb04 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 14e2:74.125.209.86->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: 14e3:74.125.209.86->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592429.0: packet received [40]****** ipid = 36860(8ffc), @c7d16110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: 14e6:74.125.209.86->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592429.0: packet received [41]****** ipid = 36861(8ffd), @c7d18910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592429.0: packet received [40]****** ipid = 35150(894e), @024c0144 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 14ea:74.125.209.86->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592429.0: packet received [41]****** ipid = 35151(894f), @024c0144 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592429.0: packet received [41]****** ipid = 36862(8ffe), @c7d00910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592429.0: packet received [40]****** ipid = 35152(8950), @024c0144 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592429.0: packet received [41]****** ipid = 35153(8951), @024c0144 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: cd17:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592429.0: packet received [40]****** ipid = 36863(8fff), @c7d0b910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592429.0: packet received [41]****** ipid = 36864(9000), @c7d0c910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592429.0: packet received [40]****** ipid = 35154(8952), @024c0144 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592429.0: packet received [41]****** ipid = 35155(8953), @024c0144 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592429.0: packet received [41]****** ipid = 36865(9001), @c7d12910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592429.0: packet received [40]****** ipid = 35156(8954), @024bbf64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592429.0: packet received [41]****** ipid = 35157(8955), @024bbf64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592429.0: packet received [41]****** ipid = 36866(9002), @c7d16910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592429.0: packet received [40]****** ipid = 35158(8956), @024ca024 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592429.0: packet received [41]****** ipid = 35159(8957), @024ca024 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: cd2d:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: bb20:210.0.146.43->192.168.1.132,6 => ethernet1(40) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (60) ****** 3592430.0: packet received [40]****** ipid = 36867(9003), @c7d1d110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592430.0: packet received [41]****** ipid = 36868(9004), @c7d0f910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592430.0: packet received [40]****** ipid = 35168(8960), @024bbf64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592430.0: packet received [41]****** ipid = 35169(8961), @024bbf64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 1a69:210.0.146.43->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: 1a6a:210.0.146.43->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592430.0: packet received [40]****** ipid = 36869(9005), @c7d13110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. flow_ip_send: cd4c:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592430.0: packet received [41]****** ipid = 36870(9006), @c7d16910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592430.0: packet received [40]****** ipid = 35170(8962), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592430.0: packet received [41]****** ipid = 35171(8963), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592430.0: packet received [41]****** ipid = 36871(9007), @c7d1f910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592430.0: packet received [40]****** ipid = 35172(8964), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592430.0: packet received [41]****** ipid = 35173(8965), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592430.0: packet received [40]****** ipid = 36872(9008), @c7d0a110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592430.0: packet received [41]****** ipid = 36873(9009), @c7d0b110 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592430.0: packet received [40]****** ipid = 35174(8966), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3592430.0: packet received [41]****** ipid = 35175(8967), @024c7774 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 1513:74.125.209.86->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3592431.0: packet received [40]****** ipid = 36874(900a), @c7d18910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592431.0: packet received [41]****** ipid = 36875(900b), @c7d1a910 packet passed sanity check. ethernet1:192.168.1.101/1517->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31048 packet is for self, copy packet to self copy packet to us. ****** 3592431.0: packet received [40]****** ipid = 35176(8968), @024bbf64 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/1517,6 existing session found. sess token 8 flow got session. flow session id 31048 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 1518:74.125.209.86->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ns25-> und  set ffilt 0                          unset ffilt 0 filter 0 removed ns25->