Below is the debug log filtering on src of my PC to dst of IPS's DNS when preference is lowered on the 0/3 interface gateway. Any help would be greatly appreciated.
****** 120038.0: <Trust/ethernet0/0> packet received [104]******
ipid = 5246(147e), @1d5b6114
packet passed sanity check.
flow_decap_vector IPv4 process
ethernet0/0:192.168.11.15/62031->64.222.84.243/53,17<Root>
no session found
flow_first_sanity_check: in <ethernet0/0>, out <N/A>
[ Dest] 1.route 192.168.11.15->0.0.0.0, to ethernet0/0
chose interface ethernet0/0 as incoming nat if.
flow_first_routing: in <ethernet0/0>, out <N/A>
search route to (ethernet0/0, 192.168.11.15->64.222.84.243) in vr trust-vr for
vsd-0/flag-0/ifp-null
[ Dest] 33.route 64.222.84.243->71.181.5.57, to ethernet0/3
routed (x_dst_ip 64.222.84.243) from ethernet0/0 (ethernet0/0 in 0) to etherne
t0/3
policy search from zone 2-> zone 102
policy_flow_search policy search nat_crt from zone 2-> zone 102
RPC Mapping Table search returned 0 matched service(s) for (vsys Root, ip 64.2
22.84.243, port 53, proto 17)
No SW RPC rule match, search HW rule
swrs_search_ip: policy matched id/idx/action = 107/53/0x9
Permitted by policy 107
No src xlate choose interface ethernet0/3 as outgoing phy if
no loop on ifp ethernet0/3.
session application type 78, name IGNORE, nas_id 0, timeout 300sec
1
outgoing wing prepared, ready
handle cleartext reverse route
search route to (ethernet0/3, 64.222.84.243->192.168.11.15) in vr trust-vr for
vsd-0/flag-3000/ifp-ethernet0/0
[ Dest] 1.route 192.168.11.15->192.168.11.15, to ethernet0/0
route to 192.168.11.15
arp entry found for 192.168.11.15
ifp2 ethernet0/0, out_ifp ethernet0/0, flag 00800801, tunnel ffffffff, rc 1
flow got session.
flow session id 43618
flow_main_body_vector in ifp ethernet0/0 out ifp ethernet0/3
flow vector index 0x1, vector addr 0x1e3e2f4, orig vector 0x1e3e2f4
post addr xlation: 192.168.11.15->64.222.84.243.
send packet to traffic shaping queue.
ntry found for 192.168.11.15
ifp2 ethernet0/0, out_ifp ethernet0/0, flag 00800801, tunnel ffffffff, rc 1
flow got session.
flow session id 43995
flow_main_body_vector in ifp ethernet0/0 out ifp ethernet0/3
flow vector index 0x1, vector addr 0x1e3e2f4, orig vector 0x1e3e2f4
post addr xlation: 192.168.11.15->64.222.84.243.
send packet to traffic shaping queue.
flow_ip_send: 147e:192.168.11.15->64.222.84.243,17 => ethernet0/3(104) flag 0x
20020, vlan 0
pak has mac
Send to ethernet0/3 (118)
flow_ip_send: 44d2:192.168.21.206->192.168.11.50,6 => ethernet0/0(1390) flag 0
x24000, vlan 0
pak has mac
Send to ethernet0/0 (1404)
****** 120040.0: <Trust/ethernet0/0> packet received [83]******
ipid = 5268(1494), @1d5f3114
packet passed sanity check.
flow_decap_vector IPv4 process
ethernet0/0:192.168.11.15/62213->64.222.84.243/53,17<Root>
no session found
flow_first_sanity_check: in <ethernet0/0>, out <N/A>
[ Dest] 1.route 192.168.11.15->0.0.0.0, to ethernet0/0
chose interface ethernet0/0 as incoming nat if.
flow_first_routing: in <ethernet0/0>, out <N/A>
search route to (ethernet0/0, 192.168.11.15->64.222.84.243) in vr trust-vr for
vsd-0/flag-0/ifp-null
[ Dest] 33.route 64.222.84.243->71.181.5.57, to ethernet0/3
routed (x_dst_ip 64.222.84.243) from ethernet0/0 (ethernet0/0 in 0) to etherne
t0/3
policy search from zone 2-> zone 102
policy_flow_search policy search nat_crt from zone 2-> zone 102
RPC Mapping Table search returned 0 matched service(s) for (vsys Root, ip 64.2
22.84.243, port 53, proto 17)
No SW RPC rule match, search HW rule
swrs_search_ip: policy matched id/idx/action = 107/53/0x9
Permitted by policy 107
No src xlate choose interface ethernet0/3 as outgoing phy if
no loop on ifp ethernet0/3.
session application type 78, name IGNORE, nas_id 0, timeout 300sec
ALG vector is not attached
1.15
ifp2 ethernet0/0, out_ifp ethernet0/0, flag 00800801, tunnel ffffffff, rc 1
flow got session.
flow session id 45832
flow_main_body_vector in ifp ethernet0/0 out ifp ethernet0/3
flow vector index 0x1, vector addr 0x1e3e2f4, orig vector 0x1e3e2f4
post addr xlation: 192.168.11.15->64.222.84.243.
send packet to traffic shaping queue.
flow_ip_send: 159e:192.168.11.15->64.222.84.243,17 => ethernet0/3(84) flag 0x2
0020, vlan 0
pak has mac
Send to ethernet0/3 (98)
flow_ip_send: 39eb:192.168.21.206->192.168.11.50,6 => ethernet0/0(1390) flag 0
x24000, vlan 0
pak has mac
Send to ethernet0/0 (1404)
flow_ip_send: 3aeb:192.168.21.206->192.168.11.50,6 => ethernet0/0(1390) flag 0
x24000, vlan 0
pak has mac
Send to ethernet0/0 (1404)
ession id 46175
flow_main_body_vector in ifp ethernet0/0 out ifp ethernet0/3
flow vector index 0x1, vector addr 0x1e3e2f4, orig vector 0x1e3e2f4
post addr xlation: 192.168.11.15->64.222.84.243.
send packet to traffic shaping queue.
flow_ip_send: 1494:192.168.11.15->64.222.84.243,17 => ethernet0/3(83) flag 0x2
0020, vlan 0
pak has mac
Send to ethernet0/3 (97)
flow_ip_send: 79d3:192.168.21.206->192.168.11.50,6 => ethernet0/0(1390) flag 0
x24000, vlan 0
pak has mac
Send to ethernet0/0 (1404)
flow_ip_send: 7ad3:192.168.21.206->192.168.11.50,6 => ethernet0/0(1390) flag 0
x24000, vlan 0
pak has mac
Send to ethernet0/0 (1404)
****** 120041.0: <Trust/ethernet0/0> packet received [68]******
ipid = 5270(1496), @1d564914
packet passed sanity check.
flow_decap_vector IPv4 process
ethernet0/0:192.168.11.15/63586->64.222.84.243/53,17<Root>
existing session found. sess token 3
flow got session.
flow session id 46838
flow_main_body_vector in ifp ethernet0/0 out ifp N/A
flow vector index 0x1, vector addr 0x1e3e2f4, orig vector 0x1e3e2f4
post addr xlation: 192.168.11.15->64.222.84.243.
send packet to traffic shaping queue.
****** 120042.0: <Trust/ethernet0/0> packet received [68]******
ipid = 5271(1497), @1d5a8114
packet passed sanity check.
flow_decap_vector IPv4 process
ethernet0/0:192.168.11.15/63322->64.222.84.243/53,17<Root>
no session found
flow_first_sanity_check: in <ethernet0/0>, out <N/A>
[ Dest] 1.route 192.168.11.15->0.0.0.0, to ethernet0/0
chose interface ethernet0/0 as incoming nat if.
flow_first_routing: in <ethernet0/0>, out <N/A>
search route to (ethernet0/0, 192.168.11.15->64.222.84.243) in vr trust-vr for
vsd-0/flag-0/ifp-null
[ Dest] 33.route 64.222.84.243->71.181.5.57, to ethernet0/3
routed (x_dst_ip 64.222.84.243) from ethernet0/0 (ethernet0/0 in 0) to etherne
t0/3
policy search from zone 2-> zone 102
fp ethernet0/0, flag 00800801, tunnel ffffffff, rc 1
flow got session.
flow session id 46444
flow_main_body_vector in ifp ethernet0/0 out ifp ethernet0/3
flow vector index 0x1, vector addr 0x1e3e2f4, orig vector 0x1e3e2f4
post addr xlation: 192.168.11.15->64.222.84.243.
send packet to traffic shaping queue.
interface ethernet0/3 as outgoing phy if
no loop on ifp ethernet0/3.
session application type 78, name IGNORE, nas_id 0, timeout 300sec
ALG vector is not attached
service lookup identified service 0.
/53,17<Root>
no session found
flow_first_sanity_check: in <ethernet0/0>, out <N/A>
[ Dest] 1.route 192.168.11.15->0.0.0.0, to ethernet0/0
chose interface ethernet0/0 as incoming nat if.
flow_first_routing: in <ethernet0/0>, out <N/A>
search route to (ethernet0/0, 192.168.11.15->64.222.84.243) in vr trust-vr for
vsd-0/flag-0/ifp-null
[ Dest] 33.route 64.222.84.243->71.181.5.57, to ethernet0/3
routed (x_dst_ip 64.222.84.243) from ethernet0/0 (ethernet0/0 in 0) to etherne
t0/3
policy search from zone 2-> zone 102
policy_flow_search policy search nat_crt from zone 2-> zone 102
RPC Mapping Table search returned 0 matched service(s) for (vsys Root, ip 64.2
22.84.243, port 53, proto 17)
No SW RPC rule match, search HW rule
swrs_search_ip: policy matched id/idx/action = 107/53/0x9
Permitted by policy 107
No src xlate choose interface ethernet0/3 as outgoing phy if
no loop on ifp ethernet0/3.
session application type 78, name IGNORE, nas_id 0, timeout 300sec
ALG vector is not attached
service lookup identified service 0.
flow_first_final_check: in <ethernet0/0>, out <ethernet0/3>
existing vector list 1-b6a5ee4.
Session (id:44617) created for first pak 1
flow_first_install_session======>
route to 71.181.5.57
arp entry found for 71.181.5.57
ifp2 ethernet0/3, out_ifp ethernet0/3, flag 00800800, tunnel ffffffff, rc 1
outgoing wing prepared, ready
handle cleartext reverse route
search route to (ethernet0/3, 64.222.84.243->192.168.11.15) in vr trust-vr for
vsd-0/flag-3000/ifp-ethernet0/0
[ Dest] 1.route 192.168.11.15->192.168.11.15, to ethernet0/0
route to 192.168.11.15
arp entry found for 192.168.11.15
ifp2 ethernet0/0, out_ifp ethernet0/0, flag 00800801, tunnel ffffffff, rc 1
flow got session.
flow session id 44617
flow_main_body_vector in ifp ethernet0/0 out ifp ethernet0/3
flow vector index 0x1, vector addr 0x1e3e2f4, orig vector 0x1e3e2f4
post addr xlation: 192.168.11.15->64.222.84.243.
send packet to traffic shaping queue.