0% found this document useful (0 votes)
18 views

Console Output CLI Console

Uploaded by

desai.preyas7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Console Output CLI Console

Uploaded by

desai.preyas7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Panipat_FW # get router infi ro

command parse error before 'infi'

Panipat_FW # get router info routing-table details 172.16.34.36

Routing table for VRF=0


Routing entry for 172.16.32.0/22
Known via "static", distance 10, metric 0, best
* via Panipat to HO tunnel 122.15.253.45 vrf 0

Panipat_FW # diag de flow filter saddr 172.16.34.36

Panipat_FW # di de fl filter daddr 172.16.152.200

Panipat_FW # di de fl sh function-name en
show function name

Panipat_FW # di de fl trace start 99

Panipat_FW # di de en

Panipat_FW # id=65308 trace_id=1 func=print_pkt_detail line=5779 msg="vd-root:0


received a packet(proto=6, 172.16.34.36:17020->172.16.15
2.200:2000) tun_id=122.15.253.45 from Panipat to HO. flag [S], seq 1233807970, ack
0, win 65535"
id=65308 trace_id=1 func=init_ip_session_common line=5964 msg="allocate a new
session-001cf660, tun_id=122.15.253.45"
id=65308 trace_id=1 func=vf_ip_route_input_common line=2605 msg="find a route:
flag=00000000 gw-172.16.152.200 via VLAN18"
id=65308 trace_id=1 func=__iprope_tree_check line=539 msg="gnum-100004, use
addr/intf hash, len=2"
id=65308 trace_id=1 func=fw_forward_handler line=990 msg="Allowed by Policy-3: AV"
id=65308 trace_id=1 func=av_receive line=443 msg="send to application layer"
id=65308 trace_id=2 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=122.15.253.45 from Panipat to HO. flag [.], seq 1233807971, ack 4187988648,
win 128"
id=65308 trace_id=2 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=2 func=npu_handle_session44 line=1199 msg="Trying to offloading
session from Panipat to HO to VLAN18, skb.npu_flag=000
00400 ses.state=00110306 ses.npu_state=0x04000000"
id=65308 trace_id=2 func=fw_forward_dirty_handler line=436 msg="state=00110306,
state2=00000001, npu_state=04000000"
id=65308 trace_id=2 func=av_receive line=443 msg="send to application layer"
id=65308 trace_id=3 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=0.0.0.0 from local. flag [S], seq 1532528381, ack 0, win 65535"
id=65308 trace_id=3 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=4 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=0.0.0.0 from local. flag [.], seq 1532528382, ack 382931179, win 85"
id=65308 trace_id=4 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=5 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=0.0.0.0 from local. flag [.], seq 1532528382, ack 382931205, win 85"
id=65308 trace_id=5 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=6 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=122.15.253.45 from Panipat to HO. flag [.], seq 1233807971, ack 4187988648,
win 128"
id=65308 trace_id=6 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"
id=65308 trace_id=6 func=npu_handle_session44 line=1199 msg="Trying to offloading
session from Panipat to HO to VLAN18, skb.npu_flag=000
00400 ses.state=00110306 ses.npu_state=0x06000000"
id=65308 trace_id=6 func=fw_forward_dirty_handler line=436 msg="state=00110306,
state2=00000001, npu_state=06000000"
id=65308 trace_id=6 func=av_receive line=443 msg="send to application layer"
id=65308 trace_id=7 func=print_pkt_detail line=5779 msg="vd-root:0 received a
packet(proto=6, 172.16.34.36:17020->172.16.152.200:2000) t
un_id=0.0.0.0 from local. flag [.], seq 1532528382, ack 382931206, win 85"
id=65308 trace_id=7 func=resolve_ip_tuple_fast line=5867 msg="Find an existing
session, id-001cf660, original direction"

You might also like