Skip to content
Snippets Groups Projects

Compare revisions

Changes are shown as if the source revision was being merged into the target revision. Learn more about comparing revisions.

Source

Select target project
No results found

Target

Select target project
  • opensrc/zipr
  • whh8b/zipr
2 results
Show changes
Showing
with 0 additions and 1190 deletions
IP 192.168.1.249.138 > 192.168.1.255.138: NBT UDP PACKET(138)
IP 192.168.1.249.138 > 192.168.1.255.138: NBT UDP PACKET(138)
IP 192.168.1.249.138 > 192.168.1.255.138: NBT UDP PACKET(138)
IP 192.168.1.249.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 192.168.1.249.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 192.168.1.249.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 192.168.1.249.138 > 192.168.1.255.138: NBT UDP PACKET(138)
IP 192.168.1.249.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 192.168.1.249.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 192.168.1.249.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
ARP, Request who-has 192.168.1.1 tell 192.168.1.249, length 28
ARP, Reply 192.168.1.1 is-at 00:0d:88:4f:25:91, length 46
IP 192.168.1.249.68 > 192.168.1.1.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
EAP packet (0) v1, len 5
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
EAPOL start (1) v1, len 0
EAP packet (0) v1, len 5
EAP packet (0) v1, len 45
EAP packet (0) v1, len 20
EAP packet (0) v1, len 76
EAP packet (0) v1, len 80
EAP packet (0) v1, len 28
EAP packet (0) v1, len 4
EAPOL key (3) v1, len 57
EAPOL key (3) v1, len 44
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
EAPOL start (1) v1, len 0
EAP packet (0) v1, len 5
EAP packet (0) v1, len 45
EAP packet (0) v1, len 20
EAP packet (0) v1, len 76
EAP packet (0) v1, len 80
EAP packet (0) v1, len 28
EAP packet (0) v1, len 4
EAPOL key (3) v1, len 57
EAPOL key (3) v1, len 44
ARP, Request who-has 169.254.67.194 tell 169.254.67.194, length 28
ARP, Request who-has 169.254.67.194 tell 169.254.67.194, length 28
ARP, Request who-has 169.254.67.194 tell 169.254.67.194, length 28
IP 169.254.67.194.4299 > 239.255.255.250.1900: UDP, length 133
IP 169.254.67.194 > 224.0.0.22: igmp v3 report, 1 group record(s)
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194 > 224.0.0.22: igmp v3 report, 1 group record(s)
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.4299 > 239.255.255.250.1900: UDP, length 133
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
EAPOL start (1) v1, len 0
EAP packet (0) v1, len 5
EAP packet (0) v1, len 45
EAP packet (0) v1, len 20
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
EAP packet (0) v1, len 76
EAP packet (0) v1, len 80
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
EAP packet (0) v1, len 28
EAP packet (0) v1, len 4
EAPOL key (3) v1, len 57
EAPOL key (3) v1, len 44
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
IP 169.254.67.194.4299 > 239.255.255.250.1900: UDP, length 133
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 169.254.67.194.137 > 169.254.255.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:04:23:57:a5:7a, length 300
EAPOL start (1) v1, len 0
EAP packet (0) v1, len 5
EAP packet (0) v1, len 45
EAP packet (0) v1, len 20
IP 169.254.67.194.138 > 169.254.255.255.138: NBT UDP PACKET(138)
EAP packet (0) v1, len 76
EAP packet (0) v1, len 80
EAP packet (0) v1, len 28
EAP packet (0) v1, len 4
EAPOL key (3) v1, len 57
EAPOL key (3) v1, len 44
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x1), length 116
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x2), length 116
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x3), length 116
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x4), length 116
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x5), length 116
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x6), length 116
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x7), length 116
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x8), length 116
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x1), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1280, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x2), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1536, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x3), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1792, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x4), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2048, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x5), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2304, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x6), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2560, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x7), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2816, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x8), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 3072, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x1), length 172: IP 192.1.2.23 > 192.0.1.1: ESP(spi=0xabcdabcd,seq=0x1), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1280, length 64 (ipip-proto-4) (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x2), length 172: IP 192.1.2.23 > 192.0.1.1: ESP(spi=0xabcdabcd,seq=0x2), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1536, length 64 (ipip-proto-4) (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x3), length 172: IP 192.1.2.23 > 192.0.1.1: ESP(spi=0xabcdabcd,seq=0x3), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1792, length 64 (ipip-proto-4) (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x4), length 172: IP 192.1.2.23 > 192.0.1.1: ESP(spi=0xabcdabcd,seq=0x4), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2048, length 64 (ipip-proto-4) (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x5), length 172: IP 192.1.2.23 > 192.0.1.1: ESP(spi=0xabcdabcd,seq=0x5), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2304, length 64 (ipip-proto-4) (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x6), length 172: IP 192.1.2.23 > 192.0.1.1: ESP(spi=0xabcdabcd,seq=0x6), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2560, length 64 (ipip-proto-4) (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x7), length 172: IP 192.1.2.23 > 192.0.1.1: ESP(spi=0xabcdabcd,seq=0x7), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2816, length 64 (ipip-proto-4) (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0x12345678,seq=0x8), length 172: IP 192.1.2.23 > 192.0.1.1: ESP(spi=0xabcdabcd,seq=0x8), length 116: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 3072, length 64 (ipip-proto-4) (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xd1234567,seq=0x1), length 132: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1280, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xd1234567,seq=0x2), length 132: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1536, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xd1234567,seq=0x3), length 132: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 1792, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xd1234567,seq=0x4), length 132: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2048, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xd1234567,seq=0x5), length 132: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2304, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xd1234567,seq=0x6), length 132: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2560, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xd1234567,seq=0x7), length 132: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 2816, length 64 (ipip-proto-4)
IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xd1234567,seq=0x8), length 132: IP 192.0.2.1 > 192.0.1.1: ICMP echo request, id 28416, seq 3072, length 64 (ipip-proto-4)
IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x1), length 116
IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x2), length 116: ip-proto-227 49
IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x3), length 116: PIMv13, length 10
IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x4), length 116
IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x5), length 116
IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x6), length 116: ip-proto-183 28
IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x7), length 116: ip-proto-72 34
IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x8), length 116: ip-proto-224 59
IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [DATA] (B)(E) [TSN: 1048037094] [SID: 0] [SSEQ 1] [PPID 0x0]
ForCES Query Response
IP 211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP] (1) [DATA] (B)(E) [TSN: 18398476] [SID: 0] [SSEQ 0] [PPID 0x0]
ForCES HeartBeat
IP 150.140.254.202.48316 > 211.129.72.8.6706: sctp[ForCES LP] (1) [SACK] [cum ack 18398476] [a_rwnd 57320] [#gap acks 0] [#dup tsns 0]
IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [DATA] (B)(E) [TSN: 167996938] [SID: 0] [SSEQ 2] [PPID 0x0]
ForCES Query
IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [DATA] (B)(E) [TSN: 167996939] [SID: 0] [SSEQ 3] [PPID 0x0]
ForCES Config
IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [SACK] [cum ack 167996939] [a_rwnd 57228] [#gap acks 0] [#dup tsns 0]
IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [DATA] (B)(E) [TSN: 167996940] [SID: 0] [SSEQ 4] [PPID 0x0]
ForCES Config
IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [DATA] (B)(E) [TSN: 167996941] [SID: 0] [SSEQ 5] [PPID 0x0]
ForCES Config
IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [SACK] [cum ack 167996941] [a_rwnd 57100] [#gap acks 0] [#dup tsns 0]
IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [DATA] (B)(E) [TSN: 167996942] [SID: 0] [SSEQ 6] [PPID 0x0]
ForCES Config
IP 211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP] (1) [SACK] [cum ack 1830592459] [a_rwnd 55272] [#gap acks 0] [#dup tsns 0]
IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [HB REQ]
IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [HB REQ]
IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [HB ACK]
IP 150.140.254.202.48316 > 211.129.72.8.6706: sctp[ForCES LP] (1) [DATA] (B)(E) [TSN: 1830592460] [SID: 0] [SSEQ 30] [PPID 0x0]
ForCES HeartBeat
IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [HB ACK]
IP 211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP] (1) [DATA] (B)(E) [TSN: 18398553] [SID: 0] [SSEQ 77] [PPID 0x0]
ForCES HeartBeat
IP 211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP] (1) [DATA] (B)(E) [TSN: 18398573] [SID: 0] [SSEQ 97] [PPID 0x0]
ForCES HeartBeat
IP 211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP] (1) [SACK] [cum ack 1830592477] [a_rwnd 55272] [#gap acks 0] [#dup tsns 0]
IP 150.140.254.202.48316 > 211.129.72.8.6706: sctp[ForCES LP] (1) [SACK] [cum ack 18398573] [a_rwnd 56144] [#gap acks 0] [#dup tsns 0]
IP (tos 0x2,ECT(0), ttl 64, id 4, offset 0, flags [DF], proto SCTP (132), length 380)
150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP]
1) [DATA] (B)(E) [TSN: 1048037094] [SID: 0] [SSEQ 1] [PPID 0x0]
ForCES Query Response
ForCES Version 1 len 332B flags 0x38400000
SrcID 0x2(FE) DstID 0x40000001(CE) Correlator 0x1
ForCES flags:
NoACK(0x0), prio=7, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
LFBselect TLV, length 308 (data length 304 Bytes)
FEObj LFB(Classid 1) instance 1
Oper TLV GetResp(0x9) length 296
PATH-DATA TLV, length 292 (data encapsulated 288 Bytes)
Pathdata: Flags 0x0 ID count 1
ID#01: 2
FULLDATA TLV (Length 280 DataLen 276 Bytes)
[
0x0000: 0000 0000 0000 0001 0000 0001 0000 0001
0x0010: 0000 0002 0000 0001 0000 0002 0000 0003
0x0020: 0000 0001 0000 0003 0000 0003 0000 0002
0x0030: 0000 0004 0000 0004 0000 0001 0000 0005
0x0040: 0000 0004 0000 0002 0000 0006 0000 0005
0x0050: 0000 0001 0000 0007 0000 0005 0000 0002
0x0060: 0000 0008 0000 0006 0000 0001 0000 0009
0x0070: 0000 0007 0000 0001 0000 000a 0000 0007
0x0080: 0000 0002 0000 000b 0000 0008 0000 0001
0x0090: 0000 000c 0000 0009 0000 0001 0000 000d
0x00a0: 0000 000a 0000 0001 0000 000e 0000 000b
0x00b0: 0000 0001 0000 000f 0000 000c 0000 0001
0x00c0: 0000 0010 0000 000d 0000 0001 0000 0011
0x00d0: 0000 000e 0000 0001 0000 0012 0000 000f
0x00e0: 0000 0001 0000 0013 0000 0010 0000 0001
0x00f0: 0000 0014 0000 0011 0000 0001 0000 0015
0x0100: 0000 0012 0000 0001 0000 0016 0000 0013
0x0110: 0000 0001
]
IP (tos 0x0, ttl 46, id 0, offset 0, flags [DF], proto SCTP (132), length 72)
211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP]
1) [DATA] (B)(E) [TSN: 18398476] [SID: 0] [SSEQ 0] [PPID 0x0]
ForCES HeartBeat
ForCES Version 1 len 24B flags 0xc0400000
SrcID 0x40000001(CE) DstID 0x2(FE) Correlator 0x2
ForCES flags:
AlwaysACK(0x3), prio=0, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
IP (tos 0x2,ECT(0), ttl 64, id 1, offset 0, flags [DF], proto SCTP (132), length 48)
150.140.254.202.48316 > 211.129.72.8.6706: sctp[ForCES LP]
1) [SACK] [cum ack 18398476] [a_rwnd 57320] [#gap acks 0] [#dup tsns 0]
IP (tos 0x0, ttl 46, id 3, offset 0, flags [DF], proto SCTP (132), length 100)
211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP]
1) [DATA] (B)(E) [TSN: 167996938] [SID: 0] [SSEQ 2] [PPID 0x0]
ForCES Query
ForCES Version 1 len 52B flags 0xf8400000
SrcID 0x40000001(CE) DstID 0x2(FE) Correlator 0x3
ForCES flags:
AlwaysACK(0x3), prio=7, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
LFBselect TLV, length 28 (data length 24 Bytes)
FEObj LFB(Classid 1) instance 1
Oper TLV Get(0x7) length 16
PATH-DATA TLV, length 12 (data encapsulated 8 Bytes)
Pathdata: Flags 0x0 ID count 1
ID#01: 1
IP (tos 0x0, ttl 46, id 4, offset 0, flags [DF], proto SCTP (132), length 112)
211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP]
1) [DATA] (B)(E) [TSN: 167996939] [SID: 0] [SSEQ 3] [PPID 0x0]
ForCES Config
ForCES Version 1 len 64B flags 0xf8400000
SrcID 0x40000001(CE) DstID 0x2(FE) Correlator 0x4
ForCES flags:
AlwaysACK(0x3), prio=7, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
LFBselect TLV, length 40 (data length 36 Bytes)
#3(Classid 3) instance 1
Oper TLV SetProp(0x2) length 28
PATH-DATA TLV, length 24 (data encapsulated 20 Bytes)
Pathdata: Flags 0x0 ID count 2
ID#01: 60
ID#02: 1
FULLDATA TLV (Length 8 DataLen 4 Bytes)
[
0x0000: 0000 0001
]
IP (tos 0x2,ECT(0), ttl 64, id 5, offset 0, flags [DF], proto SCTP (132), length 48)
150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP]
1) [SACK] [cum ack 167996939] [a_rwnd 57228] [#gap acks 0] [#dup tsns 0]
IP (tos 0x0, ttl 46, id 5, offset 0, flags [DF], proto SCTP (132), length 112)
211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP]
1) [DATA] (B)(E) [TSN: 167996940] [SID: 0] [SSEQ 4] [PPID 0x0]
ForCES Config
ForCES Version 1 len 64B flags 0xf8400000
SrcID 0x40000001(CE) DstID 0x2(FE) Correlator 0x5
ForCES flags:
AlwaysACK(0x3), prio=7, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
LFBselect TLV, length 40 (data length 36 Bytes)
#3(Classid 3) instance 1
Oper TLV SetProp(0x2) length 28
PATH-DATA TLV, length 24 (data encapsulated 20 Bytes)
Pathdata: Flags 0x0 ID count 2
ID#01: 60
ID#02: 2
FULLDATA TLV (Length 8 DataLen 4 Bytes)
[
0x0000: 0000 0001
]
IP (tos 0x0, ttl 46, id 6, offset 0, flags [DF], proto SCTP (132), length 112)
211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP]
1) [DATA] (B)(E) [TSN: 167996941] [SID: 0] [SSEQ 5] [PPID 0x0]
ForCES Config
ForCES Version 1 len 64B flags 0xf8400000
SrcID 0x40000001(CE) DstID 0x2(FE) Correlator 0x6
ForCES flags:
AlwaysACK(0x3), prio=7, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
LFBselect TLV, length 40 (data length 36 Bytes)
#3(Classid 3) instance 1
Oper TLV SetProp(0x2) length 28
PATH-DATA TLV, length 24 (data encapsulated 20 Bytes)
Pathdata: Flags 0x0 ID count 2
ID#01: 60
ID#02: 3
FULLDATA TLV (Length 8 DataLen 4 Bytes)
[
0x0000: 0000 0001
]
IP (tos 0x2,ECT(0), ttl 64, id 6, offset 0, flags [DF], proto SCTP (132), length 48)
150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP]
1) [SACK] [cum ack 167996941] [a_rwnd 57100] [#gap acks 0] [#dup tsns 0]
IP (tos 0x0, ttl 46, id 7, offset 0, flags [DF], proto SCTP (132), length 112)
211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP]
1) [DATA] (B)(E) [TSN: 167996942] [SID: 0] [SSEQ 6] [PPID 0x0]
ForCES Config
ForCES Version 1 len 64B flags 0xf8400000
SrcID 0x40000001(CE) DstID 0x2(FE) Correlator 0x7
ForCES flags:
AlwaysACK(0x3), prio=7, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
LFBselect TLV, length 40 (data length 36 Bytes)
#3(Classid 3) instance 2
Oper TLV SetProp(0x2) length 28
PATH-DATA TLV, length 24 (data encapsulated 20 Bytes)
Pathdata: Flags 0x0 ID count 2
ID#01: 60
ID#02: 1
FULLDATA TLV (Length 8 DataLen 4 Bytes)
[
0x0000: 0000 0001
]
IP (tos 0x0, ttl 46, id 110, offset 0, flags [DF], proto SCTP (132), length 48)
211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP]
1) [SACK] [cum ack 1830592459] [a_rwnd 55272] [#gap acks 0] [#dup tsns 0]
IP (tos 0x2,ECT(0), ttl 64, id 90, offset 0, flags [DF], proto SCTP (132), length 80)
150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP]
1) [HB REQ]
IP (tos 0x0, ttl 46, id 111, offset 0, flags [DF], proto SCTP (132), length 80)
211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP]
1) [HB REQ]
IP (tos 0x2,ECT(0), ttl 64, id 91, offset 0, flags [DF], proto SCTP (132), length 80)
150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP]
1) [HB ACK]
IP (tos 0x2,ECT(0), ttl 64, id 111, offset 0, flags [DF], proto SCTP (132), length 72)
150.140.254.202.48316 > 211.129.72.8.6706: sctp[ForCES LP]
1) [DATA] (B)(E) [TSN: 1830592460] [SID: 0] [SSEQ 30] [PPID 0x0]
ForCES HeartBeat
ForCES Version 1 len 24B flags 0x00000000
SrcID 0x2(FE) DstID 0x40000001(CE) Correlator 0x53
ForCES flags:
NoACK(0x0), prio=0, EMReserved(0x0),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
IP (tos 0x0, ttl 46, id 112, offset 0, flags [DF], proto SCTP (132), length 80)
211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP]
1) [HB ACK]
IP (tos 0x0, ttl 46, id 111, offset 0, flags [DF], proto SCTP (132), length 72)
211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP]
1) [DATA] (B)(E) [TSN: 18398553] [SID: 0] [SSEQ 77] [PPID 0x0]
ForCES HeartBeat
ForCES Version 1 len 24B flags 0xc0400000
SrcID 0x40000001(CE) DstID 0x2(FE) Correlator 0x83
ForCES flags:
AlwaysACK(0x3), prio=0, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
IP (tos 0x0, ttl 46, id 148, offset 0, flags [DF], proto SCTP (132), length 72)
211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP]
1) [DATA] (B)(E) [TSN: 18398573] [SID: 0] [SSEQ 97] [PPID 0x0]
ForCES HeartBeat
ForCES Version 1 len 24B flags 0xc0400000
SrcID 0x40000001(CE) DstID 0x2(FE) Correlator 0x97
ForCES flags:
AlwaysACK(0x3), prio=0, execute-all-or-none(0x1),
Standalone(0x0), StartofTransaction(0x0)
Extra flags: rsv(b5-7) 0x0 rsv(b13-31) 0x0
IP (tos 0x0, ttl 46, id 149, offset 0, flags [DF], proto SCTP (132), length 48)
211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP]
1) [SACK] [cum ack 1830592477] [a_rwnd 55272] [#gap acks 0] [#dup tsns 0]
IP (tos 0x2,ECT(0), ttl 64, id 147, offset 0, flags [DF], proto SCTP (132), length 48)
150.140.254.202.48316 > 211.129.72.8.6706: sctp[ForCES LP]
1) [SACK] [cum ack 18398573] [a_rwnd 56144] [#gap acks 0] [#dup tsns 0]
b0:99:28:c8:d6:6c > 33:33:00:00:00:01, ethertype IPv6 (0x86dd), length 230:
0x0000: 6000 0000 00b0 3aff fe80 0000 0000 0000 `.....:.........
0x0010: b299 28ff fec8 d66c ff02 0000 0000 0000 ..(....l........
0x0020: 0000 0000 0000 0001 8600 2401 4020 000f ..........$.@...
0x0030: 0000 0000 0000 0000 0304 48c0 0027 8d00 ..........H..'..
0x0040: 0009 3a80 0000 0000 2222 3333 4444 5555 ..:.....""33DDUU
0x0050: 6600 0000 0000 0000 1905 0000 0000 0005 f...............
0x0060: abcd 0000 0000 0000 0000 0000 0000 efef ................
0x0070: 1234 5678 0000 0000 0000 0000 0000 0001 .4Vx............
0x0080: 1f07 0000 0000 0005 0765 7861 6d70 6c65 .........example
0x0090: 0363 6f6d 0007 6578 616d 706c 6503 6f72 .com..example.or
0x00a0: 6700 0464 6f6d 3104 646f 6d32 0374 6c64 g..dom1.dom2.tld
0x00b0: 0000 0000 0000 0000 0501 0000 0000 0064 ...............d
0x00c0: 0101 b099 28c8 d66c 0701 0000 0000 1388 ....(..l........
0x00d0: 0801 0000 c351 000f .....Q..
00:15:17:cc:e5:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90:
0x0000: 6000 0000 0024 0001 fe80 0000 0000 0000 `....$..........
0x0010: 0215 17ff fecc e546 ff02 0000 0000 0000 .......F........
0x0020: 0000 0000 0000 0016 3a00 0502 0000 0100 ........:.......
0x0030: 8f00 1fc5 0000 0001 0400 0000 ff02 0000 ................
0x0040: 0000 0000 0000 0db8 1122 3344 ........."3D
b0:a8:6e:0c:d4:e8 > 33:33:00:00:00:01, ethertype IPv6 (0x86dd), length 90:
0x0000: 6000 0000 0024 0001 fe80 0000 0000 0000 `....$..........
0x0010: b2a8 6eff fe0c d4e8 ff02 0000 0000 0000 ..n.............
0x0020: 0000 0000 0000 0001 3a00 0502 0000 0100 ........:.......
0x0030: 8200 623a 2710 0000 0000 0000 0000 0000 ..b:'...........
0x0040: 0000 0000 0000 0000 023c 0000 .........<..
00:15:17:cc:e5:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 150:
0x0000: 6000 0000 0060 0001 fe80 0000 0000 0000 `....`..........
0x0010: 0215 17ff fecc e546 ff02 0000 0000 0000 .......F........
0x0020: 0000 0000 0000 0016 3a00 0502 0000 0100 ........:.......
0x0030: 8f00 2a0e 0000 0004 0200 0000 ff02 0000 ..*.............
0x0040: 0000 0000 0000 0db8 1122 3344 0200 0000 ........."3D....
0x0050: ff02 0000 0000 0000 0000 0001 ffcc e546 ...............F
0x0060: 0200 0000 ff02 0000 0000 0000 0000 0001 ................
0x0070: ffa7 10ad 0200 0000 ff02 0000 0000 0000 ................
0x0080: 0000 0001 ff00 0002 ........
00:15:17:cc:e5:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90:
0x0000: 6000 0000 0024 0001 fe80 0000 0000 0000 `....$..........
0x0010: 0215 17ff fecc e546 ff02 0000 0000 0000 .......F........
0x0020: 0000 0000 0000 0016 3a00 0502 0000 0100 ........:.......
0x0030: 8f00 20c5 0000 0001 0300 0000 ff02 0000 ................
0x0040: 0000 0000 0000 0db8 1122 3344 ........."3D
IP 192.2.0.2 > 224.0.0.1: igmp query v3
IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 51m12s]
IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 51m12s]
IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 1.0s]
IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 1.0s]
IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 1.0s]
IP (tos 0x0, ttl 64, id 19908, offset 0, flags [none], proto UDP (17), length 404)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000000: parent_sa ikev2_init[I]:
(sa: len=116
(p: #1 protoid=isakmp transform=12 len=116
(t: #1 type=encr id=aes (type=keylen value=0080))
(t: #2 type=encr id=aes (type=keylen value=0100))
(t: #3 type=encr id=aes (type=keylen value=00c0))
(t: #4 type=encr id=3des )
(t: #5 type=prf id=hmac-sha )
(t: #6 type=prf id=hmac-md5 )
(t: #7 type=prf id=aes128_xcbc )
(t: #8 type=integ id=hmac-sha )
(t: #9 type=integ id=hmac-md5 )
(t: #10 type=integ id=aes-xcbc )
(t: #11 type=dh id=modp1024 )
(t: #12 type=dh id=modp2048 )))
(v2ke: len=128 group=modp1024)
(nonce: len=32 data=(6128ebd023a864e94a7f...ba041b5de59955900d818ac54e18b236739d9e8b))
(n: prot_id=#0 type=16388(nat_detection_source_ip))
(n: prot_id=#0 type=16389(nat_detection_destination_ip))
IP (tos 0x0, ttl 64, id 19909, offset 0, flags [none], proto UDP (17), length 88)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000000: parent_sa ikev2_init[R]:
(n: prot_id=#0 type=16390(cookie) data=(00000001c2221e50c16e123f2b0c71aefcf0cb3b798782c6))
IP (tos 0x0, ttl 64, id 19910, offset 0, flags [none], proto UDP (17), length 436)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000000: parent_sa ikev2_init[I]:
(n: prot_id=#0 type=16390(cookie) data=(00000001c2221e50c16e...ba041b5de59955900d818ac54e18b236739d9e8b))
(sa: len=116
(p: #1 protoid=isakmp transform=12 len=116
(t: #1 type=encr id=aes (type=keylen value=0080))
(t: #2 type=encr id=aes (type=keylen value=0100))
(t: #3 type=encr id=aes (type=keylen value=00c0))
(t: #4 type=encr id=3des )
(t: #5 type=prf id=hmac-sha )
(t: #6 type=prf id=hmac-md5 )
(t: #7 type=prf id=aes128_xcbc )
(t: #8 type=integ id=hmac-sha )
(t: #9 type=integ id=hmac-md5 )
(t: #10 type=integ id=aes-xcbc )
(t: #11 type=dh id=modp1024 )
(t: #12 type=dh id=modp2048 )))
(v2ke: len=128 group=modp1024)
(nonce: len=32 data=(6128ebd023a864e94a7f...ba041b5de59955900d818ac54e18b236739d9e8b))
(n: prot_id=#0 type=16388(nat_detection_source_ip))
(n: prot_id=#0 type=16389(nat_detection_destination_ip))
IP (tos 0x0, ttl 64, id 19911, offset 0, flags [none], proto UDP (17), length 332)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000000: parent_sa ikev2_init[R]:
(sa: len=44
(p: #1 protoid=isakmp transform=4 len=44
(t: #1 type=encr id=aes (type=keylen value=0080))
(t: #2 type=prf id=hmac-sha )
(t: #3 type=integ id=hmac-sha )
(t: #4 type=dh id=modp1024 )))
(v2ke: len=128 group=modp1024)
(nonce: len=32 data=(b31c379f272ce2984bd1...905954a783be2c37e2ccc4fdd270a532dbe6f428))
(n: prot_id=#0 type=16388(nat_detection_source_ip))
(n: prot_id=#0 type=16389(nat_detection_destination_ip))
IP (tos 0x0, ttl 64, id 19912, offset 0, flags [none], proto UDP (17), length 264)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000001: child_sa ikev2_auth[I]:
(v2e: len=204)
IP (tos 0x0, ttl 64, id 19913, offset 0, flags [none], proto UDP (17), length 184)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000001: child_sa ikev2_auth[R]:
(v2e: len=124)
IP (tos 0x0, ttl 64, id 19914, offset 0, flags [none], proto UDP (17), length 280)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000002: child_sa child_sa[I]:
(v2e: len=220)
IP (tos 0x0, ttl 64, id 19915, offset 0, flags [none], proto UDP (17), length 248)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000003: child_sa child_sa[I]:
(v2e: len=188)
IP (tos 0x0, ttl 64, id 19916, offset 0, flags [none], proto UDP (17), length 104)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000002: child_sa child_sa[R]:
(v2e: len=44)
IP (tos 0x0, ttl 64, id 19917, offset 0, flags [none], proto UDP (17), length 104)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000003: child_sa child_sa[R]:
(v2e: len=44)
IP (tos 0x0, ttl 64, id 19918, offset 0, flags [none], proto UDP (17), length 312)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000004: child_sa child_sa[I]:
(v2e: len=252)
IP (tos 0x0, ttl 64, id 19919, offset 0, flags [none], proto UDP (17), length 280)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000005: child_sa child_sa[I]:
(v2e: len=220)
IP (tos 0x0, ttl 64, id 19920, offset 0, flags [none], proto UDP (17), length 232)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000004: child_sa child_sa[R]:
(v2e: len=172)
IP (tos 0x0, ttl 64, id 19921, offset 0, flags [none], proto UDP (17), length 232)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000005: child_sa child_sa[R]:
(v2e: len=172)
IP (tos 0x0, ttl 64, id 19922, offset 0, flags [none], proto UDP (17), length 312)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000006: child_sa child_sa[I]:
(v2e: len=252)
IP (tos 0x0, ttl 64, id 19923, offset 0, flags [none], proto UDP (17), length 280)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000007: child_sa child_sa[I]:
(v2e: len=220)
IP (tos 0x0, ttl 64, id 19924, offset 0, flags [none], proto UDP (17), length 232)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000006: child_sa child_sa[R]:
(v2e: len=172)
IP (tos 0x0, ttl 64, id 19925, offset 0, flags [none], proto UDP (17), length 232)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000007: child_sa child_sa[R]:
(v2e: len=172)
IP (tos 0x0, ttl 64, id 19926, offset 0, flags [none], proto UDP (17), length 392)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000008: child_sa child_sa[I]:
(v2e: len=332)
IP (tos 0x0, ttl 64, id 19927, offset 0, flags [none], proto UDP (17), length 344)
192.168.1.1.500 > 192.168.1.2.500: isakmp 2.0 msgid 00000008: child_sa child_sa[R]:
(v2e: len=284)
IP (tos 0x0, ttl 64, id 19928, offset 0, flags [none], proto UDP (17), length 120)
192.168.1.2.500 > 192.168.1.1.500: isakmp 2.0 msgid 00000000: parent_sa inf2[I]:
(v2e: len=60)
IP (tos 0x0, ttl 64, id 19908, offset 0, flags [none], proto UDP (17), length 404)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x0765 -> 0xf5df!] isakmp 2.0 msgid 00000000 cookie a88875a8198992a6->0000000000000000: parent_sa ikev2_init[I]:
(sa: len=116
(p: #1 protoid=isakmp transform=12 len=116
(t: #1 type=encr id=aes (type=keylen value=0080))
(t: #2 type=encr id=aes (type=keylen value=0100))
(t: #3 type=encr id=aes (type=keylen value=00c0))
(t: #4 type=encr id=3des )
(t: #5 type=prf id=hmac-sha )
(t: #6 type=prf id=hmac-md5 )
(t: #7 type=prf id=aes128_xcbc )
(t: #8 type=integ id=hmac-sha )
(t: #9 type=integ id=hmac-md5 )
(t: #10 type=integ id=aes-xcbc )
(t: #11 type=dh id=modp1024 )
(t: #12 type=dh id=modp2048 )))
(v2ke: len=128 group=modp1024 b5445bd60cece6fdcd3c96a52cbb7bb426a8c7a0f56a9c38d1b1c4f0c3a6e8e7dba5c7339b6ed02e757119dfb5b6933ce93b604987fbbc77221b2a0c7cdd32787eff10572bef546c361462f9da34847969a42e51c755996beac42e6fba961a75de0fc1b23f099380896ee89202122dedac1bd54aa8494ac3d740be4d2a4cf39d)
(nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) )
(n: prot_id=#0 type=16388(nat_detection_source_ip))
(n: prot_id=#0 type=16389(nat_detection_destination_ip))
IP (tos 0x0, ttl 64, id 19909, offset 0, flags [none], proto UDP (17), length 88)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x0629 -> 0x0cd0!] isakmp 2.0 msgid 00000000 cookie a88875a8198992a6->0000000000000000: parent_sa ikev2_init[R]:
(n: prot_id=#0 type=16390(cookie) data=(00000001c2221e50c16e123f2b0c71aefcf0cb3b798782c6))
IP (tos 0x0, ttl 64, id 19910, offset 0, flags [none], proto UDP (17), length 436)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x0785 -> 0x7702!] isakmp 2.0 msgid 00000000 cookie a88875a8198992a6->0000000000000000: parent_sa ikev2_init[I]:
(n: prot_id=#0 type=16390(cookie) data=(00000001c2221e50c16e...ba041b5de59955900d818ac54e18b236739d9e8b))
(sa: len=116
(p: #1 protoid=isakmp transform=12 len=116
(t: #1 type=encr id=aes (type=keylen value=0080))
(t: #2 type=encr id=aes (type=keylen value=0100))
(t: #3 type=encr id=aes (type=keylen value=00c0))
(t: #4 type=encr id=3des )
(t: #5 type=prf id=hmac-sha )
(t: #6 type=prf id=hmac-md5 )
(t: #7 type=prf id=aes128_xcbc )
(t: #8 type=integ id=hmac-sha )
(t: #9 type=integ id=hmac-md5 )
(t: #10 type=integ id=aes-xcbc )
(t: #11 type=dh id=modp1024 )
(t: #12 type=dh id=modp2048 )))
(v2ke: len=128 group=modp1024 b5445bd60cece6fdcd3c96a52cbb7bb426a8c7a0f56a9c38d1b1c4f0c3a6e8e7dba5c7339b6ed02e757119dfb5b6933ce93b604987fbbc77221b2a0c7cdd32787eff10572bef546c361462f9da34847969a42e51c755996beac42e6fba961a75de0fc1b23f099380896ee89202122dedac1bd54aa8494ac3d740be4d2a4cf39d)
(nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) )
(n: prot_id=#0 type=16388(nat_detection_source_ip))
(n: prot_id=#0 type=16389(nat_detection_destination_ip))
IP (tos 0x0, ttl 64, id 19911, offset 0, flags [none], proto UDP (17), length 332)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x071d -> 0x8650!] isakmp 2.0 msgid 00000000 cookie a88875a8198992a6->71be8358efae7663: parent_sa ikev2_init[R]:
(sa: len=44
(p: #1 protoid=isakmp transform=4 len=44
(t: #1 type=encr id=aes (type=keylen value=0080))
(t: #2 type=prf id=hmac-sha )
(t: #3 type=integ id=hmac-sha )
(t: #4 type=dh id=modp1024 )))
(v2ke: len=128 group=modp1024 5a56714d3abf64e3a3f401ead9f5323ff0b77faa5f1e99199b13ac821f0a0c4f854786ca09b7a76aa508bcee11f16369a16d5fa041ca2d9a8dfa8228c61f2482d2175c5c1a9491fc221bec7a1fa69f656d4c98ba49ae9d721dedf4a02d7ecdfc201dc785a13ed74e4f3982762a2720ffdfc365ee4e37279af496cd86f881fd15)
(nonce: len=32 nonce=(b31c379f272ce2984bd17ca38c8729e1edbc081a14fb0f67cff81721dfeec1f9) )
(n: prot_id=#0 type=16388(nat_detection_source_ip))
(n: prot_id=#0 type=16389(nat_detection_destination_ip))
IP (tos 0x0, ttl 64, id 19912, offset 0, flags [none], proto UDP (17), length 264)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x07d9 -> 0xb2d6!] isakmp 2.0 msgid 00000001 cookie a88875a8198992a6->71be8358efae7663: child_sa ikev2_auth[I]:
(v2e: len=204 f606135ad373e70836fda91b63ca4c608e1ad58218488c2647ff1e8a912958aa77efbc3068a2ae6ab7c3d0cb1e6fb864df99c62f2cc045708084708154a393c2f4cbefad1f6848525d49db563e13345a4e6e2fd066c04e2ce291f4714baec6bf328356c446247cab835bda3e8e1aae5967248f01eb3a1c02a541b4da09b3276b400d50a067542a678468c5f41e54017c00964f1003f8c88896a6f12215a5f1a060713cc83802cae3abee18417c0c35dc6f58a01adb96ed1c009c68e3069ae70f4b10afb7736c111ade4d826e)
IP (tos 0x0, ttl 64, id 19913, offset 0, flags [none], proto UDP (17), length 184)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x0689 -> 0x0748!] isakmp 2.0 msgid 00000001 cookie a88875a8198992a6->71be8358efae7663: child_sa ikev2_auth[R]:
(v2e: len=124 6afe95bc5147b0ad7e4ccb9141c160a44f7c6eddc6b29d414ad5e2b882544fdc6c3ee6983ae1408b5764b1649343876454d1bf4d515aaf03c15eafe71be6b4cf51ab60630c45bcf0e2a2db8eee70095a4e010fdb342adb6d03dae5def9d4907cdfc8ccd6f3da9b7497c58e84a952d983bafb941ab1de1b0bb9ffad3b)
IP (tos 0x0, ttl 64, id 19914, offset 0, flags [none], proto UDP (17), length 280)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x07e9 -> 0x35ac!] isakmp 2.0 msgid 00000002 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[I]:
(v2e: len=220 53cc6c0b41f14e4fc057c7f6a3524adde8521f26f67c058430a902db1a52ed16d322630d2eb515372dc12d97dc7c20552607e2ed193d9b33939e10aa2fc37b6199f0a629c6b58135f5b6f9e07906cd30dc3cae7d55fe08d95d3e660a623731c396a325adbff11c490f9fd102224391a65fb7bbe862945b64cf1fb833b9ce68c83df0b9d2ce7bd54f650864af9445e547cdfe5caa393344ae5274933b7efcf616821ea7daa9c5a6e8275ad6c688700cb7f4bcd6fb8025e93bb6dd5f581faebcbecb798c87617a4ec1b06ba290ac5fc1d6e4c2725c1f9f0e10b144fbbe)
IP (tos 0x0, ttl 64, id 19915, offset 0, flags [none], proto UDP (17), length 248)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x06c9 -> 0xdeaf!] isakmp 2.0 msgid 00000003 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[I]:
(v2e: len=188 9603e03f280964782717da15a502f0a9e9f17dbf4487c6923cf00b7040d539bc947c705790e4e99b834a7ae2a8d79f5620e11615e0a762889aab821e0d03132dfb8cc6b3718582411bcd98c242a8b10a66274dae1ce055fb30a4d3e64c969be6e08b626958f4446c6e4a0c8d7a24522959c6152e63a575c06930c2097539bfbdff08c70533428cf6b452e0b8b0259c2292925d2ed62e8956bc7e3a911a61509be1ac8f7b7cd4636176e524f4d0f17573f2aeddce2251fd6d5d9cd54d)
IP (tos 0x0, ttl 64, id 19916, offset 0, flags [none], proto UDP (17), length 104)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x0639 -> 0xc72b!] isakmp 2.0 msgid 00000002 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[R]:
(v2e: len=44 5bd2d26cb43b6cec30dec13fa387359797baf7b41e783422bc4dabf5d03ab2420d277d3b2f28d1f003da98d1)
IP (tos 0x0, ttl 64, id 19917, offset 0, flags [none], proto UDP (17), length 104)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x0639 -> 0x4119!] isakmp 2.0 msgid 00000003 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[R]:
(v2e: len=44 38f60ab69110967961ae04af4e47a770260d61e29d18fb13ce093a47970068dacb342f7999cc3d0d59f77a94)
IP (tos 0x0, ttl 64, id 19918, offset 0, flags [none], proto UDP (17), length 312)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x0709 -> 0x236f!] isakmp 2.0 msgid 00000004 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[I]:
(v2e: len=252 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)
IP (tos 0x0, ttl 64, id 19919, offset 0, flags [none], proto UDP (17), length 280)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x07e9 -> 0xd8ba!] isakmp 2.0 msgid 00000005 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[I]:
(v2e: len=220 dae6134a9cff1a4e3cc59a79e019a93f8469dd4e2faaaad1c3afba22ecd128fdb1e8954c753f8f62aeb6aac9732f414b065ec39569a670be6980c81eb3e44bc93ec63e9a754d0456c6703cd718371edeef674928180f9d14c39e52cfa4a517368e7db2fa0bfdb41cf56d97006233103f22650fdcd5ffab8418e40903e4749e126d06e9dc2a18cfd5bfda0013e3e9eb53e79bbe30eadf0f4ddcefbab0c08e870b29d39b2401c75b68fc46a066782857ca48d547e410ac15cabb6738875200b535cbd9ae1e1ce99839c9c25639070e5ed977809c50b6bb9550b50b49bb)
IP (tos 0x0, ttl 64, id 19920, offset 0, flags [none], proto UDP (17), length 232)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x06b9 -> 0x7194!] isakmp 2.0 msgid 00000004 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[R]:
(v2e: len=172 1fd8516b57b1ab1bdbcdba1930a5097decc023c5c534497ca53f178b9d4d11228746454371b0cc6ec067e14e1e5c5652840cfdae0ea84c7f0a6e799ff7fb131d15763feef45e80f24716cde47d23527f68e055a7c3adc7225489295e1bc3f1029b63822872865df55c6c275dead8a6f64bda8ae44f42c318fa71eb04eed7312dafd2dd8665fd5d3225f3aae6f7335b581c3a89c07af1009871dea9927f046432cd01b04234204d01583baf3a)
IP (tos 0x0, ttl 64, id 19921, offset 0, flags [none], proto UDP (17), length 232)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x06b9 -> 0x6053!] isakmp 2.0 msgid 00000005 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[R]:
(v2e: len=172 f6fc8113f34b92eb7d595a048f57d46593441ad9a61919e5919e7de4454fa35882937d3b74c83ab959fd053c6a12a51b04a0e92e01683782658bb9af2bbcc7a4bd5e1eef2dbcdc7715cac6eaecfbcc051a46f2263d1b8387bdad7e68c6e4ba1be9794e163e484768995a9f4a18edcbc6a44f0a74cb01c318e7848562e0866f388b8d04f14f1af87de7de6cee1f889d4330d82932a7127b7d1a934e641c32b76e33b37706d50286f8cbe335ba)
IP (tos 0x0, ttl 64, id 19922, offset 0, flags [none], proto UDP (17), length 312)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x0709 -> 0xfb68!] isakmp 2.0 msgid 00000006 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[I]:
(v2e: len=252 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)
IP (tos 0x0, ttl 64, id 19923, offset 0, flags [none], proto UDP (17), length 280)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x07e9 -> 0x9881!] isakmp 2.0 msgid 00000007 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[I]:
(v2e: len=220 02c703f4bdd83246adc67e1ca07d7e7cfe21b6bde94637680a332813b8a4ca47341abd3a9c37263896c08252bfb1ea6c7ea44783b92ac52acb4fbfec53f03554281c6377650c09208f3d778b11e77b5fbd983be1e96699232392ef31a501fda73c6150fcc2e80bab1e0d49845bd5d511f7c9285ec08352687a2ac8d70d0dec3476491c40b97cb9da405606fc5e8d46bbe199e6d91ae993b7faa0583ec4296a80812fb7e0ae88d3bd54c4a30e5edb2778c960f3e0cb5b1369e999f84de4dc72b5d006805efb7e2d2ed4033e11ff9578012d22942e3799c9382506a021)
IP (tos 0x0, ttl 64, id 19924, offset 0, flags [none], proto UDP (17), length 232)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x06b9 -> 0x3549!] isakmp 2.0 msgid 00000006 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[R]:
(v2e: len=172 7e2e6623c66e161de9641ac7e1b6dfdcf3a5f45bbed123be88f3754d12514404afc054b3c7f789eb52a432a438359dde31152c11b8d209203d62779ca064823d70536c40f846d43d6694a2f12a3176f57007a3506c82fffaf3dbb713bbdbb5f540b7b39aee3c97145671504356095f7ab0c5a84347c0268bce259ca51b4a2dd75a7e3a7ee79f3bffc58d2fc0ac36686229f2309b5cd0c0dcc2af798664c14f5f166ab5e3c1f693092121aa44)
IP (tos 0x0, ttl 64, id 19925, offset 0, flags [none], proto UDP (17), length 232)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x06b9 -> 0xe402!] isakmp 2.0 msgid 00000007 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[R]:
(v2e: len=172 7b545033a2d35df2ab9f26c4bc444713910a32e60fb04cb10a9e76634787f9ddc138c6792faa074be2ebcb43f83f444249679018ec6dc7d4e2247dd8cb915778d90fa5597f1ecba8471db53e3b4da8f73d1eb60c23ca9fb5fa599dc526a961364471b49e5288fcef6a24d02a084d29c4a5c5d1fa305310dba01d09c9c36c86c0af297e05d3fc8559a11666a4363bacc354e96c941349b3f60dd397eb4c2bb09f381831167c0b33686c6bb5d8)
IP (tos 0x0, ttl 64, id 19926, offset 0, flags [none], proto UDP (17), length 392)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x0759 -> 0x3076!] isakmp 2.0 msgid 00000008 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[I]:
(v2e: len=332 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)
IP (tos 0x0, ttl 64, id 19927, offset 0, flags [none], proto UDP (17), length 344)
192.168.1.1.500 > 192.168.1.2.500: [bad udp cksum 0x0729 -> 0xd64e!] isakmp 2.0 msgid 00000008 cookie a88875a8198992a6->71be8358efae7663: child_sa child_sa[R]:
(v2e: len=284 2c1ac864ae2c8499b3c7af8c61a8c4dc9e1af23577b588d6bb3fdef3e483cc2f0158c07071d6dfaef73dccb6cdcf7a5758e41778daceb71cf6733e17168beff6ef2015d670c0b6574fc72e97d4282909966f394a9f9e0fced8e269bbf60e93f0f2080f48dcd4e02ff1129b94f68b268ddd9cff436f38e78fa7986d87e622d1f3da3b3c2795570ebc27d3c3d51f29ef0fff01ae89bd71d2e10ab8faee7d7bb4b5be8a9ee0ea9b5e347bbaf3ebdfaf19735d75e6faa020d6ea72826c2aa5cb2ee648de6b36cbb25087428dea44bd34504e05f2d4fef43c48e2a690510e9278ca8ff2f775792af061b5ccbcf77b3fee658851289969c55edc6d561718a0c761b09b0f67c96e61d00a7fa2929023b5adcfdd33436f63a478141d51b52333)
IP (tos 0x0, ttl 64, id 19928, offset 0, flags [none], proto UDP (17), length 120)
192.168.1.2.500 > 192.168.1.1.500: [bad udp cksum 0x0649 -> 0x85b7!] isakmp 2.0 msgid 00000000 cookie 1d9be9451d4f97a8->64a2a4b5d0e17b6a: parent_sa inf2[I]:
(v2e: len=60 691b48829b6c5d6dd93fa8e33c38dd4c00f5434dc22b4251c0876f0bdb5dbba3dd06283907559a272f07ec7709b9d596a24cd8fe69b82a1f65dbf6f2)