[ovs-discuss] TSO not working for VM iperf data packets.

Piyush R Srivastava1 pirsriva at in.ibm.com
Fri Dec 18 16:17:51 UTC 2015



Hi,

Problem-

We have a testbed OpenStack setup which uses VXLAN Tunneling for connecting
the network and compute nodes.
On doing an iperf (TCP stream) from VM (client) to external network node
(server), we see that the TCP packets
( which are encapsulated by VTEP on compute node and decapsulated by VTEP
on network node ) are NOT getting segment offloaded (TSO)
by the external network NIC on Network Node.
However, TCP stream iperf packets are getting offloaded when doing iperf
between the Network Node (client) and External Node (server)

Any help on what is causing this anomaly?

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


NIC details-

External network NIC details

[root at rhel7-23 ~]# ethtool -i eth1
driver: ixgbe
version: 4.0.1-k-rh7.1
firmware-version: 0x613e0001
bus-info: 0000:1b:00.1
supports-statistics: yes
supports-test: yes
supports-eeprom-access: yes
supports-register-dump: yes
supports-priv-flags: no

[root at rhel7-23 ~]# ethtool -k eth1
Features for eth1:
rx-checksumming: on
tx-checksumming: on
        tx-checksum-ipv4: on
        tx-checksum-ip-generic: off [fixed]
        tx-checksum-ipv6: on
        tx-checksum-fcoe-crc: on [fixed]
        tx-checksum-sctp: on
scatter-gather: on
        tx-scatter-gather: on
        tx-scatter-gather-fraglist: off [fixed]
tcp-segmentation-offload: on
        tx-tcp-segmentation: on
        tx-tcp-ecn-segmentation: off [fixed]
        tx-tcp6-segmentation: on
udp-fragmentation-offload: off [fixed]
generic-segmentation-offload: on
generic-receive-offload: on
large-receive-offload: on
rx-vlan-offload: on
tx-vlan-offload: on
ntuple-filters: off
receive-hashing: on


Details for tunnel network NIC on compute and network node

[root at rhel7-23 ~]# ethtool -k eth0
Features for eth0:
rx-checksumming: on
tx-checksumming: on
        tx-checksum-ipv4: on
        tx-checksum-ip-generic: off [fixed]
        tx-checksum-ipv6: on
        tx-checksum-fcoe-crc: on [fixed]
        tx-checksum-sctp: on
scatter-gather: on
        tx-scatter-gather: on
        tx-scatter-gather-fraglist: off [fixed]
tcp-segmentation-offload: on
        tx-tcp-segmentation: on
        tx-tcp-ecn-segmentation: off [fixed]
        tx-tcp6-segmentation: on
udp-fragmentation-offload: off [fixed]
generic-segmentation-offload: on
generic-receive-offload: on
large-receive-offload: on
rx-vlan-offload: on
tx-vlan-offload: on
ntuple-filters: off
receive-hashing: on

[root at rhel7-25 ~]# ethtool -i eth0
driver: ixgbe
version: 4.0.1-k-rh7.1
firmware-version: 0x613e0001
bus-info: 0000:1b:00.0
supports-statistics: yes
supports-test: yes
supports-eeprom-access: yes
supports-register-dump: yes
supports-priv-flags: no


------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


TCPDUMP details-

In case of iperf TCP stream from VM on compute node to external network
machine (1.1.1.34 ) via network node ( VXLAN Tunneling )
10.10.10.25 - Tunnel Network IP for Compute Node (eth0)
10.10.10.23 - Tunnel Network IP for Network Node (eth0)
1.1.1.23- External network IP for Network Node (eth1)
1.1.4.92- SNAT IP for overlay VM packets (via eth1)

At tunnel network interface on Network Node we see receive offloaded
packets -

[root at rhel7-23 ~]# tcpdump -ennqi eth0 -c 30 host 10.10.10.25
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
21:20:45.605292 a0:36:9f:09:2c:20 > a0:36:9f:07:23:80, IPv4, length 64424:
10.10.10.25.45188 > 10.10.10.23.4789: UDP, length 64382
21:20:45.605334 a0:36:9f:09:2c:20 > a0:36:9f:07:23:80, IPv4, length 64424:
10.10.10.25.45188 > 10.10.10.23.4789: UDP, length 64382
21:20:45.605447 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605374 a0:36:9f:09:2c:20 > a0:36:9f:07:23:80, IPv4, length 64424:
10.10.10.25.45188 > 10.10.10.23.4789: UDP, length 64382
21:20:45.605454 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605462 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605471 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605476 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605483 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605385 a0:36:9f:09:2c:20 > a0:36:9f:07:23:80, IPv4, length 16892:
10.10.10.25.45188 > 10.10.10.23.4789: UDP, length 16850
21:20:45.605489 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605408 a0:36:9f:09:2c:20 > a0:36:9f:07:23:80, IPv4, length 14096:
10.10.10.25.45188 > 10.10.10.23.4789: UDP, length 14054
21:20:45.605495 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605502 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605508 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605515 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605522 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605527 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605533 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605540 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605545 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605551 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605559 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605565 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605570 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605578 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605583 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
21:20:45.605558 a0:36:9f:09:2c:20 > a0:36:9f:07:23:80, IPv4, length 64424:
10.10.10.25.45188 > 10.10.10.23.4789: UDP, length 64382
21:20:45.605599 a0:36:9f:09:2c:20 > a0:36:9f:07:23:80, IPv4, length 64424:
10.10.10.25.45188 > 10.10.10.23.4789: UDP, length 64382
21:20:45.605694 a0:36:9f:07:23:80 > a0:36:9f:09:2c:20, IPv4, length 116:
10.10.10.23.57457 > 10.10.10.25.4789: UDP, length 74
30 packets captured
231 packets received by filter
168 packets dropped by kernel


Within router namespace we see offloaded packets-

[root at rhel7-23 ~]# ip netns exec
qrouter-223d91ae-3025-4070-83d0-63faa58d819b tcpdump -ennqi qg-ab10ec1d-2b
-c 30 host 1.1.1.34
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on qg-ab10ec1d-2b, link-type EN10MB (Ethernet), capture size
65535 bytes
21:18:42.003258 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003260 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003261 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003262 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003288 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 64374:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 64308
21:18:42.003263 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003325 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003327 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003359 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 15444:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 15378
21:18:42.003369 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 12536:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 12470
21:18:42.003391 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 57384:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 57318
21:18:42.003444 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003446 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003447 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003447 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003467 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 28026:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 27960
21:18:42.003539 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 64374:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 64308
21:18:42.003566 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003568 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003569 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003609 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 64374:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 64308
21:18:42.003681 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 64374:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 64308
21:18:42.003715 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003751 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 64374:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 64308
21:18:42.003808 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003809 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003810 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59167: tcp 0
21:18:42.003826 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 64374:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 64308
21:18:42.003890 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 64374:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 64308
21:18:42.003965 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 32220:
1.1.4.92.59167 > 1.1.1.34.5001: tcp 32154
30 packets captured
71 packets received by filter
24 packets dropped by kernel


But at external network interface, TSO is not working-

[root at rhel7-23 ~]# tcpdump -ennqi eth1 host 1.1.1.34 -c 30
tcpdump: WARNING: eth1: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
21:17:35.207292 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59166: tcp 0
21:17:35.207296 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59166: tcp 0
21:17:35.207298 34:40:b5:c8:0a:3c > fa:16:3e:86:37:b2, IPv4, length 66:
1.1.1.34.5001 > 1.1.4.92.59166: tcp 0
21:17:35.207322 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207324 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207325 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207327 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207329 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207330 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207332 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207333 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207335 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207336 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207350 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207351 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207353 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207354 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207355 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207356 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207357 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207358 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207360 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207361 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207362 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207363 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207364 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207365 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207367 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207368 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
21:17:35.207369 fa:16:3e:86:37:b2 > 34:40:b5:c8:0a:3c, IPv4, length 1464:
1.1.4.92.59166 > 1.1.1.34.5001: tcp 1398
30 packets captured
1241 packets received by filter
1086 packets dropped by kernel


------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


In case of iperf TCP stream from Network Node (1.1.1.23) to external node
(1.1.1.34)-

[root at rhel7-23 ~]# tcpdump -ennqi eth1 host 1.1.1.34 -c 30
tcpdump: WARNING: eth1: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
21:14:38.809332 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809335 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809337 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809344 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809362 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809378 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809457 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809460 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809461 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809468 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809485 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809582 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809584 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809586 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809593 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809609 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809707 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809709 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809711 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809718 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809734 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809832 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809834 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809836 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809843 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809859 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809875 a0:36:9f:07:23:81 > 34:40:b5:c8:0a:3c, IPv4, length 65226:
1.1.1.23.57534 > 1.1.1.34.5001: tcp 65160
21:14:38.809959 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809962 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
21:14:38.809963 34:40:b5:c8:0a:3c > a0:36:9f:07:23:81, IPv4, length 66:
1.1.1.34.5001 > 1.1.1.23.57534: tcp 0
30 packets captured
70 packets received by filter
24 packets dropped by kernel


Thanks and regards,
Piyush Raman
(Mail: pirsriva at in.ibm.com)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openvswitch.org/pipermail/ovs-discuss/attachments/20151218/17e82db1/attachment-0002.html>


More information about the discuss mailing list