2016-01-14 11:34:22 id=13 trace_id=79 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:55914->224.0.0.252:5355) from internal. " 2016-01-14 11:34:22 id=13 trace_id=79 func=init_ip_session_common line=4463 msg="allocate a new session-06acb3e2" 2016-01-14 11:34:22 id=13 trace_id=79 func=ip_session_handle_no_dst line=4530 msg="trace" 2016-01-14 11:34:22 id=13 trace_id=80 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:137->192.168.1.255:137) from internal. " 2016-01-14 11:34:22 id=13 trace_id=80 func=init_ip_session_common line=4463 msg="allocate a new session-06acb3e7" 2016-01-14 11:34:22 id=13 trace_id=80 func=vf_ip4_route_input line=1605 msg="find a route: flags=90000000 gw-192.168.1.255 via root" 2016-01-14 11:34:22 id=13 trace_id=80 func=fw_local_in_handler line=360 msg="iprope_in_check() check failed on policy 0, drop" 2016-01-14 11:34:23 id=13 trace_id=81 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:137->192.168.1.255:137) from internal. " 2016-01-14 11:34:23 id=13 trace_id=81 func=init_ip_session_common line=4463 msg="allocate a new session-06acb405" 2016-01-14 11:34:23 id=13 trace_id=81 func=vf_ip4_route_input line=1605 msg="find a route: flags=90000000 gw-192.168.1.255 via root" 2016-01-14 11:34:23 id=13 trace_id=81 func=fw_local_in_handler line=360 msg="iprope_in_check() check failed on policy 0, drop" 2016-01-14 11:34:24 id=13 trace_id=82 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:137->192.168.1.255:137) from internal. " 2016-01-14 11:34:24 id=13 trace_id=82 func=init_ip_session_common line=4463 msg="allocate a new session-06acb416" 2016-01-14 11:34:24 id=13 trace_id=82 func=vf_ip4_route_input line=1605 msg="find a route: flags=90000000 gw-192.168.1.255 via root" 2016-01-14 11:34:24 id=13 trace_id=82 func=fw_local_in_handler line=360 msg="iprope_in_check() check failed on policy 0, drop" 2016-01-14 11:34:25 id=13 trace_id=83 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:55520->8.8.8.8:53) from internal. " 2016-01-14 11:34:25 id=13 trace_id=83 func=init_ip_session_common line=4463 msg="allocate a new session-06acb439" 2016-01-14 11:34:25 id=13 trace_id=83 func=vf_ip4_route_input line=1605 msg="find a route: flags=00000000 gw-173.166.61.238 via wan2" 2016-01-14 11:34:25 id=13 trace_id=83 func=__iprope_tree_check line=534 msg="use addr/intf hash, len=7" 2016-01-14 11:34:25 id=13 trace_id=83 func=get_new_addr line=2404 msg="find SNAT: IP-173.166.61.237, port-55520" 2016-01-14 11:34:25 id=13 trace_id=83 func=fw_forward_handler line=667 msg="Allowed by Policy-9: SNAT" 2016-01-14 11:34:25 id=13 trace_id=83 func=__ip_session_run_tuple line=2476 msg="SNAT 192.168.1.60->173.166.61.237:55520" 2016-01-14 11:34:25 id=13 trace_id=83 func=__ip_session_run_tuple line=2527 msg="run helper-dns-udp(dir=original)" 2016-01-14 11:34:25 id=13 trace_id=84 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 192.168.1.60:50327->104.96.210.16:80) from internal. flag [R.], seq 1428067879, ack 3155128976, win 0" 2016-01-14 11:34:25 id=13 trace_id=84 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb050, original direction" 2016-01-14 11:34:25 id=13 trace_id=84 func=av_receive line=254 msg="send to application layer" 2016-01-14 11:34:25 id=13 trace_id=85 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 192.168.1.60:50334->104.96.210.16:80) from internal. flag [S], seq 1278740022, ack 0, win 8192" 2016-01-14 11:34:25 id=13 trace_id=85 func=init_ip_session_common line=4463 msg="allocate a new session-06acb43e" 2016-01-14 11:34:25 id=13 trace_id=85 func=vf_ip4_route_input line=1605 msg="find a route: flags=00000000 gw-64.140.208.1 via wan1" 2016-01-14 11:34:25 id=13 trace_id=85 func=__iprope_tree_check line=534 msg="use addr/intf hash, len=7" 2016-01-14 11:34:25 id=13 trace_id=85 func=av_receive line=254 msg="send to application layer" 2016-01-14 11:34:25 id=13 trace_id=86 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 104.96.210.16:80->192.168.1.60:50334) from local. flag [S.], seq 3167283976, ack 1278740023, win 5840" 2016-01-14 11:34:25 id=13 trace_id=86 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb43e, reply direction" 2016-01-14 11:34:25 id=13 trace_id=87 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 192.168.1.60:50334->104.96.210.16:80) from internal. flag [.], seq 1278740023, ack 3167283977, win 16425" 2016-01-14 11:34:25 id=13 trace_id=87 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb43e, original direction" 2016-01-14 11:34:25 id=13 trace_id=87 func=av_receive line=254 msg="send to application layer" 2016-01-14 11:34:25 id=13 trace_id=88 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 192.168.1.60:50334->104.96.210.16:80) from internal. flag [.], seq 1278740023, ack 3167283977, win 16425" 2016-01-14 11:34:25 id=13 trace_id=88 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb43e, original direction" 2016-01-14 11:34:25 id=13 trace_id=88 func=av_receive line=254 msg="send to application layer" 2016-01-14 11:34:25 id=13 trace_id=89 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 104.96.210.16:80->192.168.1.60:50334) from local. flag [.], seq 3167283977, ack 1278740178, win 3216" 2016-01-14 11:34:25 id=13 trace_id=89 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb43e, reply direction" 2016-01-14 11:34:25 id=13 trace_id=90 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 104.96.210.16:80->192.168.1.60:50334) from local. flag [R.], seq 3167283977, ack 1278740178, win 3216" 2016-01-14 11:34:25 id=13 trace_id=90 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb43e, reply direction" 2016-01-14 11:34:25 id=13 trace_id=91 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:58021->224.0.0.252:5355) from internal. " 2016-01-14 11:34:25 id=13 trace_id=91 func=init_ip_session_common line=4463 msg="allocate a new session-06acb43f" 2016-01-14 11:34:25 id=13 trace_id=91 func=ip_session_handle_no_dst line=4530 msg="trace" 2016-01-14 11:34:25 id=13 trace_id=92 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:58021->224.0.0.252:5355) from internal. " 2016-01-14 11:34:25 id=13 trace_id=92 func=init_ip_session_common line=4463 msg="allocate a new session-06acb443" 2016-01-14 11:34:25 id=13 trace_id=92 func=ip_session_handle_no_dst line=4530 msg="trace" 2016-01-14 11:34:25 id=13 trace_id=93 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:137->192.168.1.255:137) from internal. " 2016-01-14 11:34:25 id=13 trace_id=93 func=init_ip_session_common line=4463 msg="allocate a new session-06acb447" 2016-01-14 11:34:25 id=13 trace_id=93 func=vf_ip4_route_input line=1605 msg="find a route: flags=90000000 gw-192.168.1.255 via root" 2016-01-14 11:34:25 id=13 trace_id=93 func=fw_local_in_handler line=360 msg="iprope_in_check() check failed on policy 0, drop" 2016-01-14 11:34:26 id=13 trace_id=94 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=17, 192.168.1.60:137->192.168.1.255:137) from internal. " 2016-01-14 11:34:26 id=13 trace_id=94 func=init_ip_session_common line=4463 msg="allocate a new session-06acb45d" 2016-01-14 11:34:26 id=13 trace_id=94 func=vf_ip4_route_input line=1605 msg="find a route: flags=90000000 gw-192.168.1.255 via root" 2016-01-14 11:34:26 id=13 trace_id=94 func=fw_local_in_handler line=360 msg="iprope_in_check() check failed on policy 0, drop" 2016-01-14 11:34:26 id=13 trace_id=95 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 192.168.1.60:50335->173.194.123.51:80) from internal. flag [S], seq 4058817610, ack 0, win 8192" 2016-01-14 11:34:26 id=13 trace_id=95 func=init_ip_session_common line=4463 msg="allocate a new session-06acb460" 2016-01-14 11:34:26 id=13 trace_id=95 func=vf_ip4_route_input line=1605 msg="find a route: flags=00000000 gw-64.140.208.1 via wan1" 2016-01-14 11:34:26 id=13 trace_id=95 func=__iprope_tree_check line=534 msg="use addr/intf hash, len=7" 2016-01-14 11:34:26 id=13 trace_id=95 func=av_receive line=254 msg="send to application layer" 2016-01-14 11:34:26 id=13 trace_id=96 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 173.194.123.51:80->192.168.1.60:50335) from local. flag [S.], seq 2253970049, ack 4058817611, win 5840" 2016-01-14 11:34:26 id=13 trace_id=96 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb460, reply direction" 2016-01-14 11:34:26 id=13 trace_id=97 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 192.168.1.60:50335->173.194.123.51:80) from internal. flag [.], seq 4058817611, ack 2253970050, win 16425" 2016-01-14 11:34:26 id=13 trace_id=97 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb460, original direction" 2016-01-14 11:34:26 id=13 trace_id=97 func=av_receive line=254 msg="send to application layer" 2016-01-14 11:34:26 id=13 trace_id=98 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 192.168.1.60:50335->173.194.123.51:80) from internal. flag [.], seq 4058817611, ack 2253970050, win 16425" 2016-01-14 11:34:26 id=13 trace_id=98 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb460, original direction" 2016-01-14 11:34:26 id=13 trace_id=98 func=av_receive line=254 msg="send to application layer" 2016-01-14 11:34:26 id=13 trace_id=99 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 173.194.123.51:80->192.168.1.60:50335) from local. flag [.], seq 2253970050, ack 4058817868, win 3216" 2016-01-14 11:34:26 id=13 trace_id=99 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb460, reply direction" 2016-01-14 11:34:26 id=13 trace_id=100 func=print_pkt_detail line=4307 msg="vd-root received a packet(proto=6, 173.194.123.51:80->192.168.1.60:50335) from local. flag [R.], seq 2253970050, ack 4058817868, win 3216" 2016-01-14 11:34:26 id=13 trace_id=100 func=resolve_ip_tuple_fast line=4366 msg="Find an existing session, id-06acb460, reply direction"