- Community Home
- >
- Networking
- >
- Software Defined Networking
- >
- matching Ip_dscp in hp aruba 3810m openflow 1.3 sw...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-12-2018 09:48 AM
02-12-2018 09:48 AM
matching Ip_dscp in hp aruba 3810m openflow 1.3 switch
I am trying to match the ip_dscp field using ryu controller i have made a small modification to the simple_switch_13.py app in ryu. it worked fine when i tried in mininet with openflow13 switch but it wont match ip_dscp when i used Hp aruba 3810m switch. i have included the ryu app and flow tables for hp and openflow13 switch below.
Thanks
here is the modified simple_switch_13.py app i am using:
class SimpleSwitch13(app_manager.RyuApp):
OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION]
def __init__(self, *args, **kwargs):
super(SimpleSwitch13, self).__init__(*args, **kwargs)
self.mac_to_port = {}
@SET_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER)
def switch_features_handler(self, ev):
datapath = ev.msg.datapath
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
# install table-miss flow entry
#
# We specify NO BUFFER to max_len of the output action due to
# OVS bug. At this moment, if we specify a lesser number, e.g.,
# 128, OVS will send Packet-In with invalid buffer_id and
# truncated packet data. In that case, we cannot output packets
# correctly. The bug has been fixed in OVS v2.1.0.
match = parser.OFPMatch()
actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER,
ofproto.OFPCML_NO_BUFFER)]
self.add_flow(datapath, 0, match, actions)
def add_flow(self, datapath, priority, match, actions, buffer_id=None):
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS,
actions)]
if buffer_id:
mod = parser.OFPFlowMod(datapath=datapath, table_id=200, buffer_id=buffer_id,
priority=priority, match=match,
instructions=inst)
else:
mod = parser.OFPFlowMod(datapath=datapath, table_id=200, priority=priority,
match=match, instructions=inst)
datapath.send_msg(mod)
@SET_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER)
def _packet_in_handler(self, ev):
# If you hit this you might want to increase
# the "miss_send_length" of your switch
if ev.msg.msg_len < ev.msg.total_len:
self.logger.debug("packet truncated: only %s of %s bytes",
ev.msg.msg_len, ev.msg.total_len)
msg = ev.msg
datapath = msg.datapath
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
in_port = msg.match['in_port']
ip_dscp = msg.match.get('ip_dscp')
#print 'ip dscp',ip_dscp
pkt = packet.Packet(msg.data)
eth = pkt.get_protocols(ethernet.ethernet)[0]
pkt = packet.Packet(msg.data)
arp_pkt = pkt.get_protocol(arp.arp)
ip_pkt = pkt.get_protocol(ipv4.ipv4)
if eth.ethertype == ether_types.ETH_TYPE_LLDP:
# ignore lldp packet
return
dst = eth.dst
src=eth.src
dpid = datapath.id
self.mac_to_port.setdefault(dpid, {})
self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port)
# learn a mac address to avoid FLOOD next time.
self.mac_to_port[dpid][src] = in_port
if dst in self.mac_to_port[dpid]:
out_port = self.mac_to_port[dpid][dst]
else:
out_port = ofproto.OFPP_FLOOD
actions = [parser.OFPActionOutput(out_port)]
arp_pkt = pkt.get_protocol(arp.arp)
# install a flow to avoid packet_in next time
if out_port != ofproto.OFPP_FLOOD:
if arp_pkt:
match = parser.OFPMatch( in_port=in_port, eth_src=src)
elif ip_dscp is not None and ip_dscp != 0:
match = parser.OFPMatch( eth_type=0x0800,ipv4_src=ip_pkt.src, ipv4_dst=ip_pkt.dst, ip_dscp=ip_dscp)
else:
match = parser.OFPMatch( eth_type=0x0800, ipv4_src=ip_pkt.src, ipv4_dst=ip_pkt.dst)
# verify if we have a valid buffer_id, if yes avoid to send both
# flow_mod & packet_out
if msg.buffer_id != ofproto.OFP_NO_BUFFER:
self.add_flow(datapath, 1, match, actions, msg.buffer_id)
return
else:
self.add_flow(datapath, 1, match, actions)
data = None
if msg.buffer_id == ofproto.OFP_NO_BUFFER:
data = msg.data
out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id,
in_port=in_port, actions=actions, data=data)
datapath.send_msg(out)
This is the flow table when i used in mininet: you can see its matching difference ip_dscp values
RECEIVED (xid=0xF0FF00F0):
stat_repl{type="flow", flags="0x0", stats=[{table="0", match="oxm{in_port="2", eth_src="9e:3e:57:3c:5c:6a", eth_type="0x806"}", dur_s="129", dur_ns="342000000", prio="1", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="5", byte_cnt="300", insts=[apply{acts=[out{port="1"}]}]},
{table="0", match="oxm{eth_type="0x800", ip_dscp="42", ipv4_src="10.0.0.1", ipv4_dst="10.0.0.2"}", dur_s="129", dur_ns="339000000", prio="1", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="74", byte_cnt="7252", insts=[apply{acts=[out{port="2"}]}]},
{table="0", match="oxm{eth_type="0x800", ip_dscp="42", ipv4_src="10.0.0.2", ipv4_dst="10.0.0.1"}", dur_s="129", dur_ns="329000000", prio="1", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="74", byte_cnt="7252", insts=[apply{acts=[out{port="1"}]}]},
{table="0", match="oxm{in_port="1", eth_src="42:7f:56:b5:4c:10", eth_type="0x806"}", dur_s="124", dur_ns="317000000", prio="1", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="4", byte_cnt="240", insts=[apply{acts=[out{port="2"}]}]},
{table="0", match="oxm{eth_type="0x800", ip_dscp="40", ipv4_src="10.0.0.1", ipv4_dst="10.0.0.2"}", dur_s="48", dur_ns="895000000", prio="1", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="42", byte_cnt="4116", insts=[apply{acts=[out{port="2"}]}]},
{table="0", match="oxm{eth_type="0x800", ip_dscp="40", ipv4_src="10.0.0.2", ipv4_dst="10.0.0.1"}", dur_s="48", dur_ns="883000000", prio="1", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="42", byte_cnt="4116", insts=[apply{acts=[out{port="1"}]}]},
{table="0", match="oxm{eth_type="0x800", ip_dscp="10", ipv4_src="10.0.0.1", ipv4_dst="10.0.0.2"}", dur_s="2", dur_ns="475000000", prio="1", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="3", byte_cnt="294", insts=[apply{acts=[out{port="2"}]}]},
{table="0", match="oxm{eth_type="0x800", ip_dscp="10", ipv4_src="10.0.0.2", ipv4_dst="10.0.0.1"}", dur_s="2", dur_ns="465000000", prio="1", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="3", byte_cnt="294", insts=[apply{acts=[out{port="1"}]}]},
{table="0", match="oxm{all match}", dur_s="164", dur_ns="472000000", prio="0", idle_to="0", hard_to="0", cookie="0x0", pkt_cnt="25", byte_cnt="2480", insts=[apply{acts=[out{port="ctrl", mlen="65535"}]}]}]}
This is the flow table when i use hp switch it does not match the ip_dscp field
Flow 1
Match
Incoming Port : Any Ethernet Type : Any
Source MAC : Any Destination MAC : Any
Source MAC Mask : 000000-000000
Destination MAC Mask : 000000-000000
VLAN ID : Any VLAN Priority : Any
Source IP Address : Any
Destination IP Address : Any
IP Protocol : Any
IP ECN : Any IP DSCP : Any
Source Port : Any Destination Port : Any
Source Port Range : NA
Destination Port Range : NA
TCP Flags : NA
Custom Match One : Any
Custom Match One Mask : Any
Custom Match Two : Any
Custom Match Two Mask : Any
Custom Match Three : Any
Custom Match Three Mask : Any
Custom Match Four : Any
Custom Match Four Mask : Any
Attributes
Priority : 0 Duration : 3396 seconds
Hard Timeout : 0 seconds Idle Timeout : 0 seconds
Byte Count : NA Packet Count : NA
Flow Table ID : 0 Controller ID : NA
Cookie : 0x0
Hardware Index: NA
Instructions
Goto Table ID : 100
Flow 2
Match
Incoming Port : 3 Ethernet Type : ARP
Source MAC : 001cc0-6cf6dc Destination MAC : Any
Source MAC Mask : ffffff-ffffff
Destination MAC Mask : 000000-000000
VLAN ID : Any VLAN Priority : Any
Source Protocol Address : Any
Target Protocol Address : Any
Source Hardware Address : Any
Source Hardware Address Mask : 000000-000000
Target Hardware Address : Any
Target Hardware Address Mask : 000000-000000
ARP Opcode : Any
IP ECN : Any IP DSCP : Any
Source Port : Any Destination Port : Any
Source Port Range : NA
Destination Port Range : NA
TCP Flags : NA
TCP Mask : NA
Custom Match One : Any
Custom Match One Mask : Any
Custom Match Two : Any
Custom Match Two Mask : Any
Custom Match Three : Any
Custom Match Three Mask : Any
Custom Match Four : Any
Custom Match Four Mask : Any
Attributes
Priority : 1 Duration : 59 seconds
Hard Timeout : 0 seconds Idle Timeout : 0 seconds
Byte Count : NA Packet Count : 2
Flow Table ID : 100 Controller ID : 1
Cookie : 0x0
Hardware Index: 0
Instructions
Apply Actions
Output : 4
Flow 3
Match
Incoming Port : 4 Ethernet Type : ARP
Source MAC : 001676-a0a1a8 Destination MAC : Any
Source MAC Mask : ffffff-ffffff
Destination MAC Mask : 000000-000000
VLAN ID : Any VLAN Priority : Any
Source Protocol Address : Any
Target Protocol Address : Any
Source Hardware Address : Any
Source Hardware Address Mask : 000000-000000
Target Hardware Address : Any
Target Hardware Address Mask : 000000-000000
ARP Opcode : Any
IP ECN : Any IP DSCP : Any
Source Port : Any Destination Port : Any
Source Port Range : NA
Destination Port Range : NA
TCP Flags : NA
TCP Mask : NA
Custom Match One : Any
Custom Match One Mask : Any
Custom Match Two : Any
Custom Match Two Mask : Any
Custom Match Three : Any
Custom Match Three Mask : Any
Custom Match Four : Any
Custom Match Four Mask : Any
Attributes
Priority : 1 Duration : 64 seconds
Hard Timeout : 0 seconds Idle Timeout : 0 seconds
Byte Count : NA Packet Count : 3
Flow Table ID : 100 Controller ID : 1
Cookie : 0x0
Hardware Index: 0
Instructions
Apply Actions
Output : 3
Flow 4
Match
Incoming Port : Any Ethernet Type : IP
Source MAC : Any Destination MAC : Any
Source MAC Mask : 000000-000000
Destination MAC Mask : 000000-000000
VLAN ID : Any VLAN Priority : Any
Source IP Address : 10.0.0.1/255.255.255.255
Destination IP Address : 10.0.0.2/255.255.255.255
IP Protocol : Any
IP ECN : Any IP DSCP : Any
Source Port : Any Destination Port : Any
Source Port Range : NA
Destination Port Range : NA
TCP Flags : NA
TCP Mask : NA
Custom Match One : Any
Custom Match One Mask : Any
Custom Match Two : Any
Custom Match Two Mask : Any
Custom Match Three : Any
Custom Match Three Mask : Any
Custom Match Four : Any
Custom Match Four Mask : Any
Attributes
Priority : 1 Duration : 64 seconds
Hard Timeout : 0 seconds Idle Timeout : 0 seconds
Byte Count : NA Packet Count : 56
Flow Table ID : 100 Controller ID : 1
Cookie : 0x0
Hardware Index: 0
Instructions
Apply Actions
Output : 4
Flow 5
Match
Incoming Port : Any Ethernet Type : IP
Source MAC : Any Destination MAC : Any
Source MAC Mask : 000000-000000
Destination MAC Mask : 000000-000000
VLAN ID : Any VLAN Priority : Any
Source IP Address : 10.0.0.2/255.255.255.255
Destination IP Address : 10.0.0.1/255.255.255.255
IP Protocol : Any
IP ECN : Any IP DSCP : Any
Source Port : Any Destination Port : Any
Source Port Range : NA
Destination Port Range : NA
TCP Flags : NA
TCP Mask : NA
Custom Match One : Any
Custom Match One Mask : Any
Custom Match Two : Any
Custom Match Two Mask : Any
Custom Match Three : Any
Custom Match Three Mask : Any
Custom Match Four : Any
Custom Match Four Mask : Any
Attributes
Priority : 1 Duration : 64 seconds
Hard Timeout : 0 seconds Idle Timeout : 0 seconds
Byte Count : NA Packet Count : 56
Flow Table ID : 100 Controller ID : 1
Cookie : 0x0
Hardware Index: 0
Instructions
Apply Actions
Output : 3
Flow 6
Match
Incoming Port : Any Ethernet Type : Any
Source MAC : Any Destination MAC : Any
Source MAC Mask : 000000-000000
Destination MAC Mask : 000000-000000
VLAN ID : Any VLAN Priority : Any
Source IP Address : Any
Destination IP Address : Any
IP Protocol : Any
IP ECN : Any IP DSCP : Any
Source Port : Any Destination Port : Any
Source Port Range : NA
Destination Port Range : NA
TCP Flags : NA
TCP Mask : NA
Custom Match One : Any
Custom Match One Mask : Any
Custom Match Two : Any
Custom Match Two Mask : Any
Custom Match Three : Any
Custom Match Three Mask : Any
Custom Match Four : Any
Custom Match Four Mask : Any
Attributes
Priority : 0 Duration : 65 seconds
Hard Timeout : 0 seconds Idle Timeout : 0 seconds
Byte Count : NA Packet Count : 4329
Flow Table ID : 100 Controller ID : 1
Cookie : 0x0
Hardware Index: NA
Instructions
Apply Actions
Controller Port
Flow 7
Match
Incoming Port : Any Ethernet Type : Any
Source MAC : Any Destination MAC : Any
Source MAC Mask : 000000-000000
Destination MAC Mask : 000000-000000
VLAN ID : Any VLAN Priority : Any
Source IP Address : Any
Destination IP Address : Any
IP Protocol : Any
IP ECN : Any IP DSCP : Any
Source Port : Any Destination Port : Any
Source Port Range : NA
Destination Port Range : NA
TCP Flags : NA
TCP Mask : NA
Custom Match One : Any
Custom Match One Mask : Any
Custom Match Two : Any
Custom Match Two Mask : Any
Custom Match Three : Any
Custom Match Three Mask : Any
Custom Match Four : Any
Custom Match Four Mask : Any
Attributes
Priority : 0 Duration : 3396 seconds
Hard Timeout : 0 seconds Idle Timeout : 0 seconds
Byte Count : 0 Packet Count : 0
Flow Table ID : 200 Controller ID : 1
Cookie : 0x0
Hardware Index: NA
Instructions
Apply Actions
Controller Port
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-16-2018 08:04 AM
02-16-2018 08:04 AM
Re: matching Ip_dscp in hp aruba 3810m openflow 1.3 switch
Hi soginy914,
I see the issue you're raising, that you're pushing multiple flows (which match IP DSCP 10, 40, 42) but only a single flow is entered into the hardware table (flows 4 and 5). I have two requests for more information:
- Could you enable OpenFlow debug output on the 3810 with the commands "debug openflow" and "debug destination session" and then run through these steps? This may give us some additional information to find out why the behavior differs from what's expected.
- Could you post the firmware version you're using? We'd recommend 16.04 firmware since that would have the latest fixes.
Shaun
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2018 05:51 AM
02-21-2018 05:51 AM
Re: matching Ip_dscp in hp aruba 3810m openflow 1.3 switch
Hi thanks for the response i have provided the information below. What i have also observed is that the switch doesnot seem to match the ip_dscp field when i try to print the dscp value i get None. the switch adminstrator guide seem to suggest that the switch supports matching dscp. Can you confirm if it through does support matching dscp.
Regards
Firmware version
Image stamp: /ws/swbuildm/rel_venice_qaoff/code/build/bom(swbuildm_rel_venice_qaoff_rel_venice)
Dec 22 2017 14:29:46
KB.16.05.0004
139
Boot Image: Primary
Boot ROM Version: KB.16.01.0008
Active Boot ROM: Primary
Debug Output
0000:00:38:39.21 OPFL eOFNetTask:aggregate<->tcp:192.168.1.253:6633:0 connection
failed (Connection refused)
0000:00:39:39.22 OPFL eOFNetTask:TX to tcp:192.168.1.253:6633: 0 : OFPT_HELLO
(OF 0x04) (xid=0x1):
00000000 00 01 00 08 00 00 00 12
|........ |
0000:00:39:39.32 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0: OFPT_HELLO
(OF 0x04) (xid=0xc25dd7b5):
0000:00:39:39.33 OPFL eOFNetTask:Flow added for instance aggregate in table 100.
0000:00:39:39.33 OPFL eOFNetTask:aggregate<->tcp:192.168.1.253:6633:0 connected
0000:00:39:39.33 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_FEATURES_REQUEST (OF 0x04) (xid=0xc25dd7b6):
0000:00:39:39.33 OPFL eOFNetTask:TX to tcp:192.168.1.253:6633: 0 :
OFPT_FEATURES_REPLY (OF 0x04) (xid=0xc25dd7b6):
dpid:000170106f8fcb00
n_tables:3, n_buffers:0
capabilities: FLOW_STATS
TABLE_STATS PORT_STATS PORT_BLOCKED
actions:
0000:00:39:39.34 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_STATS_REQUEST (OF 0x04) (xid=0xc25dd7b7):
0000:00:39:39.34 OPFL eOFNetTask:TX to tcp:192.168.1.253:6633: 0 :
OFPT_STATS_REPLY (OF 0x04) (xid=0xc25dd7b7):
0000:00:39:39.34 OPFL eOFNetTask:Instance aggregate: Exiting fail secure mode.
0000:00:39:39.34 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_FLOW_MOD (OF 0x04) (xid=0xc25dd7b8):
0000:00:39:39.34 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
0000:00:39:39.34 OPFL eOFNetTask:{"process_time":"1.004
ms","command":"OFPFC_ADD","table_id":100,"cookie":"0x0","cookie_mask":"0x0","
idle_timeout":0,"hard_timeout":0,"priority":0,"buffer_id":"0xffffffff","out_p
ort":"0x0","
0000:00:39:39.34 OPFL eOFNetTask:out_group":"0x0","flags":"0x0","match":{},"inst
s":[{"apply_actions":[{"outport":"controller"}]}]}
0000:00:39:48.54 OPFL eOFNetTask:TX to tcp:192.168.1.253:6633: 0 :
OFPT_ECHO_REQUEST (OF 0x04) (xid=0x0): 0 bytes of payload
0000:00:39:48.54 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_ECHO_REPLY (OF 0x04) (xid=0x0): 0 bytes of payload
0000:00:39:51.27 OPFL mOFPktRecv:TX to tcp:192.168.1.253:6633: 0 :
OFPT_PACKET_IN (OF 0x04) (xid=0x2): table_id=100 total_len=64 in_port=3
vlan_vid=1 (via no_match) data_len=64 (unbuffered)
0000:00:39:51.27 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_PACKET_OUT (OF 0x04) (xid=0xc25dd7b9):
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 24: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 8: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 5: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 2: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 19: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 4: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 21: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 23: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 11: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 9: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 22: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 6: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 15: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 17: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 12: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 16: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 18: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 7: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 13: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 14: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 10: vid 1
0000:00:39:51.27 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 20: vid 1
0000:00:39:51.27 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0: "in_port":3
"acts":[{"outport":"flood"},] "data_len":64
0000:00:39:51.27 OPFL mOFPktRecv:TX to tcp:192.168.1.253:6633: 0 :
OFPT_PACKET_IN (OF 0x04) (xid=0x3): table_id=100 total_len=64 in_port=4
vlan_vid=1 (via no_match) data_len=64 (unbuffered)
0000:00:39:51.28 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_FLOW_MOD (OF 0x04) (xid=0xc25dd7ba):
0000:00:39:51.28 OPFL eOFNetTask:Flow added for instance aggregate in table 100.
0000:00:39:51.28 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
0000:00:39:51.28 OPFL eOFNetTask:{"process_time":"1.715
ms","command":"OFPFC_ADD","table_id":100,"cookie":"0x0","cookie_mask":"0x0","
idle_timeout":0,"hard_timeout":0,"priority":1,"buffer_id":"0xffffffff","out_p
ort":"0x0","
0000:00:39:51.28 OPFL eOFNetTask:out_group":"0x0","flags":"0x0","match":{"in_por
t":4,"eth_src":"00:16:76:a0:a1:a8","eth_type":"0x0806"},"insts":[{"apply_acti
ons":[{"outport":3}]}]}
0000:00:39:51.28 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_PACKET_OUT (OF 0x04) (xid=0xc25dd7bb):
0000:00:39:51.28 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 3: vid 1
0000:00:39:51.28 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0: "in_port":4
"acts":[{"outport":3},] "data_len":64
0000:00:39:51.28 OPFL mOFPktRecv:TX to tcp:192.168.1.253:6633: 0 :
OFPT_PACKET_IN (OF 0x04) (xid=0x4): table_id=100 total_len=102 in_port=3
vlan_vid=1 (via no_match) data_len=102 (unbuffered)
0000:00:39:51.29 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_FLOW_MOD (OF 0x04) (xid=0xc25dd7bc):
0000:00:39:51.29 OPFL eOFNetTask:Flow added for instance aggregate in table 100.
0000:00:39:51.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
0000:00:39:51.30 OPFL eOFNetTask:{"process_time":"1.336
ms","command":"OFPFC_ADD","table_id":100,"cookie":"0x0","cookie_mask":"0x0","
idle_timeout":0,"hard_timeout":0,"priority":1,"buffer_id":"0xffffffff","out_p
ort":"0x0","
0000:00:39:51.30 OPFL eOFNetTask:out_group":"0x0","flags":"0x0","match":{"eth_ty
pe":"0x0800","ipv4_dst":"10.0.0.2"},"insts":[{"apply_actions":[{"outport":4}]
}]}
0000:00:39:51.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_PACKET_OUT (OF 0x04) (xid=0xc25dd7bd):
0000:00:39:51.30 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 4: vid 1
0000:00:39:51.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0: "in_port":3
"acts":[{"outport":4},] "data_len":102
0000:00:39:51.30 OPFL mOFPktRecv:TX to tcp:192.168.1.253:6633: 0 :
OFPT_PACKET_IN (OF 0x04) (xid=0x5): table_id=100 total_len=102 in_port=4
vlan_vid=1 (via no_match) data_len=102 (unbuffered)
0000:00:39:51.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_FLOW_MOD (OF 0x04) (xid=0xc25dd7be):
0000:00:39:51.30 OPFL eOFNetTask:Flow added for instance aggregate in table 100.
0000:00:39:51.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
0000:00:39:51.30 OPFL eOFNetTask:{"process_time":"1.230
ms","command":"OFPFC_ADD","table_id":100,"cookie":"0x0","cookie_mask":"0x0","
idle_timeout":0,"hard_timeout":0,"priority":1,"buffer_id":"0xffffffff","out_p
ort":"0x0","
0000:00:39:51.30 OPFL eOFNetTask:out_group":"0x0","flags":"0x0","match":{"eth_ty
pe":"0x0800","ipv4_dst":"10.0.0.1"},"insts":[{"apply_actions":[{"outport":3}]
}]}
0000:00:39:51.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_PACKET_OUT (OF 0x04) (xid=0xc25dd7bf):
0000:00:39:51.30 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 3: vid 1
0000:00:39:51.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0: "in_port":4
"acts":[{"outport":3},] "data_len":102
0000:00:39:56.30 OPFL mOFPktRecv:TX to tcp:192.168.1.253:6633: 0 :
OFPT_PACKET_IN (OF 0x04) (xid=0x6): table_id=100 total_len=64 in_port=3
vlan_vid=1 (via no_match) data_len=64 (unbuffered)
0000:00:39:56.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_FLOW_MOD (OF 0x04) (xid=0xc25dd7c0):
0000:00:39:56.30 OPFL eOFNetTask:Flow added for instance aggregate in table 100.
0000:00:39:56.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
0000:00:39:56.30 OPFL eOFNetTask:{"process_time":"1.522
ms","command":"OFPFC_ADD","table_id":100,"cookie":"0x0","cookie_mask":"0x0","
idle_timeout":0,"hard_timeout":0,"priority":1,"buffer_id":"0xffffffff","out_p
ort":"0x0","
0000:00:39:56.30 OPFL eOFNetTask:out_group":"0x0","flags":"0x0","match":{"in_por
t":3,"eth_src":"00:1c:c0:6c:f6:dc","eth_type":"0x0806"},"insts":[{"apply_acti
ons":[{"outport":4}]}]}
0000:00:39:56.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0:
OFPT_PACKET_OUT (OF 0x04) (xid=0xc25dd7c1):
0000:00:39:56.30 OPFL eOFNetTask:Instance:aggregate, Attempt to send pkt out
port 4: vid 1
0000:00:39:56.30 OPFL eOFNetTask:RX from tcp:192.168.1.253:6633: 0: "in_port":3
"acts":[{"outport":4},] "data_len":64