BFD Control Packet을 주고받는 Transport Node간(Host 또는 Edge) 그리고 Edge와 상단 Router 간에 Packet을 수집하여 실제로 BFD Control Packet을 올바르게 주고 받는지 확인이 필요합니다.
이에 대해, 각 영역별로 어떻게 Packet을 수집할 수 있는지 다뤄보겠습니다.
1. Transport Node간에는 우선 ESXi Host에서 pktcap-uw 도구를 이용하여 GENEVE Packet을 확인해 볼 수 있습니다.
아래는 구성 환경의 예제입니다.
esxi701.contoso.com Host의 TEP IP Address는 192.168.10.4, 192.168.10.5로 확인
TEP IP Address는 DSwitch-nsx-overlay DVS에 연결되어 있으며, uplink NIC는 vmnic3과 vmnic4
# pktcap-uw --capture UplinkRcvKernel,UplinkSndKernel --uplink vmnic3 --rcf "geneve and port 3784" -o /vmfs/volumes/iSCSIDS/esxi701.pcap
## TEP Network에 802.1q가 사용되는 경우 위 명령어로 수집한 Packet에서는 Inner Packet을 못 볼 수 있으므로 아래 옵션 사용
# pktcap-uw --uplink vmnic0 --capture UplinkSndKernel,UplinkRcvKernel --vni 0x0 --udpport 6081 --ng
수집된 Packet 예제입니다.
## 192.168.10.4는 esxi701.contoso.com의 TEP IP Address
## 192.168.11.2는 edge-node-02의 TEP IP Address
## BFD 메시지를 감싸는 GENEVE Header의 경우, TEP 간의 BFD Packet은 VNI 0를 사용
Frame 1: 116 bytes on wire (928 bits), 116 bytes captured (928 bits) Ethernet II, Src: VMware_64:8e:0f (00:50:56:64:8e:0f), Dst: VMware_a1:c8:8c (00:50:56:a1:c8:8c) Internet Protocol Version 4, Src: 192.168.10.4, Dst: 192.168.11.2 User Datagram Protocol, Src Port: 61375, Dst Port: 6081 Source Port: 61375 Destination Port: 6081 Length: 82 Checksum: 0x96ba [unverified] [Checksum Status: Unverified] [Stream index: 0] [Timestamps] UDP payload (74 bytes) Generic Network Virtualization Encapsulation, VNI: 0x000000, OAM Version: 0 Length: 0 bytes Flags: 0x80, Operations, Administration and Management Frame Protocol Type: Transparent Ethernet bridging (0x6558) Virtual Network Identifier (VNI): 0x000000 (0) ### <-- !! Geneve VNI 값 Ethernet II, Src: VMware_64:8e:0f (00:50:56:64:8e:0f), Dst: VMware_a1:c8:8c (00:50:56:a1:c8:8c) Internet Protocol Version 4, Src: 192.168.10.4, Dst: 192.168.11.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT) Total Length: 52 Identification: 0x0000 (0) 000. .... = Flags: 0x0 ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 255 Protocol: UDP (17) Header Checksum: 0x24a2 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.10.4 ### <-- !! esxi TEP IP Addres Destination Address: 192.168.11.2 ### <-- !! edge TEP IP Address User Datagram Protocol, Src Port: 49162, Dst Port: 3784 Source Port: 49162 Destination Port: 3784 ### <-- !! BFD UDP Port Length: 32 Checksum: 0x0000 [zero-value ignored] [Stream index: 1] [Timestamps] UDP payload (24 bytes) BFD Control message ### <-- !! 001. .... = Protocol Version: 1 ...0 0000 = Diagnostic Code: No Diagnostic (0x00) 11.. .... = Session State: Up (0x3) Message Flags: 0xc0 Detect Time Multiplier: 3 (= 300 ms Detection time) Message Length: 24 bytes My Discriminator: 0x80594095 Your Discriminator: 0x83e85c3f Desired Min TX Interval: 100 ms (100000 us) Required Min RX Interval: 1000 ms (1000000 us) Required Min Echo Interval: 0 ms (0 us) |
2. 다음으로는 Edge와 상단 Router간에 주고 받는 BFD Packet을 확인해보겠습니다.
우선 Router에서는 tcpdump 도구를 이용하여 확인해봅니다.
vyos@vyos:~$ tcpdump -i eth4.1612 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth4.1612, link-type EN10MB (Ethernet), capture size 262144 bytes 05:30:20.927675 IP vyos.49153 > 192.168.12.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:20.987808 IP vyos.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.007587 IP 192.168.12.12.51427 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.087624 IP 192.168.12.11.57617 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.367837 IP vyos.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.392714 IP vyos.49153 > 192.168.12.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.486816 IP 192.168.12.12.51427 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.533080 IP 192.168.12.11.57617 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.767880 IP vyos.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.867755 IP vyos.49153 > 192.168.12.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:21.982713 IP 192.168.12.12.51427 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.023040 IP 192.168.12.11.57617 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.232931 IP vyos.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.297805 IP vyos.49153 > 192.168.12.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.402559 IP 192.168.12.12.51427 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.438537 IP 192.168.12.11.57617 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.668046 IP vyos.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.782908 IP vyos.49153 > 192.168.12.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.833803 IP 192.168.12.11.57617 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:22.852871 IP 192.168.12.12.51427 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:23.158136 IP vyos.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:23.177986 IP vyos.49153 > 192.168.12.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:23.308868 IP 192.168.12.11.57617 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:23.342851 IP 192.168.12.12.51427 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:23.583060 IP vyos.49153 > 192.168.12.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:23.593243 IP vyos.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:23.709126 IP 192.168.12.11.57617 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:30:23.783276 IP 192.168.12.12.51427 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 ^C 28 packets captured 28 packets received by filter 0 packets dropped by kernel vyos@vyos:~$ tcpdump -i eth5.1613 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth5.1613, link-type EN10MB (Ethernet), capture size 262144 bytes 05:32:12.708907 IP vyos.49155 > 192.168.13.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:12.823078 IP vyos.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.025588 IP 192.168.13.11.50225 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.071970 IP 192.168.13.12.63129 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.208930 IP vyos.49155 > 192.168.13.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.293096 IP vyos.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.434261 IP 192.168.13.11.50225 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.532406 IP 192.168.13.12.63129 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.678118 IP vyos.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.698952 IP vyos.49155 > 192.168.13.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.899824 IP 192.168.13.11.50225 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:13.932565 IP 192.168.13.12.63129 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:14.143164 IP vyos.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:14.158972 IP vyos.49155 > 192.168.13.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:14.295534 IP 192.168.13.11.50225 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:14.337661 IP 192.168.13.12.63129 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:14.583189 IP vyos.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:14.598993 IP vyos.49155 > 192.168.13.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:14.734726 IP 192.168.13.11.50225 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:14.813065 IP 192.168.13.12.63129 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:15.078225 IP vyos.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:15.094014 IP vyos.49155 > 192.168.13.12.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:15.234893 IP 192.168.13.11.50225 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 05:32:15.252196 IP 192.168.13.12.63129 > vyos.3784: BFDv1, Control, State Up, Flags: [none], length: 24 ^C 24 packets captured 24 packets received by filter 0 packets dropped by kernel |
이제 Edge에서도 Uplink Interface 정보를 이용하여, Packet을 확인해봅니다.
edge-node-01> get logical-routers Mon Sep 25 2023 UTC 05:32:40.878 Logical Router UUID VRF LR-ID Name Type Ports Neighbors 736a80e3-23f6-5a2d-81d6-bbefb2786666 0 0 TUNNEL 4 6/5000 ec318044-8bd6-4269-aa47-544ee747f765 1 2 SR-tier0-01 SERVICE_ROUTER_TIER0 6 2/50000 ### <-- !! 73bdcf75-0251-4927-9c80-68a6d7265911 3 1 DR-tier0-01 DISTRIBUTED_ROUTER_TIER0 5 0/50000 064b8812-743c-427a-b0b6-801570118070 4 9 SR-tier1-01 SERVICE_ROUTER_TIER1 5 2/50000 92045476-c754-48e1-a86a-1ac4f9961112 6 8 DR-tier1-01 DISTRIBUTED_ROUTER_TIER1 4 0/50000 edge-node-01> vrf 1 edge-node-01(tier0_sr[1])> get interfaces Mon Sep 25 2023 UTC 05:32:53.927 Logical Router UUID VRF LR-ID Name Type ec318044-8bd6-4269-aa47-544ee747f765 1 2 SR-tier0-01 SERVICE_ROUTER_TIER0 Interfaces (IPv6 DAD Status A-DAD_Success, F-DAD_Duplicate, T-DAD_Tentative, U-DAD_Unavailable) Interface : 2e407500-2065-5637-a587-0d47d79b16ae Ifuid : 270 Mode : cpu Port-type : cpu Enable-mcast : false Interface : b293703d-622b-4cd7-9173-65efb2f07bd4 ### <-- !! Ifuid : 279 Name : edge01-uplink01 ### <-- !! Fwd-mode : IPV4_ONLY Internal name : uplink-279 Mode : lif Port-type : uplink IP/Mask : 192.168.12.11/24 ### <-- !! MAC : 00:50:56:a1:4f:a5 VLAN : 1612 Access-VLAN : untagged LS port : 70273c6d-7580-4c0d-a09f-3f0a7cea42f1 Urpf-mode : STRICT_MODE DAD-mode : LOOSE RA-mode : SLAAC_DNS_THROUGH_RA(M=0, O=0) Admin : up Op_state : up Enable-mcast : False MTU : 1500 arp_proxy : Interface : 40557daa-b1a5-5d85-9935-d0a1d41bacaa Ifuid : 271 Mode : blackhole Port-type : blackhole Interface : 26b8d93c-bdd1-4155-b31f-5bf966009615 Ifuid : 283 Name : bp-sr0-port Fwd-mode : IPV4_ONLY Internal name : backplane-283 Mode : lif Port-type : backplane IP/Mask : 169.254.0.2/24;fe80::50:56ff:fe56:5300/64(NA) MAC : 02:50:56:56:53:00 VNI : 72704 Access-VLAN : untagged LS port : fa66b101-63b9-45f0-9cff-dec67fb9c792 Urpf-mode : NONE DAD-mode : LOOSE RA-mode : RA_INVALID Admin : up Op_state : up Enable-mcast : True MTU : 1500 arp_proxy : Interface : 6b4feec9-7f27-4cce-be75-9c469cf56cbe Ifuid : 284 Mode : loopback Port-type : loopback IP/Mask : 127.0.0.1/8;::1/128(NA) Interface : aeb063b7-c37c-43dd-a43f-44f97d92dabb ### <-- !! Ifuid : 286 Name : edge01-uplink02 ### <-- !! Fwd-mode : IPV4_ONLY Internal name : uplink-286 Mode : lif Port-type : uplink IP/Mask : 192.168.13.11/24 ### <-- !! MAC : 00:50:56:a1:86:fa VLAN : 1613 Access-VLAN : untagged LS port : b32a861a-602f-41f9-97f8-7418c1e61649 Urpf-mode : STRICT_MODE DAD-mode : LOOSE RA-mode : SLAAC_DNS_THROUGH_RA(M=0, O=0) Admin : up Op_state : up Enable-mcast : False MTU : 1500 arp_proxy : edge-node-01> start capture interface b293703d-622b-4cd7-9173-65efb2f07bd4 05:33:44.635545 00:50:56:a1:62:5e > 00:50:56:a1:4f:a5, ethertype IPv4 (0x0800), length 66: 192.168.12.1.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoU+lAFBWoWJeCABFwAA09nVAAP8R6yXAqAwBwKgMC8AADsgAIKYWIMADGPxP1MoTPfDkAAehIAAEk+AAAMNQ</base64> 05:33:44.822733 00:50:56:a1:4f:a5 > 00:50:56:a1:62:5e, ethertype IPv4 (0x0800), length 66: 192.168.12.11.57617 > 192.168.12.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoWJeAFBWoU+lCABFwAA0AAAAAP8RIZzAqAwLwKgMAeERDsgAIDsTIMADGBM98OT8T9TKAAehIAAHoSAAAAAA</base64> 05:33:45.045602 00:50:56:a1:62:5e > 00:50:56:a1:4f:a5, ethertype IPv4 (0x0800), length 66: 192.168.12.1.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoU+lAFBWoWJeCABFwAA09rRAAP8R6ubAqAwBwKgMC8AADsgAIKYWIMADGPxP1MoTPfDkAAehIAAEk+AAAMNQ</base64> 05:33:45.323186 00:50:56:a1:4f:a5 > 00:50:56:a1:62:5e, ethertype IPv4 (0x0800), length 66: 192.168.12.11.57617 > 192.168.12.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoWJeAFBWoU+lCABFwAA0AAAAAP8RIZzAqAwLwKgMAeERDsgAIDsTIMADGBM98OT8T9TKAAehIAAHoSAAAAAA</base64> 05:33:45.470803 00:50:56:a1:62:5e > 00:50:56:a1:4f:a5, ethertype IPv4 (0x0800), length 66: 192.168.12.1.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoU+lAFBWoWJeCABFwAA09wZAAP8R6pTAqAwBwKgMC8AADsgAIKYWIMADGPxP1MoTPfDkAAehIAAEk+AAAMNQ</base64> 05:33:45.798155 00:50:56:a1:4f:a5 > 00:50:56:a1:62:5e, ethertype IPv4 (0x0800), length 66: 192.168.12.11.57617 > 192.168.12.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoWJeAFBWoU+lCABFwAA0CwMAAP8RFpnAqAwLwKgMAeERDsgAIDsTIMADGBM98OT8T9TKAAehIAAHoSAAAAAA</base64> 05:33:45.920546 00:50:56:a1:62:5e > 00:50:56:a1:4f:a5, ethertype IPv4 (0x0800), length 66: 192.168.12.1.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoU+lAFBWoWJeCABFwAA0921AAP8R6i3AqAwBwKgMC8AADsgAIKYWIMADGPxP1MoTPfDkAAehIAAEk+AAAMNQ</base64> 05:33:46.287568 00:50:56:a1:4f:a5 > 00:50:56:a1:62:5e, ethertype IPv4 (0x0800), length 66: 192.168.12.11.57617 > 192.168.12.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoWJeAFBWoU+lCABFwAA0CwMAAP8RFpnAqAwLwKgMAeERDsgAIDsTIMADGBM98OT8T9TKAAehIAAHoSAAAAAA</base64> 05:33:46.359974 00:50:56:a1:62:5e > 00:50:56:a1:4f:a5, ethertype IPv4 (0x0800), length 66: 192.168.12.1.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoU+lAFBWoWJeCABFwAA093JAAP8R6ijAqAwBwKgMC8AADsgAIKYWIMADGPxP1MoTPfDkAAehIAAEk+AAAMNQ</base64> 05:33:46.707107 00:50:56:a1:4f:a5 > 00:50:56:a1:62:5e, ethertype IPv4 (0x0800), length 66: 192.168.12.11.57617 > 192.168.12.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoWJeAFBWoU+lCABFwAA0CwMAAP8RFpnAqAwLwKgMAeERDsgAIDsTIMADGBM98OT8T9TKAAehIAAHoSAAAAAA</base64> 05:33:46.815358 00:50:56:a1:62:5e > 00:50:56:a1:4f:a5, ethertype IPv4 (0x0800), length 66: 192.168.12.1.49152 > 192.168.12.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoU+lAFBWoWJeCABFwAA096FAAP8R6fnAqAwBwKgMC8AADsgAIKYWIMADGPxP1MoTPfDkAAehIAAEk+AAAMNQ</base64> ^C 11 packets captured 11 packets received by filter 0 packets dropped by kernel edge-node-01> start capture interface aeb063b7-c37c-43dd-a43f-44f97d92dabb 05:37:47.115807 00:50:56:a1:4c:47 > 00:50:56:a1:86:fa, ethertype IPv4 (0x0800), length 66: 192.168.13.1.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoYb6AFBWoUxHCABFwAA03B5AAP8RA33AqA0BwKgNC8ACDsgAIMquIMADGPGEvGrG8jnAAAehIAAEk+AAAMNQ</base64> 05:37:47.301026 00:50:56:a1:86:fa > 00:50:56:a1:4c:47, ethertype IPv4 (0x0800), length 66: 192.168.13.11.50225 > 192.168.13.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoUxHAFBWoYb6CABFwAA0AAAAAP8RH5zAqA0LwKgNAcQxDsgAIHyNIMADGMbyOcDxhLxqAAehIAAHoSAAAAAA</base64> 05:37:47.505426 00:50:56:a1:4c:47 > 00:50:56:a1:86:fa, ethertype IPv4 (0x0800), length 66: 192.168.13.1.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoYb6AFBWoUxHCABFwAA03HRAAP8RAyfAqA0BwKgNC8ACDsgAIMquIMADGPGEvGrG8jnAAAehIAAEk+AAAMNQ</base64> 05:37:47.740338 00:50:56:a1:86:fa > 00:50:56:a1:4c:47, ethertype IPv4 (0x0800), length 66: 192.168.13.11.50225 > 192.168.13.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoUxHAFBWoYb6CABFwAA0AAAAAP8RH5zAqA0LwKgNAcQxDsgAIHyNIMADGMbyOcDxhLxqAAehIAAHoSAAAAAA</base64> 05:37:47.970215 00:50:56:a1:4c:47 > 00:50:56:a1:86:fa, ethertype IPv4 (0x0800), length 66: 192.168.13.1.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoYb6AFBWoUxHCABFwAA03LFAAP8RAurAqA0BwKgNC8ACDsgAIMquIMADGPGEvGrG8jnAAAehIAAEk+AAAMNQ</base64> 05:37:48.174850 00:50:56:a1:86:fa > 00:50:56:a1:4c:47, ethertype IPv4 (0x0800), length 66: 192.168.13.11.50225 > 192.168.13.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoUxHAFBWoYb6CABFwAA0AAAAAP8RH5zAqA0LwKgNAcQxDsgAIHyNIMADGMbyOcDxhLxqAAehIAAHoSAAAAAA</base64> 05:37:48.440740 00:50:56:a1:4c:47 > 00:50:56:a1:86:fa, ethertype IPv4 (0x0800), length 66: 192.168.13.1.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoYb6AFBWoUxHCABFwAA03NBAAP8RAsvAqA0BwKgNC8ACDsgAIMquIMADGPGEvGrG8jnAAAehIAAEk+AAAMNQ</base64> 05:37:48.646187 00:50:56:a1:86:fa > 00:50:56:a1:4c:47, ethertype IPv4 (0x0800), length 66: 192.168.13.11.50225 > 192.168.13.1.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoUxHAFBWoYb6CABFwAA0CwIAAP8RFJrAqA0LwKgNAcQxDsgAIHyNIMADGMbyOcDxhLxqAAehIAAHoSAAAAAA</base64> 05:37:48.905434 00:50:56:a1:4c:47 > 00:50:56:a1:86:fa, ethertype IPv4 (0x0800), length 66: 192.168.13.1.49154 > 192.168.13.11.3784: BFDv1, Control, State Up, Flags: [none], length: 24 <base64>AFBWoYb6AFBWoUxHCABFwAA03TFAAP8RAmrAqA0BwKgNC8ACDsgAIMquIMADGPGEvGrG8jnAAAehIAAEk+AAAMNQ</base64> ^C 9 packets captured 9 packets received by filter 0 packets dropped by kernel |
'Networking' 카테고리의 다른 글
One-arm Load Balancer 생성 (0) | 2023.10.30 |
---|---|
Packets are dropped due to DFW rule described in dvfilter (1) | 2023.10.08 |
BFD Configuration on Tier-0 and Router (0) | 2023.09.25 |
BFD Overview (0) | 2023.09.25 |
[NSX] NAT 설정 및 Traffic Flow (1) | 2023.09.16 |