Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

noVNC sudden disconnects #567

Closed
Ziris85 opened this issue Dec 23, 2015 · 30 comments
Closed

noVNC sudden disconnects #567

Ziris85 opened this issue Dec 23, 2015 · 30 comments
Assignees
Labels

Comments

@Ziris85
Copy link

Ziris85 commented Dec 23, 2015

Afternoon,

Similar to the discussion found here, I'm seeing noVNC suddenly disconnecting to the backend on a regular basis. I had thought I had been hitting some sort of server timeout or something, but that idea was dashed when I witnessed it dropping the connection as I was actively typing in the window. It also (perhaps unfortunately) doesn't happen with any regularity - sometimes it will last for several minutes before dropping, other times it will drop mere seconds after showing the display. That said, I've never had a session last longer than a half hour or so, and a connection drop always happens.

I had for a while been using websockify between the client and the server. However, after discovering that libvirt had support for websocket VNC connections, I cut out the middle-man and connect directly to that now. However, the issue has remained, thus helping narrow down that noVNC has the connection issue, rather than websockify

Since it was requested in the aforementioned issue, I'm providing the browser console results here. This is the entire session in Firefox:

 Msg: noVNC ready: native WebSockets, canvas rendering util.js:218:43
 util.js:218:43
 Msg: Starting VNC handshake util.js:218:43
 Msg: Sent ProtocolVersion: 003.008 util.js:218:43
 Msg: Authenticating using scheme: 2 util.js:218:43
 util.js:218:43
 Msg: Authentication OK util.js:218:43
 Msg: Connected (unencrypted) to: QEMU (domain) util.js:218:43
WebSocket on-close event util.js:218:43
 Msg: Server disconnected (code: 1006) util.js:220:43
Util.init_logging/Util.Error() util.js:220
RFB.prototype._updateState() rfb.js:469
RFB.prototype._fail() rfb.js:539
RFB/<() rfb.js:207
Websock.prototype.open/this._websocket.onclose<() websock.js:314

Error while connected. util.js:220:43
Util.init_logging/Util.Error() util.js:220
RFB.prototype._updateState() rfb.js:515
RFB.prototype._fail() rfb.js:539
RFB/<() rfb.js:207
Websock.prototype.open/this._websocket.onclose<() websock.js:314

It is perhaps worth mentioning that Firefox seems to suffer the issue the worst - other browsers like Opera, Chrome, even IE fare better, though they ALL will eventually have the same problem.

Any thoughts on what this might be? Let me know how I can help troubleshoot this further.

Thanks in advance.

@Ziris85
Copy link
Author

Ziris85 commented Dec 24, 2015

Just a quick update - I had been using the latest master branch download for all my testing, so I decided to try using the last official release version (0.5.1) to see if the problem might not exist there. Unfortunately, the sudden disconnects still occurred, and with the same frequency.

@Ziris85
Copy link
Author

Ziris85 commented Jan 3, 2016

Thought I would send another update. Since I happen to work in the datacenter my server is hosted at, I thought I might try connecting from there, thinking perhaps there was a latency issue between my apt. and the server that could be attributed to this. The connection was visibly faster as to be expected, but the random, inconsistent disconnects persisted, effectively ruling out network issues. I had already sort of done that anyway as I had been using guacamole beforehand and had had no such problems, but I figured it was worth a shot anyway.

@DirectXMan12 DirectXMan12 self-assigned this Jan 6, 2016
@jeffforbes
Copy link

This sounds similar to what I was seeing today with our iframe implementation of the noVNC viewer.
With the firefox browser (Version 43.0.3 under Fedora 22), the screen would paint and then a Server disconnected (code:1001) error was thrown in a matter of seconds. It worked correctly with chrome. On a windows notebook, the same happened with firefox until I updated it to the latest version (43.0.2). Both Chrome and IE11 worked correctly. I did not see this error with a normal, full browser display of the noVNC viewer.
Firebug console output

Data URI scheme cursor supported util.js (line 216)
Using native WebSockets
util.js (line 216)
 Msg: noVNC ready: native WebSockets, canvas rendering
util.js (line 218)
(an empty string)
util.js (line 218)
connecting to wss://rnd.nacon.com:8080/?token=BF3BE0B1
util.js (line 216)
Detected binaryType support in WebSockets
util.js (line 216)
Server choose sub-protocol: binary
util.js (line 216)
 Msg: Starting VNC handshake
util.js (line 218)
Server ProtocolVersion: 003.008
util.js (line 216)
 Msg: Sent ProtocolVersion: 003.008
util.js (line 218)
 Msg: Authenticating using scheme: 1
util.js (line 218)
(an empty string)
util.js (line 218)
2
 Msg: Authentication OK
util.js (line 218)
Screen: 1024x768, bpp: 16, depth: 16, big_endian: 0, true_color: 1, red_max: 31, green_max: 63, blue_max: 31, red_shift: 11, green_shift: 5, blue_shift: 0
util.js (line 216)
Server native red-shift is not 16
util.js (line 218)
 Msg: Connected (encrypted) to: QEMU (VMID_11571)
util.js (line 218)
First FBU latency: 65
util.js (line 216)
Timing of full FBU, curr: 110, total: 110, cnt: 1, avg: 110
util.js (line 216)
full FBU round-trip, cur: 226, total: 226, cnt: 1, avg: 226
util.js (line 216)
POST https://rnd.nacon.com/wsgi/doServerReqWSGI.py

200 OK
        3ms 
jquery.min.js (line 6)
WebSocket on-close event
util.js (line 218)
 Msg: Server disconnected (code: 1001)
Util.init_logging/Util.Error(msg=" Msg: Server disconnected (code: 1001)")util.js (line 220)
RFB.prototype._updateState(state="failed", statusMsg="Server disconnected (code: 1001)")rfb.js (line 470)
RFB.prototype._fail(msg="Server disconnected (code: 1001)")rfb.js (line 540)
RFB/<(e=Object { type="object"})rfb.js (line 208)
Websock.prototype.open/this._websocket.onclose<(e=Object { type="object"})websock.js (line 314)


Util.Error = function (msg) { console.error(msg); };

util.js (line 220)
Error while connected.
Util.init_logging/Util.Error(msg="Error while connected.")util.js (line 220)
RFB.prototype._updateState(state="failed", statusMsg="Server disconnected (code: 1001)")rfb.js (line 516)
RFB.prototype._fail(msg="Server disconnected (code: 1001)")rfb.js (line 540)
RFB/<(e=Object { type="object"})rfb.js (line 208)
Websock.prototype.open/this._websocket.onclose<(e=Object { type="object"})websock.js (line 314)


Util.Error = function (msg) { console.error(msg); };

util.js (line 220)
(an empty string)

@samhed
Copy link
Member

samhed commented Jan 8, 2016

This seems very odd, it's nothing I've encountered.

@Ziris85
Copy link
Author

Ziris85 commented Jan 8, 2016

Very odd indeed. I can't imagine this is super-widespread, but there do seem to be a few issues that are similar.

I tried installing Firebug to see if that might give me any more verbose output but it didn't give me anything more than what I noted in my original post. I also thought I might be on to something yesterday when I noticed my firewall blocking some traffic from my VNC connection. I was for sure that was it, but it made no impact unfortunately.

I'm still sifting through logs and what-not, but I'm afraid I'm not getting anywhere.

@Ziris85
Copy link
Author

Ziris85 commented Jan 8, 2016

May have something. I turned on debugging logging for my libvirtd backend, and it appears that it is receiving a VNC_DISCONNECT event request from the client:

2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollRunOnce:651 : Poll got 1 event(s)
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchTimeouts:433 : Dispatch 0
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:479 : Dispatch 12
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=0 w=1
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=1 w=2
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=2 w=3
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=3 w=4
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=4 w=5
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=5 w=6
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=7 w=8
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=8 w=9
2016-01-08 20:18:16.401+0000: 28219: debug : virEventPollDispatchHandles:493 : i=9 w=10
2016-01-08 20:18:16.401+0000: 28219: info : virEventPollDispatchHandles:507 : EVENT_POLL_DISPATCH_HANDLE: watch=10 events=1
2016-01-08 20:18:16.401+0000: 28219: info : virObjectRef:296 : OBJECT_REF: obj=0x7f5aac001160
2016-01-08 20:18:16.401+0000: 28219: info : qemuMonitorIOProcess:452 : QEMU_MONITOR_IO_PROCESS: mon=0x7f5aac001160 buf={"timestamp": {"seconds": 1452284296, "microseconds": 400923}, "event": "VNC_DISCONNECTED", "data": {"server": {"auth": "vnc", "family": "ipv4", "service": "5903", "host": "192.168.100.1"}, "client": {"family": "ipv4", "service": "37591", "host": "192.168.100.240"}}}
 len=269

I get the same exact messages in the debug log if I just close my window while the display is running. So from what I can tell from this, something is instructing the backend to end the session prematurely. I wish I could blame this on a timeout of some variety, but due to the extreme variability of this (sometimes disconnects in mere seconds, other times several minutes), I find it very unlikely to be a timeout. For what it's worth, I've also boosted any related timeouts to extreme figures to no effect.

@Tassatux
Copy link

I've encountered a similar issue with Firefox 43, noVNC wasn't the only impacted but also long running ajax request.
There a regression in Firefox for Linux in v43, it kill TCP connections each time an IPv6 router advertisement is received (which is pretty frequent): https://bugzilla.mozilla.org/show_bug.cgi?id=1235509
So if this bug only affect Linux users with Firefox v43, this may be the cause.
Temporary changed 'network.notify.changed' to false in about:config fix the noVNC issue for me.

@Ziris85
Copy link
Author

Ziris85 commented Jan 13, 2016

Given that I experience this issue on all browsers/OS's, I didn't think it would work. I did try it anyway, but the disconnects are still occurring. I'm quite frankly about out of ideas about what might be causing this.

@kanaka
Copy link
Member

kanaka commented Jan 13, 2016

@Ziris85 any chance you could capture a tcpdump between the browser and websockify/libvirt? That might give more indication of where the problem is. Note: it would need to be ws:// or manually unencrypted to be of much use.

@Ziris85
Copy link
Author

Ziris85 commented Jan 13, 2016

Sure @kanaka . I have a dump, but I don't see a way of attaching a file to this. So here is a giant ugly comment:

12:52:25.171198 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 3962161643:3962162036, ack 2409376910, win 236, options [nop,nop,TS val 1081187538 ecr 1079196171], length 393
12:52:25.171250 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 393, win 355, options [nop,nop,TS val 1079201235 ecr 1081187538], length 0
12:52:25.526454 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1:17, ack 393, win 355, options [nop,nop,TS val 1079201590 ecr 1081187538], length 16
12:52:25.526641 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 17, win 236, options [nop,nop,TS val 1081187893 ecr 1079201590], length 0
12:52:25.539931 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 393:432, ack 17, win 236, options [nop,nop,TS val 1081187907 ecr 1079201590], length 39
12:52:25.539977 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 432, win 355, options [nop,nop,TS val 1079201604 ecr 1081187907], length 0
12:52:25.593164 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 17:33, ack 432, win 355, options [nop,nop,TS val 1079201657 ecr 1081187907], length 16
12:52:25.632730 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 33, win 236, options [nop,nop,TS val 1081188000 ecr 1079201657], length 0
12:52:25.724188 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 432:476, ack 33, win 236, options [nop,nop,TS val 1081188091 ecr 1079201657], length 44
12:52:25.724236 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 476, win 355, options [nop,nop,TS val 1079201788 ecr 1081188091], length 0
12:52:25.765186 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 33:49, ack 476, win 355, options [nop,nop,TS val 1079201829 ecr 1081188091], length 16
12:52:25.765338 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 49, win 236, options [nop,nop,TS val 1081188132 ecr 1079201829], length 0
12:52:25.958187 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 476:512, ack 49, win 236, options [nop,nop,TS val 1081188325 ecr 1079201829], length 36
12:52:25.958228 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 512, win 355, options [nop,nop,TS val 1079202022 ecr 1081188325], length 0
12:52:26.003394 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 49:65, ack 512, win 355, options [nop,nop,TS val 1079202067 ecr 1081188325], length 16
12:52:26.003542 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 65, win 236, options [nop,nop,TS val 1081188370 ecr 1079202067], length 0
12:52:26.208172 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 65:83, ack 512, win 355, options [nop,nop,TS val 1079202272 ecr 1081188370], length 18
12:52:26.208353 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 83, win 236, options [nop,nop,TS val 1081188575 ecr 1079202272], length 0
12:52:26.251215 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 83:113, ack 512, win 355, options [nop,nop,TS val 1079202315 ecr 1081188575], length 30
12:52:26.251347 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 113, win 236, options [nop,nop,TS val 1081188618 ecr 1079202315], length 0
12:52:26.320771 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:26.641929 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 512:614, ack 113, win 236, options [nop,nop,TS val 1081189009 ecr 1079202315], length 102
12:52:26.641978 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 614, win 355, options [nop,nop,TS val 1079202706 ecr 1081189009], length 0
12:52:26.706909 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 113:129, ack 614, win 355, options [nop,nop,TS val 1079202771 ecr 1081189009], length 16
12:52:26.707088 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 129, win 236, options [nop,nop,TS val 1081189074 ecr 1079202771], length 0
12:52:27.062170 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 614:645, ack 129, win 236, options [nop,nop,TS val 1081189429 ecr 1079202771], length 31
12:52:27.062224 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 645, win 355, options [nop,nop,TS val 1079203126 ecr 1081189429], length 0
12:52:27.104361 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 129:145, ack 645, win 355, options [nop,nop,TS val 1079203168 ecr 1081189429], length 16
12:52:27.104509 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 145, win 236, options [nop,nop,TS val 1081189471 ecr 1079203168], length 0
12:52:27.157160 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 645:667, ack 145, win 236, options [nop,nop,TS val 1081189524 ecr 1079203168], length 22
12:52:27.157202 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 667, win 355, options [nop,nop,TS val 1079203221 ecr 1081189524], length 0
12:52:27.201098 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 145:161, ack 667, win 355, options [nop,nop,TS val 1079203265 ecr 1081189524], length 16
12:52:27.201246 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 161, win 236, options [nop,nop,TS val 1081189568 ecr 1079203265], length 0
12:52:27.448170 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 667:698, ack 161, win 236, options [nop,nop,TS val 1081189815 ecr 1079203265], length 31
12:52:27.448223 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 698, win 355, options [nop,nop,TS val 1079203512 ecr 1081189815], length 0
12:52:27.489857 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 161:177, ack 698, win 355, options [nop,nop,TS val 1079203554 ecr 1081189815], length 16
12:52:27.490017 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 177, win 236, options [nop,nop,TS val 1081189857 ecr 1079203554], length 0
12:52:27.521142 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 698:720, ack 177, win 236, options [nop,nop,TS val 1081189888 ecr 1079203554], length 22
12:52:27.521167 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 720, win 355, options [nop,nop,TS val 1079203585 ecr 1081189888], length 0
12:52:27.559383 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 177:193, ack 720, win 355, options [nop,nop,TS val 1079203623 ecr 1081189888], length 16
12:52:27.598762 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 193, win 236, options [nop,nop,TS val 1081189966 ecr 1079203623], length 0
12:52:27.779166 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 720:751, ack 193, win 236, options [nop,nop,TS val 1081190146 ecr 1079203623], length 31
12:52:27.818556 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 751, win 355, options [nop,nop,TS val 1079203883 ecr 1081190146], length 0
12:52:27.819109 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 193:209, ack 751, win 355, options [nop,nop,TS val 1079203883 ecr 1081190146], length 16
12:52:27.819293 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 209, win 236, options [nop,nop,TS val 1081190186 ecr 1079203883], length 0
12:52:27.965173 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 751:773, ack 209, win 236, options [nop,nop,TS val 1081190332 ecr 1079203883], length 22
12:52:27.965222 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 773, win 355, options [nop,nop,TS val 1079204029 ecr 1081190332], length 0
12:52:28.002841 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 209:225, ack 773, win 355, options [nop,nop,TS val 1079204067 ecr 1081190332], length 16
12:52:28.003001 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 225, win 236, options [nop,nop,TS val 1081190370 ecr 1079204067], length 0
12:52:28.133169 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 773:804, ack 225, win 236, options [nop,nop,TS val 1081190500 ecr 1079204067], length 31
12:52:28.172345 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 225:241, ack 804, win 355, options [nop,nop,TS val 1079204236 ecr 1081190500], length 16
12:52:28.172519 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 241, win 236, options [nop,nop,TS val 1081190539 ecr 1079204236], length 0
12:52:28.320774 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:28.445199 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 804:826, ack 241, win 236, options [nop,nop,TS val 1081190812 ecr 1079204236], length 22
12:52:28.484543 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 826, win 355, options [nop,nop,TS val 1079204549 ecr 1081190812], length 0
12:52:28.486317 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 241:257, ack 826, win 355, options [nop,nop,TS val 1079204550 ecr 1081190812], length 16
12:52:28.486465 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 257, win 236, options [nop,nop,TS val 1081190853 ecr 1079204550], length 0
12:52:28.522172 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 826:857, ack 257, win 236, options [nop,nop,TS val 1081190889 ecr 1079204550], length 31
12:52:28.522218 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 857, win 355, options [nop,nop,TS val 1079204586 ecr 1081190889], length 0
12:52:28.578119 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 257:273, ack 857, win 355, options [nop,nop,TS val 1079204642 ecr 1081190889], length 16
12:52:28.617771 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 273, win 236, options [nop,nop,TS val 1081190985 ecr 1079204642], length 0
12:52:28.786163 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 857:879, ack 273, win 236, options [nop,nop,TS val 1081191153 ecr 1079204642], length 22
12:52:28.786216 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 879, win 355, options [nop,nop,TS val 1079204850 ecr 1081191153], length 0
12:52:28.840096 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 273:289, ack 879, win 355, options [nop,nop,TS val 1079204904 ecr 1081191153], length 16
12:52:28.840267 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 289, win 236, options [nop,nop,TS val 1081191207 ecr 1079204904], length 0
12:52:28.974141 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 879:910, ack 289, win 236, options [nop,nop,TS val 1081191341 ecr 1079204904], length 31
12:52:28.974188 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 910, win 355, options [nop,nop,TS val 1079205038 ecr 1081191341], length 0
12:52:29.022081 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 289:305, ack 910, win 355, options [nop,nop,TS val 1079205086 ecr 1081191341], length 16
12:52:29.022239 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 305, win 236, options [nop,nop,TS val 1081191389 ecr 1079205086], length 0
12:52:29.222385 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 910:932, ack 305, win 236, options [nop,nop,TS val 1081191589 ecr 1079205086], length 22
12:52:29.222421 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 932, win 355, options [nop,nop,TS val 1079205286 ecr 1081191589], length 0
12:52:29.312066 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 305:321, ack 932, win 355, options [nop,nop,TS val 1079205376 ecr 1081191589], length 16
12:52:29.312216 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 321, win 236, options [nop,nop,TS val 1081191679 ecr 1079205376], length 0
12:52:29.332125 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 932:963, ack 321, win 236, options [nop,nop,TS val 1081191699 ecr 1079205376], length 31
12:52:29.332154 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 963, win 355, options [nop,nop,TS val 1079205396 ecr 1081191699], length 0
12:52:29.376016 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 321:337, ack 963, win 355, options [nop,nop,TS val 1079205440 ecr 1081191699], length 16
12:52:29.415729 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 337, win 236, options [nop,nop,TS val 1081191783 ecr 1079205440], length 0
12:52:29.542415 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 963:985, ack 337, win 236, options [nop,nop,TS val 1081191909 ecr 1079205440], length 22
12:52:29.542458 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 985, win 355, options [nop,nop,TS val 1079205606 ecr 1081191909], length 0
12:52:29.579123 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 337:353, ack 985, win 355, options [nop,nop,TS val 1079205643 ecr 1081191909], length 16
12:52:29.579310 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 353, win 236, options [nop,nop,TS val 1081191946 ecr 1079205643], length 0
12:52:29.827172 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 985:1016, ack 353, win 236, options [nop,nop,TS val 1081192194 ecr 1079205643], length 31
12:52:29.866546 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1016, win 355, options [nop,nop,TS val 1079205931 ecr 1081192194], length 0
12:52:29.872014 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 353:369, ack 1016, win 355, options [nop,nop,TS val 1079205936 ecr 1081192194], length 16
12:52:29.872178 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 369, win 236, options [nop,nop,TS val 1081192239 ecr 1079205936], length 0
12:52:30.021162 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1016:1038, ack 369, win 236, options [nop,nop,TS val 1081192388 ecr 1079205936], length 22
12:52:30.021203 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1038, win 355, options [nop,nop,TS val 1079206085 ecr 1081192388], length 0
12:52:30.062289 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 369:385, ack 1038, win 355, options [nop,nop,TS val 1079206126 ecr 1081192388], length 16
12:52:30.062431 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 385, win 236, options [nop,nop,TS val 1081192429 ecr 1079206126], length 0
12:52:30.193115 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1038:1069, ack 385, win 236, options [nop,nop,TS val 1081192560 ecr 1079206126], length 31
12:52:30.193151 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1069, win 355, options [nop,nop,TS val 1079206257 ecr 1081192560], length 0
12:52:30.270226 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 385:401, ack 1069, win 355, options [nop,nop,TS val 1079206334 ecr 1081192560], length 16
12:52:30.270374 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 401, win 236, options [nop,nop,TS val 1081192637 ecr 1079206334], length 0
12:52:30.320743 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:30.353119 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1069:1091, ack 401, win 236, options [nop,nop,TS val 1081192720 ecr 1079206334], length 22
12:52:30.353151 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1091, win 355, options [nop,nop,TS val 1079206417 ecr 1081192720], length 0
12:52:30.407000 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 401:417, ack 1091, win 355, options [nop,nop,TS val 1079206471 ecr 1081192720], length 16
12:52:30.407133 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 417, win 236, options [nop,nop,TS val 1081192774 ecr 1079206471], length 0
12:52:30.659120 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1091:1122, ack 417, win 236, options [nop,nop,TS val 1081193026 ecr 1079206471], length 31
12:52:30.659157 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1122, win 355, options [nop,nop,TS val 1079206723 ecr 1081193026], length 0
12:52:30.696224 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 417:433, ack 1122, win 355, options [nop,nop,TS val 1079206760 ecr 1081193026], length 16
12:52:30.696363 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 433, win 236, options [nop,nop,TS val 1081193063 ecr 1079206760], length 0
12:52:30.861124 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1122:1144, ack 433, win 236, options [nop,nop,TS val 1081193228 ecr 1079206760], length 22
12:52:30.900533 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1144, win 355, options [nop,nop,TS val 1079206965 ecr 1081193228], length 0
12:52:30.921229 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 433:449, ack 1144, win 355, options [nop,nop,TS val 1079206985 ecr 1081193228], length 16
12:52:30.921355 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 449, win 236, options [nop,nop,TS val 1081193288 ecr 1079206985], length 0
12:52:31.002035 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 449:491, ack 1144, win 355, options [nop,nop,TS val 1079207066 ecr 1081193288], length 42
12:52:31.002163 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 491, win 236, options [nop,nop,TS val 1081193369 ecr 1079207066], length 0
12:52:31.002556 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1144:1175, ack 491, win 236, options [nop,nop,TS val 1081193369 ecr 1079207066], length 31
12:52:31.002574 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1175, win 355, options [nop,nop,TS val 1079207067 ecr 1081193369], length 0
12:52:31.041298 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 491:537, ack 1175, win 355, options [nop,nop,TS val 1079207105 ecr 1081193369], length 46
12:52:31.060239 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 537:555, ack 1175, win 355, options [nop,nop,TS val 1079207124 ecr 1081193369], length 18
12:52:31.060394 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 555, win 236, options [nop,nop,TS val 1081193427 ecr 1079207105], length 0
12:52:31.102584 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 555:597, ack 1175, win 355, options [nop,nop,TS val 1079207167 ecr 1081193427], length 42
12:52:31.142723 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 597, win 236, options [nop,nop,TS val 1081193510 ecr 1079207167], length 0
12:52:31.152306 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 597:639, ack 1175, win 355, options [nop,nop,TS val 1079207216 ecr 1081193510], length 42
12:52:31.152436 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 639, win 236, options [nop,nop,TS val 1081193519 ecr 1079207216], length 0
12:52:31.152821 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1175:1197, ack 639, win 236, options [nop,nop,TS val 1081193520 ecr 1079207216], length 22
12:52:31.192203 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 639:667, ack 1197, win 355, options [nop,nop,TS val 1079207256 ecr 1081193520], length 28
12:52:31.231718 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 667, win 236, options [nop,nop,TS val 1081193599 ecr 1079207256], length 0
12:52:31.302726 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 667:679, ack 1197, win 355, options [nop,nop,TS val 1079207367 ecr 1081193599], length 12
12:52:31.302848 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 679, win 236, options [nop,nop,TS val 1081193670 ecr 1079207367], length 0
12:52:31.352459 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 679:691, ack 1197, win 355, options [nop,nop,TS val 1079207416 ecr 1081193670], length 12
12:52:31.352585 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 691, win 236, options [nop,nop,TS val 1081193719 ecr 1079207416], length 0
12:52:31.353254 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1197:1228, ack 691, win 236, options [nop,nop,TS val 1081193720 ecr 1079207416], length 31
12:52:31.392531 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1228, win 355, options [nop,nop,TS val 1079207457 ecr 1081193720], length 0
12:52:31.394449 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 691:707, ack 1228, win 355, options [nop,nop,TS val 1079207458 ecr 1081193720], length 16
12:52:31.433711 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 707, win 236, options [nop,nop,TS val 1081193801 ecr 1079207458], length 0
12:52:31.593151 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1228:1250, ack 707, win 236, options [nop,nop,TS val 1081193960 ecr 1079207458], length 22
12:52:31.593183 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 1250, win 355, options [nop,nop,TS val 1079207657 ecr 1081193960], length 0
12:52:31.637240 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 707:723, ack 1250, win 355, options [nop,nop,TS val 1079207701 ecr 1081193960], length 16
12:52:31.637383 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 723, win 236, options [nop,nop,TS val 1081194004 ecr 1079207701], length 0
12:52:31.775006 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 1250:5311, ack 723, win 236, options [nop,nop,TS val 1081194142 ecr 1079207701], length 4061
12:52:31.775061 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5311, win 418, options [nop,nop,TS val 1079207839 ecr 1081194142], length 0
12:52:31.854758 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 723:739, ack 5311, win 418, options [nop,nop,TS val 1079207919 ecr 1081194142], length 16
12:52:31.854907 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 739, win 236, options [nop,nop,TS val 1081194222 ecr 1079207919], length 0
12:52:32.095152 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5311:5333, ack 739, win 236, options [nop,nop,TS val 1081194462 ecr 1079207919], length 22
12:52:32.095200 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5333, win 418, options [nop,nop,TS val 1079208159 ecr 1081194462], length 0
12:52:32.154229 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 739:755, ack 5333, win 418, options [nop,nop,TS val 1079208218 ecr 1081194462], length 16
12:52:32.154371 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 755, win 236, options [nop,nop,TS val 1081194521 ecr 1079208218], length 0
12:52:32.173102 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5333:5364, ack 755, win 236, options [nop,nop,TS val 1081194540 ecr 1079208218], length 31
12:52:32.173121 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5364, win 418, options [nop,nop,TS val 1079208237 ecr 1081194540], length 0
12:52:32.212176 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 755:771, ack 5364, win 418, options [nop,nop,TS val 1079208276 ecr 1081194540], length 16
12:52:32.251716 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 771, win 236, options [nop,nop,TS val 1081194619 ecr 1079208276], length 0
12:52:32.320754 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:32.440117 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5364:5386, ack 771, win 236, options [nop,nop,TS val 1081194807 ecr 1079208276], length 22
12:52:32.476209 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 771:787, ack 5386, win 418, options [nop,nop,TS val 1079208540 ecr 1081194807], length 16
12:52:32.476347 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 787, win 236, options [nop,nop,TS val 1081194843 ecr 1079208540], length 0
12:52:32.628123 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5386:5417, ack 787, win 236, options [nop,nop,TS val 1081194995 ecr 1079208540], length 31
12:52:32.667533 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5417, win 418, options [nop,nop,TS val 1079208732 ecr 1081194995], length 0
12:52:32.674956 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 787:803, ack 5417, win 418, options [nop,nop,TS val 1079208739 ecr 1081194995], length 16
12:52:32.675087 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 803, win 236, options [nop,nop,TS val 1081195042 ecr 1079208739], length 0
12:52:32.796149 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5417:5439, ack 803, win 236, options [nop,nop,TS val 1081195163 ecr 1079208739], length 22
12:52:32.796186 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5439, win 418, options [nop,nop,TS val 1079208860 ecr 1081195163], length 0
12:52:32.838275 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 803:819, ack 5439, win 418, options [nop,nop,TS val 1079208902 ecr 1081195163], length 16
12:52:32.838449 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 819, win 236, options [nop,nop,TS val 1081195205 ecr 1079208902], length 0
12:52:32.954153 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5439:5470, ack 819, win 236, options [nop,nop,TS val 1081195321 ecr 1079208902], length 31
12:52:32.954204 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5470, win 418, options [nop,nop,TS val 1079209018 ecr 1081195321], length 0
12:52:32.991167 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 819:835, ack 5470, win 418, options [nop,nop,TS val 1079209055 ecr 1081195321], length 16
12:52:32.991302 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 835, win 236, options [nop,nop,TS val 1081195358 ecr 1079209055], length 0
12:52:33.132186 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 835:849, ack 5470, win 418, options [nop,nop,TS val 1079209196 ecr 1081195358], length 14
12:52:33.132319 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 849, win 236, options [nop,nop,TS val 1081195499 ecr 1079209196], length 0
12:52:33.138109 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5470:5537, ack 849, win 236, options [nop,nop,TS val 1081195505 ecr 1079209196], length 67
12:52:33.174920 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 849:865, ack 5537, win 418, options [nop,nop,TS val 1079209239 ecr 1081195505], length 16
12:52:33.175056 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5537:5559, ack 865, win 236, options [nop,nop,TS val 1081195542 ecr 1079209239], length 22
12:52:33.211160 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 865:881, ack 5559, win 418, options [nop,nop,TS val 1079209275 ecr 1081195542], length 16
12:52:33.250729 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 881, win 236, options [nop,nop,TS val 1081195618 ecr 1079209275], length 0
12:52:33.393031 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 881:937, ack 5559, win 418, options [nop,nop,TS val 1079209457 ecr 1081195618], length 56
12:52:33.393162 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 937, win 236, options [nop,nop,TS val 1081195760 ecr 1079209457], length 0
12:52:33.393591 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5559:5590, ack 937, win 236, options [nop,nop,TS val 1081195760 ecr 1079209457], length 31
12:52:33.432150 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 937:953, ack 5590, win 418, options [nop,nop,TS val 1079209496 ecr 1081195760], length 16
12:52:33.432276 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5590:5660, ack 953, win 236, options [nop,nop,TS val 1081195799 ecr 1079209496], length 70
12:52:33.471140 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 953:969, ack 5660, win 418, options [nop,nop,TS val 1079209535 ecr 1081195799], length 16
12:52:33.488160 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 969:983, ack 5660, win 418, options [nop,nop,TS val 1079209552 ecr 1081195799], length 14
12:52:33.488312 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 983, win 236, options [nop,nop,TS val 1081195855 ecr 1079209535], length 0
12:52:33.488621 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 983:997, ack 5660, win 418, options [nop,nop,TS val 1079209553 ecr 1081195855], length 14
12:52:33.518109 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5660:5729, ack 997, win 236, options [nop,nop,TS val 1081195885 ecr 1079209553], length 69
12:52:33.555127 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 997:1013, ack 5729, win 418, options [nop,nop,TS val 1079209619 ecr 1081195885], length 16
12:52:33.555275 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5729:5751, ack 1013, win 236, options [nop,nop,TS val 1081195922 ecr 1079209619], length 22
12:52:33.594548 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5751, win 418, options [nop,nop,TS val 1079209659 ecr 1081195922], length 0
12:52:33.597193 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1013:1029, ack 5751, win 418, options [nop,nop,TS val 1079209661 ecr 1081195922], length 16
12:52:33.602390 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1029:1043, ack 5751, win 418, options [nop,nop,TS val 1079209666 ecr 1081195922], length 14
12:52:33.602565 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1043, win 236, options [nop,nop,TS val 1081195969 ecr 1079209661], length 0
12:52:33.636452 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1043:1057, ack 5751, win 418, options [nop,nop,TS val 1079209700 ecr 1081195969], length 14
12:52:33.638129 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5751:5782, ack 1057, win 236, options [nop,nop,TS val 1081196005 ecr 1079209700], length 31
12:52:33.638163 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5782, win 418, options [nop,nop,TS val 1079209702 ecr 1081196005], length 0
12:52:33.676457 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1057:1073, ack 5782, win 418, options [nop,nop,TS val 1079209740 ecr 1081196005], length 16
12:52:33.715752 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1073, win 236, options [nop,nop,TS val 1081196083 ecr 1079209740], length 0
12:52:33.726181 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1073:1087, ack 5782, win 418, options [nop,nop,TS val 1079209790 ecr 1081196083], length 14
12:52:33.726340 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1087, win 236, options [nop,nop,TS val 1081196093 ecr 1079209790], length 0
12:52:33.806172 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5782:5804, ack 1087, win 236, options [nop,nop,TS val 1081196173 ecr 1079209790], length 22
12:52:33.842007 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1087:1103, ack 5804, win 418, options [nop,nop,TS val 1079209906 ecr 1081196173], length 16
12:52:33.842212 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1103, win 236, options [nop,nop,TS val 1081196209 ecr 1079209906], length 0
12:52:33.936184 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5804:5980, ack 1103, win 236, options [nop,nop,TS val 1081196303 ecr 1079209906], length 176
12:52:33.975540 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 5980, win 441, options [nop,nop,TS val 1079210040 ecr 1081196303], length 0
12:52:33.978225 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1103:1119, ack 5980, win 441, options [nop,nop,TS val 1079210042 ecr 1081196303], length 16
12:52:33.978406 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1119, win 236, options [nop,nop,TS val 1081196345 ecr 1079210042], length 0
12:52:33.981106 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 5980:6002, ack 1119, win 236, options [nop,nop,TS val 1081196348 ecr 1079210042], length 22
12:52:33.981127 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6002, win 441, options [nop,nop,TS val 1079210045 ecr 1081196348], length 0
12:52:34.026204 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1119:1135, ack 6002, win 441, options [nop,nop,TS val 1079210090 ecr 1081196348], length 16
12:52:34.065753 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1135, win 236, options [nop,nop,TS val 1081196433 ecr 1079210090], length 0
12:52:34.221175 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6002:6033, ack 1135, win 236, options [nop,nop,TS val 1081196588 ecr 1079210090], length 31
12:52:34.221221 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6033, win 441, options [nop,nop,TS val 1079210285 ecr 1081196588], length 0
12:52:34.320778 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:34.374192 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1135:1165, ack 6033, win 441, options [nop,nop,TS val 1079210438 ecr 1081196588], length 30
12:52:34.374363 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1165, win 236, options [nop,nop,TS val 1081196741 ecr 1079210438], length 0
12:52:34.374804 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6033:6055, ack 1165, win 236, options [nop,nop,TS val 1081196742 ecr 1079210438], length 22
12:52:34.374828 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6055, win 441, options [nop,nop,TS val 1079210439 ecr 1081196742], length 0
12:52:34.422197 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1165:1181, ack 6055, win 441, options [nop,nop,TS val 1079210486 ecr 1081196742], length 16
12:52:34.436129 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1181:1195, ack 6055, win 441, options [nop,nop,TS val 1079210500 ecr 1081196742], length 14
12:52:34.436295 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1195, win 236, options [nop,nop,TS val 1081196803 ecr 1079210486], length 0
12:52:34.516175 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6055:6086, ack 1195, win 236, options [nop,nop,TS val 1081196883 ecr 1079210486], length 31
12:52:34.516228 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6086, win 441, options [nop,nop,TS val 1079210580 ecr 1081196883], length 0
12:52:34.555890 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1195:1211, ack 6086, win 441, options [nop,nop,TS val 1079210620 ecr 1081196883], length 16
12:52:34.556167 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6086:6108, ack 1211, win 236, options [nop,nop,TS val 1081196923 ecr 1079210620], length 22
12:52:34.556194 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6108, win 441, options [nop,nop,TS val 1079210620 ecr 1081196923], length 0
12:52:34.559162 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1211:1225, ack 6108, win 441, options [nop,nop,TS val 1079210623 ecr 1081196923], length 14
12:52:34.579906 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1225:1239, ack 6108, win 441, options [nop,nop,TS val 1079210644 ecr 1081196923], length 14
12:52:34.580081 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1239, win 236, options [nop,nop,TS val 1081196947 ecr 1079210623], length 0
12:52:34.593871 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1239:1255, ack 6108, win 441, options [nop,nop,TS val 1079210658 ecr 1081196947], length 16
12:52:34.633774 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1255, win 236, options [nop,nop,TS val 1081197001 ecr 1079210658], length 0
12:52:34.706955 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1255:1269, ack 6108, win 441, options [nop,nop,TS val 1079210771 ecr 1081197001], length 14
12:52:34.707137 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1269, win 236, options [nop,nop,TS val 1081197074 ecr 1079210771], length 0
12:52:34.825188 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1269:1283, ack 6108, win 441, options [nop,nop,TS val 1079210889 ecr 1081197074], length 14
12:52:34.825378 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1283, win 236, options [nop,nop,TS val 1081197192 ecr 1079210889], length 0
12:52:35.035177 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6108:6139, ack 1283, win 236, options [nop,nop,TS val 1081197402 ecr 1079210889], length 31
12:52:35.070880 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1283:1297, ack 6139, win 441, options [nop,nop,TS val 1079211135 ecr 1081197402], length 14
12:52:35.071063 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1297, win 236, options [nop,nop,TS val 1081197438 ecr 1079211135], length 0
12:52:35.079134 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1297:1313, ack 6139, win 441, options [nop,nop,TS val 1079211143 ecr 1081197438], length 16
12:52:35.079261 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1313, win 236, options [nop,nop,TS val 1081197446 ecr 1079211143], length 0
12:52:35.151174 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6139:6161, ack 1313, win 236, options [nop,nop,TS val 1081197518 ecr 1079211143], length 22
12:52:35.190545 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6161, win 441, options [nop,nop,TS val 1079211255 ecr 1081197518], length 0
12:52:35.193880 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1313:1329, ack 6161, win 441, options [nop,nop,TS val 1079211258 ecr 1081197518], length 16
12:52:35.194020 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1329, win 236, options [nop,nop,TS val 1081197561 ecr 1079211258], length 0
12:52:35.209136 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1329:1343, ack 6161, win 441, options [nop,nop,TS val 1079211273 ecr 1081197561], length 14
12:52:35.209287 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1343, win 236, options [nop,nop,TS val 1081197576 ecr 1079211273], length 0
12:52:35.402168 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1343:1357, ack 6161, win 441, options [nop,nop,TS val 1079211466 ecr 1081197576], length 14
12:52:35.402350 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1357, win 236, options [nop,nop,TS val 1081197769 ecr 1079211466], length 0
12:52:35.402758 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6161:6192, ack 1357, win 236, options [nop,nop,TS val 1081197770 ecr 1079211466], length 31
12:52:35.402777 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6192, win 441, options [nop,nop,TS val 1079211467 ecr 1081197770], length 0
12:52:35.442166 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1357:1373, ack 6192, win 441, options [nop,nop,TS val 1079211506 ecr 1081197770], length 16
12:52:35.481755 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1373, win 236, options [nop,nop,TS val 1081197849 ecr 1079211506], length 0
12:52:35.546663 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1373:1387, ack 6192, win 441, options [nop,nop,TS val 1079211611 ecr 1081197849], length 14
12:52:35.546853 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1387, win 236, options [nop,nop,TS val 1081197914 ecr 1079211611], length 0
12:52:35.547243 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6192:6214, ack 1387, win 236, options [nop,nop,TS val 1081197914 ecr 1079211611], length 22
12:52:35.586538 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6214, win 441, options [nop,nop,TS val 1079211651 ecr 1081197914], length 0
12:52:35.593634 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1387:1403, ack 6214, win 441, options [nop,nop,TS val 1079211658 ecr 1081197914], length 16
12:52:35.633775 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1403, win 236, options [nop,nop,TS val 1081198001 ecr 1079211658], length 0
12:52:35.787185 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6214:6245, ack 1403, win 236, options [nop,nop,TS val 1081198154 ecr 1079211658], length 31
12:52:35.787234 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6245, win 441, options [nop,nop,TS val 1079211851 ecr 1081198154], length 0
12:52:35.839925 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1403:1417, ack 6245, win 441, options [nop,nop,TS val 1079211904 ecr 1081198154], length 14
12:52:35.840123 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1417, win 236, options [nop,nop,TS val 1081198207 ecr 1079211904], length 0
12:52:35.841879 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1417:1433, ack 6245, win 441, options [nop,nop,TS val 1079211906 ecr 1081198207], length 16
12:52:35.842005 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1433, win 236, options [nop,nop,TS val 1081198209 ecr 1079211906], length 0
12:52:35.960128 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1433:1447, ack 6245, win 441, options [nop,nop,TS val 1079212024 ecr 1081198209], length 14
12:52:35.960315 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1447, win 236, options [nop,nop,TS val 1081198327 ecr 1079212024], length 0
12:52:35.960723 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6245:6267, ack 1447, win 236, options [nop,nop,TS val 1081198328 ecr 1079212024], length 22
12:52:35.960746 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6267, win 441, options [nop,nop,TS val 1079212025 ecr 1081198328], length 0
12:52:35.990101 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6267:6298, ack 1447, win 236, options [nop,nop,TS val 1081198357 ecr 1079212025], length 31
12:52:35.990125 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6298, win 441, options [nop,nop,TS val 1079212054 ecr 1081198357], length 0
12:52:36.012134 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1447:1463, ack 6298, win 441, options [nop,nop,TS val 1079212076 ecr 1081198357], length 16
12:52:36.026099 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1463:1479, ack 6298, win 441, options [nop,nop,TS val 1079212090 ecr 1081198357], length 16
12:52:36.026275 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1479, win 236, options [nop,nop,TS val 1081198393 ecr 1079212076], length 0
12:52:36.071385 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1479:1493, ack 6298, win 441, options [nop,nop,TS val 1079212135 ecr 1081198393], length 14
12:52:36.072071 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1493:1507, ack 6298, win 441, options [nop,nop,TS val 1079212136 ecr 1081198393], length 14
12:52:36.072223 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1507, win 236, options [nop,nop,TS val 1081198439 ecr 1079212135], length 0
12:52:36.112363 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1507:1521, ack 6298, win 441, options [nop,nop,TS val 1079212176 ecr 1081198439], length 14
12:52:36.151740 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1521, win 236, options [nop,nop,TS val 1081198519 ecr 1079212176], length 0
12:52:36.212136 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6298:6320, ack 1521, win 236, options [nop,nop,TS val 1081198579 ecr 1079212176], length 22
12:52:36.251545 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6320, win 441, options [nop,nop,TS val 1079212316 ecr 1081198579], length 0
12:52:36.260865 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1521:1537, ack 6320, win 441, options [nop,nop,TS val 1079212325 ecr 1081198579], length 16
12:52:36.261014 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1537, win 236, options [nop,nop,TS val 1081198628 ecr 1079212325], length 0
12:52:36.272844 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1537:1551, ack 6320, win 441, options [nop,nop,TS val 1079212337 ecr 1081198628], length 14
12:52:36.272991 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1551, win 236, options [nop,nop,TS val 1081198640 ecr 1079212337], length 0
12:52:36.320756 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:36.362115 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6320:6351, ack 1551, win 236, options [nop,nop,TS val 1081198729 ecr 1079212337], length 31
12:52:36.362144 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6351, win 441, options [nop,nop,TS val 1079212426 ecr 1081198729], length 0
12:52:36.411143 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1551:1567, ack 6351, win 441, options [nop,nop,TS val 1079212475 ecr 1081198729], length 16
12:52:36.411299 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1567, win 236, options [nop,nop,TS val 1081198778 ecr 1079212475], length 0
12:52:36.503862 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1567:1581, ack 6351, win 441, options [nop,nop,TS val 1079212568 ecr 1081198778], length 14
12:52:36.504052 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1581, win 236, options [nop,nop,TS val 1081198871 ecr 1079212568], length 0
12:52:36.602178 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6351:6373, ack 1581, win 236, options [nop,nop,TS val 1081198969 ecr 1079212568], length 22
12:52:36.602212 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6373, win 441, options [nop,nop,TS val 1079212666 ecr 1081198969], length 0
12:52:36.646875 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1581:1597, ack 6373, win 441, options [nop,nop,TS val 1079212711 ecr 1081198969], length 16
12:52:36.647038 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1597, win 236, options [nop,nop,TS val 1081199014 ecr 1079212711], length 0
12:52:36.647062 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1597:1611, ack 6373, win 441, options [nop,nop,TS val 1079212711 ecr 1081198969], length 14
12:52:36.647202 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1611, win 236, options [nop,nop,TS val 1081199014 ecr 1079212711], length 0
12:52:36.752146 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6373:6404, ack 1611, win 236, options [nop,nop,TS val 1081199119 ecr 1079212711], length 31
12:52:36.752181 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6404, win 441, options [nop,nop,TS val 1079212816 ecr 1081199119], length 0
12:52:36.792431 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1611:1625, ack 6404, win 441, options [nop,nop,TS val 1079212856 ecr 1081199119], length 14
12:52:36.792665 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1625, win 236, options [nop,nop,TS val 1081199159 ecr 1079212856], length 0
12:52:36.845153 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1625:1641, ack 6404, win 441, options [nop,nop,TS val 1079212909 ecr 1081199159], length 16
12:52:36.845370 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1641, win 236, options [nop,nop,TS val 1081199212 ecr 1079212909], length 0
12:52:36.903884 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1641:1655, ack 6404, win 441, options [nop,nop,TS val 1079212968 ecr 1081199212], length 14
12:52:36.904106 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1655, win 236, options [nop,nop,TS val 1081199271 ecr 1079212968], length 0
12:52:36.975388 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1655:1669, ack 6404, win 441, options [nop,nop,TS val 1079213039 ecr 1081199271], length 14
12:52:36.975589 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1669, win 236, options [nop,nop,TS val 1081199342 ecr 1079213039], length 0
12:52:36.975962 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6404:6426, ack 1669, win 236, options [nop,nop,TS val 1081199343 ecr 1079213039], length 22
12:52:36.975981 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6426, win 441, options [nop,nop,TS val 1079213040 ecr 1081199343], length 0
12:52:37.027395 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1669:1685, ack 6426, win 441, options [nop,nop,TS val 1079213091 ecr 1081199343], length 16
12:52:37.062126 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1685:1699, ack 6426, win 441, options [nop,nop,TS val 1079213126 ecr 1081199343], length 14
12:52:37.062321 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1699, win 236, options [nop,nop,TS val 1081199429 ecr 1079213091], length 0
12:52:37.142180 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6426:6457, ack 1699, win 236, options [nop,nop,TS val 1081199509 ecr 1079213091], length 31
12:52:37.142222 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6457, win 441, options [nop,nop,TS val 1079213206 ecr 1081199509], length 0
12:52:37.172584 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1699:1713, ack 6457, win 441, options [nop,nop,TS val 1079213237 ecr 1081199509], length 14
12:52:37.181112 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1713:1729, ack 6457, win 441, options [nop,nop,TS val 1079213245 ecr 1081199509], length 16
12:52:37.181276 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1729, win 236, options [nop,nop,TS val 1081199548 ecr 1079213237], length 0
12:52:37.342865 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1729:1743, ack 6457, win 441, options [nop,nop,TS val 1079213407 ecr 1081199548], length 14
12:52:37.343454 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6457:6479, ack 1743, win 236, options [nop,nop,TS val 1081199710 ecr 1079213407], length 22
12:52:37.382543 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6479, win 441, options [nop,nop,TS val 1079213447 ecr 1081199710], length 0
12:52:37.396346 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1743:1773, ack 6479, win 441, options [nop,nop,TS val 1079213460 ecr 1081199710], length 30
12:52:37.435746 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1773, win 236, options [nop,nop,TS val 1081199803 ecr 1079213460], length 0
12:52:37.511830 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1773:1787, ack 6479, win 441, options [nop,nop,TS val 1079213576 ecr 1081199803], length 14
12:52:37.512041 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1787, win 236, options [nop,nop,TS val 1081199879 ecr 1079213576], length 0
12:52:37.513104 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6479:6510, ack 1787, win 236, options [nop,nop,TS val 1081199880 ecr 1079213576], length 31
12:52:37.513122 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6510, win 441, options [nop,nop,TS val 1079213577 ecr 1081199880], length 0
12:52:37.543140 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6510:6532, ack 1787, win 236, options [nop,nop,TS val 1081199910 ecr 1079213577], length 22
12:52:37.543164 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6532, win 441, options [nop,nop,TS val 1079213607 ecr 1081199910], length 0
12:52:37.555034 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1787:1803, ack 6532, win 441, options [nop,nop,TS val 1079213619 ecr 1081199910], length 16
12:52:37.580068 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1803:1819, ack 6532, win 441, options [nop,nop,TS val 1079213644 ecr 1081199910], length 16
12:52:37.580244 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1819, win 236, options [nop,nop,TS val 1081199947 ecr 1079213619], length 0
12:52:37.631305 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1819:1833, ack 6532, win 441, options [nop,nop,TS val 1079213695 ecr 1081199947], length 14
12:52:37.656333 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1833:1847, ack 6532, win 441, options [nop,nop,TS val 1079213720 ecr 1081199947], length 14
12:52:37.656496 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1847, win 236, options [nop,nop,TS val 1081200023 ecr 1079213695], length 0
12:52:37.871187 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6532:6563, ack 1847, win 236, options [nop,nop,TS val 1081200238 ecr 1079213695], length 31
12:52:37.879786 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1847:1861, ack 6563, win 441, options [nop,nop,TS val 1079213944 ecr 1081200238], length 14
12:52:37.901153 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6563:6610, ack 1861, win 236, options [nop,nop,TS val 1081200268 ecr 1079213944], length 47
12:52:37.908047 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1861:1877, ack 6610, win 441, options [nop,nop,TS val 1079213972 ecr 1081200268], length 16
12:52:37.939073 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1877:1893, ack 6610, win 441, options [nop,nop,TS val 1079214003 ecr 1081200268], length 16
12:52:37.939229 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1893, win 236, options [nop,nop,TS val 1081200306 ecr 1079213972], length 0
12:52:38.008057 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1893:1907, ack 6610, win 441, options [nop,nop,TS val 1079214072 ecr 1081200306], length 14
12:52:38.008659 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6610:6632, ack 1907, win 236, options [nop,nop,TS val 1081200375 ecr 1079214072], length 22
12:52:38.048552 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 6632, win 441, options [nop,nop,TS val 1079214113 ecr 1081200375], length 0
12:52:38.058853 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1907:1923, ack 6632, win 441, options [nop,nop,TS val 1079214123 ecr 1081200375], length 16
12:52:38.098776 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1923, win 236, options [nop,nop,TS val 1081200466 ecr 1079214123], length 0
12:52:38.118342 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 6632:7245, ack 1923, win 236, options [nop,nop,TS val 1081200485 ecr 1079214123], length 613
12:52:38.118379 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7245, win 463, options [nop,nop,TS val 1079214182 ecr 1081200485], length 0
12:52:38.158169 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7245:7267, ack 1923, win 236, options [nop,nop,TS val 1081200525 ecr 1079214182], length 22
12:52:38.158215 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7267, win 463, options [nop,nop,TS val 1079214222 ecr 1081200525], length 0
12:52:38.161563 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1923:1939, ack 7267, win 463, options [nop,nop,TS val 1079214226 ecr 1081200525], length 16
12:52:38.161715 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1939, win 236, options [nop,nop,TS val 1081200528 ecr 1079214226], length 0
12:52:38.188199 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7267:7607, ack 1939, win 236, options [nop,nop,TS val 1081200555 ecr 1079214226], length 340
12:52:38.195076 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1939:1955, ack 7607, win 486, options [nop,nop,TS val 1079214259 ecr 1081200555], length 16
12:52:38.234752 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1955, win 236, options [nop,nop,TS val 1081200602 ecr 1079214259], length 0
12:52:38.320779 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:38.428160 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7607:7629, ack 1955, win 236, options [nop,nop,TS val 1081200795 ecr 1079214259], length 22
12:52:38.467549 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7629, win 486, options [nop,nop,TS val 1079214532 ecr 1081200795], length 0
12:52:38.538342 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1955:1987, ack 7629, win 486, options [nop,nop,TS val 1079214602 ecr 1081200795], length 32
12:52:38.538529 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 1987, win 236, options [nop,nop,TS val 1081200905 ecr 1079214602], length 0
12:52:38.608175 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7629:7660, ack 1987, win 236, options [nop,nop,TS val 1081200975 ecr 1079214602], length 31
12:52:38.608227 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7660, win 486, options [nop,nop,TS val 1079214672 ecr 1081200975], length 0
12:52:38.646073 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 1987:2003, ack 7660, win 486, options [nop,nop,TS val 1079214710 ecr 1081200975], length 16
12:52:38.646233 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2003, win 236, options [nop,nop,TS val 1081201013 ecr 1079214710], length 0
12:52:38.772183 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7660:7682, ack 2003, win 236, options [nop,nop,TS val 1081201139 ecr 1079214710], length 22
12:52:38.807760 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2003:2019, ack 7682, win 486, options [nop,nop,TS val 1079214872 ecr 1081201139], length 16
12:52:38.807912 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2019, win 236, options [nop,nop,TS val 1081201175 ecr 1079214872], length 0
12:52:39.081180 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7682:7713, ack 2019, win 236, options [nop,nop,TS val 1081201448 ecr 1079214872], length 31
12:52:39.120554 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7713, win 486, options [nop,nop,TS val 1079215185 ecr 1081201448], length 0
12:52:39.127063 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2019:2035, ack 7713, win 486, options [nop,nop,TS val 1079215191 ecr 1081201448], length 16
12:52:39.127316 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2035, win 236, options [nop,nop,TS val 1081201494 ecr 1079215191], length 0
12:52:39.157206 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7713:7735, ack 2035, win 236, options [nop,nop,TS val 1081201524 ecr 1079215191], length 22
12:52:39.157257 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7735, win 486, options [nop,nop,TS val 1079215221 ecr 1081201524], length 0
12:52:39.421190 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7735:7766, ack 2035, win 236, options [nop,nop,TS val 1081201788 ecr 1079215221], length 31
12:52:39.421238 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7766, win 486, options [nop,nop,TS val 1079215485 ecr 1081201788], length 0
12:52:39.609186 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7766:7788, ack 2035, win 236, options [nop,nop,TS val 1081201976 ecr 1079215485], length 22
12:52:39.609228 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7788, win 486, options [nop,nop,TS val 1079215673 ecr 1081201976], length 0
12:52:39.724806 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2035:2083, ack 7788, win 486, options [nop,nop,TS val 1079215789 ecr 1081201976], length 48
12:52:39.764755 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2083, win 236, options [nop,nop,TS val 1081202132 ecr 1079215789], length 0
12:52:39.777126 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7788:7819, ack 2083, win 236, options [nop,nop,TS val 1081202144 ecr 1079215789], length 31
12:52:39.777154 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7819, win 486, options [nop,nop,TS val 1079215841 ecr 1081202144], length 0
12:52:39.828276 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2083:2099, ack 7819, win 486, options [nop,nop,TS val 1079215892 ecr 1081202144], length 16
12:52:39.828454 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2099, win 236, options [nop,nop,TS val 1081202195 ecr 1079215892], length 0
12:52:40.089160 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7819:7841, ack 2099, win 236, options [nop,nop,TS val 1081202456 ecr 1079215892], length 22
12:52:40.089207 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7841, win 486, options [nop,nop,TS val 1079216153 ecr 1081202456], length 0
12:52:40.127766 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2099:2115, ack 7841, win 486, options [nop,nop,TS val 1079216192 ecr 1081202456], length 16
12:52:40.127906 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2115, win 236, options [nop,nop,TS val 1081202495 ecr 1079216192], length 0
12:52:40.166111 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7841:7872, ack 2115, win 236, options [nop,nop,TS val 1081202533 ecr 1079216192], length 31
12:52:40.205535 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7872, win 486, options [nop,nop,TS val 1079216270 ecr 1081202533], length 0
12:52:40.209192 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2115:2131, ack 7872, win 486, options [nop,nop,TS val 1079216273 ecr 1081202533], length 16
12:52:40.248721 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2131, win 236, options [nop,nop,TS val 1081202616 ecr 1079216273], length 0
12:52:40.320764 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:40.430141 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7872:7894, ack 2131, win 236, options [nop,nop,TS val 1081202797 ecr 1079216273], length 22
12:52:40.430185 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7894, win 486, options [nop,nop,TS val 1079216494 ecr 1081202797], length 0
12:52:40.504979 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2131:2147, ack 7894, win 486, options [nop,nop,TS val 1079216569 ecr 1081202797], length 16
12:52:40.505139 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2147, win 236, options [nop,nop,TS val 1081202872 ecr 1079216569], length 0
12:52:40.618162 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7894:7925, ack 2147, win 236, options [nop,nop,TS val 1081202985 ecr 1079216569], length 31
12:52:40.618202 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 7925, win 486, options [nop,nop,TS val 1079216682 ecr 1081202985], length 0
12:52:40.655995 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2147:2163, ack 7925, win 486, options [nop,nop,TS val 1079216720 ecr 1081202985], length 16
12:52:40.656141 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2163, win 236, options [nop,nop,TS val 1081203023 ecr 1079216720], length 0
12:52:40.726269 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2163:2177, ack 7925, win 486, options [nop,nop,TS val 1079216790 ecr 1081203023], length 14
12:52:40.726426 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2177, win 236, options [nop,nop,TS val 1081203093 ecr 1079216790], length 0
12:52:40.806168 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7925:7978, ack 2177, win 236, options [nop,nop,TS val 1081203173 ecr 1079216790], length 53
12:52:40.831748 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2177:2191, ack 7978, win 486, options [nop,nop,TS val 1079216896 ecr 1081203173], length 14
12:52:40.831909 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2191, win 236, options [nop,nop,TS val 1081203199 ecr 1079216896], length 0
12:52:40.836111 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 7978:8040, ack 2191, win 236, options [nop,nop,TS val 1081203203 ecr 1079216896], length 62
12:52:40.844951 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2191:2207, ack 8040, win 486, options [nop,nop,TS val 1079216909 ecr 1081203203], length 16
12:52:40.876220 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2207:2221, ack 8040, win 486, options [nop,nop,TS val 1079216940 ecr 1081203203], length 14
12:52:40.876365 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2221, win 236, options [nop,nop,TS val 1081203243 ecr 1079216909], length 0
12:52:40.879944 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2221:2237, ack 8040, win 486, options [nop,nop,TS val 1079216944 ecr 1081203243], length 16
12:52:40.919748 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2237, win 236, options [nop,nop,TS val 1081203287 ecr 1079216944], length 0
12:52:40.958758 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2237:2251, ack 8040, win 486, options [nop,nop,TS val 1079217023 ecr 1081203287], length 14
12:52:40.958909 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2251, win 236, options [nop,nop,TS val 1081203326 ecr 1079217023], length 0
12:52:40.959318 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 8040:8062, ack 2251, win 236, options [nop,nop,TS val 1081203326 ecr 1079217023], length 22
12:52:40.997241 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2251:2267, ack 8062, win 486, options [nop,nop,TS val 1079217061 ecr 1081203326], length 16
12:52:41.009975 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2267:2281, ack 8062, win 486, options [nop,nop,TS val 1079217074 ecr 1081203326], length 14
12:52:41.010135 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2281, win 236, options [nop,nop,TS val 1081203377 ecr 1079217061], length 0
12:52:41.019139 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 8062:8105, ack 2281, win 236, options [nop,nop,TS val 1081203386 ecr 1079217061], length 43
12:52:41.058540 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 8105, win 486, options [nop,nop,TS val 1079217123 ecr 1081203386], length 0
12:52:41.064513 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2281:2297, ack 8105, win 486, options [nop,nop,TS val 1079217128 ecr 1081203386], length 16
12:52:41.096257 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2297:2311, ack 8105, win 486, options [nop,nop,TS val 1079217160 ecr 1081203386], length 14
12:52:41.096402 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2311, win 236, options [nop,nop,TS val 1081203463 ecr 1079217128], length 0
12:52:41.159024 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2311:2325, ack 8105, win 486, options [nop,nop,TS val 1079217223 ecr 1081203463], length 14
12:52:41.159592 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 8105:8136, ack 2325, win 236, options [nop,nop,TS val 1081203526 ecr 1079217223], length 31
12:52:41.159690 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 8136, win 486, options [nop,nop,TS val 1079217224 ecr 1081203526], length 0
12:52:41.204933 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2325:2341, ack 8136, win 486, options [nop,nop,TS val 1079217269 ecr 1081203526], length 16
12:52:41.244803 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2341, win 236, options [nop,nop,TS val 1081203612 ecr 1079217269], length 0
12:52:41.340533 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2341:2355, ack 8136, win 486, options [nop,nop,TS val 1079217405 ecr 1081203612], length 14
12:52:41.340737 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2355, win 236, options [nop,nop,TS val 1081203708 ecr 1079217405], length 0
12:52:41.340931 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2355:2383, ack 8136, win 486, options [nop,nop,TS val 1079217405 ecr 1081203708], length 28
12:52:41.341072 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2383, win 236, options [nop,nop,TS val 1081203708 ecr 1079217405], length 0
12:52:41.371160 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 8136:8201, ack 2383, win 236, options [nop,nop,TS val 1081203738 ecr 1079217405], length 65
12:52:41.371245 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 8201, win 486, options [nop,nop,TS val 1079217435 ecr 1081203738], length 0
12:52:41.378191 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2383:2397, ack 8201, win 486, options [nop,nop,TS val 1079217442 ecr 1081203738], length 14
12:52:41.414260 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2397:2413, ack 8201, win 486, options [nop,nop,TS val 1079217478 ecr 1081203738], length 16
12:52:41.414404 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2413, win 236, options [nop,nop,TS val 1081203781 ecr 1079217442], length 0
12:52:41.430917 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2413:2427, ack 8201, win 486, options [nop,nop,TS val 1079217495 ecr 1081203781], length 14
12:52:41.457773 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2427:2441, ack 8201, win 486, options [nop,nop,TS val 1079217522 ecr 1081203781], length 14
12:52:41.457959 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2441, win 236, options [nop,nop,TS val 1081203825 ecr 1079217495], length 0
12:52:41.461142 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 8201:8248, ack 2441, win 236, options [nop,nop,TS val 1081203828 ecr 1079217495], length 47
12:52:41.500546 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 8248, win 486, options [nop,nop,TS val 1079217565 ecr 1081203828], length 0
12:52:41.500725 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 8248:8270, ack 2441, win 236, options [nop,nop,TS val 1081203867 ecr 1079217565], length 22
12:52:41.500787 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 8270, win 486, options [nop,nop,TS val 1079217565 ecr 1081203867], length 0
12:52:41.505987 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2441:2457, ack 8270, win 486, options [nop,nop,TS val 1079217570 ecr 1081203867], length 16
12:52:41.512222 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2457:2471, ack 8270, win 486, options [nop,nop,TS val 1079217576 ecr 1081203867], length 14
12:52:41.512387 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2471, win 236, options [nop,nop,TS val 1081203879 ecr 1079217570], length 0
12:52:41.544726 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2471:2487, ack 8270, win 486, options [nop,nop,TS val 1079217609 ecr 1081203879], length 16
12:52:41.584751 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2487, win 236, options [nop,nop,TS val 1081203952 ecr 1079217609], length 0
12:52:41.732173 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 8270:10977, ack 2487, win 236, options [nop,nop,TS val 1081204099 ecr 1079217609], length 2707
12:52:41.732216 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 10977, win 528, options [nop,nop,TS val 1079217796 ecr 1081204099], length 0
12:52:41.789738 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2487:2503, ack 10977, win 528, options [nop,nop,TS val 1079217854 ecr 1081204099], length 16
12:52:41.789909 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2503, win 236, options [nop,nop,TS val 1081204157 ecr 1079217854], length 0
12:52:41.805894 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], seq 10977:25457, ack 2503, win 236, options [nop,nop,TS val 1081204173 ecr 1079217854], length 14480
12:52:41.805930 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 25457, win 755, options [nop,nop,TS val 1079217870 ecr 1081204173], length 0
12:52:41.806126 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 25457:31251, ack 2503, win 236, options [nop,nop,TS val 1081204173 ecr 1079217870], length 5794
12:52:41.806138 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 31251, win 845, options [nop,nop,TS val 1079217870 ecr 1081204173], length 0
12:52:41.832004 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 31251:37696, ack 2503, win 236, options [nop,nop,TS val 1081204199 ecr 1079217870], length 6445
12:52:41.832032 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 37696, win 946, options [nop,nop,TS val 1079217896 ecr 1081204199], length 0
12:52:42.106202 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2503:2519, ack 37696, win 946, options [nop,nop,TS val 1079218170 ecr 1081204199], length 16
12:52:42.144741 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2519:2535, ack 37696, win 946, options [nop,nop,TS val 1079218209 ecr 1081204199], length 16
12:52:42.144901 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2535, win 236, options [nop,nop,TS val 1081204512 ecr 1079218170], length 0
12:52:42.320780 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:42.555977 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2535:2547, ack 37696, win 946, options [nop,nop,TS val 1079218620 ecr 1081204512], length 12
12:52:42.595750 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2547, win 236, options [nop,nop,TS val 1081204963 ecr 1079218620], length 0
12:52:42.607261 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2547:2589, ack 37696, win 946, options [nop,nop,TS val 1079218671 ecr 1081204963], length 42
12:52:42.607402 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2589, win 236, options [nop,nop,TS val 1081204974 ecr 1079218671], length 0
12:52:42.656254 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2589:2619, ack 37696, win 946, options [nop,nop,TS val 1079218720 ecr 1081204974], length 30
12:52:42.656410 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2619, win 236, options [nop,nop,TS val 1081205023 ecr 1079218720], length 0
12:52:43.336925 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2619:2633, ack 37696, win 946, options [nop,nop,TS val 1079219401 ecr 1081205023], length 14
12:52:43.337104 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2633, win 236, options [nop,nop,TS val 1081205704 ecr 1079219401], length 0
12:52:43.431925 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2633:2647, ack 37696, win 946, options [nop,nop,TS val 1079219496 ecr 1081205704], length 14
12:52:43.432100 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2647, win 236, options [nop,nop,TS val 1081205799 ecr 1079219496], length 0
12:52:43.447506 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 37696:38493, ack 2647, win 236, options [nop,nop,TS val 1081205814 ecr 1079219496], length 797
12:52:43.482386 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], seq 38493:50077, ack 2647, win 236, options [nop,nop,TS val 1081205849 ecr 1079219496], length 11584
12:52:43.482437 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 50077, win 1149, options [nop,nop,TS val 1079219546 ecr 1081205814], length 0
12:52:43.482672 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 50077:57735, ack 2647, win 236, options [nop,nop,TS val 1081205849 ecr 1079219546], length 7658
12:52:43.482688 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 57735, win 1269, options [nop,nop,TS val 1079219547 ecr 1081205849], length 0
12:52:43.493147 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2647:2663, ack 57735, win 1269, options [nop,nop,TS val 1079219557 ecr 1081205849], length 16
12:52:43.510858 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 57735:73490, ack 2663, win 236, options [nop,nop,TS val 1081205878 ecr 1079219557], length 15755
12:52:43.510898 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 73490, win 1352, options [nop,nop,TS val 1079219575 ecr 1081205878], length 0
12:52:43.513870 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2663:2677, ack 73490, win 1424, options [nop,nop,TS val 1079219578 ecr 1081205878], length 14
12:52:43.553753 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2677, win 236, options [nop,nop,TS val 1081205921 ecr 1079219578], length 0
12:52:43.594426 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2677:2691, ack 73490, win 1424, options [nop,nop,TS val 1079219658 ecr 1081205921], length 14
12:52:43.594729 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2691, win 236, options [nop,nop,TS val 1081205961 ecr 1079219658], length 0
12:52:43.742149 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2691:2707, ack 73490, win 1424, options [nop,nop,TS val 1079219806 ecr 1081205961], length 16
12:52:43.742358 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2707, win 236, options [nop,nop,TS val 1081206109 ecr 1079219806], length 0
12:52:43.800916 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2707:2723, ack 73490, win 1424, options [nop,nop,TS val 1079219865 ecr 1081206109], length 16
12:52:43.801067 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2723, win 236, options [nop,nop,TS val 1081206168 ecr 1079219865], length 0
12:52:44.320771 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:46.320782 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:46.650790 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], seq 73490:79282, ack 2723, win 236, options [nop,nop,TS val 1081209017 ecr 1079219865], length 5792
12:52:46.650841 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], seq 79282:85074, ack 2723, win 236, options [nop,nop,TS val 1081209018 ecr 1079219865], length 5792
12:52:46.650961 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 85074, win 1374, options [nop,nop,TS val 1079222715 ecr 1081209017], length 0
12:52:46.651182 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 85074:93570, ack 2723, win 236, options [nop,nop,TS val 1081209018 ecr 1079222715], length 8496
12:52:46.651201 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 93570, win 1389, options [nop,nop,TS val 1079222715 ecr 1081209018], length 0
12:52:46.829880 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2723:2739, ack 93570, win 1424, options [nop,nop,TS val 1079222894 ecr 1081209018], length 16
12:52:46.830064 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2739, win 236, options [nop,nop,TS val 1081209197 ecr 1079222894], length 0
12:52:48.320800 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:50.169771 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], seq 93570:99362, ack 2739, win 236, options [nop,nop,TS val 1081212536 ecr 1079222894], length 5792
12:52:50.169818 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 99362:104629, ack 2739, win 236, options [nop,nop,TS val 1081212537 ecr 1079222894], length 5267
12:52:50.169893 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 104629, win 1374, options [nop,nop,TS val 1079226234 ecr 1081212536], length 0
12:52:50.231955 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2739:2755, ack 104629, win 1424, options [nop,nop,TS val 1079226296 ecr 1081212536], length 16
12:52:50.232099 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2755, win 236, options [nop,nop,TS val 1081212599 ecr 1079226296], length 0
12:52:50.320756 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:52.320780 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:52.758998 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 104629:106555, ack 2755, win 236, options [nop,nop,TS val 1081215126 ecr 1079226296], length 1926
12:52:52.759107 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 106555, win 1424, options [nop,nop,TS val 1079228823 ecr 1081215126], length 0
12:52:52.806900 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2755:2771, ack 106555, win 1424, options [nop,nop,TS val 1079228871 ecr 1081215126], length 16
12:52:52.807041 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2771, win 236, options [nop,nop,TS val 1081215174 ecr 1079228871], length 0
12:52:54.320777 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:55.754805 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 106555:108284, ack 2771, win 236, options [nop,nop,TS val 1081218122 ecr 1079228871], length 1729
12:52:55.754916 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 108284, win 1424, options [nop,nop,TS val 1079231819 ecr 1081218122], length 0
12:52:55.857085 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2771:2787, ack 108284, win 1424, options [nop,nop,TS val 1079231921 ecr 1081218122], length 16
12:52:55.857245 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2787, win 236, options [nop,nop,TS val 1081218224 ecr 1079231921], length 0
12:52:56.320780 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:58.320769 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:52:58.827980 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 108284:110745, ack 2787, win 236, options [nop,nop,TS val 1081221195 ecr 1079231921], length 2461
12:52:58.828089 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 110745, win 1424, options [nop,nop,TS val 1079234892 ecr 1081221195], length 0
12:52:58.873747 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2787:2803, ack 110745, win 1424, options [nop,nop,TS val 1079234938 ecr 1081221195], length 16
12:52:58.873908 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2803, win 236, options [nop,nop,TS val 1081221241 ecr 1079234938], length 0
12:53:00.320774 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:01.938035 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 110745:120816, ack 2803, win 236, options [nop,nop,TS val 1081224305 ecr 1079234938], length 10071
12:53:01.938142 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 120816, win 1382, options [nop,nop,TS val 1079238002 ecr 1081224305], length 0
12:53:02.002966 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2803:2819, ack 120816, win 1424, options [nop,nop,TS val 1079238067 ecr 1081224305], length 16
12:53:02.003142 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2819, win 236, options [nop,nop,TS val 1081224370 ecr 1079238067], length 0
12:53:02.320782 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:04.320786 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:04.470718 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], seq 120816:132400, ack 2819, win 236, options [nop,nop,TS val 1081226837 ecr 1079238067], length 11584
12:53:04.470821 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 132400, win 1374, options [nop,nop,TS val 1079240535 ecr 1081226837], length 0
12:53:04.470960 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 132400:134591, ack 2819, win 236, options [nop,nop,TS val 1081226838 ecr 1079240535], length 2191
12:53:04.471041 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 134591, win 1359, options [nop,nop,TS val 1079240535 ecr 1081226838], length 0
12:53:04.577849 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2819:2835, ack 134591, win 1424, options [nop,nop,TS val 1079240642 ecr 1081226838], length 16
12:53:04.577997 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2835, win 236, options [nop,nop,TS val 1081226945 ecr 1079240642], length 0
12:53:06.320793 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:07.428525 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 134591:135410, ack 2835, win 236, options [nop,nop,TS val 1081229795 ecr 1079240642], length 819
12:53:07.467277 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2835:2851, ack 135410, win 1424, options [nop,nop,TS val 1079243531 ecr 1081229795], length 16
12:53:07.467418 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2851, win 236, options [nop,nop,TS val 1081229834 ecr 1079243531], length 0
12:53:08.320777 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:10.320770 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:10.480376 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 135410:135874, ack 2851, win 236, options [nop,nop,TS val 1081232847 ecr 1079243531], length 464
12:53:10.519534 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 135874, win 1424, options [nop,nop,TS val 1079246584 ecr 1081232847], length 0
12:53:10.520661 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2851:2867, ack 135874, win 1424, options [nop,nop,TS val 1079246585 ecr 1081232847], length 16
12:53:10.520780 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2867, win 236, options [nop,nop,TS val 1081232888 ecr 1079246585], length 0
12:53:12.320780 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:13.581506 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 135874:136698, ack 2867, win 236, options [nop,nop,TS val 1081235948 ecr 1079246585], length 824
12:53:13.581562 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 136698, win 1424, options [nop,nop,TS val 1079249646 ecr 1081235948], length 0
12:53:13.620636 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2867:2883, ack 136698, win 1424, options [nop,nop,TS val 1079249685 ecr 1081235948], length 16
12:53:13.620776 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2883, win 236, options [nop,nop,TS val 1081235988 ecr 1079249685], length 0
12:53:14.320782 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:16.320776 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:16.703224 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 136698:136881, ack 2883, win 236, options [nop,nop,TS val 1081239070 ecr 1079249685], length 183
12:53:16.740766 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2883:2899, ack 136881, win 1424, options [nop,nop,TS val 1079252805 ecr 1081239070], length 16
12:53:16.740907 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2899, win 236, options [nop,nop,TS val 1081239108 ecr 1079252805], length 0
12:53:18.320775 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:19.241297 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 136881:137160, ack 2899, win 236, options [nop,nop,TS val 1081241608 ecr 1079252805], length 279
12:53:19.280541 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 137160, win 1424, options [nop,nop,TS val 1079255345 ecr 1081241608], length 0
12:53:19.361477 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2899:2915, ack 137160, win 1424, options [nop,nop,TS val 1079255425 ecr 1081241608], length 16
12:53:19.361631 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2915, win 236, options [nop,nop,TS val 1081241728 ecr 1079255425], length 0
12:53:20.320771 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:22.320779 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:22.833331 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 137160:137490, ack 2915, win 236, options [nop,nop,TS val 1081245200 ecr 1079255425], length 330
12:53:22.833380 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 137490, win 1424, options [nop,nop,TS val 1079258897 ecr 1081245200], length 0
12:53:22.870655 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2915:2931, ack 137490, win 1424, options [nop,nop,TS val 1079258935 ecr 1081245200], length 16
12:53:22.870790 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2931, win 236, options [nop,nop,TS val 1081245238 ecr 1079258935], length 0
12:53:24.320770 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:25.455394 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 137490:138144, ack 2931, win 236, options [nop,nop,TS val 1081247822 ecr 1079258935], length 654
12:53:25.494538 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 138144, win 1424, options [nop,nop,TS val 1079261559 ecr 1081247822], length 0
12:53:25.496569 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2931:2947, ack 138144, win 1424, options [nop,nop,TS val 1079261561 ecr 1081247822], length 16
12:53:25.496717 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2947, win 236, options [nop,nop,TS val 1081247863 ecr 1079261561], length 0
12:53:26.320776 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:28.320772 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:28.472437 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 138144:138541, ack 2947, win 236, options [nop,nop,TS val 1081250839 ecr 1079261561], length 397
12:53:28.472492 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 138541, win 1424, options [nop,nop,TS val 1079264536 ecr 1081250839], length 0
12:53:28.510495 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2947:2963, ack 138541, win 1424, options [nop,nop,TS val 1079264574 ecr 1081250839], length 16
12:53:28.510653 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2963, win 236, options [nop,nop,TS val 1081250877 ecr 1079264574], length 0
12:53:30.320776 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:31.552391 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 138541:138981, ack 2963, win 236, options [nop,nop,TS val 1081253919 ecr 1079264574], length 440
12:53:31.590679 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2963:2979, ack 138981, win 1424, options [nop,nop,TS val 1079267655 ecr 1081253919], length 16
12:53:31.590815 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2979, win 236, options [nop,nop,TS val 1081253958 ecr 1079267655], length 0
12:53:32.320768 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:34.320775 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:34.667279 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [P.], seq 138981:139254, ack 2979, win 236, options [nop,nop,TS val 1081257034 ecr 1079267655], length 273
12:53:34.706532 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [.], ack 139254, win 1424, options [nop,nop,TS val 1079270771 ecr 1081257034], length 0
12:53:34.711821 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2979:2995, ack 139254, win 1424, options [nop,nop,TS val 1079270776 ecr 1081257034], length 16
12:53:34.711948 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 2995, win 236, options [nop,nop,TS val 1081257079 ecr 1079270776], length 0
12:53:36.320779 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:37.569315 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [P.], seq 2995:3005, ack 139254, win 1424, options [nop,nop,TS val 1079273633 ecr 1081257079], length 10
12:53:37.569515 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 3005, win 236, options [nop,nop,TS val 1081259936 ecr 1079273633], length 0
12:53:37.569552 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [F.], seq 139254, ack 3005, win 236, options [nop,nop,TS val 1081259936 ecr 1079273633], length 0
12:53:37.569603 IP host.domain.com.38132 > 192.168.100.1.5700: Flags [F.], seq 3005, ack 139255, win 1424, options [nop,nop,TS val 1079273634 ecr 1081259936], length 0
12:53:37.569802 IP 192.168.100.1.5700 > host.domain.com.38132: Flags [.], ack 3006, win 236, options [nop,nop,TS val 1081259937 ecr 1079273634], length 0
12:53:38.320772 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:40.320766 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43
12:53:42.320767 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:2f:43:b1.8002, length 43

Worth mentioning that this dump is not from the beginning of the connection, but shortly after it started. The bottom is immediately after the disconnect occurred.

@DirectXMan12
Copy link
Member

Can you add one with the first few bytes of the payload included, so we can see the series of messages that noVNC is sending? Alternatively, a websockify recording would also work (in fact, that would be preferable, as it would enable us to reproduce the issue on our end). I would recommend sticking it in a gist and then linking to the gist here, or uploading it elsewhere (pastebin, etc).

@Ziris85
Copy link
Author

Ziris85 commented Jan 13, 2016

Oh hey, fancy. Here's a gist of the initial connection:

https://gist.github.com/Ziris85/84236e7b569c20b8292d

@Ziris85
Copy link
Author

Ziris85 commented Jan 14, 2016

I see this was labelled as a bug a bit ago. Coding is hardly my strong suite, so let me know how I can help debug/test further.

@kanaka
Copy link
Member

kanaka commented Jan 18, 2016

@Ziris85 without payload I can't really determine what's going on. A file capture (tcpdump -w FILE) would be best. You can clone a gist and add a binary file that way. Or just add a file to you fork of noVNC on a branch or something like that.

@hydro-b
Copy link

hydro-b commented Jan 20, 2016

I made a tcpdump (see attached zip). You can ignore the "health checks" from our load-balancer, relevant ip is 2001:7b8:3:1000:201:80ff:fe7c:2f35

Error message logged by "websockify" is:
novnc_debug_github_issue_567.pcap.zip

  • - [20/Jan/2016 14:48:58] code 400, message Bad request version ("`#'\x04\x82\x8a\xa2\xddj\xb6\xa1\xdcj\xb6\xa2\xddn\xb6\xa1\xdd\x82\x8atK8GwJ8GtK<GwK\x88\x8f\x81\xce\x86\x16\x82&\xd2w\xf3\xa9\xe3b\xa1\xad\xeay\xf2\xab\xe2")

@kanaka
Copy link
Member

kanaka commented Jan 20, 2016

@hydro-b does your problem occur across all browsers and intermittently like for @Ziris85? If you have a load balancer in-between then that's what I suspect is mucking with the network traffic (especially given the invalid packet that websockify receives). The pcap file you sent isn't much use to me because it looks like it's TLS (SSL) encrypted data. Can you reproduce this without encryption and post a new capture?

@DirectXMan12
Copy link
Member

@kanaka Since this issue was opened, I've seen a similar message in websockify several times. It seems to mainly occur when connections get terminated unexpectedly in noVNC.

@Ziris85
Copy link
Author

Ziris85 commented Jan 21, 2016

@kanaka What I had been providing were tcpdumps (using the command tcpdump -nvvS -i ens7 -w novnc-dump1). Here is the raw binary of that file:

novnc-dump1.zip

That is a complete dump, from just prior to the connection starting, to just after it dropped. That is a dump from the web servers perspective also (where novnc is running) to the backend (where libvirt is running).

@kanaka
Copy link
Member

kanaka commented Jan 21, 2016

@Ziris85 Okay, so here is what is happening in your dump.

  • packet 2178 (time 126.659s): the last VNC message that we receive from the server (a frame buffer update with tight encoding)
  • packet 2180 (time 126.694s): client sends frame buffer update request
  • packet 2182 (time 126.695s): client sends another frame buffer update
  • packet 2184 (time 126.752s): client sends another frame buffer update
  • packet 2186-2270 (time 128.000s-288.000s): no WebSocket traffic (or even TCP traffic for that matter). Only STP traffic, arp and the client renewing it's DHCP lease (at time 194.618s)
  • packet 2271 (time 289.761s): client sends a WebSocket ping to try and keep the TCP connection from timing out due to idle.
  • packet 2273 (time 289.762s): server sends a TCP FIN-ACK to close the connection.

So for some reason the server stopped responding to the client frame buffer requests. And then the server closes the connection when the client sends a ping.

Previously you said you were connecting directly from the noVNC client directly to the libvirt/QEMU VNC server without using websockify. Was that the case for this dump? If so, then it looks like something is happening on the server side to me. For some reason it stops responding to frame buffer requests and then the next time the client tries to talk to it with a websocket ping it closes the connection.

@Ziris85
Copy link
Author

Ziris85 commented Jan 23, 2016

@kanaka I wonder if this dump might show anything different. That is one with constant activity, and having it disconnect while I was doing stuff in there (as opposed to the other one where I was just letting it sit until it timed out).

I'm honestly just about out of ideas for this - I had been using websockify before this and was having the same problem; I've exhausted every timeout/keepalive I can find in relation to qemu/libvirtd;I've ruled out firewalls by temporarily disabling them on both sides; I just now tried testing from a remote machine by using novnc/websockify launch.sh quickstart, and it errors out with the following message:

code 400, message Bad HTTP/0.9 request type ('\x82\x8a6G\xa6c5F\xa6c6G\xa2c5G\x82\x8av\x95\xf1"u\x94\xf1"v\x95\xf5"u\x95\x82\x8a\xa9\xd3\xab{\xaa\xd2\xab{\xa9\xd3\xaf{\xaa\xd3\x88\x8f\xa4\x10\x96d\xa7\xf8\xc2\x05\xd6w\xf3\x10\x84s\xfa')

I'm open to suggestions on things to try, because I'm out of them myself.

@Ziris85
Copy link
Author

Ziris85 commented Jan 24, 2016

I wanted to see if I could prove to myself that libvirt was to blame for these disconnects. Going with the idea that libvirt is unable to sustain a VNC connection, I figured it would not matter what client I used - libvirt would eventually just stop responding. I first started with a desktop client - ssvnc. I used it to connect to the same vnc client as I had been using. However, where the novnc connection would drop, the ssvnc client retained its connection through the entirety of my testing.

I next tried going with another browser-based solution. Since I already know that guacamole works, I tried using spice-html5. This (while it appears to have a bug of its own) also did not produce any sudden disconnects.

As far as I've been able to tell, libvirt/qemu seems to be fine. I'd really like to see novnc working in this situation since it feels like the right tool for the job, but I don't know what else to do.

@DirectXMan12 , you mentioned that a websockify recording would be helpful - I can see if I can make one if we think it might still be helpful/useful.

Thanks for all your help so far with this folks.

@kanaka
Copy link
Member

kanaka commented Jan 25, 2016

@Ziris85 it's certainly possible that noVNC is doing something to trigger the server to disconnect, but it's definitely the server doing the visible disconnect on the wire and not the client.

In the latest pcap file you sent I see the following leading up to the disconnect:

  • I see you type yum instal owncloud and press enter (at about 200.95 seconds into the trace)
  • The screen does some updates and there is a bit of mouse movement
  • At 203.286 (packet 4574) you start to type yu (last key up at packet 203.582s, packet 4586)
  • The client sends a frame buffer update request at 203.583s (packet 4588)
  • The server closes the connection at 203.583s (packet 4590) with a SYN-ACK

It all looks quite normal to me right up to the point where the connection is closed by the server-side SYN-ACK. So my suspicion is that there might be a bug in the WebSocket implementation/listener in QEMU or libvirt (probably QEMU since libvirt should just be doing a passthrough of the options to QEMU/kvm).

@Ziris85 I don't think the websockify capture will reveal any more than the tcpdump since it's really just a subset of that. If it was the client doing the close, then the websockify capture would allow us to reproduce the condition in noVNC but since noVNC appears to be operating normally and it's the server initiating the close, a websockify capture probably won't reveal anything new.

Perhaps the next step would be to run a qemu/KVM instance directly and see if it reproduces without libvirt in the mix. You can do a ps auxwww | grep qemu while libvirt is running the instance to capture the arguments that libvirt is using to run qemu/KVM. You'll have to do some mangling to avoid some of the control sockets, but that should be a good reference.

@Ziris85
Copy link
Author

Ziris85 commented Jan 31, 2016

@kanaka , Thanks for that info. I had had a similar thought as well, only instead of invoking qemu by hand, to instead try newer and older versions of libvirtd, respectively, by installing the latest version of Fedora, and CentOS 6. I unfortunately am not in a position where I have another web-facing server at my disposal to try that however. Going to see what I can do about that though, unless someone else comes along who can say they've already tried one or both of those and knows how that story ends.

@dann1
Copy link

dann1 commented Mar 21, 2016

Any luck on the bug so far, I think I have the same issue, I'm trying to connect to a VNC server raised in a container deployed in opennebula, and if i click on the VNC button the connection opens and everything works fine, after a while the server falls, I used vncterm to create the server and noVNC used by opennebula, which differs from the statndard one in how it looks.

@Ziris85
Copy link
Author

Ziris85 commented Jun 6, 2016

Actually, I believe my issue to be resolved. For a variety of reasons, I switched my webserver from nginx to Apache, and once I translated the environment over, the issue disappeared. Where I was thinking that the issue lie with the qemu version on the backend I was connecting to, now I believe the issue actually to be with the way nginx handles its websocket connections. It's possible that nginx doesn't keep the connection fresh in the same way as Apache does, to the point that the backend just assumes that the connection has idled out and times out. Just a thought, since I've no real answer honestly.

Guess my suggestion to anyone encountering the same issue I was having is: if you're using nginx, try using Apache for that connection instead.

@samhed samhed closed this as completed Jun 7, 2016
@karinepires
Copy link

Hello all,
I was having the same issue in my application and decided to follow this issue just in case.
I finally managed to solve it with a different strategy.
So, to complete what @Ziris85 said, if you are using nginx as a proxy to your websocketify connection you may want to complete the configuration with different timeouts.
For example one can add the following code to the nginx configuration on the proxied block to increase the timeout to 1hour:

        proxy_read_timeout 3600s;
        proxy_send_timeout 3600s;

@samhed
Copy link
Member

samhed commented Jun 7, 2016

Thank you @Ziris85 and @karinepires for sharing your solutions.

@naggie
Copy link

naggie commented Jan 30, 2019

I wonder if a more robust solution would be to incorporate a heartbeat into the websocket connection. There are 2 reasons I can think of:

  1. Some network NATs will drop idle TCP connections, which is beyond control
  2. It would eliminate this timeout problem generally without requiring special webserver configuration and fewer issues for developers using this library.

@samhed what do you think and its it possible without affecting the VNC traffic? If you agree I'll make an issue and try to do a PR

@samhed
Copy link
Member

samhed commented Feb 7, 2019

@naggie what part of the connection is sensitive in your use case?

  1. noVNC -> websocket proxy
  2. websocket proxy -> VNC server
  3. noVNC -> VNC server

If it's between noVNC and the websocket proxy (1), I believe that the websocket protocol has something built in. Perhaps the browsers are using it already?

With regards to option 2, implementing into Websockify for example, it wouldn't be possible since Websockify is a dumb proxy websocket->TCP which isn't aware of what kind of data is being sent to the server.

The third option would mean sending data over VNC. It would require writing an extension to the RFB protocol, some sort of message that would be supported in noVNC and the VNC server.

@naggie
Copy link

naggie commented Feb 7, 2019

Hi @samhed

It's (1) between noVNC and the proxy. Indeed -- websockets have a PING/PONG mechanism built in but unfortunately none of the browsers actually expose that API. However your comment has made me look further. It appears Firefox and Chrome now implement TCP keepalive which means this is not an issue for those browsers. However, it seems MS Edge does not implement such keep-alives.

A heartbeat between noVNC and the proxy could be an option.

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

10 participants