Last active
February 2, 2026 08:03
-
-
Save tonusoo/69d2bcf0182f544ef57e593d6794b437 to your computer and use it in GitHub Desktop.
Host-outbound TCP SYN captured on internal bridge connecting the control- and forwarding-plane on MX-series router || discussion on Packet Pushers Slack group
Author
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment

Executed in RE:
ssh routing-instance vr1 192.168.123.1Received on
virbr0:02:06:0a:99:ff:f5 > 52:54:00:cc:17:2b, ethertype IPv4 (0x0800), length 78: 192.168.123.111.60331 > 192.168.123.1.22: Flags [S], seq 1619526410, win 65535, options [mss 1460,nop,wscale 1,nop,nop,TS val 3551381480 ecr 0,sackOK,eol], length 0Hex dump of the corresponding packet captured on
vfp-int-r1-budinterface:Ethernet header:
525400b8237f5254006599ef08000x525400b8237fis MAC addr of vFP internalbridge facing int,
0x5254006599efis MACaddr of vCP internal bridge facing int,
0x0800is Ethertype(IPv4)IPv4 header:
4500007ca87900004054d1a380000001800000100x54is protocol(TTP),0x80000001is srcaddress 128.0.0.1(v4 addr of vCP internal
bridge facing int) and
0x80000010is dstaddress 128.0.0.16(v4 addr of vFP internal
bridge facing int)
TTP header:
020000000000009a00541a000000000000001009000001538000First octet(
0x02) is type: L2-tx. Fourth octet ispart of TLV containing the queue number(
0x00; "show ttpstatistics" on PFE shell),
0x9a(154) is the ifd_output(ge-0/0/5),
0x00001009is decoded by 'monitor trafficinterface em1 matching "ip src 128.0.0.1" layer2-headers
extensive' on Junos CLI as "hint(s) [no key lookup]".
0x153(339) seems to be the interface index ofge-0/0/5.0(IFL)
Ethernet header:
525400cc172b02060a99fff508000x525400cc172bis MAC addr of virbr0,0x02060a99fff5is MAC addr of vFP ge-0/0/5and
0x0800is Ethertype(IPv4)IPv4 header:
45000040a877400040061a7fc0a87b6fc0a87b010x06is protocol(TCP),0xc0a87b6fis srcaddress 192.168.123.111(v4 addr of ge-0/0/5.0)
and
0xc0a87b01is dst addr 192.168.123.1(v4 addrof virbr0)
TCP header:
ebab00166088030a00000000b002ffffd4540000020405b4010303010101080ad3adc7e800000000040200000xebabis src port 60331,0x0016is dst port 22,0x02preceding0xffff(window field) areTCP flags with only SYN set