Title | DAD is performed on NUT by Stateless Link-local address autoconfiguration |
CommandLine | ./DADSendNS_DADPostSendNS.seq -pkt LLOCAL.def addrconf=boot -log 2.html -ti DAD is performed on NUT by Stateless Link-local address autoconfiguration |
TestVersion | |
ToolVersion | undefined |
Start | 2000/06/12 19:21:40 |
Tn | /usr/local/v6eval//etc//tn.def |
Nu | /usr/local/v6eval//etc//nut.def |
Pkt | LLOCAL.def |
System | linux-v6 |
TargetName | Kernel 2.2.15 |
HostName | target.tahi.org |
Type | host |
19:21:40 | Start |
*** Target initialization phase *** Wait for NUT becomes ready (wait for login prompt). |
|
19:21:40 |
vRemote(loginout.rmt) ``/usr/local/v6eval//bin/linux-v6/loginout.rmt -t linux-v6 -u root -p v6eval -d cuaa0c -o 1 timeout=20''
connected Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: root Password: Last login: Mon Jun 12 19:09:39 on ttyS0 # # exit Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: ~ [EOT] |
No NUT initialization specified. *** Target testing phase *** |
|
19:21:44 | Start Capturing Packets (Link0) |
Wait for NUT becomes ready (wait for login prompt). |
|
19:21:44 |
vRemote(loginout.rmt) ``/usr/local/v6eval//bin/linux-v6/loginout.rmt -t linux-v6 -u root -p v6eval -d cuaa0c -o 1 timeout=20''
connected Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: root Password: Last login: Mon Jun 12 19:17:49 on ttyS0 # # exit Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: ~ [EOT] |
Remote boot NUT. |
|
19:21:50 |
vRemote(reboot_async.rmt) ``/usr/local/v6eval//bin/linux-v6/reboot_async.rmt -t linux-v6 -u root -p v6eval -d cuaa0c -o 1 timeout=5''
connected Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: root Password: Last login: Mon Jun 12 19:17:55 on ttyS0 # # reboot ~ [EOT] |
19:22:10 | wait 10 [sec] for shutdown NUT. |
TN wait the DAD NS sends from NUT (120 [sec]): dadns_from_NUT |
|
19:22:20 | vRecv(Link0,dadns_from_NUT dadns_any_from_NUT dadns_sll_any_from_NUT) timeout:120 cntLimit:0 seektime:0 recv unexpect packet at 19:21:45 recv unexpect packet at 19:21:49 recv dadns_sll_any_from_NUT |
Received packet count=3TN received irregular DAD NS. TN received the DAD NS sends from NUT. Note: There is a irregular DAD NS. WARN *** EOT *** |
|
19:23:05 | End |
Frame_Ether (length:70) | Hdr_Ether (length:14) | | DestinationAddress = 33:33:0:0:0:2 | | SourceAddress = 0:0:1:0:24:da | | Type = 34525 | Packet_IPv6 (length:56) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 16 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = fe80::200:1ff:fe00:24da | | | DestinationAddress = ff02::2 | | ICMPv6_RS (length:16) | | | Type = 133 | | | Code = 0 | | | Checksum = 12154 calc(12154) | | | Reserved = 0 | | | Opt_ICMPv6_SLL (length:8) | | | | Type = 1 | | | | Length = 1 | | | | LinkLayerAddress = 0:0:1:0:24:da ===dadns_from_NUT================================= ng compare hether_nut2tentsolnode.DestinationAddress received:33:33:0:0:0:2 = 33:33:ff:0:24:da ng compare _HDR_IPV6_dadns_from_NUT.SourceAddress received:fe80::200:1ff:fe00:24da = :: ng compare _HDR_IPV6_dadns_from_NUT.DestinationAddress received:ff02::2 = ff02::1:ff00:24da ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_RS ===dadns_any_from_NUT================================= ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_RS ===dadns_sll_any_from_NUT================================= ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_RS
Frame_Ether (length:70) | Hdr_Ether (length:14) | | DestinationAddress = 33:33:0:0:0:2 | | SourceAddress = 0:0:1:0:24:da | | Type = 34525 | Packet_IPv6 (length:56) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 16 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = fe80::200:1ff:fe00:24da | | | DestinationAddress = ff02::2 | | ICMPv6_RS (length:16) | | | Type = 133 | | | Code = 0 | | | Checksum = 12154 calc(12154) | | | Reserved = 0 | | | Opt_ICMPv6_SLL (length:8) | | | | Type = 1 | | | | Length = 1 | | | | LinkLayerAddress = 0:0:1:0:24:da ===dadns_from_NUT================================= ng compare hether_nut2tentsolnode.DestinationAddress received:33:33:0:0:0:2 = 33:33:ff:0:24:da ng compare _HDR_IPV6_dadns_from_NUT.SourceAddress received:fe80::200:1ff:fe00:24da = :: ng compare _HDR_IPV6_dadns_from_NUT.DestinationAddress received:ff02::2 = ff02::1:ff00:24da ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_RS ===dadns_any_from_NUT================================= ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_RS ===dadns_sll_any_from_NUT================================= ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_RS
Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 33:33:ff:0:24:da | | SourceAddress = 0:0:1:0:24:da | | Type = 34525 | Packet_IPv6 (length:72) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 32 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = :: | | | DestinationAddress = ff02::1:ff00:24da | | ICMPv6_NS (length:32) | | | Type = 135 | | | Code = 0 | | | Checksum = 2448 calc(2448) | | | Reserved = 0 | | | TargetAddress = fe80::200:1ff:fe00:24da | | | Opt_ICMPv6_SLL (length:8) | | | | Type = 1 | | | | Length = 1 | | | | LinkLayerAddress = 0:0:1:0:24:da ===dadns_from_NUT================================= ng count Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_NS ===dadns_any_from_NUT================================= ng count Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_NS ===dadns_sll_any_from_NUT=================================