After applying this patch, ingress traffic are catched. #### 08:26:09.528646 fa:16:3e:92:5c:7c (oui Unknown) > fa:16:3e:06:48:2d (oui Unknown), ethertype IPv4 (0x0800), length 98: xianghui-bastion.openstacklocal > 192.168.21.5: ICMP echo request, id 32688, seq 1, length 64 08:26:09.529292 fa:16:3e:06:48:2d (oui Unknown) > fa:16:3e:92:5c:7c (oui Unknown), ethertype IPv4 (0x0800), length 98: 192.168.21.5 > xianghui-bastion.openstacklocal: ICMP echo reply, id 32688, seq 1, length 64
# dp flow port 6: qvof33b94a9-bd port 7: qvo8a0d7c3b-b2 tunnel(tun_id=0x5,src=10.5.6.210,dst=10.5.6.213,ttl=64,flags(-df-csum+key)),in_port(2),skb_mark(0),eth(src=fa:16:3e:92:5c:7c,dst=fa:16:3e:06:48:2d),eth_type(0x0800),ipv4(frag=no), packets:116, bytes:12356, used:1.776s, actions:6,7
After applying this patch, ingress traffic are catched. bastion. openstacklocal > 192.168.21.5: ICMP echo request, id 32688, seq 1, length 64 bastion. openstacklocal: ICMP echo reply, id 32688, seq 1, length 64
####
08:26:09.528646 fa:16:3e:92:5c:7c (oui Unknown) > fa:16:3e:06:48:2d (oui Unknown), ethertype IPv4 (0x0800), length 98: xianghui-
08:26:09.529292 fa:16:3e:06:48:2d (oui Unknown) > fa:16:3e:92:5c:7c (oui Unknown), ethertype IPv4 (0x0800), length 98: 192.168.21.5 > xianghui-
# dp flow tun_id= 0x5,src= 10.5.6. 210,dst= 10.5.6. 213,ttl= 64,flags( -df-csum+ key)),in_ port(2) ,skb_mark( 0),eth( src=fa: 16:3e:92: 5c:7c,dst= fa:16:3e: 06:48:2d) ,eth_type( 0x0800) ,ipv4(frag= no), packets:116, bytes:12356, used:1.776s, actions:6,7
port 6: qvof33b94a9-bd
port 7: qvo8a0d7c3b-b2
tunnel(