Step 1: Obtain the scatter point details link of the error report Step 2: Open the scatter point details link and obtain the corresponding captured packets Step 3: Packet capture analysis (reset Error corresponding analysis of packet information with RST mark) RST: Indicates connection reset Filter rules:
1.
ip.addr==target Hostip address (filtering only contains data packets related to target Hostip)
It seems that the packet capture is all in the SSL Handshake Time stage. The client does not receive a response from the server after sending the "Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message" message (under normal circumstances, the server will send the "New Session Ticket, Change Cipher Spec, Encrypted Handshake Message" message). At this time, the client thinks that the previously sent packet should be lost, and then performs TCP Retransmission (timeout retransmission). After retransmitting package #14 7 times, the server still did not respond. Finally, the client initiated an RST reset. In this case, the packet may be lost during data transmission (Network is temporarily unreachable), so the client actively sends RST to reset. Step 4: Instant Testing result (reproduction): Use 8593927Probe and specify the access: 223.93.161.60 target Host to reproduce normally. Step 5: Solution The feedback is the occasional Exception caused by the Network link fluctuation, which has now returned to normal.