I have problem with flow-accounting data on subinterface: all information except of destination address is wrong.
$ sh flow-accounting interface eth1.334
flow-accounting for [eth1.334]
Src Addr Dst Addr Sport Dport Proto Packets Bytes Flows
64.6.70.15 172.16.0.100 0 0 194 1 63 1
64.6.70.21 172.16.0.100 0 0 188 1 63 1
64.6.70.13 172.16.0.100 0 0 196 1 63 1
64.6.70.9 172.16.0.100 0 0 200 1 63 1
64.6.70.19 172.16.0.100 0 0 190 1 63 1
64.6.70.11 172.16.0.100 0 0 198 1 63 1
64.6.70.17 172.16.0.100 0 0 192 1 63 1
64.6.70.23 172.16.0.100 0 0 186 1 63 1
64.6.70.9 172.16.0.100 0 0 202 1 61 1
64.6.70.37 172.16.0.100 0 0 195 1 40 1
64.6.70.43 172.16.0.100 0 0 189 1 40 1
64.6.70.29 172.16.0.100 0 0 203 1 40 1
64.6.70.35 172.16.0.100 0 0 197 1 40 1
64.6.70.41 172.16.0.100 0 0 191 1 40 1
64.6.70.33 172.16.0.100 0 0 199 1 40 1
64.6.70.39 172.16.0.100 0 0 193 1 40 1
64.6.70.31 172.16.0.100 0 0 201 1 40 1
64.6.70.45 172.16.0.100 0 0 187 1 40 1
$ sh nat source translations address 172.16.0.100
Pre-NAT src Pre-NAT dst Post-NAT src Post-NAT dst
172.16.0.100:5896 192.70.196.45:2061 xxx.yyy.223.194:5896 192.70.196.45:2061
tcp: 172.16.0.100 ==> xxx.yyy.223.194 timeout: 299 use: 1
$ monitor traffic interface eth1.334 filter "host 172.16.0.100"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1.334, link-type EN10MB (Ethernet), capture size 262144 bytes
09:31:11.749977 IP 172.16.0.100.5896 > 192.70.196.45.2061: Flags [P.], seq 157720286:157720313, ack 2053498746, win 32120, length 27
09:31:11.753586 IP 192.70.196.45.2061 > 172.16.0.100.5896: Flags [P.], seq 1:23, ack 27, win 64737, length 22
09:31:12.420381 IP 172.16.0.100.5896 > 192.70.196.45.2061: Flags [.], ack 23, win 32120, length 0
09:31:13.019616 IP 172.16.0.100.5896 > 192.70.196.45.2061: Flags [P.], seq 27:54, ack 23, win 32120, length 27
09:31:13.061320 IP 192.70.196.45.2061 > 172.16.0.100.5896: Flags [.], ack 54, win 64710, length 0
09:31:13.068682 IP 192.70.196.45.2061 > 172.16.0.100.5896: Flags [P.], seq 23:45, ack 54, win 64710, length 22
09:31:13.724740 IP 172.16.0.100.5896 > 192.70.196.45.2061: Flags [.], ack 45, win 32120, length 0
09:31:14.339969 IP 172.16.0.100.5896 > 192.70.196.45.2061: Flags [P.], seq 54:82, ack 45, win 32120, length 28
09:31:14.344559 IP 192.70.196.45.2061 > 172.16.0.100.5896: Flags [P.], seq 45:67, ack 82, win 64682, length 22
09:31:14.959218 IP 172.16.0.100.5896 > 192.70.196.45.2061: Flags [.], ack 67, win 32120, length 0
09:31:15.566137 IP 172.16.0.100.5896 > 192.70.196.45.2061: Flags [P.], seq 82:109, ack 67, win 32120, length 27
09:31:15.569549 IP 192.70.196.45.2061 > 172.16.0.100.5896: Flags [P.], seq 67:89, ack 109, win 64655, length 22
Version: VyOS 1.2.0-rolling+201904190439
Hardware model: KVM