| 
 I had not looked at these packets in detail. I had assumed they were special pxe packets. I will try and find out what the source device is running that might be generating the packets. 
  
Greg
  >>> Guy Harris <guy@xxxxxxxxxxxx> 7/7/2003 3:06:56 PM >>>
  
 On Monday, July 7, 2003, at 8:57 AM, Greg Morris wrote:
  > Here are the same problem trace files in Lanalyzer format.
  Well, they're Ethernet captures, but with a network type other than  what we've seen in NetXRay/Windows Sniffer captures.
  I have a change that treats the network type as a 1-byte field rather  than a 2-byte field, and that checks the byte *after* the network type  - if it's 2, it treats the network type as an NDIS type value, and if  it's 0, it treats it as an NDIS type value - 1, which should handle all  the captures with 0 the same as it always has, and treats your two  captures as Ethernet.
  I treat all other values for that byte as errors.
  I don't know what significance, if any, that byte has.
  I've attached a patch with the change.
  BTW, there are some packets in the server capture (such as the first  two) with an IP protocol type of 0xe0; any idea what they are?  (There  are also some SNAP packets with an OUI of 0x00000c, for Cisco, and a  protocol ID of 0x2004; does anybody know what *those* are?)
 
 
  |