Please could you send your trace?
Hello,
I have a capture
with 802.1q VLAN tags taken between an Avaya IP handset and an Avaya Call
Manager and I'm trying to understand call setup. I presumed this was H323
(tcp 1720) and tried the two `decode as' options only to produce nonsense
and assumed that it was proprietory.
By chance, I opened
the same trace in Wildpackets Omnipeek, which identified the traffic as TPKT and
Q931 and within this I could see call setup data. When I attempt to
`decode as' the traffic as TPKT, Ethereal doesn't realise there is Q931 in there
with the info showing an unknown TPDU type (0x0).
Am I doing something
wrong? Is there a way to decode directly as Q931 rather than relying on
the TPKT dissector to work it out?
Thanks,
Mike
--
No virus found in this outgoing message.
Checked by AVG
Free Edition.
Version: 7.1.394 / Virus Database: 268.9.10/385 - Release Date:
11/07/2006
_______________________________________________
Ethereal-users mailing list
Ethereal-users@xxxxxxxxxxxx
http://www.ethereal.com/mailman/listinfo/ethereal-users