Wireshark-bugs: [Wireshark-bugs] [Bug 2282] New: Extend netscreen2dump.py to work with SSG520
Date: Tue, 19 Feb 2008 16:03:58 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2282

           Summary: Extend netscreen2dump.py to work with SSG520
           Product: Wireshark
           Version: unspecified
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Extras
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: pizza_4u@xxxxxxx


Build Information:
current netscreen2dump.py script
--
The snoop output on a Netscreen SSG520 lists the interface with the name and
not with the internal interface number.
So the regex in the current netscreen2dump.py Python script didn`t match.

Snoop-Output on old Netscreen-Systems:
2519832.0: 1(o) len=54:0000db575ee1->0010f3096df3/0800
              215.21.21.103 -> 19.4.1.41/6
              vhl=45, tos=00, id=25059, frag=4000, ttl=124 tlen=40
              tcp:ports 1368->3389, seq=1175086909, ack=3213774435,
flag=5010/ACK

Snoop-Output on SSG520 Netscreen-Systems:
10240596.0: ethernet0/0(i) len=360:000c86033875->0010dbfb6000/0800
              215.200.10.14 -> 104.31.122.3/17
              vhl=45, tos=40, id=42603, frag=0000, ttl=59 tlen=346
              udp:ports 12003->12003, len=326


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.