Wireshark-bugs: [Wireshark-bugs] [Bug 3469] wireshark doesn't interpret "adsl" interface in snoo
Date: Mon, 25 May 2009 00:22:04 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3469





--- Comment #4 from Rafael Gracioli <rgracioli@xxxxxxxxxxx>  2009-05-25 00:21:51 PDT ---
(In reply to comment #3)
> What version of ScreenOS are you running on which type of hardware? 
ScreenOS 6.2r1/SSG20 with ADSL mini-PIM
What kind of ADSL config are you using?
It's bridged mode (without PPP):
rgracioli@homeoffice-> get config | in adsl
set interface adsl2/0 phy operating-mode auto
set interface "adsl2/0" pvc 0 34 mux llc protocol bridged qos ubr zone
"Untrust"
set interface adsl2/0 ip x.x.x.x
set interface adsl2/0 route
set interface adsl2/0 dhcp client enable

 Can you supply the "get system" output of your NetScreen?
rgracioli@homeoffice-> get syst
Product Name: SSG20-WLAN
Serial Number: 0164012007000358, Control Number: 00000000
Hardware Version: 0710(0)-(00), FPGA checksum: 00000000, VLAN1 IP (0.0.0.0)
Flash Type: Samsung
Software Version: 6.2.0r1.0, Type: Firewall+VPN
Feature: AV-K
Compiled by build_master at: Wed Oct 15 18:36:36 PDT 2008
Base Mac: 0017.cbf2.6d40
File Name: screenos_image, Checksum: 89b9a9c6
, Total Memory: 256MB

Date 05/25/2009 09:16:40, Daylight Saving Time enabled
The Network Time Protocol is Enabled
Up 157 hours 37 minutes 38 seconds Since 18May2009:19:39:02
Total Device Resets: 0


System in NAT/route mode.

Use interface IP, Config Port: 80
Manager IP enforced: False
Manager IPs: 0

Address                                  Mask                                  
  Vsys                
----------------------------------------
---------------------------------------- --------------------
User Name: rgracioli

Interface serial0/0:
  description serial0/0
  number 23, if_info 9384, if_index 0
  link down, phy-link down
  status change:0
  vsys Root, zone Null, vr untrust-vr
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 0.0.0.0/0   mac 0017.cbf2.6d57
  bandwidth: physical 92kbps, configured egress [gbw 0kbps mbw 0kbps]
             configured ingress mbw 0kbps, current bw 0kbps
             total allocated gbw 0kbps
Interface ethernet0/0:
  description ethernet0/0
  number 0, if_info 0, if_index 0, mode route
  link down, phy-link down
  status change:0
  vsys Root, zone Untrust, vr trust-vr
  dhcp client disabled
  PPPoE disabled
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 0.0.0.0/0   mac 0017.cbf2.6d40
  *manage ip 0.0.0.0, mac 0017.cbf2.6d40
  bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps]
             configured ingress mbw 0kbps, current bw 0kbps
             total allocated gbw 0kbps
Interface ethernet0/1:
  description ethernet0/1
  number 5, if_info 2040, if_index 0, mode route
  link down, phy-link down
  status change:0
  vsys Root, zone Untrust, vr trust-vr
  dhcp client disabled
  PPPoE disabled
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 0.0.0.0/0   mac 0017.cbf2.6d45
  *manage ip 0.0.0.0, mac 0017.cbf2.6d45
  bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps]
             configured ingress mbw 0kbps, current bw 0kbps
             total allocated gbw 0kbps
Interface ethernet0/2:
  description ethernet0/2
  number 6, if_info 2448, if_index 0
  link down, phy-link down
  status change:0
  member of bgroup0
  vsys Root, zone Null, vr untrust-vr
  *ip 0.0.0.0/0   mac 0017.cbf2.6d46
Interface ethernet0/3:
  description ethernet0/3
  number 7, if_info 2856, if_index 0
  link down, phy-link down
  status change:0
  member of bgroup0
  vsys Root, zone Null, vr untrust-vr
  *ip 0.0.0.0/0   mac 0017.cbf2.6d47
Interface ethernet0/4:
  description ethernet0/4
  number 8, if_info 3264, if_index 0
  link down, phy-link down
  status change:0
  member of bgroup0
  vsys Root, zone Null, vr untrust-vr
  *ip 0.0.0.0/0   mac 0017.cbf2.6d48
Interface wireless0/0:
  description wireless0/0
  number 13, if_info 5304, if_index 0, mode route
  link up, phy-link up
  status change:1, last change:05/18/2009 19:31:21
  vsys Root, zone Trust, vr trust-vr
  PPPoE disabled
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 192.168.2.1/24   mac 0017.cbf2.6d4d
  wireless AP 2.4G radio mac  0017.cbf2.6d60
  ssid is rgracioli
  *manage ip 192.168.2.1, mac 0017.cbf2.6d4d
  route-deny disable
Interface wireless0/1:
  description wireless0/1
  number 14, if_info 5712, if_index 0
  link down, phy-link down
  status change:0
  vsys Root, zone Null, vr untrust-vr
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 0.0.0.0/0   mac 0017.cbf2.6d4e
Interface wireless0/2:
  description wireless0/2
  number 21, if_info 8568, if_index 0
  link down, phy-link down
  status change:0
  vsys Root, zone Null, vr untrust-vr
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 0.0.0.0/0   mac 0017.cbf2.6d55
Interface wireless0/3:
  description wireless0/3
  number 22, if_info 8976, if_index 0, mode route
  link up, phy-link up
  status change:1, last change:05/18/2009 19:31:21
  vsys Root, zone monique, vr trust-vr
  PPPoE disabled
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 192.168.30.1/24   mac 0017.cbf2.6d56
  wireless AP 2.4G radio mac  0017.cbf2.6d61
  wireless AP 5G radio mac  0017.cbf2.6d64
  ssid is monique
  *manage ip 192.168.30.1, mac 0017.cbf2.6d56
  route-deny disable
Interface bgroup0:
  description bgroup0
  number 9, if_info 3672, if_index 0, mode route
  link down, phy-link down
  status change:0
  vsys Root, zone DMZ, vr trust-vr
  dhcp client disabled
  PPPoE disabled
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 192.168.1.1/24   mac 0017.cbf2.6d49
  *manage ip 192.168.1.1, mac 0017.cbf2.6d49
  route-deny disable
  bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps]
             configured ingress mbw 0kbps, current bw 0kbps
             total allocated gbw 0kbps
Interface bgroup1:
  description bgroup1
  number 10, if_info 4080, if_index 0
  link down, phy-link down
  status change:0
  vsys Root, zone Null, vr untrust-vr
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 0.0.0.0/0   mac 0017.cbf2.6d4a
  bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps]
             configured ingress mbw 0kbps, current bw 0kbps
             total allocated gbw 0kbps
Interface bgroup2:
  description bgroup2
  number 11, if_info 4488, if_index 0
  link down, phy-link down
  status change:0
  vsys Root, zone Null, vr untrust-vr
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 0.0.0.0/0   mac 0017.cbf2.6d4b
  bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps]
             configured ingress mbw 0kbps, current bw 0kbps
             total allocated gbw 0kbps
Interface bgroup3:
  description bgroup3
  number 12, if_info 4896, if_index 0
  link down, phy-link down
  status change:0
  vsys Root, zone Null, vr untrust-vr
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip 0.0.0.0/0   mac 0017.cbf2.6d4c
  bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps]
             configured ingress mbw 0kbps, current bw 0kbps
             total allocated gbw 0kbps
Interface adsl2/0:
  description adsl2/0
  number 24, if_info 9792, if_index 0, PVC 0/34 (LLC, rfc1483-bridged),
line-code auto, mode route
  link up, phy-link up
  status change:5, last change:05/23/2009 13:38:17
  vsys Root, zone Untrust, vr trust-vr
  dhcp client enabled
  PPPoE disabled
  PPPoA disabled
  admin mtu 0, operating mtu 1500, default mtu 1500
  *ip x.x.x.x/23   mac 0017.cbf2.6d58
  gateway y.y.y.y
  *manage ip z.z.z.z, mac 0017.cbf2.6d58
  route-deny disable
  bandwidth: physical 0/0kbps, configured egress [gbw 0kbps mbw 0kbps]
             configured ingress mbw 0kbps, current bw 0kbps
             total allocated gbw 0kbps


> I wrote and tested the NetScreen snoop code against a NS-5GT-ADSL with a PPPoA
> config, which uses PPP as link layer for the ADSL interface.

Thanks for the reply, I work for Juniper in customer support (JTAC) and I
appreciate the effort to support decoding of snoop output!

Rafael Gracioli
Escalation Engineer, SLT                office: +31 20 712 5923 (35923)
EMEA Regional JTAC                      mobile: +31 650 287299
Juniper Networks, Inc                    e-mail: rgracioli@xxxxxxxxxxx


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.