Wireshark-bugs: [Wireshark-bugs] [Bug 3469] wireshark doesn't interpret "adsl" interface in snoo
Date: Mon, 25 May 2009 00:22:04 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3469 --- Comment #4 from Rafael Gracioli <rgracioli@xxxxxxxxxxx> 2009-05-25 00:21:51 PDT --- (In reply to comment #3) > What version of ScreenOS are you running on which type of hardware? ScreenOS 6.2r1/SSG20 with ADSL mini-PIM What kind of ADSL config are you using? It's bridged mode (without PPP): rgracioli@homeoffice-> get config | in adsl set interface adsl2/0 phy operating-mode auto set interface "adsl2/0" pvc 0 34 mux llc protocol bridged qos ubr zone "Untrust" set interface adsl2/0 ip x.x.x.x set interface adsl2/0 route set interface adsl2/0 dhcp client enable Can you supply the "get system" output of your NetScreen? rgracioli@homeoffice-> get syst Product Name: SSG20-WLAN Serial Number: 0164012007000358, Control Number: 00000000 Hardware Version: 0710(0)-(00), FPGA checksum: 00000000, VLAN1 IP (0.0.0.0) Flash Type: Samsung Software Version: 6.2.0r1.0, Type: Firewall+VPN Feature: AV-K Compiled by build_master at: Wed Oct 15 18:36:36 PDT 2008 Base Mac: 0017.cbf2.6d40 File Name: screenos_image, Checksum: 89b9a9c6 , Total Memory: 256MB Date 05/25/2009 09:16:40, Daylight Saving Time enabled The Network Time Protocol is Enabled Up 157 hours 37 minutes 38 seconds Since 18May2009:19:39:02 Total Device Resets: 0 System in NAT/route mode. Use interface IP, Config Port: 80 Manager IP enforced: False Manager IPs: 0 Address Mask Vsys ---------------------------------------- ---------------------------------------- -------------------- User Name: rgracioli Interface serial0/0: description serial0/0 number 23, if_info 9384, if_index 0 link down, phy-link down status change:0 vsys Root, zone Null, vr untrust-vr admin mtu 0, operating mtu 1500, default mtu 1500 *ip 0.0.0.0/0 mac 0017.cbf2.6d57 bandwidth: physical 92kbps, configured egress [gbw 0kbps mbw 0kbps] configured ingress mbw 0kbps, current bw 0kbps total allocated gbw 0kbps Interface ethernet0/0: description ethernet0/0 number 0, if_info 0, if_index 0, mode route link down, phy-link down status change:0 vsys Root, zone Untrust, vr trust-vr dhcp client disabled PPPoE disabled admin mtu 0, operating mtu 1500, default mtu 1500 *ip 0.0.0.0/0 mac 0017.cbf2.6d40 *manage ip 0.0.0.0, mac 0017.cbf2.6d40 bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps] configured ingress mbw 0kbps, current bw 0kbps total allocated gbw 0kbps Interface ethernet0/1: description ethernet0/1 number 5, if_info 2040, if_index 0, mode route link down, phy-link down status change:0 vsys Root, zone Untrust, vr trust-vr dhcp client disabled PPPoE disabled admin mtu 0, operating mtu 1500, default mtu 1500 *ip 0.0.0.0/0 mac 0017.cbf2.6d45 *manage ip 0.0.0.0, mac 0017.cbf2.6d45 bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps] configured ingress mbw 0kbps, current bw 0kbps total allocated gbw 0kbps Interface ethernet0/2: description ethernet0/2 number 6, if_info 2448, if_index 0 link down, phy-link down status change:0 member of bgroup0 vsys Root, zone Null, vr untrust-vr *ip 0.0.0.0/0 mac 0017.cbf2.6d46 Interface ethernet0/3: description ethernet0/3 number 7, if_info 2856, if_index 0 link down, phy-link down status change:0 member of bgroup0 vsys Root, zone Null, vr untrust-vr *ip 0.0.0.0/0 mac 0017.cbf2.6d47 Interface ethernet0/4: description ethernet0/4 number 8, if_info 3264, if_index 0 link down, phy-link down status change:0 member of bgroup0 vsys Root, zone Null, vr untrust-vr *ip 0.0.0.0/0 mac 0017.cbf2.6d48 Interface wireless0/0: description wireless0/0 number 13, if_info 5304, if_index 0, mode route link up, phy-link up status change:1, last change:05/18/2009 19:31:21 vsys Root, zone Trust, vr trust-vr PPPoE disabled admin mtu 0, operating mtu 1500, default mtu 1500 *ip 192.168.2.1/24 mac 0017.cbf2.6d4d wireless AP 2.4G radio mac 0017.cbf2.6d60 ssid is rgracioli *manage ip 192.168.2.1, mac 0017.cbf2.6d4d route-deny disable Interface wireless0/1: description wireless0/1 number 14, if_info 5712, if_index 0 link down, phy-link down status change:0 vsys Root, zone Null, vr untrust-vr admin mtu 0, operating mtu 1500, default mtu 1500 *ip 0.0.0.0/0 mac 0017.cbf2.6d4e Interface wireless0/2: description wireless0/2 number 21, if_info 8568, if_index 0 link down, phy-link down status change:0 vsys Root, zone Null, vr untrust-vr admin mtu 0, operating mtu 1500, default mtu 1500 *ip 0.0.0.0/0 mac 0017.cbf2.6d55 Interface wireless0/3: description wireless0/3 number 22, if_info 8976, if_index 0, mode route link up, phy-link up status change:1, last change:05/18/2009 19:31:21 vsys Root, zone monique, vr trust-vr PPPoE disabled admin mtu 0, operating mtu 1500, default mtu 1500 *ip 192.168.30.1/24 mac 0017.cbf2.6d56 wireless AP 2.4G radio mac 0017.cbf2.6d61 wireless AP 5G radio mac 0017.cbf2.6d64 ssid is monique *manage ip 192.168.30.1, mac 0017.cbf2.6d56 route-deny disable Interface bgroup0: description bgroup0 number 9, if_info 3672, if_index 0, mode route link down, phy-link down status change:0 vsys Root, zone DMZ, vr trust-vr dhcp client disabled PPPoE disabled admin mtu 0, operating mtu 1500, default mtu 1500 *ip 192.168.1.1/24 mac 0017.cbf2.6d49 *manage ip 192.168.1.1, mac 0017.cbf2.6d49 route-deny disable bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps] configured ingress mbw 0kbps, current bw 0kbps total allocated gbw 0kbps Interface bgroup1: description bgroup1 number 10, if_info 4080, if_index 0 link down, phy-link down status change:0 vsys Root, zone Null, vr untrust-vr admin mtu 0, operating mtu 1500, default mtu 1500 *ip 0.0.0.0/0 mac 0017.cbf2.6d4a bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps] configured ingress mbw 0kbps, current bw 0kbps total allocated gbw 0kbps Interface bgroup2: description bgroup2 number 11, if_info 4488, if_index 0 link down, phy-link down status change:0 vsys Root, zone Null, vr untrust-vr admin mtu 0, operating mtu 1500, default mtu 1500 *ip 0.0.0.0/0 mac 0017.cbf2.6d4b bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps] configured ingress mbw 0kbps, current bw 0kbps total allocated gbw 0kbps Interface bgroup3: description bgroup3 number 12, if_info 4896, if_index 0 link down, phy-link down status change:0 vsys Root, zone Null, vr untrust-vr admin mtu 0, operating mtu 1500, default mtu 1500 *ip 0.0.0.0/0 mac 0017.cbf2.6d4c bandwidth: physical 0kbps, configured egress [gbw 0kbps mbw 0kbps] configured ingress mbw 0kbps, current bw 0kbps total allocated gbw 0kbps Interface adsl2/0: description adsl2/0 number 24, if_info 9792, if_index 0, PVC 0/34 (LLC, rfc1483-bridged), line-code auto, mode route link up, phy-link up status change:5, last change:05/23/2009 13:38:17 vsys Root, zone Untrust, vr trust-vr dhcp client enabled PPPoE disabled PPPoA disabled admin mtu 0, operating mtu 1500, default mtu 1500 *ip x.x.x.x/23 mac 0017.cbf2.6d58 gateway y.y.y.y *manage ip z.z.z.z, mac 0017.cbf2.6d58 route-deny disable bandwidth: physical 0/0kbps, configured egress [gbw 0kbps mbw 0kbps] configured ingress mbw 0kbps, current bw 0kbps total allocated gbw 0kbps > I wrote and tested the NetScreen snoop code against a NS-5GT-ADSL with a PPPoA > config, which uses PPP as link layer for the ADSL interface. Thanks for the reply, I work for Juniper in customer support (JTAC) and I appreciate the effort to support decoding of snoop output! Rafael Gracioli Escalation Engineer, SLT office: +31 20 712 5923 (35923) EMEA Regional JTAC mobile: +31 650 287299 Juniper Networks, Inc e-mail: rgracioli@xxxxxxxxxxx -- Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug.
- References:
- Prev by Date: [Wireshark-bugs] [Bug 3479] New Dissector: PICMG SFP.0/SFP.1 I-TDM contrl protocol (PICMG SFP.1 chapter 3.12)
- Next by Date: [Wireshark-bugs] [Bug 3487] New: RADIUS Dictionary enhancement for OpenSER / Kamailio / OpenSIP
- Previous by thread: [Wireshark-bugs] [Bug 3469] wireshark doesn't interpret "adsl" interface in snoop output of Juniper ScreenOS
- Next by thread: [Wireshark-bugs] [Bug 3469] wireshark doesn't interpret "adsl" interface in snoop output of Juniper ScreenOS
- Index(es):