Hello ethereal developers and contributors,
the WLAN-company "Trapeze Networks" (http://www.trapezenetworks.com)
uses a proprietary protocol named "TAPA", for the communication between
their wireless switches and access points in their WLAN products.
Obviously the protocol has some components for the provisioning of the
access points, firmware and configuration upgrade and user data
tunneling within the connection between the access point and the switch.
Furthermore there're small keep-alive packets between the wlan-switches,
which also possibly could be analyzed.
We're using the "Trapeze Mobility System" in our company and I really
would appreciate a dissector for this protocol (suite).
As I have no clue about the internal structures of a "dissector", I
would ask you, if there is anyone, who is willing to analyze and
reverse-engineer this protocol suite to create a dissector for it. (The
transfered data between the access points and wlan-switches is
unencrypted afaik, so that should be theoretically possible)
If so, of course, I would provide lots of commented traces and dumps of
different situations from lab- and live-systems for the analysis.
So, is anybody here interested in working on this topic?
Thanks in advance,
Dennis Breithaupt