http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2282
Summary: Extend netscreen2dump.py to work with SSG520
Product: Wireshark
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Extras
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: pizza_4u@xxxxxxx
Build Information:
current netscreen2dump.py script
--
The snoop output on a Netscreen SSG520 lists the interface with the name and
not with the internal interface number.
So the regex in the current netscreen2dump.py Python script didn`t match.
Snoop-Output on old Netscreen-Systems:
2519832.0: 1(o) len=54:0000db575ee1->0010f3096df3/0800
215.21.21.103 -> 19.4.1.41/6
vhl=45, tos=00, id=25059, frag=4000, ttl=124 tlen=40
tcp:ports 1368->3389, seq=1175086909, ack=3213774435,
flag=5010/ACK
Snoop-Output on SSG520 Netscreen-Systems:
10240596.0: ethernet0/0(i) len=360:000c86033875->0010dbfb6000/0800
215.200.10.14 -> 104.31.122.3/17
vhl=45, tos=40, id=42603, frag=0000, ttl=59 tlen=346
udp:ports 12003->12003, len=326
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.