http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2482
--- Comment #3 from LEGO <luis.ontanon@xxxxxxxxx> 2008-04-21 10:54:43 GMT ---
> The Cisco IOS Extended ACLs, on the other hand, don't match the iptables logic
> and are off-the-mark (at least for my needs). Wireshark chooses the wrong
> source address (the target rather than the scanner):
> access-list NUMBER deny tcp host 192.168.1.123 any eq 0
> access-list NUMBER deny tcp host 192.168.1.123 any eq 443
You can choose which address to use in the ACL using the "Filter" pop-down
menu.
And, If that's wrong when applied to the ingress interface it is OK on the
egress one, and vice-versa...
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.