https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6616
--- Comment #2 from Juha Takala <user1@xxxxxxxxxxxx> 2011-11-26 05:51:19 PST ---
Created an attachment (id=7473)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7473)
Sample capture file containing ELCOM traffic
This file contains data that has been collected by 'tshark ... port 5997'.
5997 is the 'well known' ELCOM port in the environment in my case.
I have substituted all original IP-addresses in this file with something like:
x.x.x.x -> 10.1.1.1
y.y.y.y -> 10.2.2.2
z.z.z.z -> 10.3.3.3
This substitution is done with a perl script, using 'tshark -x' and
'text2pcap'.
-juha
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.