https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7145
Summary: Add L2TP filter on Control Message AVP value
Product: Wireshark
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: akk142@xxxxxxxxx
Build Information:
akarch-lnx wireshark-1.6-svn$ ./tshark -v
TShark 1.6.6 (SVN Rev 40982 from /trunk-1.6)
Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GLib 2.12.3, with libpcap (version unknown), with libz
1.2.3, with POSIX capabilities (Linux), without libpcre, without SMI, without
c-ares, without ADNS, without Lua, without Python, with GnuTLS 1.4.1, with
Gcrypt 1.4.4, with MIT Kerberos, without GeoIP.
NOTE: this build doesn't support the "matches" operator for Wireshark filter
syntax.
Running on Linux 2.6.18-194.8.1.el5, with libpcap version 0.9.4, with libz
1.2.3.
Built using gcc 4.1.2 20080704 (Red Hat 4.1.2-48).
akarch-lnx wireshark-1.6-svn$
--
In L2TP, we should be able to filter packets based on the value of the Message
Type AVP.
This is particularly useful if you want to find the tunnels or sessions that
have disconnected. In this case you would filter on StopCCN(4) or CDN(14).
>From there, you can filter on the IDs in the header or the Assigned ID AVPs
(added in Bug 6841).
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.