Wireshark-users: Re: [Wireshark-users] How to view rf5 files

From: "Luis EG Ontanon" <luis.ontanon@xxxxxxxxx>
Date: Wed, 15 Aug 2007 23:32:16 +0200
You can edit the 'K12 Protocols' table from Preferences->Protocols->K12xx

Click on preferences .
expand the protoocols tree.
scroll down until K12xx
click on K12xx
click on [Edit Table...]

In the protocols table,
click [New] to create a new binding
a "new" window will open
in "match" you put a unique part of the stack file e.g.: "v34_telcel_2"
in "protocol" you have to write the lowest layer protocol in the file
( "eth_withoutfcs" for ethernet, "mtp2" for mtp2, "x25" for X.25, "fr"
for frame-relay ).


BTW: If you have  files containing X.25 or ANSI MTP2 I'd really
appreciate if you sent me a small one (of each), I have neither X25
nor MTP2 ANSI  files and that'd be good for testing.

Luis


On 8/15/07, Segura, Miguel - Acision <miguel.segura@xxxxxxxxxxx> wrote:
>
>
>
>
> Hello,
>
>
>
> I tried to view rf5 files on wireshark and I got the following:
>
>
>
>
>
>
>
>
>
> The question is how can I edit the k12 protocols table in order to be able to view the packets properly?
>
>
>
> In this packets there are some smpp packets that I would like to see.
>
>
>
> Any advices will be appreciated.
>
>
>
> Kind Regards,
>
> Miguel Segura
>  Senior Operations Engineer
>  ________________________________________
>
> Acision. Innovation. Assured.
>  www.acision.com
>
> 6404   International Parkway, Suite 2048
>  Plano, TX 75204
>  T:  +52  55 5254 4718
>  M: +52  155 1798 6674
>  E:  miguel.segura@xxxxxxxxxxx
>
>
>
>
>
>
>
>  This e-mail and any attachment is for authorised use by the intended recipient(s) only. This email contains confidential information. It should not be copied, disclosed to, retained or used by, any party other than the intended recipient. Any unauthorised distribution, dissemination or copying of this E-mail or its attachments, and/or any use of any information contained in them, is strictly prohibited and may be illegal. If you are not an intended recipient then please promptly delete this e-mail and any attachment and all copies and inform the sender directly via email. Any emails that you send to us may be monitored by systems or persons other than the named communicant for the purposes of ascertaining whether the communication complies with the law and company policies.
> _______________________________________________
> Wireshark-users mailing list
> Wireshark-users@xxxxxxxxxxxxx
> http://www.wireshark.org/mailman/listinfo/wireshark-users
>
>



-- 
This information is top security. When you have read it, destroy yourself.
-- Marshall McLuhan