Ethereal-users: RE: [Ethereal-users] Weird Cisco packet?
Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.
From: "McNutt, Justin M." <McNuttJ@xxxxxxxxxxxx>
Date: Fri, 5 Oct 2001 18:42:34 -0500
One more time (I guess that table isn't very useful without the headers):
============================================================================
====
Topology Table
============================================================================
====
PORT IP_ADDR SEG MAC_ADDR CHASSIS BKPL LOCAL
CURSTATE
SLOT ID TYPE TYPE SEG
----------------------------------------------------------------------------
----
0 /0 128.206.95.254 0 00:04:dc:a0:98:00 75 enetFastGigEnet true
heart
beat
1 /2 128.206.95.252 281 00:80:2d:97:61:fe 48 enetFastGigEnet true
heart
beat
My apologies if the table gets mangled on its way through the Internet...
--J
> -----Original Message-----
> From: McNutt, Justin M. [mailto:McNuttJ@xxxxxxxxxxxx]
> Sent: Friday, October 05, 2001 6:40 PM
> To: 'ethereal-users@xxxxxxxxxxxx'
> Subject: RE: [Ethereal-users] Weird Cisco packet?
>
>
> One other note. "show sys topology" on the Passport showed
> these things for
> itself and 128.206.95.252:
>
> 0 /0 128.206.95.254 0 00:04:dc:a0:98:00 75
> enetFastGigEnet true
> heartbeat
> 1 /2 128.206.95.252 281 00:80:2d:97:61:fe 48
> enetFastGigEnet true
> heartbeat
>
> If anybody has any Nortel equipment, look for the file
> s5emt104.mib in the
> BayStack 450 MIBs on Nortel's site (you shouldn't have to
> have a password to
> get the MIBs). I will try to see if the stuff in these MIBs
> correlates with
> anything in this table or in the packets I captured.
>
> --J
>
> > -----Original Message-----
> > From: McNutt, Justin M. [mailto:McNuttJ@xxxxxxxxxxxx]
> > Sent: Friday, October 05, 2001 6:35 PM
> > To: 'ethereal-users@xxxxxxxxxxxx'
> > Subject: RE: [Ethereal-users] Weird Cisco packet?
> >
> >
> > It has something to do with Aironet wireless devices. I see
> > similar packets
> > on my network, and we have several of these wireless access
> > points in our
> > LAN.
> >
> > I can't seem to find any aironet MIBs anywhere, though, or we
> > might be able
> > to figure it out.
> >
> > Here are some similar things that Ethereal doesn't understand
> > (attached).
> >
> > In autotopology.bay.cap, you'll see two different L2
> multicasts to the
> > groups 01:00:81:00:01:00 (this segment) and 01:00:81:00:01:01
> > (all segments
> > in the bridged LAN). IIRC, devices that understand Bay
> > autotopology frames
> > *will* forward the :01 frames as a L2 multicast, but will
> > *not* forward the
> > :00 frames.
> >
> > I don't know how to decode the whole data portion, but there
> > are some things
> > that are recognizable to me deeper in the frames. For
> > example, the first
> > four bytes of the data payload in both type of autotopology
> > frames are the
> > IP address of the switch sending the frame. In the case
> > shown, the IP is
> > 128.206.95.252, which is the switch I connect to.
> >
> > In the :01 frames:
> >
> > If the byte at offset 0x031 is 0x41, then at offset 0x024 we
> > see the MAC
> > address of the next switch upstream +0x01. The next switch
> > upstream is a
> > Nortel Passport. Passports have different MAC's for damn
> > near everything.
> > The base MAC address of the Passport in question is
> > 00:04:DC:A0:98:00. Add
> > one and you get the MAC seen in the frames in this capture.
> This MAC
> > address is what the Passport uses as it's bridge address for
> > Spanning Tree
> > in Spanning Tree Group 1 (Passports don't do per-VLAN STP;
> > they use STG's).
> >
> > If the byte at offset 0x031 is not 0x41, then at offset 0x024
> > we see the MAC
> > address of the switch sending the frame +0x1e, which is also
> > the source MAC
> > on the frame. The way a BayStack 450 works, the MAC address
> > of the base
> > unit in a stack is used for a bunch of other things as well.
> > You add 0x1e
> > to get the MAC used for autotopology. Add 0x1f and you get
> > the MAC address
> > used by the IP stack. Even weirder is that if the switch is
> > a stand-alone
> > (not stacked with other BayStacks), all three MAC addresses
> > are simply that
> > of the unit itself (00:80:2D:97:61:E0 in this case).
> >
> > In the :00 frames:
> >
> > If the byte at offset 0x031 is 0x41, we see the MAC of the
> > Passport again at
> > 0x024.
> >
> > If the byte at offset 0x031 is not 0x41, then at 0x024 we see
> > something
> > *similar* to eth.dst of the frame, but with the bytes in
> > reverse order, and
> > with the 81 byte as 18 instead. Could be coincidence since I
> > don't *really*
> > know what any of these fields are.
> >
> > I really oughta go into our test lab and compare these to
> > what I get from
> > other Nortel switches and what I get if I change STP settings, etc.
> >
> > Does anybody have any other info about these frames?
> >
> > --J
> >
> > > -----Original Message-----
> > > From: Joe Tomasone [mailto:joe@xxxxxxxx]
> > > Sent: Friday, October 05, 2001 2:59 PM
> > > To: ethereal-users@xxxxxxxxxxxx
> > > Subject: [Ethereal-users] Weird Cisco packet?
> > >
> > >
> > > Anyone know what this packet is?
> > >
> > > Looks like some funky Cisco thing, since the source MAC is
> > > embedded in the
> > > data portion.
> > > Whatever it is, Ethereal didn't know what to do with it.
> > >
> > >
> > > - Joe
> > >
> > >
> >
> >
>
> _______________________________________________
> Ethereal-users mailing list
> Ethereal-users@xxxxxxxxxxxx
> http://www.ethereal.com/mailman/listinfo/ethereal-users
>
- Prev by Date: RE: [Ethereal-users] Weird Cisco packet?
- Next by Date: RE: [Ethereal-users] Weird Cisco packet?
- Previous by thread: RE: [Ethereal-users] Weird Cisco packet?
- Next by thread: RE: [Ethereal-users] Weird Cisco packet?
- Index(es):





