summaryrefslogtreecommitdiff
path: root/wka.tmpl
diff options
context:
space:
mode:
authorJörg Mayer <jmayer@loplof.de>2006-01-05 08:33:53 +0000
committerJörg Mayer <jmayer@loplof.de>2006-01-05 08:33:53 +0000
commit3f8354909c4cd322b3bd0b704910cdaba199a615 (patch)
treeb951fd16270e9c8e81c368d434d81966400cbc22 /wka.tmpl
parent131241e40a14f750cea073380a4913bd2008b701 (diff)
downloadwireshark-3f8354909c4cd322b3bd0b704910cdaba199a615.tar.gz
Jaap Keuter:
I've captured a Direct Cable Connection on a WinXP machine (see http://wiki.ethereal.com/SampleCaptures?action=AttachFile&do=get&target=PPP-config.cap). The thing is that the capture lib(?) creates fake Ethernet headers for the PPP LCP and NCP packets. These contain " SEND#" or " RECV#" as both source and destination address, where "#" seems to be a session number based on modem control signals(?). Anyway, to make more sense of the direction these PPP frames are going I've added them to the address resolution file, as per attached patch. svn path=/trunk/; revision=16949
Diffstat (limited to 'wka.tmpl')
-rw-r--r--wka.tmpl2
1 files changed, 2 insertions, 0 deletions
diff --git a/wka.tmpl b/wka.tmpl
index 4e32a372eb..8a002e7247 100644
--- a/wka.tmpl
+++ b/wka.tmpl
@@ -190,6 +190,8 @@
09-00-87-90-FF-FF Xyplex-Terminal-Servers
0C-00-0C-00-00/40 ISL-Frame
0D-1E-15-BA-DD-06 HP
+20-52-45-43-56-00/40 Receive
+20-53-45-4E-44-00/40 Send
33-33-00-00-00-00/16 IPv6-Neighbor-Discovery
AA-00-03-00-00-00/32 DEC-UNA
AA-00-03-01-00-00/32 DEC-PROM-AA