Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 7496] Cant parse VNTAGGED frames correctly (opcode 8926) w

Date: Mon, 23 Jul 2012 07:16:39 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7496

Jakub Zawadzki <darkjames-ws@xxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |darkjames-ws@xxxxxxxxxxxx

--- Comment #3 from Jakub Zawadzki <darkjames-ws@xxxxxxxxxxxx> 2012-07-23 07:16:39 PDT ---
Commited stub dissector in r43928.

I couldn't find any official (cisco) specifcation of VNTAG.
I found some links which might help to develop dissector:
 -
http://www.definethecloud.net/access-layer-network-virtualization-vn-tag-and-vepa
 - http://hg.secdev.org/scapy-com/rev/37acec891993

But in your attached sample file other fields of VNTAG header are 0s.

Anyway commited dissector seems to work. 
After VNTAG header there's vlan header and later testing (ip.proto=253) IP
traffic from 1.1.1.1 to 1.1.1.2 and IP header checksum are correct.


Keeping this bug open just, maybe someone want to improve it.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.