I have the packet that gives the wrong informations but i don’t know how to do 
a dump raw…
Maybe you can understand this ?

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

        
Jean-Laurent Ivars 
Responsable Technique | Technical Manager
22, rue Robert - 13007 Marseille 
Mobile: 06.52.60.86.47 - Tel: 09 84 56 64 30 - Fax: 09 89 56 64 30 
Linkedin <http://fr.linkedin.com/in/jlivars/>   |  Viadeo 
<http://www.viadeo.com/fr/profile/jean-laurent.ivars>   |  www.ipgenius.fr 
<http://www.ipgenius.fr/>
> Le 24 nov. 2014 à 14:32, Espen Johansen <pfse...@gmail.com> a écrit :
> 
> Grab the packet containing the dhcp request/reply that breaks the win7 
> client. Wireshark will help you analyze this properly. Sorry, cant help you 
> more then that. 
> Feel free to post a raw dump of the packets that breaks win7 and I'll take a 
> look.
> 
> -lsf
> 
> 24. nov. 2014 14:21 skrev "Jean-Laurent Ivars" <jl.iv...@ipgenius.fr 
> <mailto:jl.iv...@ipgenius.fr>> følgende:
> i’m so sorry but i don’t see the answer…
> 
> 1. I put off 252 option from dhcp server
> 2. I made ipconfig /renew on the host then check the settings where corrects
> 3. launch i.e. then press random buttons, the close
> 4. i made ipconfig /all and can see parameter are back to bad ones
> 
> If you can understand pore than me, please tell me witch line answer to the 
> question…
> 
> [2.1.5-RELEASE][r...@toto.tutu.fr <mailto:r...@toto.tutu.fr>]/root(5): 
> tcpdump -i vtnet1 | grep -v ARP
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on vtnet1, link-type EN10MB (Ethernet), capture size 96 bytes
> 14:09:24.779450 IP IPG1.tutu.local.bootpc > firewall.ipgenius.fr.bootps: 
> BOOTP/DHCP, Request from ee:b4:77:12:46:40 (oui Unknown), length 300
> 14:09:24.779680 IP firewall.ipgenius.fr.bootps > IPG1.tutu.local.bootpc: 
> BOOTP/DHCP, Reply, length 300
> 14:09:24.782818 IP IPG1.tutu.local > all-routers.mcast.net 
> <http://all-routers.mcast.net/>: igmp leave 224.0.0.252
> 14:09:24.785573 IP IPG1.tutu.local > all-routers.mcast.net 
> <http://all-routers.mcast.net/>: igmp leave 224.0.0.252
> 14:09:24.788170 IP6 fe80::a8c6:c004:d018:251.49580 > ff02::1:3.5355: UDP, 
> length 25
> 14:09:24.788446 IP IPG1.tutu.local.61967 > 224.0.0.252.5355: UDP, length 25
> 14:09:24.896913 IP6 fe80::a8c6:c004:d018:251.49580 > ff02::1:3.5355: UDP, 
> length 25
> 14:09:24.896944 IP IPG1.tutu.local.61967 > 224.0.0.252.5355: UDP, length 25
> 14:09:42.189605 IP IPG1.tutu.local.59770 > 
> google-public-dns-b.google.com.domain: 61225+ A? www.google.fr 
> <http://www.google.fr/>. (31)
> 14:09:42.194543 IP google-public-dns-b.google.com.domain > 
> IPG1.tutu.local.59770: 61225 3/0/0 A 173.194.41.55,[|domain]
> 14:09:42.378885 IP IPG1.tutu.local.56421 > 
> google-public-dns-b.google.com.domain: 49131+ A? wpad.tutu.local. (33)
> 14:09:42.381022 IP IPG1.tutu.local.bootpc > 255.255.255.255.bootps: 
> BOOTP/DHCP, Request from ee:b4:77:12:46:40 (oui Unknown), length 300
> 14:09:42.381247 IP firewall.ipgenius.fr.bootps > IPG1.tutu.local.bootpc: 
> BOOTP/DHCP, Reply, length 300
> 14:09:42.398465 IP IPG1.tutu.local.54954 > 
> google-public-dns-b.google.com.domain: 20328+ A? ssl.gstatic.com 
> <http://ssl.gstatic.com/>. (33)
> 14:09:42.398756 IP IPG1.tutu.local.55282 > 
> google-public-dns-b.google.com.domain: 34794+ A? www.google.com 
> <http://www.google.com/>. (32)
> 14:09:42.399292 IP IPG1.tutu.local.62442 > 
> google-public-dns-b.google.com.domain: 56847+ A? www.gstatic.com 
> <http://www.gstatic.com/>. (33)
> 14:09:42.400054 IP IPG1.tutu.local.58409 > 
> google-public-dns-b.google.com.domain: 50690+ A? apis.google.com 
> <http://apis.google.com/>. (33)
> 14:09:42.402225 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [S], seq 1887194521, win 8192, options [mss 1460,nop,wscale 
> 2,nop,nop,sackOK], length 0
> 14:09:42.403387 IP google-public-dns-b.google.com.domain > 
> IPG1.tutu.local.54954: 20328 2/0/0 A 74.125.133.94, (65)
> 14:09:42.403728 IP google-public-dns-b.google.com.domain > 
> IPG1.tutu.local.55282: 34794 6/0/0 A 74.125.71.106,[|domain]
> 14:09:42.404148 IP google-public-dns-b.google.com.domain > 
> IPG1.tutu.local.62442: 56847 4/0/0 A 173.194.41.55,[|domain]
> 14:09:42.404959 IP google-public-dns-b.google.com.domain > 
> IPG1.tutu.local.58409: 50690 7/0/0 CNAME plus.l.google.com 
> <http://plus.l.google.com/>.[|domain]
> 14:09:42.414079 IP google-public-dns-b.google.com.domain > 
> IPG1.tutu.local.56421: 49131 NXDomain 0/1/0 (108)
> 14:09:42.414202 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [S.], seq 888602616, ack 1887194522, win 42900, options [mss 
> 1430,nop,nop,sackOK,nop,wscale 7], length 0
> 14:09:42.414342 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 1, win 32890, length 0
> 14:09:42.415316 IP6 fe80::a8c6:c004:d018:251.52455 > ff02::1:3.5355: UDP, 
> length 22
> 14:09:42.415485 IP IPG1.tutu.local.63116 > 224.0.0.252.5355: UDP, length 22
> 14:09:42.424547 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 1, win 32890, length 180
> 14:09:42.436564 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 181, win 344, length 0
> 14:09:42.436780 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 181, win 344, length 1430
> 14:09:42.436886 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 181, win 344, length 1430
> 14:09:42.436926 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 181, win 344, length 1067
> 14:09:42.436970 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 1431, win 32890, length 0
> 14:09:42.437006 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 3928, win 32890, length 0
> 14:09:42.443820 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 3928, win 32890, length 126
> 14:09:42.455955 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 307, win 344, length 51
> 14:09:42.456626 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 3979, win 32877, length 0
> 14:09:42.484097 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 3979, win 32877, length 548
> 14:09:42.521885 IP6 fe80::a8c6:c004:d018:251.52455 > ff02::1:3.5355: UDP, 
> length 22
> 14:09:42.521912 IP IPG1.tutu.local.63116 > 224.0.0.252.5355: UDP, length 22
> 14:09:42.535970 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 0
> 14:09:42.573992 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 855, win 353, length 1416
> 14:09:42.574084 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.574115 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 855, win 353, length 1402
> 14:09:42.574174 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.574199 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.574217 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.574249 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 855, win 353, length 1374
> 14:09:42.574270 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.574302 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.574322 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.574382 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 5395, win 32890, length 0
> 14:09:42.574414 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 8227, win 32890, length 0
> 14:09:42.574448 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 11087, win 32890, length 0
> 14:09:42.574476 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 13891, win 32890, length 0
> 14:09:42.574517 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 16751, win 32175, length 0
> 14:09:42.574564 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 18181, win 31817, length 0
> 14:09:42.576036 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 18181, win 32890, length 0
> 14:09:42.586323 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586426 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 19611, win 32890, length 0
> 14:09:42.586584 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586618 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586666 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586689 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586711 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586741 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586773 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 855, win 353, length 1430
> 14:09:42.586797 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586817 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586854 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586878 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586906 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 855, win 353, length 1430
> 14:09:42.586932 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 855, win 353, length 1039
> 14:09:42.586988 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 22471, win 32890, length 0
> 14:09:42.587024 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 25331, win 32890, length 0
> 14:09:42.587068 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 28191, win 32532, length 0
> 14:09:42.587108 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 31051, win 31817, length 0
> 14:09:42.587147 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 32481, win 31460, length 0
> 14:09:42.587187 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 35341, win 30745, length 0
> 14:09:42.587228 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 37810, win 30127, length 0
> 14:09:42.681305 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 37810, win 30995, length 0
> 14:09:42.681383 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 37810, win 32890, length 0
> 14:09:42.725225 IP IPG1.tutu.local.netbios-ns > 192.168.254.255.netbios-ns: 
> NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
> 14:09:42.883913 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 37810, win 32890, length 1130
> 14:09:42.893028 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [S], seq 3004206825, win 8192, options [mss 1460,nop,wscale 
> 2,nop,nop,sackOK], length 0
> 14:09:42.895926 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [.], ack 1985, win 370, length 0
> 14:09:42.905107 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [S.], seq 3703826050, ack 3004206826, win 42900, options [mss 
> 1430,nop,nop,sackOK,nop,wscale 7], length 0
> 14:09:42.905255 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 1, win 32890, length 0
> 14:09:42.905482 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 1, win 32890, length 212
> 14:09:42.905756 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 1985, win 370, length 264
> 14:09:42.905891 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 38074, win 32824, length 0
> 14:09:42.906056 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 38074, win 32824, length 1017
> 14:09:42.917462 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 213, win 344, length 0
> 14:09:42.918605 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 213, win 344, length 1430
> 14:09:42.918687 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 213, win 344, length 1430
> 14:09:42.918713 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 213, win 344, length 1067
> 14:09:42.918789 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 1431, win 32890, length 0
> 14:09:42.918809 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 3928, win 32890, length 0
> 14:09:42.925292 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 3928, win 32890, length 126
> 14:09:42.926639 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 3002, win 388, length 264
> 14:09:42.926762 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 38338, win 32758, length 0
> 14:09:42.937551 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 339, win 344, length 51
> 14:09:42.937663 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 3979, win 32877, length 0
> 14:09:43.474994 IP IPG1.tutu.local.netbios-ns > 192.168.254.255.netbios-ns: 
> NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
> 14:09:44.225166 IP IPG1.tutu.local.netbios-ns > 192.168.254.255.netbios-ns: 
> NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
> 14:09:44.233400 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 38338, win 32758, length 791
> 14:09:44.263686 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 3793, win 406, length 990
> 14:09:44.263873 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 39328, win 32890, length 0
> 14:09:44.265555 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 3793, win 406, length 161
> 14:09:44.265662 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 39489, win 32849, length 0
> 14:09:44.314781 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 39489, win 32849, length 666
> 14:09:44.336461 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 4459, win 423, length 264
> 14:09:44.336636 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 39753, win 32783, length 0
> 14:09:44.339474 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 39753, win 32783, length 793
> 14:09:44.370144 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49184: 
> Flags [P.], ack 5252, win 441, length 838
> 14:09:44.370298 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 40591, win 32574, length 0
> 14:09:44.471118 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 3979, win 32877, length 794
> 14:09:44.500381 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1133, win 356, length 912
> 14:09:44.500545 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 4891, win 32649, length 0
> 14:09:44.502196 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1133, win 356, length 139
> 14:09:44.502338 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 5030, win 32614, length 0
> 14:09:44.624278 IP IPG1.tutu.local.49184 > par03s14-in-f23.1e100.net.https: 
> Flags [R.], seq 5252, ack 40591, win 0, length 0
> 14:09:44.625506 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 5030, win 32614, length 849
> 14:09:44.676831 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 1982, win 370, length 0
> 14:09:44.704497 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 1416
> 14:09:44.704534 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 234
> 14:09:44.704679 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 6680, win 32890, length 0
> 14:09:45.126141 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 1416
> 14:09:45.126177 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 1982, win 370, length 1430
> 14:09:45.126229 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 1402
> 14:09:45.126254 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 1982, win 370, length 1430
> 14:09:45.126280 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 1982, win 370, length 1430
> 14:09:45.126314 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 1388
> 14:09:45.126341 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 396
> 14:09:45.126445 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 9526, win 32890, length 0
> 14:09:45.126485 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 10928, win 32539, length 0
> 14:09:45.126536 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 13788, win 32890, length 0
> 14:09:45.126591 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 15176, win 32543, length 0
> 14:09:45.126636 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 15572, win 32890, length 0
> 14:09:45.137694 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 1416
> 14:09:45.137841 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 16988, win 32536, length 0
> 14:09:45.138466 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 1982, win 370, length 1430
> 14:09:45.138508 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 1275
> 14:09:45.138614 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 19693, win 32890, length 0
> 14:09:45.145145 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [P.], ack 1982, win 370, length 239
> 14:09:45.145281 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [.], ack 19932, win 32830, length 0
> 14:09:45.212081 IP IPG1.tutu.local.49185 > par03s14-in-f23.1e100.net.https: 
> Flags [P.], ack 19932, win 32830, length 1143
> 14:09:45.224186 IP par03s14-in-f23.1e100.net.https > IPG1.tutu.local.49185: 
> Flags [.], ack 3125, win 388, length 0
> ^C190 packets captured
> 190 packets received by filter
> 0 packets dropped by kernel
> 
>       
> Jean-Laurent Ivars 
> Responsable Technique | Technical Manager
> 22, rue Robert - 13007 Marseille 
> Mobile: 06.52.60.86.47 - Tel: 09 84 56 64 30 - Fax: 09 89 56 64 30 
> Linkedin <http://fr.linkedin.com/in/jlivars/>   |  Viadeo 
> <http://www.viadeo.com/fr/profile/jean-laurent.ivars>   |  www.ipgenius.fr 
> <http://www.ipgenius.fr/>
>> Le 24 nov. 2014 à 13:56, Espen Johansen <pfse...@gmail.com 
>> <mailto:pfse...@gmail.com>> a écrit :
>> 
>> Tcpdump and you will know the answer to that.
>> 
>> 24. nov. 2014 13:35 skrev "Jean-Laurent Ivars" <jl.iv...@ipgenius.fr 
>> <mailto:jl.iv...@ipgenius.fr>> følgende:
>> Well thank you for your answer, this is exactly the same result that when i 
>> set the option 252 with null parameters in the DHCP 
>> (WindowsProxyAutodiscoveryDetection)
>> 
>> But this is workaround, the real question is why the dhcp server is not 
>> providing the rights settings ?
>> 
>> 
>> Jean-Laurent Ivars
>> Responsable Technique | Technical Manager
>> 22, rue Robert - 13007 Marseille
>> Mobile: 06.52.60.86.47 - Tel: 09 84 56 64 30 - Fax: 09 89 56 64 30
>> Linkedin   |  Viadeo   |  www.ipgenius.fr <http://www.ipgenius.fr/>
>> 
>> > Le 24 nov. 2014 à 13:24, Doug Lytle <supp...@drdos.info 
>> > <mailto:supp...@drdos.info>> a écrit :
>> >
>> >>> What happens (only for the win7 hosts, other are perfects, bad win7 
>> >>> nasty nasty) after a few second, and especially when you launch i.e. 
>> >>> win7 seem to make some kind of new dhcp request
>> >
>> > Just a hunch,
>> >
>> > On the Windows 7 machine, go into Control Panel => Internet Options => 
>> > Connections Tab => Lan Settings
>> >
>> > Uncheck 'Automatically Detect Settings'
>> >
>> > Doug
>> > _______________________________________________
>> > List mailing list
>> > List@lists.pfsense.org <mailto:List@lists.pfsense.org>
>> > https://lists.pfsense.org/mailman/listinfo/list 
>> > <https://lists.pfsense.org/mailman/listinfo/list>
>> 
>> 
>> _______________________________________________
>> List mailing list
>> List@lists.pfsense.org <mailto:List@lists.pfsense.org>
>> https://lists.pfsense.org/mailman/listinfo/list 
>> <https://lists.pfsense.org/mailman/listinfo/list>_______________________________________________
>> List mailing list
>> List@lists.pfsense.org <mailto:List@lists.pfsense.org>
>> https://lists.pfsense.org/mailman/listinfo/list 
>> <https://lists.pfsense.org/mailman/listinfo/list>
> 
> _______________________________________________
> List mailing list
> List@lists.pfsense.org <mailto:List@lists.pfsense.org>
> https://lists.pfsense.org/mailman/listinfo/list 
> <https://lists.pfsense.org/mailman/listinfo/list>
> _______________________________________________
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list

_______________________________________________
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Reply via email to