Just wondering if you had an answer on whether this was a bug or not.
Maybe you missed the response to your questions from my colleague
Georgiy.  I've include it below.

Thanks,
David Maltby

        -----Original Message-----
        From: Zhytar, Georgiy 
        Sent: Friday, April 17, 2009 4:02 AM
        To: [email protected]
        Cc: Maltby, David
        Subject: RE: [Ntop-dev] IPFIX generated traffic from nProbe

        Hi,

        Here is command line: 
        nprobe /c -i 1 -n 10.140.2.53:2055 -V 10 -b 2 -s 5 -l 5 -u 1 -Q
2 -T "%IPV4_SRC_ADDR %  IPV4_DST_ADDR %IPV4_NEXT_HOP %INPUT_SNMP
%OUTPUT_SNMP %IN_PKTS %IN_BYTES %OUT_PKTS %OUT_BYTES %FIRST_SWITCHED
%LAST_SWITCHED %L4_SRC_PORT %L4_DST_PORT %TCP_FLAGS %PROTOCOL %SRC_TOS
%SRC_AS %DST_AS %SRC_MASK %DST_MASK" -U 777

        WireShark version 1.1.3 shows that flows as IPFIX partial flow
(254/1) where 254 - expected length, 1-length in a header.

        Thanks for your collaboration!

        Georgiy Zhytar

-----Original Message-----
From: [email protected] [mailto:[email protected]] On
Behalf Of Luca Deri
Sent: Thursday, April 16, 2009 6:17 PM
To: [email protected]
Subject: Re: [Ntop-dev] IPFIX generated traffic from nProbe

David
I need to look at the issue:
- What command line arguments you passed to nprobe in your test?
- what wireshark version are you using?

Luca

On Apr 17, 2009, at 1:10 AM, Maltby, David wrote:

> Hi,
> My company is considering buying "nProbe 5.x [Win32]" because of its  
> ability to generate IPFIX traffic.  We downloaded the demo version  
> and took a packet capture of the traffic.  The flow headers  
> indicated version 10, as expected, but the Length field in the flow  
> header is reporting the number of FlowSets (like was done in NetFlow  
> Version 9).
>
> The RFC
(http://www.ietf.org/internet-drafts/draft-ietf-ipfix-file-03.txt 
> ) indicates:
>
>    1.  Search for the first occurrence of the octet string 0x00,  
> 0x0A (the IPFIX Message Header Version field)
>
>    2.  Treat this field as the beginning of a candidate IPFIX  
> Message.  Read the two bytes following the Version field as a  
> Message Length, and seek to that offset from the beginning of the  
> candidate IPFIX Message.
>
> Also, Wireshark is unable to decode the IPFIX packets, until I  
> manually modify a packet so that it is the message length.  So, I  
> guess my question is, is this a bug or intended behavior?
>
>
>
> Thanks,
>
> David
>
>
>
>
>
>
>
> _______________________________________________
> Ntop-dev mailing list
> [email protected]
> http://listgateway.unipi.it/mailman/listinfo/ntop-dev

_______________________________________________
Ntop-dev mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop-dev
_______________________________________________
Ntop-dev mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop-dev

Reply via email to