C
Chris Miller
I'm trying to debug a connection issue from a w2k client machine. I can
decode the server side trace data (Livingston PPP decoder), but I need
to decode the client side where the problem appears to be occurring. I
haven't found anything in the way of tools mentioned on Usenet or
Microsoft's site. Does anyone know of a tool or procedure for decoding
these traces? Here's an example from the ppp.log under c:\winnt\tracing :
[1532] 16:51:38:431: <Protocol = LCP, Type = Configure-Req, Length =
0x34, Id = 0x0, Port = 257
[1532] 16:51:38:431: <C0 21 01 00 00 32 02 06 00 00 00 00 05 06 69 AF
|.!...2........i.|
[1532] 16:51:38:431: <38 DB 07 02 08 02 0D 03 06 11 04 06 4E 13 17 01
|8...........N...|
[1532] 16:51:38:431: <77 97 5A F6 F3 71 4E 2A 9B E3 80 47 1A 83 CC 3D
|w.Z..qN*...G...=|
[1532] 16:51:38:431: <00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|................|
On the server side, I can turn this :
Received LCP_CONFIGURE_REQUEST on port S0 of 46 bytes containing:wire
bytes 50
01 01 00 32 02 06 00 00 00 00 05 06 57 99 31 35
07 02 08 02 0d 03 06 11 04 06 4e 13 17 01 fc 3d
3f 15 6d 27 41 f1 b4 f1 87 79 e2 e9 e1 70 00 00
00 00
to this using Livingston's PPP decoder :
Received LCP_CONFIGURE_REQUEST on port S0 of 46 bytes containing:wire
bytes 50
01 01 00 32 02 06 00 00 00 00 05 06 57 99 31 35 07 02 08
02 0D 03 06 11 04 06 4E 13 17 01 FC 3D 3F 15 6D 27 41
F1 B4 F1 87 79 E2 E9 E1 70 00 00 00 00
Packet Info: Code: 01, ID: 01, 50 bytes.
Async-Control-Character-Map [0x02], length: (6 bytes), [0x00000000]
Magic-Number [0x05], length: (6 bytes), [0x57993135]
Protocol-Field-Compression [0x07], length: (2 bytes)
Address-and-Control-Field-Compression [0x08], length: (2 bytes)
Callback [0x0D], length: (3 bytes), [0x06]
Multilink-MRRU [0x11], length: (4 bytes), [0x064E]
Max-Receive-Reconstructed-Unit (MRRU): 1614 bytes.
Multilink-Endpoint-Discriminator [0x13], length: (23 bytes),
[0x01FC3D3F156D2741F1B4F18779E2E9E17000000000]
Class [0x01]: Locally Assigned Address FC 3D 3F 15 6D 27 41 F1 B4 F1
87 79 E2 E9 E1 70 00 00 00 00
Unfortunately this tool doesn't help with the Microsoft traces as you
would expect. Any help is much appreciated.
Chris
decode the server side trace data (Livingston PPP decoder), but I need
to decode the client side where the problem appears to be occurring. I
haven't found anything in the way of tools mentioned on Usenet or
Microsoft's site. Does anyone know of a tool or procedure for decoding
these traces? Here's an example from the ppp.log under c:\winnt\tracing :
[1532] 16:51:38:431: <Protocol = LCP, Type = Configure-Req, Length =
0x34, Id = 0x0, Port = 257
[1532] 16:51:38:431: <C0 21 01 00 00 32 02 06 00 00 00 00 05 06 69 AF
|.!...2........i.|
[1532] 16:51:38:431: <38 DB 07 02 08 02 0D 03 06 11 04 06 4E 13 17 01
|8...........N...|
[1532] 16:51:38:431: <77 97 5A F6 F3 71 4E 2A 9B E3 80 47 1A 83 CC 3D
|w.Z..qN*...G...=|
[1532] 16:51:38:431: <00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|................|
On the server side, I can turn this :
Received LCP_CONFIGURE_REQUEST on port S0 of 46 bytes containing:wire
bytes 50
01 01 00 32 02 06 00 00 00 00 05 06 57 99 31 35
07 02 08 02 0d 03 06 11 04 06 4e 13 17 01 fc 3d
3f 15 6d 27 41 f1 b4 f1 87 79 e2 e9 e1 70 00 00
00 00
to this using Livingston's PPP decoder :
Received LCP_CONFIGURE_REQUEST on port S0 of 46 bytes containing:wire
bytes 50
01 01 00 32 02 06 00 00 00 00 05 06 57 99 31 35 07 02 08
02 0D 03 06 11 04 06 4E 13 17 01 FC 3D 3F 15 6D 27 41
F1 B4 F1 87 79 E2 E9 E1 70 00 00 00 00
Packet Info: Code: 01, ID: 01, 50 bytes.
Async-Control-Character-Map [0x02], length: (6 bytes), [0x00000000]
Magic-Number [0x05], length: (6 bytes), [0x57993135]
Protocol-Field-Compression [0x07], length: (2 bytes)
Address-and-Control-Field-Compression [0x08], length: (2 bytes)
Callback [0x0D], length: (3 bytes), [0x06]
Multilink-MRRU [0x11], length: (4 bytes), [0x064E]
Max-Receive-Reconstructed-Unit (MRRU): 1614 bytes.
Multilink-Endpoint-Discriminator [0x13], length: (23 bytes),
[0x01FC3D3F156D2741F1B4F18779E2E9E17000000000]
Class [0x01]: Locally Assigned Address FC 3D 3F 15 6D 27 41 F1 B4 F1
87 79 E2 E9 E1 70 00 00 00 00
Unfortunately this tool doesn't help with the Microsoft traces as you
would expect. Any help is much appreciated.
Chris