You can edit the 'K12 Protocols' table from Preferences->Protocols->K12xx
Click on preferences . expand the protoocols tree. scroll down until K12xx click on K12xx click on [Edit Table...] In the protocols table, click [New] to create a new binding a "new" window will open in "match" you put a unique part of the stack file e.g.: "v34_telcel_2" in "protocol" you have to write the lowest layer protocol in the file ( "eth_withoutfcs" for ethernet, "mtp2" for mtp2, "x25" for X.25, "fr" for frame-relay ). BTW: If you have files containing X.25 or ANSI MTP2 I'd really appreciate if you sent me a small one (of each), I have neither X25 nor MTP2 ANSI files and that'd be good for testing. Luis On 8/15/07, Segura, Miguel - Acision <[EMAIL PROTECTED]> wrote: > > > > > Hello, > > > > I tried to view rf5 files on wireshark and I got the following: > > > > > > > > > > The question is how can I edit the k12 protocols table in order to be able to > view the packets properly? > > > > In this packets there are some smpp packets that I would like to see. > > > > Any advices will be appreciated. > > > > Kind Regards, > > Miguel Segura > Senior Operations Engineer > ________________________________________ > > Acision. Innovation. Assured. > www.acision.com > > 6404 International Parkway, Suite 2048 > Plano, TX 75204 > T: +52 55 5254 4718 > M: +52 155 1798 6674 > E: [EMAIL PROTECTED] > > > > > > > > This e-mail and any attachment is for authorised use by the intended > recipient(s) only. This email contains confidential information. It should > not be copied, disclosed to, retained or used by, any party other than the > intended recipient. Any unauthorised distribution, dissemination or copying > of this E-mail or its attachments, and/or any use of any information > contained in them, is strictly prohibited and may be illegal. If you are not > an intended recipient then please promptly delete this e-mail and any > attachment and all copies and inform the sender directly via email. Any > emails that you send to us may be monitored by systems or persons other than > the named communicant for the purposes of ascertaining whether the > communication complies with the law and company policies. > _______________________________________________ > Wireshark-users mailing list > Wireshark-users@wireshark.org > http://www.wireshark.org/mailman/listinfo/wireshark-users > > -- This information is top security. When you have read it, destroy yourself. -- Marshall McLuhan _______________________________________________ Wireshark-users mailing list Wireshark-users@wireshark.org http://www.wireshark.org/mailman/listinfo/wireshark-users