This is a static archive of our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

Ethernet packets with no L2 information when using Cisco Embedded Packet Capture

0

Odd activity identified and a packet capture performed in which the packets had not L2 information with minimal L3 information. I was not aware that such a packet would be allowed to traverse ethernet switches. The unit was sending approximately 5,000,000 packets at a rate of 30,000pps within 3 minutes and repeating at a very regular interval of every 30 minutes.

Has anyone observed the type of behavior?

asked 20 Feb '14, 11:19

Bolton's gravatar image

Bolton
11112
accept rate: 0%

edited 26 Feb '14, 12:44

Guy%20Harris's gravatar image

Guy Harris ♦♦
17.4k335196

I am not familiar with RAW IP. If this is the case, any links to relevant documents would be appreciated.

(20 Feb '14, 11:35) Bolton

and a packet capture performed in which the packets had not L2 information

On which operating system did you do this capture, and what was the name of the network interface on which you captured it? The capture mechanisms libpcap and WinPcap use (those are the libraries used by Wireshark to capture traffic) sometimes supply packets without L2 headers, even if the packets had L2 headers when they arrived from the network.

(20 Feb '14, 16:13) Guy Harris ♦♦

Using Cisco Embedded Packet Capture (EPC) feature. The capture was performed via a Cisco 2911 capturing all IP CEF packets traversing the interface for L2 (ip subnet) connectivity, in this case it was BVI10 that is L2 bridged to Gi0/0.

(25 Feb '14, 14:02) Bolton

Can you post a small sample file somewhere (Google drive, dropbox, etc.)?

(26 Feb '14, 11:08) Kurt Knochner ♦

FYI:
I have captured MANY conversations via the EPC function of Cisco routers over the past several years and it does capture all data on the wire.

I have seen hundreds of captures during my 20+ years of application troubleshooting via Sniffer, Protocol Expert and Wireshark and this is the first I have ever observed RAW IP.

One other odd behavior, that may be a limitation of Cisco EPC, is that the timestamps are "similar" 1 - 9 are .722398 10-20 are .726398 21-31 are .730398 32-42 are .734398 etc... through .xxx387 to .xxx396 to .xxx404 and so on.

(26 Feb '14, 11:54) Bolton

Can you post a small sample file somewhere?

(26 Feb '14, 12:01) Kurt Knochner ♦
(26 Feb '14, 12:02) Bolton

I have captured MANY conversations via the EPC function of Cisco routers over the past several years and it does capture all data on the wire.

Maybe you never before this happened to do the capture under the conditions in which a Cisco box writes out a LINKTYPE_RAWIP/DLT_RAW capture rather than, for example, a LINKTYPE_ETHERNET/DLT_EN10MB capture.

I have seen hundreds of captures during my 20+ years of application troubleshooting via Sniffer, Protocol Expert and Wireshark and this is the first I have ever observed RAW IP.

It's not a common link-layer header type, but it's existed for at least a couple of decades.

In any case, this is NOT a Wireshark issue:

  • the standard UN*X file command reports that it's a raw IP capture:

    $ file Lancaster201402201017.cap Lancaster201402201017.cap: tcpdump capture file (big-endian) - version 2.4 (raw IP, capture length 1518)

  • tcpdump reports that it's a "raw IP" capture and doesn't show any link-layer information:

    $ tcpdump -e -n -r Lancaster201402201017.cap | head reading from file Lancaster201402201017.cap, link-type RAW (Raw IP) 08:14:17.722398 ip: 10.74.96.188.20 > 0.0.0.1.0: Flags [.E], ack 0, win 15012, length 0 08:14:17.722398 ip: 10.74.96.188.20 > 0.0.0.1.0: Flags [.E], ack 1, win 15012, length 0

  • Wireshark is just processing what it's been handed.

So, again, as I said in my answer, you will have to ask Cisco why it's not putting the link-layer information out in this particular situation.

(26 Feb '14, 12:12) Guy Harris ♦♦
showing 5 of 8 show 3 more comments

One Answer:

0

I guess that feature strips off the link-layer header, and supplies packets that begin with the IP header; you'll need to ask Cisco whether there's any way not to do so. ("RAW IP" refers to the pcap/pcap-ng link-layer header type that's used when there are no link-layer headers and the packet begins with the IP header.)

answered 25 Feb '14, 17:25

Guy%20Harris's gravatar image

Guy Harris ♦♦
17.4k335196
accept rate: 19%