This is a static archive of our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

Decoding SNMP Trap HEX to OIDS? Only getting garbled text

0

Hello,

I've done a bit of searching, but I cannot seem to find an appropriate answer. I've seen wireshark displays before where you can capture on port 162 and see all the trap oids and varbinds. I'm in the process right now of writing trap definitions for an NMS suite, and need to see the trap contents, rather than hex or un-normalized trap garble.

Currently, I sent a test trap from a test box of mine, and in the "data" section of the packet capture, it displays hex on one side and some of the trap information spaced between "...." and other garbled text. How do I get wireshark to display this as a list of OID's? This is the view I have of a trap, which is basically very unhelpful alt text

asked 21 Aug '15, 10:44

James%20Newman's gravatar image

James Newman
1111
accept rate: 0%

Also, I notice that the SNMP layer of the packet is not even displayed. It's being seen as protocol 0x0800 instead of SNMP. Any idea what's going on? I'm very confused =(

I am on 1.12.7 release btw

(21 Aug '15, 11:12) James Newman

One Answer:

0

0x0800 means the frame contains an IPv4 packet. Try an SNMP sample capture from here and check if it's being displayed correctly.

answered 21 Aug '15, 11:47

Roland's gravatar image

Roland
7642415
accept rate: 13%

I tried the b6300a.cap file and it displays Protocol SNMP correctly and I can see varbinds. Any idea why my capture is not being registered as SNMP?

(21 Aug '15, 11:53) James Newman

How did you capture the traffic? Can you please post a link to the packet capture.

(21 Aug '15, 13:38) Roland