On Monday 23 April 2007, James Knott wrote:
>
> Ethereal (now known as Wire Shark) will let you examine the packets, to
> see what they are, along with addresses etc.  It's included with SUSE,
> but I don't think it's installed by default.

Well, that showed one of these every three seconds:
__________________________________________________

No.     Time        Source                Destination           Protocol Info
      1 0.000000    00:18:4d:56:c1:c8     Micro-St_9b:06:2c     LLC      I, 
N(R)=0, N(S)=0; DSAP NULL LSAP Individual, SSAP NULL LSAP Command

Frame 1 (1490 bytes on wire, 1490 bytes captured)
IEEE 802.3 Ethernet 
    Destination: Micro-St_9b:06:2c (00:11:09:9b:06:2c)
    Source: 00:18:4d:56:c1:c8 (00:18:4d:56:c1:c8)
    Length: 1476
Logical-Link Control
    DSAP: NULL LSAP (0x00)
    IG Bit: Individual
    SSAP: NULL LSAP (0x00)
    CR Bit: Command
    Control field: I, N(R)=0, N(S)=0 (0x0000)
Data (1472 bytes)
_____________________________________________________

Further investigation shows that the source MAC address belongs to a wired 
port on the wireless access point. When this laptop is on a wire the traffic 
doesn't occur, but when on wireless it is there. Any suggestions as to what 
it is and maybe how to stop it. The AP is a Netgear WPN824v2.

Dylan
-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to