On Monday 23 April 2007, James Knott wrote:
>
> Ethereal (now known as Wire Shark) will let you examine the packets, to
> see what they are, along with addresses etc. It's included with SUSE,
> but I don't think it's installed by default.
Well, that showed one of these every three seconds:
__________________________________________________
No. Time Source Destination Protocol Info
1 0.000000 00:18:4d:56:c1:c8 Micro-St_9b:06:2c LLC I,
N(R)=0, N(S)=0; DSAP NULL LSAP Individual, SSAP NULL LSAP Command
Frame 1 (1490 bytes on wire, 1490 bytes captured)
IEEE 802.3 Ethernet
Destination: Micro-St_9b:06:2c (00:11:09:9b:06:2c)
Source: 00:18:4d:56:c1:c8 (00:18:4d:56:c1:c8)
Length: 1476
Logical-Link Control
DSAP: NULL LSAP (0x00)
IG Bit: Individual
SSAP: NULL LSAP (0x00)
CR Bit: Command
Control field: I, N(R)=0, N(S)=0 (0x0000)
Data (1472 bytes)
_____________________________________________________
Further investigation shows that the source MAC address belongs to a wired
port on the wireless access point. When this laptop is on a wire the traffic
doesn't occur, but when on wireless it is there. Any suggestions as to what
it is and maybe how to stop it. The AP is a Netgear WPN824v2.
Dylan
--
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]