Embedded Packet Trace


The ZyWALL packet trace records and analyzes packets running on LAN and WAN interfaces. It is designed for users with technical backgrounds who are interested in the details of the packet flow on LAN or WAN end of ZyWALL. It is also very helpful for diagnostics if you have compatibility problems with your ISP or if you want to know the details of a packet for configuring a filter rule.

The format of the display is as following:

Packet:

 0    11880.160 ENET0-R[0062] TCP 192.168.1.2:1108->192.31.7.130:80

[index] [timer/second][channel-receive/transmit][length]  [protocol] [sourceIP/port] [destIP/port]

There are two ways to dump the trace:

  1. Online Trace--display the trace real time on screen
  2. Offline Trace--capture the trace first and display later

The details for capturing the trace in SMT menu 24.8 are as follows.

Online Trace

1. Trace LAN packet
2. Trace WAN packet

1. Trace LAN packet

1.1 Disable to capture the WAN packet by entering: sys trcp channel enet1 none
1.2 Enable to capture the LAN packet by entering: sys trcp channel enet0 bothway
1.3 Enable the trace log by entering: sys trcp sw on & sys trcl sw on
1.4 Display the brief trace online by entering: sys trcd brief
or
1.5 Display the detailed trace online by entering: sys trcd parse

Example: 

ZyWALL> sys trcp channel enet1 none
ZyWALL> sys trcp channel enet0 bothway
ZyWALL> sys trcp sw on
ZyWALL> sys trcl sw on
ZyWALL> sys trcd brief
   0    11880.160 ENET0-R[0062] TCP 192.168.1.2:1108->192.31.7.130:80
   1    11883.100 ENET0-R[0062] TCP 192.168.1.2:1108->192.31.7.130:80
   2    11883.330 ENET0-T[0058] TCP 192.31.7.130:80->192.168.1.2:1108
   3    11883.340 ENET0-R[0060] TCP 192.168.1.2:1108->192.31.7.130:80
   4    11883.340 ENET0-R[0339] TCP 192.168.1.2:1108->192.31.7.130:80
   5    11883.610 ENET0-T[0054] TCP 192.31.7.130:80->192.168.1.2:1108
   6    11883.620 ENET0-T[0102] TCP 192.31.7.130:80->192.168.1.2:1108
   7    11883.630 ENET0-T[0054] TCP 192.31.7.130:80->192.168.1.2:1108
   8    11883.630 ENET0-R[0060] TCP 192.168.1.2:1108->192.31.7.130:80
   9    11883.650 ENET0-R[0060] TCP 192.168.1.2:1108->192.31.7.130:80
  10    11883.650 ENET0-R[0062] TCP 192.168.1.2:1109->192.31.7.130:80
ZyWALL> sys trcd parse
---<0000>----------------------------------------------------------------
LAN Frame: ENET0-RECV   Size:  62/  62   Time: 12089.790 sec
Frame Type: TCP 192.168.1.2:1116->192.31.7.130:80

  Ethernet Header:
    Destination MAC Addr     = 00A0C5921311
    Source MAC Addr          = 0080C84CEA63
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x0030 (48)
    Idetification            = 0x330B (13067)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0x80 (128)
    Protocol                 = 0x06 (TCP)
    Header Checksum          = 0x3E71 (15985)
    Source IP                = 0xC0A80102 (192.168.1.2)
    Destination IP           = 0xC01F0782 (192.31.7.130)

  TCP Header:
    Source Port              = 0x045C (1116)
    Destination Port         = 0x0050 (80)
    Sequence Number          = 0x00BD15A7 (12391847)
    Ack Number               = 0x00000000 (0)
    Header Length            = 28
    Flags                    = 0x02 (....S.)
    Window Size              = 0x2000 (8192)
    Checksum                 = 0xBEC3 (48835)
    Urgent Ptr               = 0x0000 (0)
    Options                  =
        0000: 02 04 05 B4 01 01 04 02

  RAW DATA:
  0000: 00 A0 C5 92 13 11 00 80-C8 4C EA 63 08 00 45 00  .........L.c..E.
  0010: 00 30 33 0B 40 00 80 06-3E 71 C0 A8 01 02 C0 1F  .03.@...>q......
  0020: 07 82 04 5C 00 50 00 BD-15 A7 00 00 00 00 70 02  ...\.P........p.
  0030: 20 00 BE C3 00 00 02 04-05 B4 01 01 04 02         .............
---<0001>----------------------------------------------------------------
LAN Frame: ENET0-XMIT   Size:  58/  58   Time: 12090.020 sec
Frame Type: TCP 192.31.7.130:80->192.168.1.2:1116

  Ethernet Header:
    Destination MAC Addr     = 0080C84CEA63
    Source MAC Addr          = 00A0C5921311
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x002C (44)
    Idetification            = 0x57F3 (22515)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0xED (237)
    Protocol                = 0x06 (TCP)
    Header Checksum          = 0xAC8C (44172)
    Source IP                = 0xC01F0782 (192.31.7.130)
    Destination IP           = 0xC0A80102 (192.168.1.2)

  TCP Header:
    Source Port              = 0x0050 (80)
    Destination Port         = 0x045C (1116)
    Sequence Number          = 0x4AD1B57F (1255257471)
    Ack Number               = 0x00BD15A8 (12391848)
    Header Length            = 24
    Flags                    = 0x12 (.A..S.)
    Window Size              = 0xFAF0 (64240)
    Checksum                 = 0xF877 (63607)
    Urgent Ptr               = 0x0000 (0)
    Options                  =
        0000: 02 04 05 B4

  RAW DATA:
  0000: 00 80 C8 4C EA 63 00 A0-C5 92 13 11 08 00 45 00  ...L.c........E.
  0010: 00 2C 57 F3 40 00 ED 06-AC 8C C0 1F 07 82 C0 A8  .,W.@...........
  0020: 01 02 00 50 04 5C 4A D1-B5 7F 00 BD 15 A8 60 12  ...P.\J.......`.
  0030: FA F0 F8 77 00 00 02 04-05 B4                    ...w......
---<0002>----------------------------------------------------------------
LAN Frame: ENET0-RECV   Size:  60/  60   Time: 12090.210 sec
Frame Type: TCP 192.168.1.2:1116->192.31.7.130:80

  Ethernet Header:
    Destination MAC Addr     = 00A0C5921311
    Source MAC Addr          = 0080C84CEA63
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x0028 (40)
    Idetification            = 0x350B (13579)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0x80 (128)
    Protocol                 = 0x06 (TCP)
    Header Checksum          = 0x3C79 (15481)
    Source IP                = 0xC0A80102 (192.168.1.2)
    Destination IP           = 0xC01F0782 (192.31.7.130)

  TCP Header:
    Source Port              = 0x045C (1116)
    Destination Port         = 0x0050 (80)
    Sequence Number          = 0x00BD15A8 (12391848)
    Ack Number               = 0x4AD1B580 (1255257472)
    Header Length            = 20
    Flags                    = 0x10 (.A....)
    Window Size              = 0x2238 (8760)
    Checksum                 = 0xE8ED (59629)
    Urgent Ptr               = 0x0000 (0)

  TCP Data: (Length=6, Captured=6)
    0000: 20 20 20 20 20 20

  RAW DATA:
  0000: 00 A0 C5 92 13 11 00 80-C8 4C EA 63 08 00 45 00  .........L.c..E.
  0010: 00 28 35 0B 40 00 80 06-3C 79 C0 A8 01 02 C0 1F  .(5.@...<y......
  0020: 07 82 04 5C 00 50 00 BD-15 A8 4A D1 B5 80 50 10  ...\.P....J...P.
  0030: 22 38 E8 ED 00 00 20 20-20 20 20 20              "8....

2. Trace WAN packet

1.1 Disable to capture the LAN packet by entering: sys trcp channel enet0 none
1.2 Enable to capture the WAN packet by entering: sys trcp channel enet1 bothway
1.3 Enable the trace log by entering: sys trcp sw on & sys trcl sw on
1.4 Display the brief trace online by entering: sys trcd brief
or
1.5 Display the detailed trace online by entering: sys trcd parse

Example:   

ZyWALL> sys trcp channel enet0 none
ZyWALL> sys trcp channel enet1 bothway
ZyWALL> sys trcp sw on
ZyWALL> sys trcl sw on
ZyWALL> sys trcd brief
0    12367.680 ENET1-R[0070] UDP 202.132.155.95:520->202.132.155.255:520
1    12370.980 ENET1-T[0062] TCP 202.132.155.97:10261->192.31.7.130:80
2    12373.940 ENET1-T[0062] TCP 202.132.155.97:10261->192.31.7.130:80
3    12374.930 ENET1-R[0064] TCP 192.31.7.130:80->202.132.155.97:10261
4    12374.940 ENET1-T[0054] TCP 202.132.155.97:10261->192.31.7.130:80
5    12374.940 ENET1-T[0438] TCP 202.132.155.97:10261->192.31.7.130:80
6    12375.320 ENET1-R[0064] TCP 192.31.7.130:80->202.132.155.97:10261
7    12375.360 ENET1-R[0090] UDP 202.132.155.95:520->202.132.155.255:520
ZyWALL> sys trcd parse
---<0000>----------------------------------------------------------------
LAN Frame: ENET1-RECV   Size:1181/  96   Time: 12387.260 sec
Frame Type: TCP 192.31.7.130:80->202.132.155.97:10270

  Ethernet Header:
    Destination MAC Addr     = 00A0C5921312
    Source MAC Addr          = 00A0C5012345
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x048B (1163)
    Idetification            = 0xB139 (45369)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0xEE (238)
    Protocol                 = 0x06 (TCP)
    Header Checksum          = 0xA9AB (43435)
    Source IP                = 0xC01F0782 (192.31.7.130)
    Destination IP           = 0xCA849B61 (202.132.155.97)

  TCP Header:
    Source Port              = 0x0050 (80)
    Destination Port         = 0x281E (10270)
    Sequence Number          = 0xD3E95985 (3555285381)
    Ack Number               = 0x00C18F63 (12685155)
    Header Length            = 20
    Flags                    = 0x19 (.AP..F)
    Window Size              = 0xFAF0 (64240)
    Checksum                 = 0x3735 (14133)
    Urgent Ptr               = 0x0000 (0)

  TCP Data: (Length=1127, Captured=42)
  0000: DF 33 AF 62 58 37 52 3D-79 99 A5 3C 2B 59 E2 78  .3.bX7R=y..<+Y.x
  0010: A7 98 8F 3F A9 09 E4 0F-26 14 9C 58 3E 95 3E E7  ...?....&..X>.>.
  0020: FC 2A 4C 2F FB BE 2F FE-EF D0                    .*L/../...

  RAW DATA:
  0000: 00 A0 C5 92 13 12 00 A0-C5 01 23 45 08 00 45 00  ..........#E..E.
  0010: 04 8B B1 39 40 00 EE 06-A9 AB C0 1F 07 82 CA 84  ...9@...........
  0020: 9B 61 00 50 28 1E D3 E9-59 85 00 C1 8F 63 50 19  .a.P(...Y....cP.
  0030: FA F0 37 35 00 00 DF 33-AF 62 58 37 52 3D 79 99  ..75...3.bX7R=y.
  0040: A5 3C 2B 59 E2 78 A7 98-8F 3F A9 09 E4 0F 26 14  .<+Y.x...?....&.
  0050: 9C 58 3E 95 3E E7 FC 2A-4C 2F FB BE 2F FE EF D0  .X>.>..*L/../...
---<0001>----------------------------------------------------------------
LAN Frame: ENET1-XMIT   Size:  54/  54   Time: 12387.490 sec
Frame Type: TCP 202.132.155.97:10270->192.31.7.130:80

  Ethernet Header:
    Destination MAC Addr     = 00A0C5012345
    Source MAC Addr          = 00A0C5921312
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x0028 (40)
    Idetification            = 0x7A0C (31244)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0x7F (127)
    Protocol                 = 0x06 (TCP)
    Header Checksum          = 0x543C (21564)
    Source IP                = 0xCA849B61 (202.132.155.97)
    Destination IP           = 0xC01F0782 (192.31.7.130)

  TCP Header:
    Source Port              = 0x281E (10270)
    Destination Port         = 0x0050 (80)
    Sequence Number          = 0x00C18F63 (12685155)
    Ack Number               = 0xD3E95DE9 (3555286505)
    Header Length            = 20
    Flags                    = 0x10 (.A....)
    Window Size              = 0x1DD5 (7637)
    Checksum                 = 0x7A12 (31250)
    Urgent Ptr               = 0x0000 (0)

  RAW DATA:
  0000: 00 A0 C5 01 23 45 00 A0-C5 92 13 12 08 00 45 00  ....#E........E.
  0010: 00 28 7A 0C 40 00 7F 06-54 3C CA 84 9B 61 C0 1F  .(z.@...T<...a..
  0020: 07 82 28 1E 00 50 00 C1-8F 63 D3 E9 5D E9 50 10  ..(..P...c..].P.
  0030: 1D D5 7A 12 00 00                                ..z...
---<0002>----------------------------------------------------------------
LAN Frame: ENET1-XMIT   Size:  54/  54   Time: 12387.490 sec
Frame Type: TCP 202.132.155.97:10270->192.31.7.130:80

  Ethernet Header:
    Destination MAC Addr     = 00A0C5012345
    Source MAC Addr          = 00A0C5921312
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x0028 (40)
    Idetification            = 0x7B0C (31500)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0x7F (127)
    Protocol                 = 0x06 (TCP)
    Header Checksum          = 0x533C (21308)
    Source IP                = 0xCA849B61 (202.132.155.97)
    Destination IP           = 0xC01F0782 (192.31.7.130)

  TCP Header:
    Source Port              = 0x281E (10270)
    Destination Port         = 0x0050 (80)
    Sequence Number          = 0x00C18F63 (12685155)
    Ack Number               = 0xD3E95DE9 (3555286505)
    Header Length            = 20
    Flags                    = 0x11 (.A...F)
    Window Size              = 0x1DD5 (7637)
    Checksum                 = 0x7A11 (31249)
    Urgent Ptr               = 0x0000 (0)

  RAW DATA:
  0000: 00 A0 C5 01 23 45 00 A0-C5 92 13 12 08 00 45 00  ....#E........E.
  0010: 00 28 7B 0C 40 00 7F 06-53 3C CA 84 9B 61 C0 1F  .({.@...S<...a..
  0020: 07 82 28 1E 00 50 00 C1-8F 63 D3 E9 5D E9 50 11  ..(..P...c..].P.
  0030: 1D D5 7A 11 00 00                                ..z...
ZyWALL>


Offline Trace

1. Trace LAN packet
2. Trace WAN packet

1. Trace LAN packet

1.1 Disable to capture the WAN packet by entering: sys trcp channel enet1 none
1.2 Enable to capture the LAN packet by entering: sys trcp channel enet0 bothway
1.3 Enable the trace log by entering: sys trcp sw on & sys trcl sw on
1.4 Wait for packet passing through ZyWALL over LAN
1.5 Disable the trace log by entering: sys trcp sw off & sys trcl sw off
1.6 Display the trace briefly by entering: sys trcp brief
1.7 Display specific packets by using: sys trcp parse <from_index> <to_index>

Exmaple:   

ZyWALL> sys trcp channel enet1 none
ZyWALL> sys trcp channel enet0 bothway
ZyWALL> sys trcp sw on
ZyWALL> sys trcl sw on
ZyWALL> sys trcp sw off
ZyWALL> sys trcl sw off
ZyWALL> sys trcp brief
   0    10855.790 ENET0-T[0141] TCP 192.31.7.130:80->192.168.1.2:1102
   1    10855.800 ENET0-R[0060] TCP 192.168.1.2:1102->192.31.7.130:80
   2    10855.810 ENET0-R[0062] TCP 192.168.1.2:1103->192.31.7.130:80
   3    10855.840 ENET0-R[0062] TCP 192.168.1.2:1104->192.31.7.130:80
   4    10856.020 ENET0-T[0054] TCP 192.31.7.130:80->192.168.1.2:1102
   5    10856.030 ENET0-T[0058] TCP 192.31.7.130:80->192.168.1.2:1103

   6    10856.040 ENET0-R[0060] TCP 192.168.1.2:1103->192.31.7.130:80
ZyWALL> sys trcp parse 5 5
---<0005>----------------------------------------------------------------
LAN Frame: ENET0-XMIT   Size:  58/  58   Time: 10856.030 sec
Frame Type: TCP 192.31.7.130:80->192.168.1.2:1103

  Ethernet Header:
    Destination MAC Addr     = 0080C84CEA63
    Source MAC Addr          = 00A0C5921311
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x002C (44)
    Idetification            = 0x7F02 (32514)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0xED (237)
    Protocol                 = 0x06 (TCP)
    Header Checksum          = 0x857D (34173)
    Source IP                = 0xC01F0782 (192.31.7.130)
    Destination IP           = 0xC0A80102 (192.168.1.2)

  TCP Header:
    Source Port              = 0x0050 (80)
    Destination Port         = 0x044F (1103)
    Sequence Number          = 0xD91B1826 (3642431526)
    Ack Number               = 0x00AA405F (11157599)
    Header Length            = 24
    Flags                    = 0x12 (.A..S.)
    Window Size              = 0xFAF0 (64240)
    Checksum                 = 0xDCEF (56559)
    Urgent Ptr               = 0x0000 (0)
    Options                  =
        0000: 02 04 05 B4

  RAW DATA:
  0000: 00 80 C8 4C EA 63 00 A0-C5 92 13 11 08 00 45 00  ...L.c........E.
  0010: 00 2C 7F 02 40 00 ED 06-85 7D C0 1F 07 82 C0 A8  .,..@....}......
  0020: 01 02 00 50 04 4F D9 1B-18 26 00 AA 40 5F 60 12  ...P.O...&..@_`.
  0030: FA F0 DC EF 00 00 02 04-05 B4                    ..........
ZyWALL>

2. Trace WAN packet

1.1 Disable to capture the LAN packet by entering: sys trcp channel enet0 none
1.2 Enable to capture the WAN packet by entering: sys trcp channel enet1 bothway
1.3 Enable the trace log by entering: sys trcp sw on & sys trcl sw on
1.4 Wait for packet passing through ZyWALL over WAN
1.5 Disable the trace log by entering: sys trcp sw off & sys trcl sw off
1.6 Display the trace briefly by entering: sys trcp brief
1.7 Display specific packets by using: sys trcp parse <from_index> <to_index>

Example:  

ZyWALL> sys trcp channel enet0 none
ZyWALL> sys trcp channel enet1 bothway
ZyWALL> sys trcl sw on
ZyWALL> sys trcp sw on
ZyWALL> sys trcl sw off
ZyWALL> sys trcp sw off
ZyWALL> sys trcp brief
   0    12864.800 ENET1-T[0411] TCP 202.132.155.97:10278->204.217.0.2:80
   1    12864.890 ENET1-R[0247] TCP 204.217.0.2:80->202.132.155.97:10282
   2    12864.900 ENET1-T[0416] TCP 202.132.155.97:10282->204.217.0.2:80
   3    12865.120 ENET1-R[0247] TCP 204.217.0.2:80->202.132.155.97:10278
   4    12865.130 ENET1-T[0411] TCP 202.132.155.97:10278->204.217.0.2:80
   5    12865.220 ENET1-R[0247] TCP 204.217.0.2:80->202.132.155.97:10282
ZyWALL> sys trcp parse 3 4
---<0003>----------------------------------------------------------------
LAN Frame: ENET1-RECV   Size: 247/  96   Time: 12865.120 sec
Frame Type: TCP 204.217.0.2:80->202.132.155.97:10278

  Ethernet Header:
    Destination MAC Addr     = 00A0C5921312
    Source MAC Addr          = 00A0C5591284
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x00E5 (229)
    Idetification            = 0xE93B (59707)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0xF0 (240)
    Protocol                 = 0x06 (TCP)
    Header Checksum          = 0x6E15 (28181)
    Source IP                = 0xCCD90002 (204.217.0.2)
    Destination IP           = 0xCA849B61 (202.132.155.97)

  TCP Header:
    Source Port              = 0x0050 (80)
    Destination Port         = 0x2826 (10278)
    Sequence Number          = 0x4D713D8A (1299266954)
    Ack Number               = 0x00C8C015 (13156373)
    Header Length            = 20
    Flags                    = 0x18 (.AP...)
    Window Size              = 0x2238 (8760)
    Checksum                 = 0xAB57 (43863)
    Urgent Ptr               = 0x0000 (0)

  TCP Data: (Length=193, Captured=42)
  0000: 48 54 54 50 2F 31 2E 31-20 33 30 34 20 4E 6F 74  HTTP/1.1 304 Not
  0010: 20 4D 6F 64 69 66 69 65-64 0D 0A 44 61 74 65 3A   Modified..Date:
  0020: 20 57 65 64 2C 20 30 37-20 4A                     Wed, 07 J

  RAW DATA:
  0000: 00 A0 C5 92 13 12 00 A0-C5 59 12 84 08 00 45 00  .........Y....E.
  0010: 00 E5 E9 3B 40 00 F0 06-6E 15 CC D9 00 02 CA 84  ...;@...n.......
  0020: 9B 61 00 50 28 26 4D 71-3D 8A 00 C8 C0 15 50 18  .a.P(&Mq=.....P.
  0030: 22 38 AB 57 00 00 48 54-54 50 2F 31 2E 31 20 33  "8.W..HTTP/1.1 3
  0040: 30 34 20 4E 6F 74 20 4D-6F 64 69 66 69 65 64 0D  04 Not Modified.
  0050: 0A 44 61 74 65 3A 20 57-65 64 2C 20 30 37 20 4A  .Date: Wed, 07 J
---<0004>----------------------------------------------------------------
LAN Frame: ENET1-XMIT   Size: 411/  96   Time: 12865.130 sec
Frame Type: TCP 202.132.155.97:10278->204.217.0.2:80

  Ethernet Header:
    Destination MAC Addr     = 00A0C5591284
    Source MAC Addr          = 00A0C5921312
    Network Type             = 0x0800 (TCP/IP)

  IP Header:
    IP Version               = 4
    Header Length            = 20
    Type of Service          = 0x00 (0)
    Total Length             = 0x018D (397)
    Idetification            = 0xF20C (61964)
    Flags                    = 0x02
    Fragment Offset          = 0x00
    Time to Live             = 0x7F (127)
    Protocol                 = 0x06 (TCP)
    Header Checksum          = 0xD59C (54684)
    Source IP                = 0xCA849B61 (202.132.155.97)
    Destination IP           = 0xCCD90002 (204.217.0.2)

  TCP Header:
    Source Port              = 0x2826 (10278)
    Destination Port         = 0x0050 (80)
    Sequence Number          = 0x00C8C015 (13156373)
    Ack Number               = 0x4D713E47 (1299267143)
    Header Length            = 20
    Flags                    = 0x18 (.AP...)
    Window Size              = 0x1E87 (7815)
    Checksum                 = 0x4374 (17268)
    Urgent Ptr               = 0x0000 (0)

  TCP Data: (Length=357, Captured=42)
  0000: 47 45 54 20 2F 70 69 63-74 75 72 65 73 2F 6D 61  GET /pictures/ma
  0010: 67 61 7A 69 6E 65 5F 6C-6F 67 6F 2F 62 65 73 74  gazine_logo/best
  0020: 6F 66 74 69 6D 65 73 2E-67 69                    oftimes.gi

  RAW DATA:
  0000: 00 A0 C5 59 12 84 00 A0-C5 92 13 12 08 00 45 00  ...Y..........E.
  0010: 01 8D F2 0C 40 00 7F 06-D5 9C CA 84 9B 61 CC D9  ....@........a..
  0020: 00 02 28 26 00 50 00 C8-C0 15 4D 71 3E 47 50 18  ..(&.P....Mq>GP.
  0030: 1E 87 43 74 00 00 47 45-54 20 2F 70 69 63 74 75  ..Ct..GET /pictu
  0040: 72 65 73 2F 6D 61 67 61-7A 69 6E 65 5F 6C 6F 67  res/magazine_log
  0050: 6F 2F 62 65 73 74 6F 66-74 69 6D 65 73 2E 67 69  o/bestoftimes.gi
ZyWALL>
 


All contents copyright ?1999 ZyXEL Communications Corporation.