SIPp 返回错误,如“忽略非 IP{4,6} 数据包!”

发布于 2025-01-15 17:35:20 字数 810 浏览 3 评论 0原文

我正在尝试使用 rtp-nte dtmf 向 cisco 路由器播放一些音频。我 出现以下错误:

root@sipper:~# sipp -sf /root/aaravi-sip.xml -s 911 -i 10.106.106.72 -m 1 -pause_msg_ign -trace_msg -trace_shortmsg -f 1 -l 10000 -trace_err -trace_stat -trace_rtt -trace_logs -trace_screen -s 911 10.106.106.69
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!

我可以在互联网上看到一些讨论。不过貌似没人发帖 一个解决方案。我可以分享我正在使用的 pcap 文件..默认 pcaps 和 dtmf 样品工作正常。!

I am trying to play out some audio with rtp-nte dtmf to a cisco router. I
get the following error:

root@sipper:~# sipp -sf /root/aaravi-sip.xml -s 911 -i 10.106.106.72 -m 1 -pause_msg_ign -trace_msg -trace_shortmsg -f 1 -l 10000 -trace_err -trace_stat -trace_rtt -trace_logs -trace_screen -s 911 10.106.106.69
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!
Ignoring non IP{4,6} packet!

I can see some discussions on the internet. But, no one seems to have posted
a solution. I could share the pcap file I was using.. Default pcaps and dtmf
samples work fine.!

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(1

飘落散花 2025-01-22 17:35:20

SIPp 中使用的 pcap 类型应为“以太网”。但是当数据包被tcpdump或wireshark捕获时,数据包类型将是“Linux“cooked””。

可以通过以下命令检查pcap的类型

root@sipper:~# file sample.pcap
sample.pcap: extended tcpdump capture file (little-endian) - version 2.4 (Linux "cooked", capture length 262144)

可以使用以下命令将linux熟pcap转换为以太网

tcprewrite --dlt=enet -i sample.pcap -o sample-out.pcap

The type of pcap used in the SIPp should be 'Ethernet'. But when the packet is captured by tcpdump or wireshark, the packet type will 'Linux "cooked"'.

The type of pcap can be checked by the following command

root@sipper:~# file sample.pcap
sample.pcap: extended tcpdump capture file (little-endian) - version 2.4 (Linux "cooked", capture length 262144)

The linux cooked pcap can be converted to ethernet by using the following command

tcprewrite --dlt=enet -i sample.pcap -o sample-out.pcap
~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文