TCP Dscp class of the packet

What is the dscp class of this packet or tos number ?


0021 563e 9cc3 748e f82a 3500 0800 4500  .!V>..t..*5...E.
0030 9722 4000 7506 76d0 464c 2b4b 257b  .0."@.u.v.FL+K%{
60c3 280a 0050 ffc8 696a 97fc 455b 7002  `.(..P..ij..E[p.
2000 fc64 0000 0204 05b4 0101 0402        ..d..........

Open in new window

3XLcomAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Ernie BeekExpertCommented:
Let's see:

Packet Info:
    Packet Number:                      000001
    Packet Length:                      67
    Captured Length:                    63
    Delta Time                          0.100000 Second
Ethernet Type II                        [0/14]
    Destination Address:                00:21:56:3E:9C:C3  [0/6]
    Source Address:                     74:8E:F8:2A:35:00  [6/6]
    Protocol:                           0x0800  (Internet IP(IPv4))  [12/2]
IP - Internet Protocol                  [14/20]
    Version                             4  [14/1]  0x00F0
    Header Length                       5  (20 Bytes)  [14/1]  0x000F
    Differentiated Services Field       0000 0000  [15/1]  0x00FF
        Differentiated Services Codepoint0000 00..  [15/1]  0x00FC
        Transport Protocol will ignore the CE bit.... ..0.  (Ignore)  [15/1]  0x0002
        Congestion                      .... ...0  (No Congestion)  [15/1]  0x0001
    Total Length                        48  (48 Bytes)  [16/2]
    Identification                      0x9722  (38690)  [18/2]
    Fragment Flags                      010. ....  (Don't Fragment)  [20/1]  0x00E0
        Reserved                        0... ....  [20/1]  0x0080
        Fragment                        .1.. ....  (Don't Fragment)  [20/1]  0x0040
        More Fragment                   ..0. ....  (Last Fragment)  [20/1]  0x0020
    Fragment Offset                     0  [20/2]  0x1FFF
    Time To Live                        117  [22/1]
    Protocol                            6  (TCP)  [23/1]
    Checksum                            0x76D0  (Correct)  [24/2]
    Source IP                           70.76.43.75  [26/4]
    Destination IP                      37.123.96.195  [30/4]
TCP - Transport Control Protocol        [34/28]
    Source Port:                        10250  [34/2]
    Destination Port:                   80  [36/2]
    Sequence Number:                    4291324266  [38/4]
    Ack Number:                         2549892443  [42/4]
    TCP Offset:                         7  (28 Bytes)  [46/1]  0x00F0
    Flags:                              ..00 0010  [47/1]  0x003F
        Urgent pointer:                 ..0. ....  [47/1]  0x0020
        Acknowledgment number:          ...0 ....  [47/1]  0x0010
        Push Function:                  .... 0...  [47/1]  0x0008
        Reset the connection:           .... .0..  [47/1]  0x0004
        Synchronize sequence:           .... ..1.  [47/1]  0x0002
        End of data:                    .... ...0  [47/1]  0x0001
    Window:                             8192  [48/2]
    Checksum:                           0xFC64  (Correct)  [50/2]
    Urgent point:                       0  [52/2]
    TCP Option - 1                      [54/4]
        Code:                           2  [54/1]
        Length:                         4  [55/1]
        Maximum Segment Length:         1460  [56/2]
    TCP Option - 2                      [58/1]
        Code:                           1  [58/1]
    TCP Option - 3                      [59/1]
        Code:                           1  [59/1]
    TCP Option - 4                      [60/2]
        Code:                           4  [60/1]
        Length:                         2  [61/1]
Extra Data:                             [62/1]
    Number of Bytes:                    1 bytes  [62/1]
FCS:
    FCS:                                0x2FA24C7A

Open in new window


So as you can see the dscp is 0
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
3XLcomAuthor Commented:
How did you convert this packet to this :) i really want to know.
0
Ernie BeekExpertCommented:
Colasoft packet builder: http://www.colasoft.com/packet_builder/ 
Have fun ;)
0
Become an IT Security Management Expert

In today’s fast-paced, digitally transformed world of business, the need to protect network data and ensure cloud privacy has never been greater. With a B.S. in Network Operations and Security, you can get the credentials it takes to become an IT security management expert.

3XLcomAuthor Commented:
And i want to know if there is a way to block this type of packets on the router.
0
3XLcomAuthor Commented:
Thank you millions of time
0
Ernie BeekExpertCommented:
Is this related to your other question by any chance? The one with the TTL?
0
3XLcomAuthor Commented:
:( unfortunately my router does not has a ttl block support and / also my juniper is not have a capability to got 500k+ packets
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
TCP/IP

From novice to tech pro — start learning today.