wrong bogus ipv4 info
the payload for ib pkt starts with 0x0800, and the wireshark makes a decision that this appears to be ethertype encapsulated, and there are zeros behind the 0800, which trigers a bogus ipv4 version info. Is there any way to colse the analysis of ib payload.
Can you share the capture in question? Use a public share such as Google Drive, DropBox etc. and post a link to it back back here.
sorry, I can't uploade any file because of the firewall in this pc. I copied the raw txt info
here's the pkt raw hex data
Your pkt raw hex data is missing two octets in the first line. If we add data for the two missing octets between 9b and 53 to make the first six octets read f4 9b 00 00 63 3e then use text2pcap against the amended hex file we will produce a single packet pcap file that by default dissects identically to the packet details pasted above.
yes, i missed two octets, thanks @Jim Young for pointing out.