Server/Application State Protocol (SASP)

Server/Application State Protocol (SASP) provides a mechanism for load balancers and workload management systems to communicate better ways of distributing the existing workload to the group members.

Protocol dependencies

  • TCP: Typically, SASP uses TCP as its transport protocol. The well known TCP port for SASP traffic is 3860.

Wireshark

The SASP dissector is fully functional.

Preference Settings

Unsetting Reassemble SASP Packets over multiple TCP segments will throw Error (Expert Info (Error/Malformed): Malformed Packet (Exception occurred)) for SASP packets spread across multiple tcp segments. By Default, the preference is set to TRUE.

Example capture file

Display Filter

Show only the PROTO based traffic:

 SASP 

Capture Filter

You cannot directly filter SASP protocols while capturing. However, if you know the TCP port used (see above), you can filter on that one.

Capture only the SASP traffic over the default port (3860):

 tcp port 3860 

External links

  • RFC 4678 Server/Application State Protocol v1

Discussion


Imported from https://wiki.wireshark.org/SASP on 2020-08-11 23:24:26 UTC