STANAG 5066 (Profile for High Frequency (HF) Radio Data Communication) is a NATO protocol stack definition operated over HF modem/radio equipment. S5066 provides standard clients over SIS(Subnetwork Interface Sublayer) and an IP mapping/adaptation sublayer in order to make use of conventional IP applications over HF radio band in a transparent way.
There exist three editions of STANAG 5066 protocol specification. Edition 1, and Edition 2 radios do not attempt to transmit when it is known that another radio is transmitting. When there is silence, if two radios start transmitting together, they conflict with each other and all data is lost. It means that the data exchange is node to node and no more than two peers may communicate at the same time. With the release of STANAG 5066 Edition 3, this problem was resolved by using two genuine MAC methods, CSMA and HFTRP.
The DTS layers are same for Edition 1 and 2 but a new feature, especially two medium access control methods named as HFTRP(High Frequency Token Ring Protocol) and CSMA(Carrier Sense Multiple Access) that can be used interchangeably, was added to DTS layer of the STANAG 5066 Edition 3. In effect, the DTS sublayer of the Edition 3 is backward compatible with the old protocol editions(1,2).
Otherwise: D_PDUs captured directly from the line(configurable as well) with pcap encapsulation. Link name is registered as DLT_STANAG_5066_D_PDU.
The s5066dts dissector is fully functional.
When you want to dissect TCP encapsulated STANAG 5066 DPDUs, you need to configure and check "Dissect STANAG 5066 DPDUs with prepending TCP headers" option.
Otherwise, when you want to dissect STANAG 5066 DPDUs that are captured directly from the line, you need to uncheck "Dissect STANAG 5066 DPDUs with prepending TCP headers" option.
SampleCaptures/Stanag5066-RAW-ENCAP-Bftp-Exchange-tx.pcap - BFTP file transfer exchange D_PDUs captured directly from the line
SampleCaptures/Stanag5066-TCP-ENCAP-Bftp-Exchange-tx-rx.pcapng - BFTP file transfer exchange D_PDUs encapsulated in TCP, then handed off to S5066 dissector
A complete list of s5066dts display filter fields can be found in the display filter reference
Show only the s5066dts based traffic:
You cannot directly filter s5066dts protocols while capturing. However, if you know the TCP port used (see above), you can filter on that one.
Capture only the s5066dts traffic over the default port (5067):
tcp port 5067
Imported from https://wiki.wireshark.org/STANAG_5066_DTS on 2020-08-11 23:25:55 UTC