Does anyone know of any tools we can use for analyzing packet capture information from datapath-debugging on the high-end SRXs? The format as displayed on the CLI does not appear to be supported by Wireshark. The first two lines look to be internal headers used within the SRX.
root@srx01> show security datapath-debug capture
Packet 1, len 100: (C1/F1/P1/SEQ:5023:np-ingress)
b0 00 00 6a 01 18 05 1d 9b e4 00 06 01 00 19 0a
46 59 08 00 ff 01 13 9f 45 00 00 00 00 00 00 00
00 18 74 14 b0 80 00 23 04 18 11 40 81 00 01 e5
08 00 45 00 00 52 6f 96 40 00 3a 06 b9 1b ac 10
a1 34 ac 12 1e 9d d0 fd 44 c0 61 1d a2 28 56 6d
73 bb 50 18 80 00 e0 a9 00 00 00 00
#datapath.debug