All or part of each captured network trace can be saved to disk.Display filters can also be used to selectively highlight and color packet summary information. Data display can be refined using a display filter.Output can be saved or printed as plain text or PostScript.602 protocols can currently be dissected.Capture files can be programmatically edited or converted via command-line switches to the "editcap" program.Captured network data can be browsed via a GUI, or via the TTY-mode "tethereal" program.Live data can be read from Ethernet, FDDI, PPP, Token-Ring, IEEE 802.11, Classical IP over ATM, and loopback interfaces (at least on some platforms not all of those types are supported on all platforms).Any of these files can be compressed with gzip and Ethereal will decompress them on the fly. It can also read traces made from Lucent/Ascend WAN routers and Toshiba ISDN routers, as well as the text output from VMS's TCPIPtrace utility and the DBS Etherwatch utility for VMS. Wireshark can read capture files from tcpdump (libpcap), NAI's Sniffer (compressed and uncompressed), Sniffer Pro, NetXray, Sun snoop and atmsnoop, Shomiti/Finisar Surveyor, AIX's iptrace, Microsoft's Network Monitor, Novell's LANalyzer, RADCOM's WAN/LAN Analyzer, HP-UX nettl, i4btrace from the ISDN4BSD project, Cisco Secure IDS iplog, the pppd log (pppdump-format), the AG Group's/WildPacket's EtherPeek/TokenPeek/AiroPeek, or Visual Networks' Visual UpTime.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |