

It's simply not worth it, it's like going back in time 20 years. Then I run it, and it shows bugger all, I suspect I need to find and install more libraries (tcell, gowid), which themselves require massive downloads. I had to install 540MB of support files just to run "go get /gcla/termshark/cmd/termshark". If I want a quick overview of a given machine I load up iftop, which isn't very thrilling on my desktop at the momentĪll of these are trivial to install (except for the RTP perl script which I have as a custom apt-gettable package) and don't require non-standard interpreters and package managers. Usually I'm looking at RTP streams, so I run it through some perl to decode įor wider monitoring, at key points on the network I use ntop to see what's -w − write the output to the file mycapture identifier.My first port of call tends to be tcpdump, with various filters and greps to pick out what I want.-b files: − the number of files to capture before overwriting the oldest.-b filesize: − file size in kB before starting a new.-i − interface number (listed from dumpcap -D).# dumpcap -i 1 -b filesize:100000 -b files:20 -w mycapture.pcapng pcap files of 100MB each, replacing the oldest file with the twenty-first file and so on… This allows a continuous capture without exhausting disk space.

The following example will provide a ringbuffer capture. To see all dumpcap options, use the -h flag. Used in combination with tmux will allow the capture of packets in a detached session. Tcp.port=80||tcp.port=3306||tcp.port=443ĭumpcap is part of Wireshark and can be used for capturing packets without the GUI. If the first string typed into the Mininet CLI is a host, switch or controller name, the command. This will filter traffic within any of the private network spaces. If Wireshark is not installed (command not found error). To only see LAN traffic and no internet traffic, run If you would like to see all the incoming and outgoing traffic for a specific address, enter display filter ip.addr = 1.2.3.4, replacing 1.2.3.4 with the relevant IP address.Įxclude packets from a specific IP address ip.addr != 1.2.3.4.

If you would like to see all the incoming traffic for a specific address, enter display filter ip.src = 1.2.3.4, replacing 1.2.3.4 with the IP address the incoming traffic is being sent to.If you would like to see all the traffic going to a specific address, enter display filter ip.dst = 1.2.3.4, replacing 1.2.3.4 with the IP address the outgoing traffic is being sent to.If you want to see all the current UDP packets, type udp into the Filter bar or in the CLI, enter: If you want to see all the current TCP packets, type tcp into the Filter bar or in the CLI, enter: For display filters, see wireshark-filter(4).

Note: To learn the capture filter syntax, see pcap-filter(7).
