
Display: Source: IN SP -> MP (2052)Ĭoming from AX. Physical Port number - where packet came from or are going to.

E - Shows extra information (to be sent in Wireshark), including the following: Note: The below parameters are useful in a configuration of a tunnel with an SSL (port 443) while the back-end flow is clear (port 80).

a - Captures and processes SPAX packets (alters IP address and port). m - Discards packets sent and received by the MP from the capture file.
#Wireshark capture filter host or host full
A - For live capture, prints a full ASCII dump. x - For live capture, prints a full hex dump, as well as packet header decode. n - For live capture, no DNS lookups to translate IP addresses to names. e - For live capture, prints link level header. Note: Defines the packet count for the current capture only and overrides the globally-defined packet count value defined using the count parameter. c - Sets the maximum number of captured packets (packet count).Range: 0-1000000000 Note: Defines the snap length for the current capture only and overrides the globally-defined snap length value defined using the snaplen parameter. s - Sets the length of the packets to capture (snap length) in bytes.Range: 0-9100 v or -vlan - Captures traffic on all ingress ports for a specific VLAN.Range: 1-4090 t - Sets ports (from-to range) on which traffic is captured. This allows minimal impact on management performance.Note: The following flags are not supported when using the -sp flag: -l, -e, -n, -x, and -A. p or -I - Port or interface (enter port range).

l or -live - Sends the packet live to Telnet or SSH. This command starts the packet capture operation and sets the packet capture options parameters, the details of the filters/flags, which can be used after command ‘capture’ as:
