summaryrefslogtreecommitdiff
path: root/doc/mergecap.pod
diff options
context:
space:
mode:
authorGuy Harris <guy@alum.mit.edu>2003-10-31 00:43:21 +0000
committerGuy Harris <guy@alum.mit.edu>2003-10-31 00:43:21 +0000
commit0247fbeb1554b58b434f7c8722d4b7ba3bcc5013 (patch)
tree5a53e326f6692d879d2277af6107a9906020de5c /doc/mergecap.pod
parent6f7c4c683658a06676cd892fa103318d972a337c (diff)
downloadwireshark-0247fbeb1554b58b434f7c8722d4b7ba3bcc5013.tar.gz
From Scott Emberley: support for reading Network Instruments version 9
capture files. svn path=/trunk/; revision=8840
Diffstat (limited to 'doc/mergecap.pod')
-rw-r--r--doc/mergecap.pod37
1 files changed, 20 insertions, 17 deletions
diff --git a/doc/mergecap.pod b/doc/mergecap.pod
index e91b75b3c2..9b62d10bf1 100644
--- a/doc/mergecap.pod
+++ b/doc/mergecap.pod
@@ -21,25 +21,28 @@ a single output file specified by the B<-w> argument. B<Mergecap> knows
how to read B<libpcap> capture files, including those of B<tcpdump>,
B<Ethereal>, and other tools that write captures in that format. In
addition, B<Mergecap> can read capture files from B<snoop> and
-B<atmsnoop>, Shomiti/Finisar B<Surveyor>, Novell B<LANalyzer>, Network
-General/Network Associates DOS-based B<Sniffer> (compressed or
-uncompressed), Microsoft B<Network Monitor>, AIX's B<iptrace>, Cinco
-Networks B<NetXRay>, Network Associates Windows-based B<Sniffer>, AG
-Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s
-WAN/LAN analyzer, B<Lucent/Ascend> router debug output, HP-UX's
-B<nettl>, the dump output from B<Toshiba's> ISDN routers, the output
-from B<i4btrace> from the ISDN4BSD project, the output in B<IPLog>
-format from the Cisco Secure Intrusion Detection System, B<pppd logs>
-(pppdump format), the output from VMS's
+B<atmsnoop>, Shomiti/Finisar B<Surveyor> captures, Novell B<LANalyzer>
+captures, Network General/Network Associates DOS-based B<Sniffer>
+(compressed or uncompressed) captures, Microsoft B<Network Monitor>
+captures, files from AIX's B<iptrace>, Cinco Networks B<NetXRay>
+captures, captures from Network Associates Windows-based B<Sniffer>, AG
+Group/WildPackets B<EtherPeek>/B<TokenPeek>/B<AiroPeek> captures,
+captures from B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router
+debug output, files from HP-UX's B<nettl>, the dump output from
+B<Toshiba's> ISDN routers, the output from B<i4btrace> from the ISDN4BSD
+project, the output in B<IPLog> format from the Cisco Secure Intrusion
+Detection System, B<pppd logs> (pppdump format), the output from VMS's
B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities, the text output from
the B<DBS Etherwatch> VMS utility, traffic capture files from Visual
-Networks' Visual UpTime, the output from B<CoSine> L2 debug, and the
-output from Accellent's 5Views LAN agents. There is no need to tell
-B<Mergecap> what type of file you are reading; it will determine the
-file type by itself. B<Mergecap> is also capable of reading any of
-these file formats if they are compressed using gzip. B<Mergecap>
-recognizes this directly from the file; the '.gz' extension is not
-required for this purpose.
+Networks' Visual UpTime, the output from B<CoSine> L2 debug, the output
+from Accellent's 5Views LAN agents, captures in Endace Measurement
+Systems' ERF format, Linux Bluez Bluetooth stack "hcidump -w" traces,
+and captures from Network Instruments Observer version 9. There is no
+need to tell B<Mergecap> what type of file you are reading; it will
+determine the file type by itself. B<Mergecap> is also capable of
+reading any of these file formats if they are compressed using gzip.
+B<Mergecap> recognizes this directly from the file; the '.gz' extension
+is not required for this purpose.
By default, it writes the capture file in B<libpcap> format, and writes
all of the packets in both input capture files to the output file. The