diff options
author | Guy Harris <guy@alum.mit.edu> | 2003-10-31 00:43:21 +0000 |
---|---|---|
committer | Guy Harris <guy@alum.mit.edu> | 2003-10-31 00:43:21 +0000 |
commit | 0247fbeb1554b58b434f7c8722d4b7ba3bcc5013 (patch) | |
tree | 5a53e326f6692d879d2277af6107a9906020de5c /doc/tethereal.pod | |
parent | 6f7c4c683658a06676cd892fa103318d972a337c (diff) | |
download | wireshark-0247fbeb1554b58b434f7c8722d4b7ba3bcc5013.tar.gz |
From Scott Emberley: support for reading Network Instruments version 9
capture files.
svn path=/trunk/; revision=8840
Diffstat (limited to 'doc/tethereal.pod')
-rw-r--r-- | doc/tethereal.pod | 40 |
1 files changed, 22 insertions, 18 deletions
diff --git a/doc/tethereal.pod b/doc/tethereal.pod index 1e20fa8c8f..75fbba81d0 100644 --- a/doc/tethereal.pod +++ b/doc/tethereal.pod @@ -42,24 +42,28 @@ standard output or writing the packets to a file. B<Tethereal>'s native capture file format is B<libpcap> format, which is also the format used by B<tcpdump> and various other tools. In addition, B<Tethereal> can read capture files from B<snoop> and B<atmsnoop>, Shomiti/Finisar -B<Surveyor>, Novell B<LANalyzer>, Network General/Network Associates -DOS-based B<Sniffer> (compressed or uncompressed), Microsoft B<Network -Monitor>, AIX's B<iptrace>, Cinco Networks B<NetXRay>, Network -Associates Windows-based B<Sniffer>, AG Group/WildPackets -B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s WAN/LAN analyzer, -B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the dump output -from B<Toshiba's> ISDN routers, the output from B<i4btrace> from the -ISDN4BSD project, the output in B<IPLog> format from the Cisco Secure -Intrusion Detection System, B<pppd logs> (pppdump format), the output -from VMS's B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities, the text -output from the B<DBS Etherwatch> VMS utility, traffic capture files -from Visual Networks' Visual UpTime, the output from B<CoSine> L2 debug, -and the output from Accellent's 5Views LAN agents. There is no need to -tell B<Tethereal> what type of file you are reading; it will determine -the file type by itself. B<Tethereal> is also capable of reading any of -these file formats if they are compressed using gzip. B<Tethereal> -recognizes this directly from the file; the '.gz' extension is not -required for this purpose. +B<Surveyor> captures, Novell B<LANalyzer> captures, Network +General/Network Associates DOS-based B<Sniffer> (compressed or +uncompressed) captures, Microsoft B<Network Monitor> captures, files +from AIX's B<iptrace>, Cinco Networks B<NetXRay> captures, captures from +Network Associates Windows-based B<Sniffer>, AG Group/WildPackets +B<EtherPeek>/B<TokenPeek>/B<AiroPeek> captures, captures from +B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router debug output, +files from HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN +routers, the output from B<i4btrace> from the ISDN4BSD project, the +output in B<IPLog> format from the Cisco Secure Intrusion Detection +System, B<pppd logs> (pppdump format), the output from VMS's +B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities, the text output from +the B<DBS Etherwatch> VMS utility, traffic capture files from Visual +Networks' Visual UpTime, the output from B<CoSine> L2 debug, the output +from Accellent's 5Views LAN agents, captures in Endace Measurement +Systems' ERF format, Linux Bluez Bluetooth stack "hcidump -w" traces, +and captures from Network Instruments Observer version 9. There is no +need to tell B<Tethereal> what type of file you are reading; it will +determine the file type by itself. B<Tethereal> is also capable of +reading any of these file formats if they are compressed using gzip. +B<Tethereal> recognizes this directly from the file; the '.gz' extension +is not required for this purpose. If the B<-w> flag is not specified, B<Tethereal> prints a decoded form of the packets it captures or reads; otherwise, it writes those packets |