summaryrefslogtreecommitdiff
path: root/doc/tethereal.pod
diff options
context:
space:
mode:
authorGuy Harris <guy@alum.mit.edu>2003-10-31 00:43:21 +0000
committerGuy Harris <guy@alum.mit.edu>2003-10-31 00:43:21 +0000
commit0247fbeb1554b58b434f7c8722d4b7ba3bcc5013 (patch)
tree5a53e326f6692d879d2277af6107a9906020de5c /doc/tethereal.pod
parent6f7c4c683658a06676cd892fa103318d972a337c (diff)
downloadwireshark-0247fbeb1554b58b434f7c8722d4b7ba3bcc5013.tar.gz
From Scott Emberley: support for reading Network Instruments version 9
capture files. svn path=/trunk/; revision=8840
Diffstat (limited to 'doc/tethereal.pod')
-rw-r--r--doc/tethereal.pod40
1 files changed, 22 insertions, 18 deletions
diff --git a/doc/tethereal.pod b/doc/tethereal.pod
index 1e20fa8c8f..75fbba81d0 100644
--- a/doc/tethereal.pod
+++ b/doc/tethereal.pod
@@ -42,24 +42,28 @@ standard output or writing the packets to a file. B<Tethereal>'s native
capture file format is B<libpcap> format, which is also the format used
by B<tcpdump> and various other tools. In addition, B<Tethereal> can
read capture files from B<snoop> and B<atmsnoop>, Shomiti/Finisar
-B<Surveyor>, Novell B<LANalyzer>, Network General/Network Associates
-DOS-based B<Sniffer> (compressed or uncompressed), Microsoft B<Network
-Monitor>, AIX's B<iptrace>, Cinco Networks B<NetXRay>, Network
-Associates Windows-based B<Sniffer>, AG Group/WildPackets
-B<EtherPeek>/B<TokenPeek>/B<AiroPeek>, B<RADCOM>'s WAN/LAN analyzer,
-B<Lucent/Ascend> router debug output, HP-UX's B<nettl>, the dump output
-from B<Toshiba's> ISDN routers, the output from B<i4btrace> from the
-ISDN4BSD project, the output in B<IPLog> format from the Cisco Secure
-Intrusion Detection System, B<pppd logs> (pppdump format), the output
-from VMS's B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities, the text
-output from the B<DBS Etherwatch> VMS utility, traffic capture files
-from Visual Networks' Visual UpTime, the output from B<CoSine> L2 debug,
-and the output from Accellent's 5Views LAN agents. There is no need to
-tell B<Tethereal> what type of file you are reading; it will determine
-the file type by itself. B<Tethereal> is also capable of reading any of
-these file formats if they are compressed using gzip. B<Tethereal>
-recognizes this directly from the file; the '.gz' extension is not
-required for this purpose.
+B<Surveyor> captures, Novell B<LANalyzer> captures, Network
+General/Network Associates DOS-based B<Sniffer> (compressed or
+uncompressed) captures, Microsoft B<Network Monitor> captures, files
+from AIX's B<iptrace>, Cinco Networks B<NetXRay> captures, captures from
+Network Associates Windows-based B<Sniffer>, AG Group/WildPackets
+B<EtherPeek>/B<TokenPeek>/B<AiroPeek> captures, captures from
+B<RADCOM>'s WAN/LAN analyzer, B<Lucent/Ascend> router debug output,
+files from HP-UX's B<nettl>, the dump output from B<Toshiba's> ISDN
+routers, the output from B<i4btrace> from the ISDN4BSD project, the
+output in B<IPLog> format from the Cisco Secure Intrusion Detection
+System, B<pppd logs> (pppdump format), the output from VMS's
+B<TCPIPtrace>/B<TCPtrace>/B<UCX$TRACE> utilities, the text output from
+the B<DBS Etherwatch> VMS utility, traffic capture files from Visual
+Networks' Visual UpTime, the output from B<CoSine> L2 debug, the output
+from Accellent's 5Views LAN agents, captures in Endace Measurement
+Systems' ERF format, Linux Bluez Bluetooth stack "hcidump -w" traces,
+and captures from Network Instruments Observer version 9. There is no
+need to tell B<Tethereal> what type of file you are reading; it will
+determine the file type by itself. B<Tethereal> is also capable of
+reading any of these file formats if they are compressed using gzip.
+B<Tethereal> recognizes this directly from the file; the '.gz' extension
+is not required for this purpose.
If the B<-w> flag is not specified, B<Tethereal> prints a decoded form
of the packets it captures or reads; otherwise, it writes those packets