
Display tcp and dns packets both tcp or dnsģ. Display traffic with source or destination port as 443 tcp.port = 443ĥ. display all protocols other than arp, icmp and dns !(arp or icmp or dns)Ħ. Show traffic which contains google tcp contains googleħ.
An example to capture SQL Server traffic would be: hostCapture filters are set in Capture Options (ctrl-K). The capture filter captures only certain packets, resulting in a small capture file. Display http response code of 200 in network traffic = 200ġ0. Wireshark has display filters and capture filters. Show only SMTP (port 25) and ICMP traffic: tcp.port eq 25 or icmpġ1. TCP buffer full - Source is instructing Destination to stop sending data tcp.window_size = 0 & != 1ġ3.Filter on Windows - Filter out noise, while watching Windows Client - DC exchanges smb || nbns || dcerpc || nbss || dns Show only traffic in the LAN (.x), between workstations and servers - no Internet: ip.src =192.168.0.0/16 and ip.dst =192.168.0.0/16ġ2. This translates to "pass any traffic except with a source IPv4 address of 192.168.65.129 or a destination IPv4 address of 192.168.65.129"ġ5.Some filter fields match against multiple protocol fields.

For example, "ip.addr" matches against both the IP source and destination addresses in the IP header. The same is true for "tcp.port", "udp.port", "eth.addr", and others.
