aboutsummaryrefslogtreecommitdiffstats
path: root/doc/dissection-options.adoc
blob: 5c55a76368dc769fdad6cc6f9e70b756e803c38f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
== DISSECTION OPTIONS

// tag::decode_as[]
[#decode_as]
-d  <layer type>==<selector>,<decode-as protocol>::
+
--
Like Wireshark's *Decode As...* feature, this lets you specify how a
layer type should be dissected.  If the layer type in question (for example,
*tcp.port* or *udp.port* for a TCP or UDP port number) has the specified
selector value, packets should be dissected as the specified protocol.

.Decode As Port
[example]
*-d tcp.port==8888,http* will decode any traffic running over
TCP port 8888 as HTTP.

// tag::tshark[]
.Decode As Port Range
[example]
*-d tcp.port==8888-8890,http* will decode any traffic running
over TCP ports 8888, 8889 or 8890 as HTTP.

.Decode As Port Range via Length
[example]
*-d tcp.port==8888:3,http* will decode any traffic running over
the three TCP ports 8888, 8889 or 8890 as HTTP.

Using an invalid selector or protocol will print out a list of valid selectors
and protocol names, respectively.

.Decode As List of Selectors
[example]
*-d .* is a quick way to get a list of valid selectors.

.Decode As List of Values for a Selector
[example]
*-d ethertype==0x0800,.* is a quick way to get a list of protocols
that can be selected with an ethertype.
// end::tshark[]
// tag::not_tshark[]
See the xref:tshark.html#decode_as[tshark](1) manual page for more examples.
// end::not_tshark[]
--
// end::decode_as[]

--disable-all-protocols::
Disable dissection of all protocols.

--disable-protocol <proto_name>[,<proto_name>,...]::
Disable dissection of proto_name.
Use a proto_name of *ALL* to override
your chosen profile's default enabled protocol list and temporarily
disable all protocols.

--disable-heuristic <short_name>::
Disable dissection of heuristic protocol.

--enable-protocol <proto_name>[,<proto_name>,...]::
+
--
Enable dissection of proto_name.
Use a proto_name of *ALL* to override
your chosen profile's default disabled protocol list and temporarily
enable all protocols which are enabled by default.

If a protocol is implicated in both *--disable-protocol*
and *--enable-protocol*, the protocol is enabled. This allows you to
temporarily disable all protocols but a list of exceptions.
Example: *--disable-protocol ALL --enable-protocol eth,ip*
--

--enable-heuristic <short_name>::
Enable dissection of heuristic protocol.

-K  <keytab>::
+
--
Load kerberos crypto keys from the specified keytab file.
This option can be used multiple times to load keys from several files.

Example: *-K krb5.keytab*
--

-n::
Disable network object name resolution (such as hostname, TCP and UDP port
names); the *-N* option might override this one.

-N  <name resolving flags>::
+
--
Turn on name resolving only for particular types of addresses and port
numbers, with name resolving for other types of addresses and port
numbers turned off.  This option (along with *-n*) can be specified
multiple times; the last value given overrides earlier ones. This option
and *-n* override the options from the preferences, including preferences
set via the *-o* option. If both *-N* and *-n* options are not present,
the values from the preferences are used, which default to *-N dmN*.

The argument is a string that may contain the letters:

*d* to enable resolution from captured DNS packets

*g* to enable IP address geolocation information lookup from configured
MaxMind databases

*m* to enable MAC address resolution

*n* to enable network address resolution

*N* to enable using external resolvers (e.g., DNS) for network address
resolution; no effect without *n* also enabled.

*t* to enable transport-layer port number resolution

*v* to enable VLAN IDs to names resolution

// tag::tshark[]
[CAUTION]
In tshark single-pass mode, external resolution and geolocation lookup is
performed synchronously. For live captures, which are always in single-pass
mode, this makes it more difficult for dissection to keep up with a busy
network, possibly leading to dropped packets.
// end::tshark[]
--

--only-protocols <protocols>::
Only enable dissection of these protocols, comma separated. Disable everything else.

-t  (a|ad|adoy|d|dd|e|r|u|ud|udoy)[.[N]]|.[N]::
+
--
Set the format of the packet timestamp displayed in the default time
column.  The format can be one of:

*a* absolute: The absolute time, as local time in your time zone,
is the actual time the packet was captured, with no date displayed

*ad* absolute with date: The absolute date, displayed as YYYY-MM-DD,
and time, as local time in your time zone, is the actual time and date
the packet was captured

*adoy* absolute with date using day of year: The absolute date,
displayed as YYYY/DOY, and time, as local time in your time zone,
is the actual time and date the packet was captured

*d* delta: The delta time is the time since the previous packet was
captured

*dd* delta_displayed: The delta_displayed time is the time since the
previous displayed packet was captured

*e* epoch: The time in seconds since epoch (Jan 1, 1970 00:00:00)

*r* relative: The relative time is the time elapsed between the first packet
and the current packet

*u* UTC: The absolute time, as UTC, is the actual time the packet was
captured, with no date displayed

*ud* UTC with date: The absolute date, displayed as YYYY-MM-DD,
and time, as UTC, is the actual time and date the packet was captured

*udoy* UTC with date using day of year: The absolute date, displayed
as YYYY/DOY, and time, as UTC, is the actual time and date the packet
was captured

*.[N]* Set the precision: N is the number of decimals (0 through 9).
If using "." without N, automatically determine precision from trace.

The default format is relative with precision based on capture format.
--

-u <s|hms>::
+
--
Specifies how packet timestamp formats in *-t* which are relative times
(i.e.  relative, delta, and delta_displayed) are displayed.  Valid choices are:

*s* for seconds

*hms* for hours, minutes, and seconds

The default format is seconds.
--