| # Configuration file for Wireshark 1.2.2. |
| # Configuration file for Wireshark 1.2.2. |
| # |
| # |
| # This file is regenerated each time preferences are saved within |
| # This file is regenerated each time preferences are saved within |
| # Wireshark. Making manual changes should be safe, however. |
| # Wireshark. Making manual changes should be safe, however. |
| |
| |
| ######## User Interface ######## |
| ######## User Interface ######## |
| |
| |
| # Vertical scrollbars should be on right side? |
| # Vertical scrollbars should be on right side? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.scrollbar_on_right: TRUE |
| gui.scrollbar_on_right: TRUE |
| |
| |
| # Packet-list selection bar can be used to browse w/o selecting? |
| # Packet-list selection bar can be used to browse w/o selecting? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.packet_list_sel_browse: FALSE |
| gui.packet_list_sel_browse: FALSE |
| |
| |
| # Protocol-tree selection bar can be used to browse w/o selecting? |
| # Protocol-tree selection bar can be used to browse w/o selecting? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.protocol_tree_sel_browse: FALSE |
| gui.protocol_tree_sel_browse: FALSE |
| |
| |
| # Alternating colors in TreeViews? |
| # Alternating colors in TreeViews? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.tree_view_altern_colors: FALSE |
| gui.tree_view_altern_colors: FALSE |
| |
| |
| # Place filter toolbar inside the statusbar? |
| # Place filter toolbar inside the statusbar? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.filter_toolbar_show_in_statusbar: FALSE |
| gui.filter_toolbar_show_in_statusbar: FALSE |
| |
| |
| # Protocol-tree line style. |
| # Protocol-tree line style. |
| # One of: NONE, SOLID, DOTTED, TABBED |
| # One of: NONE, SOLID, DOTTED, TABBED |
| gui.protocol_tree_line_style: NONE |
| gui.protocol_tree_line_style: NONE |
| |
| |
| # Protocol-tree expander style. |
| # Protocol-tree expander style. |
| # One of: NONE, SQUARE, TRIANGLE, CIRCULAR |
| # One of: NONE, SQUARE, TRIANGLE, CIRCULAR |
| gui.protocol_tree_expander_style: SQUARE |
| gui.protocol_tree_expander_style: SQUARE |
| |
| |
| # Hex dump highlight style. |
| # Hex dump highlight style. |
| # One of: BOLD, INVERSE |
| # One of: BOLD, INVERSE |
| gui.hex_dump_highlight_style: INVERSE |
| gui.hex_dump_highlight_style: INVERSE |
| |
| |
| # Main Toolbar style. |
| # Main Toolbar style. |
| # One of: ICONS, TEXT, BOTH |
| # One of: ICONS, TEXT, BOTH |
| gui.toolbar_main_style: ICONS |
| gui.toolbar_main_style: ICONS |
| |
| |
| # Save window position at exit? |
| # Save window position at exit? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.geometry.save.position: FALSE |
| gui.geometry.save.position: FALSE |
| |
| |
| # Save window size at exit? |
| # Save window size at exit? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.geometry.save.size: TRUE |
| gui.geometry.save.size: TRUE |
| |
| |
| # Save window maximized state at exit? |
| # Save window maximized state at exit? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.geometry.save.maximized: TRUE |
| gui.geometry.save.maximized: TRUE |
| |
| |
| # Use MacOS X style (Mac OS X with native GTK only)? |
| # Use MacOS X style (Mac OS X with native GTK only)? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.macosx_style: TRUE |
| gui.macosx_style: TRUE |
| |
| |
| # Open a console window (WIN32 only)? |
| # Open a console window (WIN32 only)? |
| # One of: NEVER, AUTOMATIC, ALWAYS |
| # One of: NEVER, AUTOMATIC, ALWAYS |
| gui.console_open: NEVER |
| gui.console_open: NEVER |
| |
| |
| # The max. number of entries in the display filter list. |
| # The max. number of entries in the display filter list. |
| # A decimal number. |
| # A decimal number. |
| gui.recent_display_filter_entries.max: 10 |
| gui.recent_display_filter_entries.max: 10 |
| |
| |
| # The max. number of items in the open recent files list. |
| # The max. number of items in the open recent files list. |
| # A decimal number. |
| # A decimal number. |
| gui.recent_files_count.max: 10 |
| gui.recent_files_count.max: 10 |
| |
| |
| # Where to start the File Open dialog box. |
| # Where to start the File Open dialog box. |
| # One of: LAST_OPENED, SPECIFIED |
| # One of: LAST_OPENED, SPECIFIED |
| gui.fileopen.style: LAST_OPENED |
| gui.fileopen.style: LAST_OPENED |
| |
| |
| # Directory to start in when opening File Open dialog. |
| # Directory to start in when opening File Open dialog. |
| gui.fileopen.dir: C:\Documents and Settings\dbastiani\My Documents |
| gui.fileopen.dir: C:\Documents and Settings\dbastiani\My Documents |
| |
| |
| # The preview timeout in the File Open dialog. |
| # The preview timeout in the File Open dialog. |
| # A decimal number (in seconds). |
| # A decimal number (in seconds). |
| gui.fileopen.preview: 3 |
| gui.fileopen.preview: 3 |
| |
| |
| # Ask to save unsaved capture files? |
| # Ask to save unsaved capture files? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.ask_unsaved: TRUE |
| gui.ask_unsaved: TRUE |
| |
| |
| # Wrap to beginning/end of file during search? |
| # Wrap to beginning/end of file during search? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.find_wrap: TRUE |
| gui.find_wrap: TRUE |
| |
| |
| # Settings dialogs use a save button? |
| # Settings dialogs use a save button? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.use_pref_save: FALSE |
| gui.use_pref_save: FALSE |
| |
| |
| # The path to the webbrowser. |
| # The path to the webbrowser. |
| # Ex: mozilla %s |
| # Ex: mozilla %s |
| gui.webbrowser: mozilla %s |
| gui.webbrowser: mozilla %s |
| |
| |
| # Custom window title. (Prepended to existing titles.) |
| # Custom window title. (Prepended to existing titles.) |
| gui.window_title: |
| gui.window_title: |
| |
| |
| # Custom start page title. |
| # Custom start page title. |
| gui.start_title: The World's Most Popular Network Protocol Analyzer |
| gui.start_title: The World's Most Popular Network Protocol Analyzer |
| |
| |
| # Show version in start page, can be useful in custom builds. |
| # Show version in start page, can be useful in custom builds. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gui.version_in_start_page: FALSE |
| gui.version_in_start_page: FALSE |
| |
| |
| ######## User Interface: Layout ######## |
| ######## User Interface: Layout ######## |
| |
| |
| # Layout type (1-6). |
| # Layout type (1-6). |
| gui.layout_type: 1 |
| gui.layout_type: 1 |
| |
| |
| # Layout content of the panes (1-3). |
| # Layout content of the panes (1-3). |
| # One of: NONE, PLIST, PDETAILS, PBYTES |
| # One of: NONE, PLIST, PDETAILS, PBYTES |
| gui.layout_content_1: PLIST |
| gui.layout_content_1: PLIST |
| gui.layout_content_2: PDETAILS |
| gui.layout_content_2: PDETAILS |
| gui.layout_content_3: PBYTES |
| gui.layout_content_3: PBYTES |
| |
| |
| ######## User Interface: Columns ######## |
| ######## User Interface: Columns ######## |
| |
| |
| # Packet list column format. |
| # Packet list column format. |
| # Each pair of strings consists of a column title and its format. |
| # Each pair of strings consists of a column title and its format. |
| column.format: "No.", "%m", "Time", "%t", "Source", "%s", "Destination", |
| column.format: "No.", "%m", "Time", "%t", "Source", "%s", "Destination", |
| "%d", "Protocol", "%p", "Info", "%i" |
| "%d", "Protocol", "%p", "Info", "%i" |
| |
| |
| ######## User Interface: Font ######## |
| ######## User Interface: Font ######## |
| |
| |
| # Font name for packet list, protocol tree, and hex dump panes. |
| # Font name for packet list, protocol tree, and hex dump panes. |
| gui.gtk2.font_name: Lucida Console 10 |
| gui.gtk2.font_name: Lucida Console 10 |
| |
| |
| ######## User Interface: Colors ######## |
| ######## User Interface: Colors ######## |
| |
| |
| # Color preferences for a marked frame. |
| # Color preferences for a marked frame. |
| # Each value is a six digit hexadecimal color value in the form rrggbb. |
| # Each value is a six digit hexadecimal color value in the form rrggbb. |
| gui.marked_frame.fg: ffffff |
| gui.marked_frame.fg: ffffff |
| gui.marked_frame.bg: 000000 |
| gui.marked_frame.bg: 000000 |
| |
| |
| # TCP stream window color preferences. |
| # TCP stream window color preferences. |
| # Each value is a six digit hexadecimal color value in the form rrggbb. |
| # Each value is a six digit hexadecimal color value in the form rrggbb. |
| stream.client.fg: 7f0000 |
| stream.client.fg: 7f0000 |
| stream.client.bg: fbeded |
| stream.client.bg: fbeded |
| stream.server.fg: 00007f |
| stream.server.fg: 00007f |
| stream.server.bg: ededfb |
| stream.server.bg: ededfb |
| |
| |
| ######## Console: logging level ######## |
| ######## Console: logging level ######## |
| # (debugging only, not in the Preferences dialog) |
| # (debugging only, not in the Preferences dialog) |
| # A bitmask of glib log levels: |
| # A bitmask of glib log levels: |
| # G_LOG_LEVEL_ERROR = 4 |
| # G_LOG_LEVEL_ERROR = 4 |
| # G_LOG_LEVEL_CRITICAL = 8 |
| # G_LOG_LEVEL_CRITICAL = 8 |
| # G_LOG_LEVEL_WARNING = 16 |
| # G_LOG_LEVEL_WARNING = 16 |
| # G_LOG_LEVEL_MESSAGE = 32 |
| # G_LOG_LEVEL_MESSAGE = 32 |
| # G_LOG_LEVEL_INFO = 64 |
| # G_LOG_LEVEL_INFO = 64 |
| # G_LOG_LEVEL_DEBUG = 128 |
| # G_LOG_LEVEL_DEBUG = 128 |
| console.log.level: 28 |
| console.log.level: 28 |
| |
| |
| ####### Capture ######## |
| ####### Capture ######## |
| |
| |
| # Default capture device |
| # Default capture device |
| capture.device: Adapter for generic dialup and VPN capture: \Device\NPF_GenericDialupAdapter |
| capture.device: Adapter for generic dialup and VPN capture: \Device\NPF_GenericDialupAdapter |
| |
| |
| # Capture in promiscuous mode? |
| # Capture in promiscuous mode? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| capture.prom_mode: TRUE |
| capture.prom_mode: TRUE |
| |
| |
| # Capture in Pcap-NG format? |
| # Capture in Pcap-NG format? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| capture.pcap_ng: FALSE |
| capture.pcap_ng: FALSE |
| |
| |
| # Update packet list in real time during capture? |
| # Update packet list in real time during capture? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| capture.real_time_update: TRUE |
| capture.real_time_update: TRUE |
| |
| |
| # Scroll packet list during capture? |
| # Scroll packet list during capture? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| capture.auto_scroll: TRUE |
| capture.auto_scroll: TRUE |
| |
| |
| # Show capture info dialog while capturing? |
| # Show capture info dialog while capturing? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| capture.show_info: FALSE |
| capture.show_info: FALSE |
| |
| |
| ######## Printing ######## |
| ######## Printing ######## |
| |
| |
| # Can be one of "text" or "postscript". |
| # Can be one of "text" or "postscript". |
| print.format: text |
| print.format: text |
| |
| |
| # Can be one of "command" or "file". |
| # Can be one of "command" or "file". |
| print.destination: command |
| print.destination: command |
| |
| |
| # This is the file that gets written to when the destination is set to "file" |
| # This is the file that gets written to when the destination is set to "file" |
| print.file: wireshark.out |
| print.file: wireshark.out |
| |
| |
| # Output gets piped to this command when the destination is set to "command" |
| # Output gets piped to this command when the destination is set to "command" |
| print.command: lpr |
| print.command: lpr |
| |
| |
| ####### Name Resolution ######## |
| ####### Name Resolution ######## |
| |
| |
| # Resolve addresses to names? |
| # Resolve addresses to names? |
| # TRUE or FALSE (case-insensitive), or a list of address types to resolve. |
| # TRUE or FALSE (case-insensitive), or a list of address types to resolve. |
| name_resolve: mtC |
| name_resolve: mtC |
| |
| |
| # Name resolution concurrency. |
| # Name resolution concurrency. |
| # A decimal number. |
| # A decimal number. |
| name_resolve_concurrency: 500 |
| name_resolve_concurrency: 500 |
| |
| |
| ####### Taps/Statistics ######## |
| ####### Taps/Statistics ######## |
| |
| |
| # Tap update interval in ms. |
| # Tap update interval in ms. |
| # An integer value greater between 100 and 10000. |
| # An integer value greater between 100 and 10000. |
| taps.update_interval: 3000 |
| taps.update_interval: 3000 |
| |
| |
| # Maximum visible channels in RTP Player window. |
| # Maximum visible channels in RTP Player window. |
| # An integer value greater than 0. |
| # An integer value greater than 0. |
| taps.rtp_player_max_visible: 8 |
| taps.rtp_player_max_visible: 4 |
| |
| |
| ####### Protocols ######## |
| ####### Protocols ######## |
| |
| |
| # Display hidden items in packet details pane? |
| # Display hidden items in packet details pane? |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| packet_list.display_hidden_proto_items: FALSE |
| packet_list.display_hidden_proto_items: FALSE |
| |
| |
| # Enable this option to recognise all traffic on RTP dynamic payload type 96 (0x60) as FEC data corresponding to Pro-MPEG Code of Practice #3 release 2 |
| # Enable this option to recognise all traffic on RTP dynamic payload type 96 (0x60) as FEC data corresponding to Pro-MPEG Code of Practice #3 release 2 |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| 2dparityfec.enable: FALSE |
| 2dparityfec.enable: FALSE |
| |
| |
| # Enable Architecture for Control Networks dissector (ANSI BSR E1.17) |
| # Enable Architecture for Control Networks dissector (ANSI BSR E1.17) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| acn.heuristic_acn: FALSE |
| acn.heuristic_acn: FALSE |
| |
| |
| # Enable Streaming DMX extension dissector (ANSI BSR E1.31) |
| # Enable Streaming DMX extension dissector (ANSI BSR E1.31) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| acn.dmx_enable: FALSE |
| acn.dmx_enable: FALSE |
| |
| |
| # Display format |
| # Display format |
| # One of: Hex , Decimal, Percent |
| # One of: Hex , Decimal, Percent |
| # (case-insensitive). |
| # (case-insensitive). |
| acn.dmx_display_view: Hex |
| acn.dmx_display_view: Hex |
| |
| |
| # Display zeros instead of dots |
| # Display zeros instead of dots |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| acn.dmx_display_zeros: FALSE |
| acn.dmx_display_zeros: FALSE |
| |
| |
| # Display leading zeros on levels |
| # Display leading zeros on levels |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| acn.dmx_display_leading_zeros: FALSE |
| acn.dmx_display_leading_zeros: FALSE |
| |
| |
| # Display line format |
| # Display line format |
| # One of: 20 per line, 16 per line |
| # One of: 20 per line, 16 per line |
| # (case-insensitive). |
| # (case-insensitive). |
| acn.dmx_display_line_format: 20 per line |
| acn.dmx_display_line_format: 20 per line |
| |
| |
| # Set the UDP port for AudioCodes Trunk Traces.Use http://x.x.x.x/TrunkTraces to enable the traces in the Blade |
| # Set the UDP port for AudioCodes Trunk Traces.Use http://x.x.x.x/TrunkTraces to enable the traces in the Blade |
| # A decimal number. |
| # A decimal number. |
| actrace.udp_port: 2428 |
| actrace.udp_port: 2428 |
| |
| |
| # Set the TCP port for AgentX(if other than the default of 705) |
| # Set the TCP port for AgentX(if other than the default of 705) |
| # A decimal number. |
| # A decimal number. |
| agentx.tcp.agentx_port: 705 |
| agentx.tcp.agentx_port: 705 |
| |
| |
| # Whether the AH payload decode should be placed in a subtree |
| # Whether the AH payload decode should be placed in a subtree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ah.place_ah_payload_in_subtree: FALSE |
| ah.place_ah_payload_in_subtree: FALSE |
| |
| |
| # Whether the AIM dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the AIM dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| aim.desegment: TRUE |
| aim.desegment: TRUE |
| |
| |
| # Whether that payload of UDP packets with a specific destination port should be automatically dissected as ALC packets |
| # Whether that payload of UDP packets with a specific destination port should be automatically dissected as ALC packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| alc.default.udp_port.enabled: FALSE |
| alc.default.udp_port.enabled: FALSE |
| |
| |
| # Specifies the UDP destination port for automatic dissection of ALC packets |
| # Specifies the UDP destination port for automatic dissection of ALC packets |
| # A decimal number. |
| # A decimal number. |
| alc.default.udp_port: 4001 |
| alc.default.udp_port: 4001 |
| |
| |
| # Whether the LCT header Codepoint field should be considered the FEC Encoding ID of carried object |
| # Whether the LCT header Codepoint field should be considered the FEC Encoding ID of carried object |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| alc.lct.codepoint_as_fec_id: TRUE |
| alc.lct.codepoint_as_fec_id: TRUE |
| |
| |
| # How to decode LCT header extension 192 |
| # How to decode LCT header extension 192 |
| # One of: Don't decode, Decode as FLUTE extension (EXT_FDT) |
| # One of: Don't decode, Decode as FLUTE extension (EXT_FDT) |
| # (case-insensitive). |
| # (case-insensitive). |
| alc.lct.ext.192: Decode as FLUTE extension (EXT_FDT) |
| alc.lct.ext.192: Decode as FLUTE extension (EXT_FDT) |
| |
| |
| # How to decode LCT header extension 193 |
| # How to decode LCT header extension 193 |
| # One of: Don't decode, Decode as FLUTE extension (EXT_CENC) |
| # One of: Don't decode, Decode as FLUTE extension (EXT_CENC) |
| # (case-insensitive). |
| # (case-insensitive). |
| alc.lct.ext.193: Decode as FLUTE extension (EXT_CENC) |
| alc.lct.ext.193: Decode as FLUTE extension (EXT_CENC) |
| |
| |
| # Whether persistent call leg information is to be kept |
| # Whether persistent call leg information is to be kept |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| alcap.leg_info: TRUE |
| alcap.leg_info: TRUE |
| |
| |
| # The dynamic payload type which will be interpreted as AMR; The value must be greater than 95 |
| # The dynamic payload type which will be interpreted as AMR; The value must be greater than 95 |
| # A decimal number. |
| # A decimal number. |
| amr.dynamic.payload.type: 0 |
| amr.dynamic.payload.type: 0 |
| |
| |
| # Type of AMR encoding of the payload |
| # Type of AMR encoding of the payload |
| # One of: RFC 3267 octet aligned, RFC 3267 BW-efficient, AMR IF1, AMR IF2 |
| # One of: RFC 3267 octet aligned, RFC 3267 BW-efficient, AMR IF1, AMR IF2 |
| # (case-insensitive). |
| # (case-insensitive). |
| amr.encoding.version: RFC 3267 octet aligned |
| amr.encoding.version: RFC 3267 octet aligned |
| |
| |
| # The AMR mode |
| # The AMR mode |
| # One of: Narrowband AMR, Wideband AMR |
| # One of: Narrowband AMR, Wideband AMR |
| # (case-insensitive). |
| # (case-insensitive). |
| amr.mode: Narrowband AMR |
| amr.mode: Narrowband AMR |
| |
| |
| # (if other than the default of IOS 4.0.1) |
| # (if other than the default of IOS 4.0.1) |
| # One of: IS-634 rev. 0, TSB-80, IS-634-A, IOS 2.x, IOS 3.x, IOS 4.0.1, IOS 5.0.1 |
| # One of: IS-634 rev. 0, TSB-80, IS-634-A, IOS 2.x, IOS 3.x, IOS 4.0.1, IOS 5.0.1 |
| # (case-insensitive). |
| # (case-insensitive). |
| ansi_a_bsmap.global_variant: IOS 4.0.1 |
| ansi_a_bsmap.global_variant: IOS 4.0.1 |
| |
| |
| # ANSI MAP SSNs to decode as ANSI MAP |
| # ANSI MAP SSNs to decode as ANSI MAP |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| ansi_map.map.ssn: 5-14 |
| ansi_map.map.ssn: 5-14 |
| |
| |
| # Attempt to detect excessive rate of ARP requests |
| # Attempt to detect excessive rate of ARP requests |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| arp.detect_request_storms: FALSE |
| arp.detect_request_storms: FALSE |
| |
| |
| # Number of requests needed within period to indicate a storm |
| # Number of requests needed within period to indicate a storm |
| # A decimal number. |
| # A decimal number. |
| arp.detect_storm_number_of_packets: 30 |
| arp.detect_storm_number_of_packets: 30 |
| |
| |
| # Period in milliseconds during which a packet storm may be detected |
| # Period in milliseconds during which a packet storm may be detected |
| # A decimal number. |
| # A decimal number. |
| arp.detect_storm_period: 100 |
| arp.detect_storm_period: 100 |
| |
| |
| # Attempt to detect duplicate use of IP addresses |
| # Attempt to detect duplicate use of IP addresses |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| arp.detect_duplicate_ips: TRUE |
| arp.detect_duplicate_ips: TRUE |
| |
| |
| # The UDP port on which Art-Net packets will be sent |
| # The UDP port on which Art-Net packets will be sent |
| # A decimal number. |
| # A decimal number. |
| artnet.udp_port: 6454 |
| artnet.udp_port: 6454 |
| |
| |
| # The way DMX values are displayed |
| # The way DMX values are displayed |
| # One of: Percent, Hexadecimal, Decimal |
| # One of: Percent, Hexadecimal, Decimal |
| # (case-insensitive). |
| # (case-insensitive). |
| artnet.dmx_disp_chan_val_type: Percent |
| artnet.dmx_disp_chan_val_type: Percent |
| |
| |
| # The way DMX channel numbers are displayed |
| # The way DMX channel numbers are displayed |
| # One of: Hexadecimal, Decimal |
| # One of: Hexadecimal, Decimal |
| # (case-insensitive). |
| # (case-insensitive). |
| artnet.dmx_disp_chan_nr_type: Hexadecimal |
| artnet.dmx_disp_chan_nr_type: Hexadecimal |
| |
| |
| # The number of columns for the DMX display |
| # The number of columns for the DMX display |
| # One of: 6, 10, 12, 16, 24 |
| # One of: 6, 10, 12, 16, 24 |
| # (case-insensitive). |
| # (case-insensitive). |
| artnet.dmx_disp_col_count: 16 |
| artnet.dmx_disp_col_count: 16 |
| |
| |
| # The TCP ports on which ASN.1 messages will be read |
| # The TCP ports on which ASN.1 messages will be read |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| asn1.tcp_ports: 0 |
| asn1.tcp_ports: 0 |
| |
| |
| # The UDP ports on which ASN.1 messages will be read |
| # The UDP ports on which ASN.1 messages will be read |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| asn1.udp_ports: 0 |
| asn1.udp_ports: 0 |
| |
| |
| # The SCTP ports on which ASN.1 messages will be read |
| # The SCTP ports on which ASN.1 messages will be read |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| asn1.sctp_ports: 0 |
| asn1.sctp_ports: 0 |
| |
| |
| # Desegment ASN.1 messages that span TCP segments |
| # Desegment ASN.1 messages that span TCP segments |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| asn1.desegment_messages: TRUE |
| asn1.desegment_messages: TRUE |
| |
| |
| # Compiled ASN.1 description of ASN.1 types |
| # Compiled ASN.1 description of ASN.1 types |
| # A string. |
| # A string. |
| asn1.file: |
| asn1.file: |
| |
| |
| # Name of top level PDU |
| # Name of top level PDU |
| # A string. |
| # A string. |
| asn1.pdu_name: ASN1 |
| asn1.pdu_name: ASN1 |
| |
| |
| # Offset for non-reassembled packets, wrong if this happens on other than the first packet! |
| # Offset for non-reassembled packets, wrong if this happens on other than the first packet! |
| # A decimal number. |
| # A decimal number. |
| asn1.first_pdu_offset: 0 |
| asn1.first_pdu_offset: 0 |
| |
| |
| # Show full names for all values |
| # Show full names for all values |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| asn1.flat: FALSE |
| asn1.flat: FALSE |
| |
| |
| # Allow this recursion level for eliminated type references |
| # Allow this recursion level for eliminated type references |
| # One of: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 |
| # One of: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 |
| # (case-insensitive). |
| # (case-insensitive). |
| asn1.type_recursion: 1 |
| asn1.type_recursion: 1 |
| |
| |
| # Extra output useful for debugging |
| # Extra output useful for debugging |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| asn1.debug: FALSE |
| asn1.debug: FALSE |
| |
| |
| # log to file $TMP/wireshark.log |
| # log to file $TMP/wireshark.log |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| asn1.verbose_log: FALSE |
| asn1.verbose_log: FALSE |
| |
| |
| # Autodection between LANE and SSCOP is hard. As default LANE is preferred |
| # Autodection between LANE and SSCOP is hard. As default LANE is preferred |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| atm.dissect_lane_as_sscop: FALSE |
| atm.dissect_lane_as_sscop: FALSE |
| |
| |
| # Whether the ATP dissector should reassemble messages spanning multiple DDP packets |
| # Whether the ATP dissector should reassemble messages spanning multiple DDP packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| atp.desegment: TRUE |
| atp.desegment: TRUE |
| |
| |
| # Set the port for B.A.T.M.A.N. BAT messages (if other than the default of 4305) |
| # Set the port for B.A.T.M.A.N. BAT messages (if other than the default of 4305) |
| # A decimal number. |
| # A decimal number. |
| bat.batman.bat.port: 4305 |
| bat.batman.bat.port: 4305 |
| |
| |
| # Set the port for B.A.T.M.A.N. Gateway messages (if other than the default of 4306) |
| # Set the port for B.A.T.M.A.N. Gateway messages (if other than the default of 4306) |
| # A decimal number. |
| # A decimal number. |
| bat.batman.gw.port: 4306 |
| bat.batman.gw.port: 4306 |
| |
| |
| # Set the port for B.A.T.M.A.N. VIS messages (if other than the default of 4307) |
| # Set the port for B.A.T.M.A.N. VIS messages (if other than the default of 4307) |
| # A decimal number. |
| # A decimal number. |
| bat.batman.vis.port: 4307 |
| bat.batman.vis.port: 4307 |
| |
| |
| # Set the port for BEEP messages (if other than the default of 10288) |
| # Set the port for BEEP messages (if other than the default of 10288) |
| # A decimal number. |
| # A decimal number. |
| beep.tcp.port: 10288 |
| beep.tcp.port: 10288 |
| |
| |
| # Specifies that BEEP requires CRLF as a terminator, and not just CR or LF |
| # Specifies that BEEP requires CRLF as a terminator, and not just CR or LF |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| beep.strict_header_terminator: TRUE |
| beep.strict_header_terminator: TRUE |
| |
| |
| # Whether the dissector should also display internal ASN.1 BER details such as Identifier and Length fields |
| # Whether the dissector should also display internal ASN.1 BER details such as Identifier and Length fields |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ber.show_internals: FALSE |
| ber.show_internals: FALSE |
| |
| |
| # Whether the dissector should decode unexpected tags as ASN.1 BER encoded data |
| # Whether the dissector should decode unexpected tags as ASN.1 BER encoded data |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ber.decode_unexpected: FALSE |
| ber.decode_unexpected: FALSE |
| |
| |
| # Whether the dissector should try decoding OCTET STRINGs as constructed ASN.1 BER encoded data |
| # Whether the dissector should try decoding OCTET STRINGs as constructed ASN.1 BER encoded data |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ber.decode_octetstring: FALSE |
| ber.decode_octetstring: FALSE |
| |
| |
| # Whether the BGP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the BGP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| bgp.desegment: TRUE |
| bgp.desegment: TRUE |
| |
| |
| # BGP dissector detect the length of the AS number in AS_PATH attributes automatically or manually (NOTE: Automatic detection is not 100% accurate) |
| # BGP dissector detect the length of the AS number in AS_PATH attributes automatically or manually (NOTE: Automatic detection is not 100% accurate) |
| # One of: Auto-detect, 2 octet, 4 octet |
| # One of: Auto-detect, 2 octet, 4 octet |
| # (case-insensitive). |
| # (case-insensitive). |
| bgp.asn_len: Auto-detect |
| bgp.asn_len: Auto-detect |
| |
| |
| # Whether the BitTorrent dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the BitTorrent dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| bittorrent.desegment: TRUE |
| bittorrent.desegment: TRUE |
| |
| |
| # Enabling this will tell which BitTorrent client that produced the handshake message |
| # Enabling this will tell which BitTorrent client that produced the handshake message |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| bittorrent.decode_client: FALSE |
| bittorrent.decode_client: FALSE |
| |
| |
| # Novell Servers option 85 can be configured as a string instead of address |
| # Novell Servers option 85 can be configured as a string instead of address |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| bootp.novellserverstring: FALSE |
| bootp.novellserverstring: FALSE |
| |
| |
| # The PacketCable CCC protocol version |
| # The PacketCable CCC protocol version |
| # One of: PKT-SP-PROV-I05-021127, IETF Draft 5, RFC 3495 |
| # One of: PKT-SP-PROV-I05-021127, IETF Draft 5, RFC 3495 |
| # (case-insensitive). |
| # (case-insensitive). |
| bootp.pkt.ccc.protocol_version: RFC 3495 |
| bootp.pkt.ccc.protocol_version: RFC 3495 |
| |
| |
| # Option Number for PacketCable CableLabs Client Configuration |
| # Option Number for PacketCable CableLabs Client Configuration |
| # A decimal number. |
| # A decimal number. |
| bootp.pkt.ccc.option: 122 |
| bootp.pkt.ccc.option: 122 |
| |
| |
| # Format: OptionNumber,OptionName,OptionType[;Format]. |
| # Format: OptionNumber,OptionName,OptionType[;Format]. |
| # Example: 176,MyOption,string;242,NewOption,ipv4. |
| # Example: 176,MyOption,string;242,NewOption,ipv4. |
| # OptionNumbers: 1-254, but no special options. OptionType: string, ipv4 and bytes |
| # OptionNumbers: 1-254, but no special options. OptionType: string, ipv4 and bytes |
| # A string. |
| # A string. |
| bootp.displayasstring: |
| bootp.displayasstring: |
| |
| |
| # For the sake of sub-dissectors registering to accept data from the BSSAP/BSAP dissector, this defines whether it is identified as BSSAP or BSAP. |
| # For the sake of sub-dissectors registering to accept data from the BSSAP/BSAP dissector, this defines whether it is identified as BSSAP or BSAP. |
| # One of: BSSAP, BSAP |
| # One of: BSSAP, BSAP |
| # (case-insensitive). |
| # (case-insensitive). |
| bssap.bsap_or_bssap: BSSAP |
| bssap.bsap_or_bssap: BSSAP |
| |
| |
| # GSM-A is the interface between the BSC and the MSC. Lb is the interface between the BSC and the SMLC. |
| # GSM-A is the interface between the BSC and the MSC. Lb is the interface between the BSC and the SMLC. |
| # One of: GSM A, Lb |
| # One of: GSM A, Lb |
| # (case-insensitive). |
| # (case-insensitive). |
| bssap.gsm_or_lb_interface: GSM A |
| bssap.gsm_or_lb_interface: GSM A |
| |
| |
| # Set Subsystem number used for BSSAP/BSSAP+ |
| # Set Subsystem number used for BSSAP/BSSAP+ |
| # A decimal number. |
| # A decimal number. |
| bssap.ssn: 98 |
| bssap.ssn: 98 |
| |
| |
| # Decode NRI (for use with SGSN in Pool) |
| # Decode NRI (for use with SGSN in Pool) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| bssgp.decode_nri: FALSE |
| bssgp.decode_nri: FALSE |
| |
| |
| # NRI length, in bits |
| # NRI length, in bits |
| # A decimal number. |
| # A decimal number. |
| bssgp.nri_length: 4 |
| bssgp.nri_length: 4 |
| |
| |
| # Whether the ACL dissector should reassemble fragmented PDUs |
| # Whether the ACL dissector should reassemble fragmented PDUs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| bthci_acl.btacl_reassembly: TRUE |
| bthci_acl.btacl_reassembly: TRUE |
| |
| |
| # Set an additional UDP port, besides the standard X'BAC0' (47808) port. |
| # Set an additional UDP port, besides the standard X'BAC0' (47808) port. |
| # A decimal number. |
| # A decimal number. |
| bvlc.additional_udp_port: 0 |
| bvlc.additional_udp_port: 0 |
| |
| |
| # The date format: (DD/MM) or (MM/DD) |
| # The date format: (DD/MM) or (MM/DD) |
| # One of: DD/MM/YYYY, MM/DD/YYYY |
| # One of: DD/MM/YYYY, MM/DD/YYYY |
| # (case-insensitive). |
| # (case-insensitive). |
| camel.date.format: DD/MM/YYYY |
| camel.date.format: DD/MM/YYYY |
| |
| |
| # TCAP Subsystem numbers used for Camel |
| # TCAP Subsystem numbers used for Camel |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| camel.tcap.ssn: 6-9 |
| camel.tcap.ssn: 6-9 |
| |
| |
| # Activate the analyse for Response Time |
| # Activate the analyse for Response Time |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| camel.srt: FALSE |
| camel.srt: FALSE |
| |
| |
| # Statistics for Response Time |
| # Statistics for Response Time |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| camel.persistentsrt: FALSE |
| camel.persistentsrt: FALSE |
| |
| |
| # Whether the CAST dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the CAST dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| cast.reassembly: TRUE |
| cast.reassembly: TRUE |
| |
| |
| # Set the port(s) for NetFlow messages (default: 2055,9996) |
| # Set the port(s) for NetFlow messages (default: 2055,9996) |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| cflow.netflow.ports: 2055,9996 |
| cflow.netflow.ports: 2055,9996 |
| |
| |
| # Set the port(s) for IPFIX messages (default: 4739) |
| # Set the port(s) for IPFIX messages (default: 4739) |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| cflow.ipfix.ports: 4739 |
| cflow.ipfix.ports: 4739 |
| |
| |
| # The type of CHDLC frame checksum (none, 16-bit, 32-bit) |
| # The type of CHDLC frame checksum (none, 16-bit, 32-bit) |
| # One of: None, 16-Bit, 32-Bit |
| # One of: None, 16-Bit, 32-Bit |
| # (case-insensitive). |
| # (case-insensitive). |
| chdlc.fcs_type: None |
| chdlc.fcs_type: None |
| |
| |
| # The version of CIGI with which to dissect packets |
| # The version of CIGI with which to dissect packets |
| # One of: From Packet, CIGI 2, CIGI 3 |
| # One of: From Packet, CIGI 2, CIGI 3 |
| # (case-insensitive). |
| # (case-insensitive). |
| cigi.version: From Packet |
| cigi.version: From Packet |
| |
| |
| # The byte order with which to dissect CIGI packets (CIGI3) |
| # The byte order with which to dissect CIGI packets (CIGI3) |
| # One of: From Packet, Big-Endian, Little-Endian |
| # One of: From Packet, Big-Endian, Little-Endian |
| # (case-insensitive). |
| # (case-insensitive). |
| cigi.byte_order: From Packet |
| cigi.byte_order: From Packet |
| |
| |
| # IPv4 address or hostname of the host |
| # IPv4 address or hostname of the host |
| # A string. |
| # A string. |
| cigi.host: |
| cigi.host: |
| |
| |
| # IPv4 address or hostname of the image generator |
| # IPv4 address or hostname of the image generator |
| # A string. |
| # A string. |
| cigi.ig: |
| cigi.ig: |
| |
| |
| # NSAP selector for Transport Protocol (last byte in hex) |
| # NSAP selector for Transport Protocol (last byte in hex) |
| # A hexadecimal number. |
| # A hexadecimal number. |
| clnp.tp_nsap_selector: 0x21 |
| clnp.tp_nsap_selector: 0x21 |
| |
| |
| # Always try to decode NSDU as transport PDUs |
| # Always try to decode NSDU as transport PDUs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| clnp.always_decode_transport: FALSE |
| clnp.always_decode_transport: FALSE |
| |
| |
| # Whether segmented CLNP datagrams should be reassembled |
| # Whether segmented CLNP datagrams should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| clnp.reassemble: TRUE |
| clnp.reassemble: TRUE |
| |
| |
| # Whether the CMP-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the CMP-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| cmp.desegment: TRUE |
| cmp.desegment: TRUE |
| |
| |
| # Decode this TCP port's traffic as CMP. Set to "0" to disable. |
| # Decode this TCP port's traffic as CMP. Set to "0" to disable. |
| # A decimal number. |
| # A decimal number. |
| cmp.tcp_alternate_port: 0 |
| cmp.tcp_alternate_port: 0 |
| |
| |
| # Decode this TCP port's traffic as CMP-over-HTTP. Set to "0" to disable. Use this if the Content-Type is not set correctly. |
| # Decode this TCP port's traffic as CMP-over-HTTP. Set to "0" to disable. Use this if the Content-Type is not set correctly. |
| # A decimal number. |
| # A decimal number. |
| cmp.http_alternate_port: 0 |
| cmp.http_alternate_port: 0 |
| |
| |
| # Decode this TCP port's traffic as TCP-transport-style CMP-over-HTTP. Set to "0" to disable. Use this if the Content-Type is not set correctly. |
| # Decode this TCP port's traffic as TCP-transport-style CMP-over-HTTP. Set to "0" to disable. Use this if the Content-Type is not set correctly. |
| # A decimal number. |
| # A decimal number. |
| cmp.tcp_style_http_alternate_port: 0 |
| cmp.tcp_style_http_alternate_port: 0 |
| |
| |
| # Set the TCP port for COPS messages |
| # Set the TCP port for COPS messages |
| # A decimal number. |
| # A decimal number. |
| cops.tcp.cops_port: 3288 |
| cops.tcp.cops_port: 3288 |
| |
| |
| # Whether the COPS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the COPS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| cops.desegment: TRUE |
| cops.desegment: TRUE |
| |
| |
| # Decode the COPS messages using PacketCable clients. (Select port 2126) |
| # Decode the COPS messages using PacketCable clients. (Select port 2126) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| cops.packetcable: TRUE |
| cops.packetcable: TRUE |
| |
| |
| # PIB settings can be changed in the Name Resolution preferences |
| # PIB settings can be changed in the Name Resolution preferences |
| |
| |
| # Whether segmented COTP datagrams should be reassembled. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether segmented COTP datagrams should be reassembled. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| cotp.reassemble: TRUE |
| cotp.reassemble: TRUE |
| |
| |
| # How TSAPs should be displayed |
| # How TSAPs should be displayed |
| # One of: As strings if printable, As strings, As bytes |
| # One of: As strings if printable, As strings, As bytes |
| # (case-insensitive). |
| # (case-insensitive). |
| cotp.tsap_display: As strings if printable |
| cotp.tsap_display: As strings if printable |
| |
| |
| # Set the port for CPFI messages (if other than the default of 5000) |
| # Set the port for CPFI messages (if other than the default of 5000) |
| # A decimal number. |
| # A decimal number. |
| cpfi.udp.port: 5000 |
| cpfi.udp.port: 5000 |
| |
| |
| # Set the port for InstanceToInstance messages (if other than the default of 5001) |
| # Set the port for InstanceToInstance messages (if other than the default of 5001) |
| # A decimal number. |
| # A decimal number. |
| cpfi.udp.port2: 5001 |
| cpfi.udp.port2: 5001 |
| |
| |
| # Control the way the '-->' is displayed. When enabled, keeps the 'lowest valued' endpoint of the src-dest pair on the left, and the arrow moves to distinguish source from dest. When disabled, keeps the arrow pointing right so the source of the frame is always on the left. |
| # Control the way the '-->' is displayed. When enabled, keeps the 'lowest valued' endpoint of the src-dest pair on the left, and the arrow moves to distinguish source from dest. When disabled, keeps the arrow pointing right so the source of the frame is always on the left. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| cpfi.arrow_ctl: TRUE |
| cpfi.arrow_ctl: TRUE |
| |
| |
| # Set the destination UDP port Cisco wireless IDS messages |
| # Set the destination UDP port Cisco wireless IDS messages |
| # A decimal number. |
| # A decimal number. |
| cwids.udp.port: 0 |
| cwids.udp.port: 0 |
| |
| |
| # Set the port for DAP operations (if other than the default of 102) |
| # Set the port for DAP operations (if other than the default of 102) |
| # A decimal number. |
| # A decimal number. |
| dap.tcp.port: 102 |
| dap.tcp.port: 102 |
| |
| |
| # Whether the DCCP summary line should be shown in the protocol tree |
| # Whether the DCCP summary line should be shown in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dccp.summary_in_tree: TRUE |
| dccp.summary_in_tree: TRUE |
| |
| |
| # Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port |
| # Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dccp.try_heuristic_first: FALSE |
| dccp.try_heuristic_first: FALSE |
| |
| |
| # Whether to check the validity of the DCCP checksum |
| # Whether to check the validity of the DCCP checksum |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dccp.check_checksum: TRUE |
| dccp.check_checksum: TRUE |
| |
| |
| # Whether the DCE/RPC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the DCE/RPC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dcerpc.desegment_dcerpc: TRUE |
| dcerpc.desegment_dcerpc: TRUE |
| |
| |
| # Whether the DCE/RPC dissector should reassemble fragmented DCE/RPC PDUs |
| # Whether the DCE/RPC dissector should reassemble fragmented DCE/RPC PDUs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dcerpc.reassemble_dcerpc: TRUE |
| dcerpc.reassemble_dcerpc: TRUE |
| |
| |
| # Display some DCOM unmarshalled fields usually hidden |
| # Display some DCOM unmarshalled fields usually hidden |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dcom.display_unmarshalling_details: FALSE |
| dcom.display_unmarshalling_details: FALSE |
| |
| |
| # If a payload looks like its embedded in an IP primitive message, and there is a Wireshark dissector matching the DCT2000 protocol name, try parsing the payload using that dissector |
| # If a payload looks like its embedded in an IP primitive message, and there is a Wireshark dissector matching the DCT2000 protocol name, try parsing the payload using that dissector |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dct2000.ipprim_heuristic: TRUE |
| dct2000.ipprim_heuristic: TRUE |
| |
| |
| # If a payload looks like its embedded in an SCTP primitive message, and there is a Wireshark dissector matching the DCT2000 protocol name, try parsing the payload using that dissector |
| # If a payload looks like its embedded in an SCTP primitive message, and there is a Wireshark dissector matching the DCT2000 protocol name, try parsing the payload using that dissector |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dct2000.sctpprim_heuristic: TRUE |
| dct2000.sctpprim_heuristic: TRUE |
| |
| |
| # Set the port for DHCP failover communications |
| # Set the port for DHCP failover communications |
| # A decimal number. |
| # A decimal number. |
| dhcpfo.tcp_port: 519 |
| dhcpfo.tcp_port: 519 |
| |
| |
| # Whether the DHCP failover dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the DHCP failover dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dhcpfo.desegment: TRUE |
| dhcpfo.desegment: TRUE |
| |
| |
| # TCP ports to be decoded as Diameter (default: 3868) |
| # TCP ports to be decoded as Diameter (default: 3868) |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| diameter.tcp.ports: 3868,3868 |
| diameter.tcp.ports: 3868 |
| |
| |
| # Set the SCTP port for Diameter messages |
| # Set the SCTP port for Diameter messages |
| # A decimal number. |
| # A decimal number. |
| diameter.sctp.port: 3868 |
| diameter.sctp.port: 3868 |
| |
| |
| # Whether the Diameter dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the Diameter dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| diameter.desegment: TRUE |
| diameter.desegment: TRUE |
| |
| |
| # DICOM Ports range |
| # DICOM Ports range |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| dicom.tcp.port: 104 |
| dicom.tcp.port: 104 |
| |
| |
| # When enabled, the DICOM dissector will parse all TCP packets not handled by any other dissector and look for an association request. Disabled by default, to preserve resources for the non DICOM community. |
| # When enabled, the DICOM dissector will parse all TCP packets not handled by any other dissector and look for an association request. Disabled by default, to preserve resources for the non DICOM community. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dicom.heuristic: FALSE |
| dicom.heuristic: FALSE |
| |
| |
| # Create DICOM File Meta Header according to PS 3.10 on export for PDUs. If the captured PDV does not contain a SOP Class UID and SOP Instance UID (e.g. for command PDVs), wireshark specific ones will be created. |
| # Create DICOM File Meta Header according to PS 3.10 on export for PDUs. If the captured PDV does not contain a SOP Class UID and SOP Instance UID (e.g. for command PDVs), wireshark specific ones will be created. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dicom.export_header: TRUE |
| dicom.export_header: TRUE |
| |
| |
| # Do not show items below this size in the export list. Set it to 0, to see DICOM commands and responses in the list. Set it higher, to just export DICOM IODs (i.e. CT Images, RT Structures). |
| # Do not show items below this size in the export list. Set it to 0, to see DICOM commands and responses in the list. Set it higher, to just export DICOM IODs (i.e. CT Images, RT Structures). |
| # A decimal number. |
| # A decimal number. |
| dicom.export_minsize: 4096 |
| dicom.export_minsize: 4096 |
| |
| |
| # Create a node for sequences and items, and show children in a hierarchy. Deselect this option, if you prefer a flat display or e.g. when using TShark to create a text output. |
| # Create a node for sequences and items, and show children in a hierarchy. Deselect this option, if you prefer a flat display or e.g. when using TShark to create a text output. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dicom.seq_tree: TRUE |
| dicom.seq_tree: TRUE |
| |
| |
| # Create a node for a tag and show tag details as single elements. This can be useful to debug a tag and to allow display filters on these attributes. When using TShark to create a text output, it's better to have it disabled. |
| # Create a node for a tag and show tag details as single elements. This can be useful to debug a tag and to allow display filters on these attributes. When using TShark to create a text output, it's better to have it disabled. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dicom.tag_tree: FALSE |
| dicom.tag_tree: FALSE |
| |
| |
| # Show message ID and number of completed, remaining, warned or failed operations in header and info column. |
| # Show message ID and number of completed, remaining, warned or failed operations in header and info column. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dicom.cmd_details: TRUE |
| dicom.cmd_details: TRUE |
| |
| |
| # Set the UDP port for DIS messages |
| # Set the UDP port for DIS messages |
| # A decimal number. |
| # A decimal number. |
| dis.udp.port: 3000 |
| dis.udp.port: 3000 |
| |
| |
| # Set the port for DISP operations (if other than the default of 102) |
| # Set the port for DISP operations (if other than the default of 102) |
| # A decimal number. |
| # A decimal number. |
| disp.tcp.port: 102 |
| disp.tcp.port: 102 |
| |
| |
| # Set the TCP port for DISTCC messages |
| # Set the TCP port for DISTCC messages |
| # A decimal number. |
| # A decimal number. |
| distcc.tcp.port: 3632 |
| distcc.tcp.port: 3632 |
| |
| |
| # Whether the DISTCC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the DISTCC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| distcc.desegment_distcc_over_tcp: TRUE |
| distcc.desegment_distcc_over_tcp: TRUE |
| |
| |
| # Set the TCP port for Distributed Lock Manager |
| # Set the TCP port for Distributed Lock Manager |
| # A decimal number. |
| # A decimal number. |
| dlm3.tcp.port: 21064 |
| dlm3.tcp.port: 21064 |
| |
| |
| # Set the SCTP port for Distributed Lock Manager |
| # Set the SCTP port for Distributed Lock Manager |
| # A decimal number. |
| # A decimal number. |
| dlm3.sctp.port: 21064 |
| dlm3.sctp.port: 21064 |
| |
| |
| # Port numbers used for DMP traffic |
| # Port numbers used for DMP traffic |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| dmp.udp_ports: |
| dmp.udp_ports: |
| |
| |
| # Calculate sequence/acknowledgement analysis |
| # Calculate sequence/acknowledgement analysis |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dmp.seq_ack_analysis: TRUE |
| dmp.seq_ack_analysis: TRUE |
| |
| |
| # Align identifiers in info list (does not align when retransmission or duplicate acknowledgement indication) |
| # Align identifiers in info list (does not align when retransmission or duplicate acknowledgement indication) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dmp.align_ids: FALSE |
| dmp.align_ids: FALSE |
| |
| |
| # Print subject as body id in free text messages with subject |
| # Print subject as body id in free text messages with subject |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dmp.subject_as_id: FALSE |
| dmp.subject_as_id: FALSE |
| |
| |
| # Format of the structured message id |
| # Format of the structured message id |
| # One of: None, 1 Byte value, 2 Byte value, 4 Byte value, 8 Byte value, Fixed text string, Zero terminated text string |
| # One of: None, 1 Byte value, 2 Byte value, 4 Byte value, 8 Byte value, Fixed text string, Zero terminated text string |
| # (case-insensitive). |
| # (case-insensitive). |
| dmp.struct_print: None |
| dmp.struct_print: None |
| |
| |
| # Used to set where the structured message id starts in the User Data |
| # Used to set where the structured message id starts in the User Data |
| # A decimal number. |
| # A decimal number. |
| dmp.struct_offset: 0 |
| dmp.struct_offset: 0 |
| |
| |
| # Used to set length of fixed text string in the structured message id format (maximum 128 characters) |
| # Used to set length of fixed text string in the structured message id format (maximum 128 characters) |
| # A decimal number. |
| # A decimal number. |
| dmp.struct_length: 1 |
| dmp.struct_length: 1 |
| |
| |
| # Whether the DNP3 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the DNP3 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dnp3.desegment: TRUE |
| dnp3.desegment: TRUE |
| |
| |
| # Whether the DNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the DNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dns.desegment_dns_messages: TRUE |
| dns.desegment_dns_messages: TRUE |
| |
| |
| # Set the port for DOP operations (if other than the default of 102) |
| # Set the port for DOP operations (if other than the default of 102) |
| # A decimal number. |
| # A decimal number. |
| dop.tcp.port: 102 |
| dop.tcp.port: 102 |
| |
| |
| # Whether the DRDA dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the DRDA dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| drda.desegment: TRUE |
| drda.desegment: TRUE |
| |
| |
| # Whether the DSI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the DSI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dsi.desegment: TRUE |
| dsi.desegment: TRUE |
| |
| |
| # Set the port for DSP operations (if other than the default of 102) |
| # Set the port for DSP operations (if other than the default of 102) |
| # A decimal number. |
| # A decimal number. |
| dsp.tcp.port: 102 |
| dsp.tcp.port: 102 |
| |
| |
| # semicolon separated list of private RSA keys used for DTLS decryption; each list entry must be in the form of <ip>,<port>,<protocol>,<key_file_name><key_file_name> is the local file name of the RSA private key used by the specified server |
| # semicolon separated list of private RSA keys used for DTLS decryption; each list entry must be in the form of <ip>,<port>,<protocol>,<key_file_name><key_file_name> is the local file name of the RSA private key used by the specified server |
| # |
| # |
| # A string. |
| # A string. |
| dtls.keys_list: |
| dtls.keys_list: |
| |
| |
| # redirect dtls debug to file name; leave empty to disable debug, use "-" to redirect output to stderr |
| # redirect dtls debug to file name; leave empty to disable debug, use "-" to redirect output to stderr |
| # |
| # |
| # A string. |
| # A string. |
| dtls.debug_file: |
| dtls.debug_file: |
| |
| |
| # Set the TDP port for the DTPT Server |
| # Set the TDP port for the DTPT Server |
| # A decimal number. |
| # A decimal number. |
| dtpt.tcp.port: 5721 |
| dtpt.tcp.port: 5721 |
| |
| |
| # Allow only packets with Major=0x03//Minor=0xFF as DVMRP V3 packets |
| # Allow only packets with Major=0x03//Minor=0xFF as DVMRP V3 packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| dvmrp.strict_v3: FALSE |
| dvmrp.strict_v3: FALSE |
| |
| |
| # Whether the eDonkey dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the eDonkey dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| edonkey.desegment: TRUE |
| edonkey.desegment: TRUE |
| |
| |
| # Whether the EtherNet/IP dissector should desegment all messages spanning multiple TCP segments |
| # Whether the EtherNet/IP dissector should desegment all messages spanning multiple TCP segments |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| enip.desegment: TRUE |
| enip.desegment: TRUE |
| |
| |
| # The UDP port on which ENTTEC packets will be sent |
| # The UDP port on which ENTTEC packets will be sent |
| # A decimal number. |
| # A decimal number. |
| enttec.udp_port: 3333 |
| enttec.udp_port: 3333 |
| |
| |
| # The TCP port on which ENTTEC packets will be sent |
| # The TCP port on which ENTTEC packets will be sent |
| # A decimal number. |
| # A decimal number. |
| enttec.tcp_port: 3333 |
| enttec.tcp_port: 3333 |
| |
| |
| # The way DMX values are displayed |
| # The way DMX values are displayed |
| # One of: Percent, Hexadecimal, Decimal |
| # One of: Percent, Hexadecimal, Decimal |
| # (case-insensitive). |
| # (case-insensitive). |
| enttec.dmx_disp_chan_val_type: Percent |
| enttec.dmx_disp_chan_val_type: Percent |
| |
| |
| # The way DMX channel numbers are displayed |
| # The way DMX channel numbers are displayed |
| # One of: Hexadecimal, Decimal |
| # One of: Hexadecimal, Decimal |
| # (case-insensitive). |
| # (case-insensitive). |
| enttec.dmx_disp_chan_nr_type: Hexadecimal |
| enttec.dmx_disp_chan_nr_type: Hexadecimal |
| |
| |
| # The number of columns for the DMX display |
| # The number of columns for the DMX display |
| # One of: 6, 10, 12, 16, 24 |
| # One of: 6, 10, 12, 16, 24 |
| # (case-insensitive). |
| # (case-insensitive). |
| enttec.dmx_disp_col_count: 16 |
| enttec.dmx_disp_col_count: 16 |
| |
| |
| # If you are capturing in networks with multiplexed or slow nodes, this can be useful |
| # If you are capturing in networks with multiplexed or slow nodes, this can be useful |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| epl.show_soc_flags: FALSE |
| epl.show_soc_flags: FALSE |
| |
| |
| # Protocol encapsulated in HDLC records |
| # Protocol encapsulated in HDLC records |
| # One of: Cisco HDLC, PPP serial, Frame Relay, SS7 MTP2, Attempt to guess |
| # One of: Cisco HDLC, PPP serial, Frame Relay, SS7 MTP2, Attempt to guess |
| # (case-insensitive). |
| # (case-insensitive). |
| erf.hdlc_type: SS7 MTP2 |
| erf.hdlc_type: Attempt to guess |
| |
| |
| # Whether raw ATM cells should be treated as the first cell of an AAL5 PDU |
| # Whether raw ATM cells should be treated as the first cell of an AAL5 PDU |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| erf.rawcell_first: FALSE |
| erf.rawcell_first: FALSE |
| |
| |
| # Protocol encapsulated in ATM AAL5 packets |
| # Protocol encapsulated in ATM AAL5 packets |
| # One of: Attempt to guess, LLC multiplexed |
| # One of: Attempt to guess, LLC multiplexed |
| # (case-insensitive). |
| # (case-insensitive). |
| erf.aal5_type: Attempt to guess |
| erf.aal5_type: Attempt to guess |
| |
| |
| # Whether the FCS is present in Ethernet packets |
| # Whether the FCS is present in Ethernet packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| erf.ethfcs: TRUE |
| erf.ethfcs: TRUE |
| |
| |
| # This is done only if the Decoding is not SET or the packet does not belong to a SA. Assumes a 12 byte auth (HMAC-SHA1-96/HMAC-MD5-96/AES-XCBC-MAC-96) and attempts decode based on the ethertype 13 bytes from packet end |
| # This is done only if the Decoding is not SET or the packet does not belong to a SA. Assumes a 12 byte auth (HMAC-SHA1-96/HMAC-MD5-96/AES-XCBC-MAC-96) and attempts decode based on the ethertype 13 bytes from packet end |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| esp.enable_null_encryption_decode_heuristic: FALSE |
| esp.enable_null_encryption_decode_heuristic: FALSE |
| |
| |
| # Attempt to decode based on the SAD described hereafter. |
| # Attempt to decode based on the SAD described hereafter. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| esp.enable_encryption_decode: FALSE |
| esp.enable_encryption_decode: FALSE |
| |
| |
| # Attempt to Check ESP Authentication based on the SAD described hereafter. |
| # Attempt to Check ESP Authentication based on the SAD described hereafter. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| esp.enable_authentication_check: FALSE |
| esp.enable_authentication_check: FALSE |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_1: |
| esp.sa_1: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_1: NULL |
| esp.encryption_algorithm_1: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_1: NULL |
| esp.authentication_algorithm_1: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_1: |
| esp.encryption_key_1: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_1: |
| esp.authentication_key_1: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_2: |
| esp.sa_2: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_2: NULL |
| esp.encryption_algorithm_2: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_2: NULL |
| esp.authentication_algorithm_2: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_2: |
| esp.encryption_key_2: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_2: |
| esp.authentication_key_2: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_3: |
| esp.sa_3: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_3: NULL |
| esp.encryption_algorithm_3: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_3: NULL |
| esp.authentication_algorithm_3: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_3: |
| esp.encryption_key_3: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_3: |
| esp.authentication_key_3: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_4: |
| esp.sa_4: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_4: NULL |
| esp.encryption_algorithm_4: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_4: NULL |
| esp.authentication_algorithm_4: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_4: |
| esp.encryption_key_4: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_4: |
| esp.authentication_key_4: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_5: |
| esp.sa_5: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_5: NULL |
| esp.encryption_algorithm_5: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_5: NULL |
| esp.authentication_algorithm_5: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_5: |
| esp.encryption_key_5: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_5: |
| esp.authentication_key_5: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_6: |
| esp.sa_6: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_6: NULL |
| esp.encryption_algorithm_6: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_6: NULL |
| esp.authentication_algorithm_6: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_6: |
| esp.encryption_key_6: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_6: |
| esp.authentication_key_6: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_7: |
| esp.sa_7: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_7: NULL |
| esp.encryption_algorithm_7: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_7: NULL |
| esp.authentication_algorithm_7: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_7: |
| esp.encryption_key_7: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_7: |
| esp.authentication_key_7: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_8: |
| esp.sa_8: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_8: NULL |
| esp.encryption_algorithm_8: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_8: NULL |
| esp.authentication_algorithm_8: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_8: |
| esp.encryption_key_8: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_8: |
| esp.authentication_key_8: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_9: |
| esp.sa_9: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_9: NULL |
| esp.encryption_algorithm_9: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_9: NULL |
| esp.authentication_algorithm_9: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_9: |
| esp.encryption_key_9: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_9: |
| esp.authentication_key_9: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_10: |
| esp.sa_10: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_10: NULL |
| esp.encryption_algorithm_10: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_10: NULL |
| esp.authentication_algorithm_10: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_10: |
| esp.encryption_key_10: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_10: |
| esp.authentication_key_10: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_11: |
| esp.sa_11: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_11: NULL |
| esp.encryption_algorithm_11: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_11: NULL |
| esp.authentication_algorithm_11: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_11: |
| esp.encryption_key_11: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_11: |
| esp.authentication_key_11: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_12: |
| esp.sa_12: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_12: NULL |
| esp.encryption_algorithm_12: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_12: NULL |
| esp.authentication_algorithm_12: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_12: |
| esp.encryption_key_12: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_12: |
| esp.authentication_key_12: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_13: |
| esp.sa_13: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_13: NULL |
| esp.encryption_algorithm_13: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_13: NULL |
| esp.authentication_algorithm_13: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_13: |
| esp.encryption_key_13: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_13: |
| esp.authentication_key_13: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_14: |
| esp.sa_14: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_14: NULL |
| esp.encryption_algorithm_14: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_14: NULL |
| esp.authentication_algorithm_14: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_14: |
| esp.encryption_key_14: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_14: |
| esp.authentication_key_14: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_15: |
| esp.sa_15: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_15: NULL |
| esp.encryption_algorithm_15: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_15: NULL |
| esp.authentication_algorithm_15: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_15: |
| esp.encryption_key_15: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_15: |
| esp.authentication_key_15: |
| |
| |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # SA identifier. Must have the form "Protocol|Source Address|Destination Address|SPI". Example: "IPv4|192.168.0.45|10.1.2.7|*" See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for more details. |
| # A string. |
| # A string. |
| esp.sa_16: |
| esp.sa_16: |
| |
| |
| # Encryption algorithm |
| # Encryption algorithm |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # One of: NULL, TripleDES-CBC [RFC2451], AES-CBC [RFC3602], AES-CTR [RFC3686], DES-CBC [RFC2405], CAST5-CBC [RFC2144], BLOWFISH-CBC [RFC2451], TWOFISH-CBC |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.encryption_algorithm_16: NULL |
| esp.encryption_algorithm_16: NULL |
| |
| |
| # Authentication algorithm |
| # Authentication algorithm |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # One of: NULL, HMAC-SHA1-96 [RFC2404], HMAC-SHA256, HMAC-MD5-96 [RFC2403], HMAC-RIPEMD, ANY 12-bytes of Authentication [No Checking] |
| # (case-insensitive). |
| # (case-insensitive). |
| esp.authentication_algorithm_16: NULL |
| esp.authentication_algorithm_16: NULL |
| |
| |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Encryption key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.encryption_key_16: |
| esp.encryption_key_16: |
| |
| |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # Authentication key. May be ASCII or hexadecimal (if prepended with 0x).See the ESP Preferences page on the Wireshark wiki (http://wiki.wireshark.org/ESP_Preferences) for supported sizes. |
| # A string. |
| # A string. |
| esp.authentication_key_16: |
| esp.authentication_key_16: |
| |
| |
| # Some Ethernet adapters and drivers include the FCS at the end of a packet, others do not. The Ethernet dissector attempts to guess whether a captured packet has an FCS, but it cannot always guess correctly. |
| # Some Ethernet adapters and drivers include the FCS at the end of a packet, others do not. The Ethernet dissector attempts to guess whether a captured packet has an FCS, but it cannot always guess correctly. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| eth.assume_fcs: FALSE |
| eth.assume_fcs: FALSE |
| |
| |
| # Whether packets should be interpreted as coming from CheckPoint FireWall-1 monitor file if they look as if they do |
| # Whether packets should be interpreted as coming from CheckPoint FireWall-1 monitor file if they look as if they do |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| eth.interpret_as_fw1_monitor: FALSE |
| eth.interpret_as_fw1_monitor: FALSE |
| |
| |
| # Describe the conditions that must be true for the CCSDS dissector to be called |
| # Describe the conditions that must be true for the CCSDS dissector to be called |
| |
| |
| # Set the condition that must be true for the CCSDS dissector to be called |
| # Set the condition that must be true for the CCSDS dissector to be called |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| eth.ccsds_heuristic_length: FALSE |
| eth.ccsds_heuristic_length: FALSE |
| |
| |
| # Set the condition that must be true for the CCSDS dissector to be called |
| # Set the condition that must be true for the CCSDS dissector to be called |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| eth.ccsds_heuristic_version: FALSE |
| eth.ccsds_heuristic_version: FALSE |
| |
| |
| # Set the condition that must be true for the CCSDS dissector to be called |
| # Set the condition that must be true for the CCSDS dissector to be called |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| eth.ccsds_heuristic_header: FALSE |
| eth.ccsds_heuristic_header: FALSE |
| |
| |
| # Set the condition that must be true for the CCSDS dissector to be called |
| # Set the condition that must be true for the CCSDS dissector to be called |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| eth.ccsds_heuristic_bit: FALSE |
| eth.ccsds_heuristic_bit: FALSE |
| |
| |
| # Set TCP port 1 for etheric messages |
| # Set TCP port 1 for etheric messages |
| # A decimal number. |
| # A decimal number. |
| etheric.tcp.port1: 1806 |
| etheric.tcp.port1: 1806 |
| |
| |
| # Set TCP port 2 for etheric messages |
| # Set TCP port 2 for etheric messages |
| # A decimal number. |
| # A decimal number. |
| etheric.tcp.port2: 10002 |
| etheric.tcp.port2: 10002 |
| |
| |
| # Whether the EVRC dissector should process payload type 60 as legacy EVRC packets |
| # Whether the EVRC dissector should process payload type 60 as legacy EVRC packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| evrc.legacy_pt_60: FALSE |
| evrc.legacy_pt_60: FALSE |
| |
| |
| # Controls the display of the session's username in the info column. This is only displayed if the packet containing it was seen during this capture session. |
| # Controls the display of the session's username in the info column. This is only displayed if the packet containing it was seen during this capture session. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| exec.info_show_username: TRUE |
| exec.info_show_username: TRUE |
| |
| |
| # Controls the display of the command being run on the server by this session in the info column. This is only displayed if the packet containing it was seen during this capture session. |
| # Controls the display of the command being run on the server by this session in the info column. This is only displayed if the packet containing it was seen during this capture session. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| exec.info_show_command: FALSE |
| exec.info_show_command: FALSE |
| |
| |
| # If enabled, reassembly of multi-frame sequences is done |
| # If enabled, reassembly of multi-frame sequences is done |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| fc.reassemble: TRUE |
| fc.reassemble: TRUE |
| |
| |
| # This is the size of non-last frames in a multi-frame sequence |
| # This is the size of non-last frames in a multi-frame sequence |
| # A decimal number. |
| # A decimal number. |
| fc.max_frame_size: 1024 |
| fc.max_frame_size: 1024 |
| |
| |
| # Whether the FCIP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the FCIP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| fcip.desegment: TRUE |
| fcip.desegment: TRUE |
| |
| |
| # Port number used for FCIP |
| # Port number used for FCIP |
| # A decimal number. |
| # A decimal number. |
| fcip.target_port: 3225 |
| fcip.target_port: 3225 |
| |
| |
| # Whether the FDDI dissector should add 3-byte padding to all captured FDDI packets (useful with e.g. Tru64 UNIX tcpdump) |
| # Whether the FDDI dissector should add 3-byte padding to all captured FDDI packets (useful with e.g. Tru64 UNIX tcpdump) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| fddi.padding: FALSE |
| fddi.padding: FALSE |
| |
| |
| # Whether the FIX dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the FIX dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| fix.desegment: TRUE |
| fix.desegment: TRUE |
| |
| |
| # TCP Ports range |
| # TCP Ports range |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| fix.tcp.port: |
| fix.tcp.port: |
| |
| |
| # With this option display filters for fmp fhandle a RPC call, even if the actual fhandle is only present in one of the packets |
| # With this option display filters for fmp fhandle a RPC call, even if the actual fhandle is only present in one of the packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| fmp.fhandle_find_both_reqrep: FALSE |
| fmp.fhandle_find_both_reqrep: FALSE |
| |
| |
| # Encapsulation |
| # Encapsulation |
| # One of: FRF 3.2/Cisco HDLC, GPRS Network Service, Raw Ethernet |
| # One of: FRF 3.2/Cisco HDLC, GPRS Network Service, Raw Ethernet |
| # (case-insensitive). |
| # (case-insensitive). |
| fr.encap: FRF 3.2/Cisco HDLC |
| fr.encap: FRF 3.2/Cisco HDLC |
| |
| |
| # Show offset of frame in capture file |
| # Show offset of frame in capture file |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| frame.show_file_off: FALSE |
| frame.show_file_off: FALSE |
| |
| |
| # Treat all frames as DOCSIS Frames |
| # Treat all frames as DOCSIS Frames |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| frame.force_docsis_encap: FALSE |
| frame.force_docsis_encap: FALSE |
| |
| |
| # Whether or not MD5 hashes should be generated for each frame, useful for finding duplicate frames. |
| # Whether or not MD5 hashes should be generated for each frame, useful for finding duplicate frames. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| frame.generate_md5_hash: FALSE |
| frame.generate_md5_hash: FALSE |
| |
| |
| # Whether the FireWall-1 summary line should be shown in the protocol tree |
| # Whether the FireWall-1 summary line should be shown in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| fw1.summary_in_tree: TRUE |
| fw1.summary_in_tree: TRUE |
| |
| |
| # Whether the Firewall-1 monitor file includes UUID information |
| # Whether the Firewall-1 monitor file includes UUID information |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| fw1.with_uuid: FALSE |
| fw1.with_uuid: FALSE |
| |
| |
| # Whether the interface list includes the chain position |
| # Whether the interface list includes the chain position |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| fw1.iflist_with_chain: FALSE |
| fw1.iflist_with_chain: FALSE |
| |
| |
| # Whether the GIOP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the GIOP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| giop.desegment_giop_messages: TRUE |
| giop.desegment_giop_messages: TRUE |
| |
| |
| # File containing stringified IORs, one per line. |
| # File containing stringified IORs, one per line. |
| # A string. |
| # A string. |
| giop.ior_txt: IOR.txt |
| giop.ior_txt: IOR.txt |
| |
| |
| # Whether the Gryphon dissector should desegment all messages spanning multiple TCP segments |
| # Whether the Gryphon dissector should desegment all messages spanning multiple TCP segments |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gryphon.desegment: TRUE |
| gryphon.desegment: TRUE |
| |
| |
| # Always decode a GSM Short Message as Connectionless WSP if a Port Number Information Element is present in the SMS User Data Header. |
| # Always decode a GSM Short Message as Connectionless WSP if a Port Number Information Element is present in the SMS User Data Header. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gsm-sms-ud.port_number_udh_means_wsp: FALSE |
| gsm-sms-ud.port_number_udh_means_wsp: FALSE |
| |
| |
| # Always try subdissection of the 1st fragment of a fragmented GSM Short Message. If reassembly is possible, the Short Message may be dissected twice (once as a short frame, once in its entirety). |
| # Always try subdissection of the 1st fragment of a fragmented GSM Short Message. If reassembly is possible, the Short Message may be dissected twice (once as a short frame, once in its entirety). |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gsm-sms-ud.try_dissect_1st_fragment: FALSE |
| gsm-sms-ud.try_dissect_1st_fragment: FALSE |
| |
| |
| # Prevent sub-dissectors from replacing column data with their own. Eg. Prevent WSP dissector overwriting SMPP information. |
| # Prevent sub-dissectors from replacing column data with their own. Eg. Prevent WSP dissector overwriting SMPP information. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gsm-sms-ud.prevent_dissectors_chg_cols: FALSE |
| gsm-sms-ud.prevent_dissectors_chg_cols: FALSE |
| |
| |
| # TCAP Subsystem numbers used for GSM MAP |
| # TCAP Subsystem numbers used for GSM MAP |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| gsm_map.tcap.ssn: 6-10 |
| gsm_map.tcap.ssn: 6-9 |
| |
| |
| # Always try subdissection of 7bit, UCS2 Short Message fragment.If checked, every msg decode will shown in its fragment |
| # Always try subdissection of 7bit, UCS2 Short Message fragment.If checked, every msg decode will shown in its fragment |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gsm_sms.try_dissect_message_fragment: FALSE |
| gsm_sms.try_dissect_message_fragment: FALSE |
| |
| |
| # Treat ARFCN 512-810 as DCS 1800 rather than PCS 1900 |
| # Treat ARFCN 512-810 as DCS 1800 rather than PCS 1900 |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gsm_um.dcs1800: TRUE |
| gsm_um.dcs1800: TRUE |
| |
| |
| # Whether or not to try reassembling GSSAPI blobs spanning multiple (SMB/SessionSetup) PDUs |
| # Whether or not to try reassembling GSSAPI blobs spanning multiple (SMB/SessionSetup) PDUs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gss-api.gssapi_reassembly: TRUE |
| gss-api.gssapi_reassembly: TRUE |
| |
| |
| # GTPv0 port (default 3386) |
| # GTPv0 port (default 3386) |
| # A decimal number. |
| # A decimal number. |
| gtp.v0_port: 3386 |
| gtp.v0_port: 3386 |
| |
| |
| # GTPv1 control plane port (default 2123) |
| # GTPv1 control plane port (default 2123) |
| # A decimal number. |
| # A decimal number. |
| gtp.v1c_port: 2123 |
| gtp.v1c_port: 2123 |
| |
| |
| # GTPv1 user plane port (default 2152) |
| # GTPv1 user plane port (default 2152) |
| # A decimal number. |
| # A decimal number. |
| gtp.v1u_port: 2152 |
| gtp.v1u_port: 2152 |
| |
| |
| # Dissect T-PDU |
| # Dissect T-PDU |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gtp.dissect_tpdu: TRUE |
| gtp.dissect_tpdu: TRUE |
| |
| |
| # GTP ETSI order |
| # GTP ETSI order |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gtp.check_etsi: FALSE |
| gtp.check_etsi: FALSE |
| |
| |
| # Dissect GTP over TCP |
| # Dissect GTP over TCP |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| gtp.dissect_gtp_over_tcp: TRUE |
| gtp.dissect_gtp_over_tcp: TRUE |
| |
| |
| # H.225 Server TLS Port |
| # H.225 Server TLS Port |
| # A decimal number. |
| # A decimal number. |
| h225.tls.port: 1300 |
| h225.tls.port: 1300 |
| |
| |
| # Whether the H.225 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the H.225 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| h225.reassembly: TRUE |
| h225.reassembly: TRUE |
| |
| |
| # ON - display tunnelled H.245 inside H.225.0 tree, OFF - display tunnelled H.245 in root tree after H.225.0 |
| # ON - display tunnelled H.245 inside H.225.0 tree, OFF - display tunnelled H.245 in root tree after H.225.0 |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| h225.h245_in_tree: TRUE |
| h225.h245_in_tree: TRUE |
| |
| |
| # ON - display tunnelled protocols inside H.225.0 tree, OFF - display tunnelled protocols in root tree after H.225.0 |
| # ON - display tunnelled protocols inside H.225.0 tree, OFF - display tunnelled protocols in root tree after H.225.0 |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| h225.tp_in_tree: TRUE |
| h225.tp_in_tree: TRUE |
| |
| |
| # Whether the H.245 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the H.245 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| h245.reassembly: TRUE |
| h245.reassembly: TRUE |
| |
| |
| # Whether the dissector should show short names or the long names from the standard |
| # Whether the dissector should show short names or the long names from the standard |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| h245.shorttypes: FALSE |
| h245.shorttypes: FALSE |
| |
| |
| # Mantain relationships between transactions and contexts and display an extra tree showing context data |
| # Mantain relationships between transactions and contexts and display an extra tree showing context data |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| h248.ctx_info: FALSE |
| h248.ctx_info: FALSE |
| |
| |
| # Port to be decoded as h248 |
| # Port to be decoded as h248 |
| # A decimal number. |
| # A decimal number. |
| h248.udp_port: 2945 |
| h248.udp_port: 2945 |
| |
| |
| # Port to be decoded as h248 |
| # Port to be decoded as h248 |
| # A decimal number. |
| # A decimal number. |
| h248.tcp_port: 2945 |
| h248.tcp_port: 2945 |
| |
| |
| # Desegment H.248 messages that span more TCP segments |
| # Desegment H.248 messages that span more TCP segments |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| h248.desegment: TRUE |
| h248.desegment: TRUE |
| |
| |
| # The dynamic payload type which will be interpreted as H264; The value must be greater than 95 |
| # The dynamic payload type which will be interpreted as H264; The value must be greater than 95 |
| # A decimal number. |
| # A decimal number. |
| h263p.dynamic.payload.type: 0 |
| h263p.dynamic.payload.type: 0 |
| |
| |
| # The dynamic payload type which will be interpreted as H264; The value must be greater than 95 |
| # The dynamic payload type which will be interpreted as H264; The value must be greater than 95 |
| # A decimal number. |
| # A decimal number. |
| h264.dynamic.payload.type: 0 |
| h264.dynamic.payload.type: 0 |
| |
| |
| # Port to be decoded as h501 |
| # Port to be decoded as h501 |
| # A decimal number. |
| # A decimal number. |
| h501.udp.port: 2099 |
| h501.udp.port: 2099 |
| |
| |
| # Port to be decoded as h501 |
| # Port to be decoded as h501 |
| # A decimal number. |
| # A decimal number. |
| h501.tcp.port: 2099 |
| h501.tcp.port: 2099 |
| |
| |
| # Desegment H.501 messages that span more TCP segments |
| # Desegment H.501 messages that span more TCP segments |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| h501.desegment: TRUE |
| h501.desegment: TRUE |
| |
| |
| # Enable this dissector (default is false) |
| # Enable this dissector (default is false) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| hilscher.enable: FALSE |
| hilscher.enable: FALSE |
| |
| |
| # Whether the HTTP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the HTTP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| http.desegment_headers: TRUE |
| http.desegment_headers: TRUE |
| |
| |
| # Whether the HTTP dissector should use the "Content-length:" value, if present, to reassemble the body of a request spanning multiple TCP segments, and reassemble chunked data spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the HTTP dissector should use the "Content-length:" value, if present, to reassemble the body of a request spanning multiple TCP segments, and reassemble chunked data spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| http.desegment_body: TRUE |
| http.desegment_body: TRUE |
| |
| |
| # Whether to reassemble bodies of entities that are transfered using the "Transfer-Encoding: chunked" method |
| # Whether to reassemble bodies of entities that are transfered using the "Transfer-Encoding: chunked" method |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| http.dechunk_body: TRUE |
| http.dechunk_body: TRUE |
| |
| |
| # Whether to uncompress entity bodies that are compressed using "Content-Encoding: " |
| # Whether to uncompress entity bodies that are compressed using "Content-Encoding: " |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| http.decompress_body: TRUE |
| http.decompress_body: TRUE |
| |
| |
| # TCP Ports range |
| # TCP Ports range |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| http.tcp.port: 80,3128,3132,8080,8088,11371,3689,1900 |
| http.tcp.port: 80,3128,3132,8080,8088,11371,3689,1900 |
| |
| |
| # SSL/TLS Ports range |
| # SSL/TLS Ports range |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| http.ssl.port: 443 |
| http.ssl.port: 443 |
| |
| |
| # A table to define custom HTTP header for which fields can be setup and used for filtering/data extraction etc. |
| # A table to define custom HTTP header for which fields can be setup and used for filtering/data extraction etc. |
| |
| |
| # How the I2C messages are interpreted |
| # How the I2C messages are interpreted |
| # One of: None (raw I2C), IPMB |
| # One of: None (raw I2C), IPMB |
| # (case-insensitive). |
| # (case-insensitive). |
| i2c.type: IPMB |
| i2c.type: IPMB |
| |
| |
| # Whether the 128th and following bytes of the ICMP payload should be decoded as MPLS extensions or as a portion of the original packet |
| # Whether the 128th and following bytes of the ICMP payload should be decoded as MPLS extensions or as a portion of the original packet |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| icmp.favor_icmp_mpls: FALSE |
| icmp.favor_icmp_mpls: FALSE |
| |
| |
| # (Hexadecimal) Ethertype used to indicate IEEE 802.1ah tag. |
| # (Hexadecimal) Ethertype used to indicate IEEE 802.1ah tag. |
| # A hexadecimal number. |
| # A hexadecimal number. |
| ieee8021ah.8021ah_ethertype: 0x88f0 |
| ieee8021ah.8021ah_ethertype: 0x88e7 |
| |
| |
| # Whether the iFCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the iFCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ifcp.desegment: TRUE |
| ifcp.desegment: TRUE |
| |
| |
| # TCAP Subsystem numbers used for INAP |
| # TCAP Subsystem numbers used for INAP |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| inap.ssn: 106,241 |
| inap.ssn: 106,241 |
| |
| |
| # Whether the IPv4 type-of-service field should be decoded as a Differentiated Services field (see RFC2474/RFC2475) |
| # Whether the IPv4 type-of-service field should be decoded as a Differentiated Services field (see RFC2474/RFC2475) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ip.decode_tos_as_diffserv: TRUE |
| ip.decode_tos_as_diffserv: TRUE |
| |
| |
| # Whether fragmented IP datagrams should be reassembled |
| # Whether fragmented IP datagrams should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ip.defragment: TRUE |
| ip.defragment: TRUE |
| |
| |
| # Whether the IP summary line should be shown in the protocol tree |
| # Whether the IP summary line should be shown in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ip.summary_in_tree: TRUE |
| ip.summary_in_tree: TRUE |
| |
| |
| # Whether to validate the IP checksum |
| # Whether to validate the IP checksum |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ip.check_checksum: TRUE |
| ip.check_checksum: TRUE |
| |
| |
| # Whether to correct for TSO-enabled hardware captures, such as spoofing the IP packet length |
| # Whether to correct for TSO-enabled hardware captures, such as spoofing the IP packet length |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ip.tso_support: FALSE |
| ip.tso_support: FALSE |
| |
| |
| # Whether to look up IP addresses in each GeoIP database we have loaded |
| # Whether to look up IP addresses in each GeoIP database we have loaded |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ip.use_geoip: FALSE |
| ip.use_geoip: FALSE |
| |
| |
| # Whether the IPDC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the IPDC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ipdc.desegment_ipdc_messages: TRUE |
| ipdc.desegment_ipdc_messages: TRUE |
| |
| |
| # Set the IPDC monitoring port |
| # Set the IPDC monitoring port |
| # A decimal number. |
| # A decimal number. |
| ipdc.tcp.port: 6668 |
| ipdc.tcp.port: 6668 |
| |
| |
| # FRU Language Code is English; strings are ASCII+LATIN1 (vs. Unicode) |
| # FRU Language Code is English; strings are ASCII+LATIN1 (vs. Unicode) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ipmi.fru_langcode_is_english: TRUE |
| ipmi.fru_langcode_is_english: TRUE |
| |
| |
| # Do not search for responses coming after this timeout (milliseconds) |
| # Do not search for responses coming after this timeout (milliseconds) |
| # A decimal number. |
| # A decimal number. |
| ipmi.response_after_req: 5000 |
| ipmi.response_after_req: 5000 |
| |
| |
| # Allow for responses before requests (milliseconds) |
| # Allow for responses before requests (milliseconds) |
| # A decimal number. |
| # A decimal number. |
| ipmi.response_before_req: 0 |
| ipmi.response_before_req: 0 |
| |
| |
| # Format of messages embedded into Send/Get/Forward Message |
| # Format of messages embedded into Send/Get/Forward Message |
| # One of: None, IPMB, Session-based (LAN, ...), Use heuristics |
| # One of: None, IPMB, Session-based (LAN, ...), Use heuristics |
| # (case-insensitive). |
| # (case-insensitive). |
| ipmi.msgfmt: Use heuristics |
| ipmi.msgfmt: Use heuristics |
| |
| |
| # Selects which OEM format is used for commands that IPMI does not define |
| # Selects which OEM format is used for commands that IPMI does not define |
| # One of: None, Pigeon Point Systems |
| # One of: None, Pigeon Point Systems |
| # (case-insensitive). |
| # (case-insensitive). |
| ipmi.selected_oem: None |
| ipmi.selected_oem: None |
| |
| |
| # Whether fragmented IPv6 datagrams should be reassembled |
| # Whether fragmented IPv6 datagrams should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ipv6.defragment: TRUE |
| ipv6.defragment: TRUE |
| |
| |
| # Path to a pluto log file containing DH secret information |
| # Path to a pluto log file containing DH secret information |
| # A string. |
| # A string. |
| isakmp.log: insert pluto log path here |
| isakmp.log: insert pluto log path here |
| |
| |
| # Table of IKE_SA security parameters for decryption of IKEv2 packets |
| # Table of IKE_SA security parameters for decryption of IKEv2 packets |
| |
| |
| # The iSCSI protocol version |
| # The iSCSI protocol version |
| # One of: Draft 08, Draft 09, Draft 11, Draft 12, Draft 13 |
| # One of: Draft 08, Draft 09, Draft 11, Draft 12, Draft 13 |
| # (case-insensitive). |
| # (case-insensitive). |
| iscsi.protocol_version: Draft 13 |
| iscsi.protocol_version: Draft 13 |
| |
| |
| # Whether the iSCSI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the iSCSI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| iscsi.desegment_iscsi_messages: TRUE |
| iscsi.desegment_iscsi_messages: TRUE |
| |
| |
| # When enabled, packets that appear bogus are ignored |
| # When enabled, packets that appear bogus are ignored |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| iscsi.bogus_pdu_filter: TRUE |
| iscsi.bogus_pdu_filter: TRUE |
| |
| |
| # Ignore packets that haven't set the F bit when they should have |
| # Ignore packets that haven't set the F bit when they should have |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| iscsi.demand_good_f_bit: FALSE |
| iscsi.demand_good_f_bit: FALSE |
| |
| |
| # Treat packets whose data segment length is greater than this value as bogus |
| # Treat packets whose data segment length is greater than this value as bogus |
| # A decimal number. |
| # A decimal number. |
| iscsi.bogus_pdu_max_data_len: 262144 |
| iscsi.bogus_pdu_max_data_len: 262144 |
| |
| |
| # Port number of iSCSI target |
| # Port number of iSCSI target |
| # A decimal number. |
| # A decimal number. |
| iscsi.target_port: 3260 |
| iscsi.target_port: 3260 |
| |
| |
| # When enabled, pdus are assumed to contain a data digest |
| # When enabled, pdus are assumed to contain a data digest |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| iscsi.enable_data_digests: FALSE |
| iscsi.enable_data_digests: FALSE |
| |
| |
| # When enabled, data digests are assumed to be CRC32C |
| # When enabled, data digests are assumed to be CRC32C |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| iscsi.data_digest_is_crc32c: TRUE |
| iscsi.data_digest_is_crc32c: TRUE |
| |
| |
| # The size of a data digest (bytes) |
| # The size of a data digest (bytes) |
| # A decimal number. |
| # A decimal number. |
| iscsi.data_digest_size: 4 |
| iscsi.data_digest_size: 4 |
| |
| |
| # The dynamic payload type which will be interpreted as ISMACryp |
| # The dynamic payload type which will be interpreted as ISMACryp |
| # A decimal number. |
| # A decimal number. |
| ismacryp.dynamic.payload.type: 0 |
| ismacryp.dynamic.payload.type: 0 |
| |
| |
| # ISMACryp version |
| # ISMACryp version |
| # One of: ISMACryp v1.1, ISMACryp v2.0 |
| # One of: ISMACryp v1.1, ISMACryp v2.0 |
| # (case-insensitive). |
| # (case-insensitive). |
| ismacryp.version: ISMACryp v1.1 |
| ismacryp.version: ISMACryp v1.1 |
| |
| |
| # The following option allows the version to be set manually and to override the version if detected from RTP payload type: |
| # The following option allows the version to be set manually and to override the version if detected from RTP payload type: |
| |
| |
| # Indicates whether or not the ISMACryp version deduced from RTP payload type, if present, is used or whether the version above is used |
| # Indicates whether or not the ISMACryp version deduced from RTP payload type, if present, is used or whether the version above is used |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ismacryp.override_rtp_pt: FALSE |
| ismacryp.override_rtp_pt: FALSE |
| |
| |
| # ISMACryp v1.1 parameters declared in SDP |
| # ISMACryp v1.1 parameters declared in SDP |
| |
| |
| # Set the length of the IV in the ISMACryp AU Header in bytes |
| # Set the length of the IV in the ISMACryp AU Header in bytes |
| # A decimal number. |
| # A decimal number. |
| ismacryp.iv_length: 4 |
| ismacryp.iv_length: 4 |
| |
| |
| # Set the length of the Delta IV in the ISMACryp AU Header in bytes |
| # Set the length of the Delta IV in the ISMACryp AU Header in bytes |
| # A decimal number. |
| # A decimal number. |
| ismacryp.delta_iv_length: 0 |
| ismacryp.delta_iv_length: 0 |
| |
| |
| # Set the length of the Key Indicator in the ISMACryp AU Header in bytes |
| # Set the length of the Key Indicator in the ISMACryp AU Header in bytes |
| # A decimal number. |
| # A decimal number. |
| ismacryp.key_indicator_length: 0 |
| ismacryp.key_indicator_length: 0 |
| |
| |
| # Indicates whether or not the Key Indicator is present in all AU Headers (T/F) |
| # Indicates whether or not the Key Indicator is present in all AU Headers (T/F) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ismacryp.key_indicator_per_au_flag: FALSE |
| ismacryp.key_indicator_per_au_flag: FALSE |
| |
| |
| # Indicates whether or not selective encryption is enabled (T/F) |
| # Indicates whether or not selective encryption is enabled (T/F) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ismacryp.selective_encryption: TRUE |
| ismacryp.selective_encryption: TRUE |
| |
| |
| # ISMACryp v2.0 parameters declared in SDP |
| # ISMACryp v2.0 parameters declared in SDP |
| |
| |
| # Indicates whether or not slice start / end is present (T/F) |
| # Indicates whether or not slice start / end is present (T/F) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ismacryp.slice_indication: FALSE |
| ismacryp.slice_indication: FALSE |
| |
| |
| # Indicates whether or not padding information is present (T/F) |
| # Indicates whether or not padding information is present (T/F) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ismacryp.padding_indication: FALSE |
| ismacryp.padding_indication: FALSE |
| |
| |
| # AU parameters set according to RFC3640 mode or user defined |
| # AU parameters set according to RFC3640 mode or user defined |
| |
| |
| # RFC3640 mode |
| # RFC3640 mode |
| # One of: aac-hbr, mpeg4-video, avc-video |
| # One of: aac-hbr, mpeg4-video, avc-video |
| # (case-insensitive). |
| # (case-insensitive). |
| ismacryp.rfc3640_mode: avc-video |
| ismacryp.rfc3640_mode: avc-video |
| |
| |
| # Indicates use of user mode instead of RFC3640 modes (T/F) |
| # Indicates use of user mode instead of RFC3640 modes (T/F) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ismacryp.user_mode: FALSE |
| ismacryp.user_mode: FALSE |
| |
| |
| # AU parameters defined by the user |
| # AU parameters defined by the user |
| |
| |
| # Set the length of the AU size in the AU Header in bits |
| # Set the length of the AU size in the AU Header in bits |
| # A decimal number. |
| # A decimal number. |
| ismacryp.au_size_length: 0 |
| ismacryp.au_size_length: 0 |
| |
| |
| # Set the length of the AU index in the AU Header in bits |
| # Set the length of the AU index in the AU Header in bits |
| # A decimal number. |
| # A decimal number. |
| ismacryp.au_index_length: 0 |
| ismacryp.au_index_length: 0 |
| |
| |
| # Set the length of the AU delta index in the AU Header in bits |
| # Set the length of the AU delta index in the AU Header in bits |
| # A decimal number. |
| # A decimal number. |
| ismacryp.au_index_delta_length: 0 |
| ismacryp.au_index_delta_length: 0 |
| |
| |
| # Set the length of the CTS delta field in the AU Header in bits |
| # Set the length of the CTS delta field in the AU Header in bits |
| # A decimal number. |
| # A decimal number. |
| ismacryp.cts_delta_length: 0 |
| ismacryp.cts_delta_length: 0 |
| |
| |
| # Set the length of the DTS delta field in the AU Header in bits |
| # Set the length of the DTS delta field in the AU Header in bits |
| # A decimal number. |
| # A decimal number. |
| ismacryp.dts_delta_length: 0 |
| ismacryp.dts_delta_length: 0 |
| |
| |
| # Indicates whether or not the RAP field is present in the AU Header (T/F) |
| # Indicates whether or not the RAP field is present in the AU Header (T/F) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ismacryp.random_access_indication: FALSE |
| ismacryp.random_access_indication: FALSE |
| |
| |
| # Indicates the number of bits on which the stream state field is encoded in the AU Header (bits) |
| # Indicates the number of bits on which the stream state field is encoded in the AU Header (bits) |
| # A decimal number. |
| # A decimal number. |
| ismacryp.stream_state_indication: 0 |
| ismacryp.stream_state_indication: 0 |
| |
| |
| # Whether the iSNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the iSNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| isns.desegment: TRUE |
| isns.desegment: TRUE |
| |
| |
| # Show the CIC value (in addition to the message type) in the Info column |
| # Show the CIC value (in addition to the message type) in the Info column |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| isup.show_cic_in_info: TRUE |
| isup.show_cic_in_info: TRUE |
| |
| |
| # Whether APM messages datagrams should be reassembled |
| # Whether APM messages datagrams should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| isup.defragment_apm: TRUE |
| isup.defragment_apm: TRUE |
| |
| |
| # Set TCP port for ISUP Thin messages |
| # Set TCP port for ISUP Thin messages |
| # A decimal number. |
| # A decimal number. |
| isup_thin.tcp.port: 0 |
| isup_thin.tcp.port: 0 |
| |
| |
| # The MPLS label (aka Flow Bundle ID) used by ITDM traffic. |
| # The MPLS label (aka Flow Bundle ID) used by ITDM traffic. |
| # A hexadecimal number. |
| # A hexadecimal number. |
| itdm.mpls_label: 0x99887 |
| itdm.mpls_label: 0x99887 |
| |
| |
| # Flow Number used by I-TDM Control Protocol traffic. |
| # Flow Number used by I-TDM Control Protocol traffic. |
| # A decimal number. |
| # A decimal number. |
| itdm.ctl_flowno: 0 |
| itdm.ctl_flowno: 0 |
| |
| |
| # Support Implementers Guide (version 01) |
| # Support Implementers Guide (version 01) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| iua.support_ig: FALSE |
| iua.support_ig: FALSE |
| |
| |
| # Whether IuUP Payload bits should be dissected |
| # Whether IuUP Payload bits should be dissected |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| iuup.dissect_payload: FALSE |
| iuup.dissect_payload: FALSE |
| |
| |
| # The payload contains a two byte pseudoheader indicating direction and circuit_id |
| # The payload contains a two byte pseudoheader indicating direction and circuit_id |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| iuup.two_byte_pseudoheader: FALSE |
| iuup.two_byte_pseudoheader: FALSE |
| |
| |
| # The dynamic payload type which will be interpreted as IuUP |
| # The dynamic payload type which will be interpreted as IuUP |
| # A decimal number. |
| # A decimal number. |
| iuup.dynamic.payload.type: 0 |
| iuup.dynamic.payload.type: 0 |
| |
| |
| # Enable to have correctly typed MIME media dissected as JXTA Messages. |
| # Enable to have correctly typed MIME media dissected as JXTA Messages. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| jxta.msg.mediatype: TRUE |
| jxta.msg.mediatype: TRUE |
| |
| |
| # Whether the JXTA dissector should reassemble messages spanning multiple UDP/TCP/SCTP segments. To use this option you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings and enable "Reassemble fragmented IP datagrams" in the IP protocol settings. |
| # Whether the JXTA dissector should reassemble messages spanning multiple UDP/TCP/SCTP segments. To use this option you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings and enable "Reassemble fragmented IP datagrams" in the IP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| jxta.desegment: TRUE |
| jxta.desegment: TRUE |
| |
| |
| # Enable to inspect UDP datagrams for JXTA messages. |
| # Enable to inspect UDP datagrams for JXTA messages. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| jxta.udp.heuristic: TRUE |
| jxta.udp.heuristic: TRUE |
| |
| |
| # Enable to inspect TCP connections for JXTA conversations. |
| # Enable to inspect TCP connections for JXTA conversations. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| jxta.tcp.heuristic: TRUE |
| jxta.tcp.heuristic: TRUE |
| |
| |
| # Enable to inspect SCTP connections for JXTA conversations. |
| # Enable to inspect SCTP connections for JXTA conversations. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| jxta.sctp.heuristic: TRUE |
| jxta.sctp.heuristic: TRUE |
| |
| |
| # A table of matches vs stack filenames and relative protocols |
| # A table of matches vs stack filenames and relative protocols |
| |
| |
| # Whether the Kerberos dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the Kerberos dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| kerberos.desegment: TRUE |
| kerberos.desegment: TRUE |
| |
| |
| # Whether the dissector should try to decrypt encrypted Kerberos blobs. This requires that the proper keytab file is installed as well. |
| # Whether the dissector should try to decrypt encrypted Kerberos blobs. This requires that the proper keytab file is installed as well. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| kerberos.decrypt: FALSE |
| kerberos.decrypt: FALSE |
| |
| |
| # The keytab file containing all the secrets |
| # The keytab file containing all the secrets |
| # A string. |
| # A string. |
| kerberos.file: insert filename here |
| kerberos.file: insert filename here |
| |
| |
| # Set the port for Kismet Client/Server messages (if other than the default of 2501) |
| # Set the port for Kismet Client/Server messages (if other than the default of 2501) |
| # A decimal number. |
| # A decimal number. |
| kismet.tcp.port: 2501 |
| kismet.tcp.port: 2501 |
| |
| |
| # Whether the Kpasswd dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the Kpasswd dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| kpasswd.desegment: TRUE |
| kpasswd.desegment: TRUE |
| |
| |
| # L2TPv3 Cookie Size |
| # L2TPv3 Cookie Size |
| # One of: None, 4 Byte Cookie, 8 Byte Cookie |
| # One of: None, 4 Byte Cookie, 8 Byte Cookie |
| # (case-insensitive). |
| # (case-insensitive). |
| l2tp.cookie_size: 4 Byte Cookie |
| l2tp.cookie_size: 4 Byte Cookie |
| |
| |
| # L2TPv3 L2-Specific Sublayer |
| # L2TPv3 L2-Specific Sublayer |
| # One of: None, Default L2-Specific, ATM-Specific, LAPD-Specific |
| # One of: None, Default L2-Specific, ATM-Specific, LAPD-Specific |
| # (case-insensitive). |
| # (case-insensitive). |
| l2tp.l2_specific: Default L2-Specific |
| l2tp.l2_specific: Default L2-Specific |
| |
| |
| # Decode L2TPv3 packet contents as this protocol |
| # Decode L2TPv3 packet contents as this protocol |
| # One of: Ethernet, Cisco HDLC, Frame Relay, PPP, IP, MPLS, AAL5, LAPD |
| # One of: Ethernet, Cisco HDLC, Frame Relay, PPP, IP, MPLS, AAL5, LAPD |
| # (case-insensitive). |
| # (case-insensitive). |
| l2tp.protocol: Cisco HDLC |
| l2tp.protocol: Cisco HDLC |
| |
| |
| # Use SAPI values as specified in TS 48 056 |
| # Use SAPI values as specified in TS 48 056 |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| lapd.use_gsm_sapi_values: FALSE |
| lapd.use_gsm_sapi_values: FALSE |
| |
| |
| # RTP payload type for embedded LAPD. It must be one of the dynamic types from 96 to 127. Set it to 0 to disable. |
| # RTP payload type for embedded LAPD. It must be one of the dynamic types from 96 to 127. Set it to 0 to disable. |
| # A decimal number. |
| # A decimal number. |
| lapd.rtp_payload_type: 0 |
| lapd.rtp_payload_type: 0 |
| |
| |
| # Whether the dissector should defragment LAPDm messages spanning multiple packets. |
| # Whether the dissector should defragment LAPDm messages spanning multiple packets. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| lapdm.reassemble: TRUE |
| lapdm.reassemble: TRUE |
| |
| |
| # Whether the Laplink dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the Laplink dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| laplink.desegment_laplink_over_tcp: TRUE |
| laplink.desegment_laplink_over_tcp: TRUE |
| |
| |
| # Whether the LDAP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the LDAP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ldap.desegment_ldap_messages: TRUE |
| ldap.desegment_ldap_messages: TRUE |
| |
| |
| # Set the port for LDAP operations |
| # Set the port for LDAP operations |
| # A decimal number. |
| # A decimal number. |
| ldap.tcp.port: 389 |
| ldap.tcp.port: 389 |
| |
| |
| # Set the port for LDAP operations over SSL |
| # Set the port for LDAP operations over SSL |
| # A decimal number. |
| # A decimal number. |
| ldap.ssl.port: 636 |
| ldap.ssl.port: 636 |
| |
| |
| # Set the TCP port for messages (if other than the default of 646) |
| # Set the TCP port for messages (if other than the default of 646) |
| # A decimal number. |
| # A decimal number. |
| ldp.tcp.port: 646 |
| ldp.tcp.port: 646 |
| |
| |
| # Set the UDP port for messages (if other than the default of 646) |
| # Set the UDP port for messages (if other than the default of 646) |
| # A decimal number. |
| # A decimal number. |
| ldp.udp.port: 646 |
| ldp.udp.port: 646 |
| |
| |
| # Whether the LDP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the LDP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ldp.desegment_ldp_messages: TRUE |
| ldp.desegment_ldp_messages: TRUE |
| |
| |
| # The UDP port on which Local Download Sharing Service broadcasts will be sent |
| # The UDP port on which Local Download Sharing Service broadcasts will be sent |
| # A decimal number. |
| # A decimal number. |
| ldss.udp_port: 6087 |
| ldss.udp_port: 6087 |
| |
| |
| # Set UDP port for LGE Monitor messages |
| # Set UDP port for LGE Monitor messages |
| # A decimal number. |
| # A decimal number. |
| lge_monitor.udp.port: 0 |
| lge_monitor.udp.port: 0 |
| |
| |
| # Whether to autodetect the cipher bit (because it might be set on unciphered data) |
| # Whether to autodetect the cipher bit (because it might be set on unciphered data) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| llcgprs.autodetect_cipher_bit: FALSE |
| llcgprs.autodetect_cipher_bit: FALSE |
| |
| |
| # Dissect this ethertype as LLT traffic in addition to the default, 0xCAFE. |
| # Dissect this ethertype as LLT traffic in addition to the default, 0xCAFE. |
| # A hexadecimal number. |
| # A hexadecimal number. |
| llt.alternate_ethertype: 0 |
| llt.alternate_ethertype: 0 |
| |
| |
| # UDP port number to use for LMP |
| # UDP port number to use for LMP |
| # A decimal number. |
| # A decimal number. |
| lmp.udp_port: 701 |
| lmp.udp_port: 701 |
| |
| |
| # Set the TCP or UDP port for Pegasus LSC messages |
| # Set the TCP or UDP port for Pegasus LSC messages |
| # A decimal number. |
| # A decimal number. |
| lsc.port: 0 |
| lsc.port: 0 |
| |
| |
| # Swap frame control bytes (needed for some APs |
| # Swap frame control bytes (needed for some APs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| lwapp.swap_fc: FALSE |
| lwapp.swap_fc: FALSE |
| |
| |
| # Set the UDP port for lwres daemon(if other than the default of 921) |
| # Set the UDP port for lwres daemon(if other than the default of 921) |
| # A decimal number. |
| # A decimal number. |
| lwres.udp.lwres_port: 921 |
| lwres.udp.lwres_port: 921 |
| |
| |
| # Version used by Wireshark |
| # Version used by Wireshark |
| # One of: Internet Draft version 2, Internet Draft version 8, Internet Draft version 12 |
| # One of: Internet Draft version 2, Internet Draft version 8, Internet Draft version 12 |
| # (case-insensitive). |
| # (case-insensitive). |
| m2pa.version: Internet Draft version 12 |
| m2pa.version: Internet Draft version 12 |
| |
| |
| # Set the port for M2PA messages (Default of 3565) |
| # Set the port for M2PA messages (Default of 3565) |
| # A decimal number. |
| # A decimal number. |
| m2pa.port: 3565 |
| m2pa.port: 3565 |
| |
| |
| # The value of the parameter tag for protocol data 1 |
| # The value of the parameter tag for protocol data 1 |
| # One of: 0x000e (Draft 7), 0x0300 (RFC3331) |
| # One of: 0x000e (Draft 7), 0x0300 (RFC3331) |
| # (case-insensitive). |
| # (case-insensitive). |
| m2ua.protocol_data_1_tag: 0x0300 (RFC3331) |
| m2ua.protocol_data_1_tag: 0x0300 (RFC3331) |
| |
| |
| # Version used by Wireshark |
| # Version used by Wireshark |
| # One of: Internet Draft version 5, Internet Draft version 6, Internet Draft version 7, RFC 3332 |
| # One of: Internet Draft version 5, Internet Draft version 6, Internet Draft version 7, RFC 3332 |
| # (case-insensitive). |
| # (case-insensitive). |
| m3ua.version: RFC 3332 |
| m3ua.version: RFC 3332 |
| |
| |
| # When set, an expert warning will indicate if reserved bits are not zero |
| # When set, an expert warning will indicate if reserved bits are not zero |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mac-lte.check_reserved_bits: TRUE |
| mac-lte.check_reserved_bits: TRUE |
| |
| |
| # Number of Re-Transmits before expert warning triggered |
| # Number of Re-Transmits before expert warning triggered |
| # A decimal number. |
| # A decimal number. |
| mac-lte.retx_count_warn: 3 |
| mac-lte.retx_count_warn: 3 |
| |
| |
| # Attempt to decode BCH, PCH and CCCH data using LTE RRC dissector |
| # Attempt to decode BCH, PCH and CCCH data using LTE RRC dissector |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mac-lte.attempt_rrc_decode: TRUE |
| mac-lte.attempt_rrc_decode: TRUE |
| |
| |
| # Attempt to decode details of RAR UL grant field |
| # Attempt to decode details of RAR UL grant field |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mac-lte.decode_rar_ul_grant: TRUE |
| mac-lte.decode_rar_ul_grant: TRUE |
| |
| |
| # The name of the file containing the mate module's configuration |
| # The name of the file containing the mate module's configuration |
| # A string. |
| # A string. |
| mate.config: |
| mate.config: |
| |
| |
| # A frame is considered for decoding as MDSHDR if either ethertype is 0xFCFC or zero. Turn this flag off if you you don't want ethertype zero to be decoded as MDSHDR. This might be useful to avoid problems with test frames. |
| # A frame is considered for decoding as MDSHDR if either ethertype is 0xFCFC or zero. Turn this flag off if you you don't want ethertype zero to be decoded as MDSHDR. This might be useful to avoid problems with test frames. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mdshdr.decode_if_etype_zero: TRUE |
| mdshdr.decode_if_etype_zero: TRUE |
| |
| |
| # Set the TCP port for MEGACO text messages |
| # Set the TCP port for MEGACO text messages |
| # A decimal number. |
| # A decimal number. |
| megaco.tcp.txt_port: 2944 |
| megaco.tcp.txt_port: 2944 |
| |
| |
| # Set the UDP port for MEGACO text messages |
| # Set the UDP port for MEGACO text messages |
| # A decimal number. |
| # A decimal number. |
| megaco.udp.txt_port: 2944 |
| megaco.udp.txt_port: 2944 |
| |
| |
| # Specifies that the raw text of the MEGACO message should be displayed instead of (or in addition to) the dissection tree |
| # Specifies that the raw text of the MEGACO message should be displayed instead of (or in addition to) the dissection tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| megaco.display_raw_text: TRUE |
| megaco.display_raw_text: TRUE |
| |
| |
| # Specifies that the dissection tree of the MEGACO message should be displayed instead of (or in addition to) the raw text |
| # Specifies that the dissection tree of the MEGACO message should be displayed instead of (or in addition to) the raw text |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| megaco.display_dissect_tree: TRUE |
| megaco.display_dissect_tree: TRUE |
| |
| |
| # Mantain relationships between transactions and contexts and display an extra tree showing context data |
| # Mantain relationships between transactions and contexts and display an extra tree showing context data |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| megaco.ctx_info: FALSE |
| megaco.ctx_info: FALSE |
| |
| |
| # Whether the MEMCACHE dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the MEMCACHE dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| memcache.desegment_headers: TRUE |
| memcache.desegment_headers: TRUE |
| |
| |
| # Whether the memcache dissector should reassemble PDUs spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the memcache dissector should reassemble PDUs spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| memcache.desegment_pdus: TRUE |
| memcache.desegment_pdus: TRUE |
| |
| |
| # Set the UDP port for gateway messages (if other than the default of 2427) |
| # Set the UDP port for gateway messages (if other than the default of 2427) |
| # A decimal number. |
| # A decimal number. |
| mgcp.tcp.gateway_port: 2427 |
| mgcp.tcp.gateway_port: 2427 |
| |
| |
| # Set the TCP port for gateway messages (if other than the default of 2427) |
| # Set the TCP port for gateway messages (if other than the default of 2427) |
| # A decimal number. |
| # A decimal number. |
| mgcp.udp.gateway_port: 2427 |
| mgcp.udp.gateway_port: 2427 |
| |
| |
| # Set the TCP port for callagent messages (if other than the default of 2727) |
| # Set the TCP port for callagent messages (if other than the default of 2727) |
| # A decimal number. |
| # A decimal number. |
| mgcp.tcp.callagent_port: 2727 |
| mgcp.tcp.callagent_port: 2727 |
| |
| |
| # Set the UDP port for callagent messages (if other than the default of 2727) |
| # Set the UDP port for callagent messages (if other than the default of 2727) |
| # A decimal number. |
| # A decimal number. |
| mgcp.udp.callagent_port: 2727 |
| mgcp.udp.callagent_port: 2727 |
| |
| |
| # Specifies that the raw text of the MGCP message should be displayed instead of (or in addition to) the dissection tree |
| # Specifies that the raw text of the MGCP message should be displayed instead of (or in addition to) the dissection tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mgcp.display_raw_text: FALSE |
| mgcp.display_raw_text: FALSE |
| |
| |
| # Display the number of MGCP messages found in a packet in the protocol column. |
| # Display the number of MGCP messages found in a packet in the protocol column. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mgcp.display_mgcp_message_count: FALSE |
| mgcp.display_mgcp_message_count: FALSE |
| |
| |
| # Set the port for MIKEY messages (if other than the default of 2269) |
| # Set the port for MIKEY messages (if other than the default of 2269) |
| # A decimal number. |
| # A decimal number. |
| mikey.udp.port: 2269 |
| mikey.udp.port: 2269 |
| |
| |
| # Set the port for MIKEY messages (if other than the default of 2269) |
| # Set the port for MIKEY messages (if other than the default of 2269) |
| # A decimal number. |
| # A decimal number. |
| mikey.tcp.port: 2269 |
| mikey.tcp.port: 2269 |
| |
| |
| # Display multipart bodies with no media type dissector as raw text (may cause problems with binary data). |
| # Display multipart bodies with no media type dissector as raw text (may cause problems with binary data). |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mime_multipart.display_unknown_body_as_text: FALSE |
| mime_multipart.display_unknown_body_as_text: FALSE |
| |
| |
| # Remove any base64 content-transfer encoding from bodies. This supports export of the body and its further dissection. |
| # Remove any base64 content-transfer encoding from bodies. This supports export of the body and its further dissection. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mime_multipart.remove_base64_encoding: FALSE |
| mime_multipart.remove_base64_encoding: FALSE |
| |
| |
| # Whether PPP Multilink frames use 12-bit sequence numbers |
| # Whether PPP Multilink frames use 12-bit sequence numbers |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mp.short_seqno: FALSE |
| mp.short_seqno: FALSE |
| |
| |
| # The dynamic payload type which will be interpreted as MP4V-ES |
| # The dynamic payload type which will be interpreted as MP4V-ES |
| # A decimal number. |
| # A decimal number. |
| mp4v-es.dynamic.payload.type: 0 |
| mp4v-es.dynamic.payload.type: 0 |
| |
| |
| # Default decoder for MPLS payload |
| # Default decoder for MPLS payload |
| # One of: SAToP (no RTP support), CESoPSN basic NxDS0 mode (no RTP support), Ethernet MPLS PW (CW is heuristically detected), Frame relay DLCI MPLS PW, HDLC MPLS PW (no CW), FR Port mode, HDLC MPLS PW (no CW), HDLC mode, PPP payload, Ethernet MPLS PW (with CW), Ethernet MPLS PW (no CW, early implementations), Generic MPLS PW (with Generic/Preferred MPLS CW), Internal TDM |
| # One of: SAToP (no RTP support), CESoPSN basic NxDS0 mode (no RTP support), Ethernet MPLS PW (CW is heuristically detected), Frame relay DLCI MPLS PW, HDLC MPLS PW (no CW), FR Port mode, HDLC MPLS PW (no CW), HDLC mode, PPP payload, Ethernet MPLS PW (with CW), Ethernet MPLS PW (no CW, early implementations), Generic MPLS PW (with Generic/Preferred MPLS CW), Internal TDM |
| # (case-insensitive). |
| # (case-insensitive). |
| mpls.mplspref.payload: Ethernet MPLS PW (CW is heuristically detected) |
| mpls.mplspref.payload: Ethernet MPLS PW (CW is heuristically detected) |
| |
| |
| # Set the UDP port for messages (if other than the default of 3503) |
| # Set the UDP port for messages (if other than the default of 3503) |
| # A decimal number. |
| # A decimal number. |
| mpls-echo.udp.port: 3503 |
| mpls-echo.udp.port: 3503 |
| |
| |
| # Whether the MQ dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the MQ dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mq.desegment: TRUE |
| mq.desegment: TRUE |
| |
| |
| # Whether the MQ dissector should reassemble MQ messages spanning multiple TSH segments |
| # Whether the MQ dissector should reassemble MQ messages spanning multiple TSH segments |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mq.reassembly: TRUE |
| mq.reassembly: TRUE |
| |
| |
| # Specifies that the raw text of the MSRP message should be displayed in addition to the dissection tree |
| # Specifies that the raw text of the MSRP message should be displayed in addition to the dissection tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| msrp.display_raw_text: TRUE |
| msrp.display_raw_text: TRUE |
| |
| |
| # Where available, show which protocol and frame caused this MSRP stream to be created |
| # Where available, show which protocol and frame caused this MSRP stream to be created |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| msrp.show_setup_info: TRUE |
| msrp.show_setup_info: TRUE |
| |
| |
| # Whether the MTP2 dissector should use extended sequence numbers as described in Q.703, Annex A as a default. |
| # Whether the MTP2 dissector should use extended sequence numbers as described in Q.703, Annex A as a default. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mtp2.use_extended_sequence_numbers: TRUE |
| mtp2.use_extended_sequence_numbers: FALSE |
| |
| |
| # The SS7 standard used in MTP3 packets |
| # The SS7 standard used in MTP3 packets |
| # One of: ITU, ANSI, Chinese ITU, Japan |
| # One of: ITU, ANSI, Chinese ITU, Japan |
| # (case-insensitive). |
| # (case-insensitive). |
| mtp3.standard: ANSI |
| mtp3.standard: ITU |
| |
| |
| # The structure of the pointcodes in ITU networks |
| # The structure of the pointcodes in ITU networks |
| # One of: Unstructured, 3-8-3, 4-3-4-3 |
| # One of: Unstructured, 3-8-3, 4-3-4-3 |
| # (case-insensitive). |
| # (case-insensitive). |
| mtp3.itu_pc_structure: 3-8-3 |
| mtp3.itu_pc_structure: Unstructured |
| |
| |
| # The structure of the pointcodes in Japan networks |
| # The structure of the pointcodes in Japan networks |
| # One of: Unstructured, 7-4-5, 3-4-4-5 |
| # One of: Unstructured, 7-4-5, 3-4-4-5 |
| # (case-insensitive). |
| # (case-insensitive). |
| mtp3.japan_pc_structure: Unstructured |
| mtp3.japan_pc_structure: Unstructured |
| |
| |
| # Use 5-bit (instead of 8-bit) SLS in ANSI MTP3 packets |
| # Use 5-bit (instead of 8-bit) SLS in ANSI MTP3 packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mtp3.ansi_5_bit_sls: FALSE |
| mtp3.ansi_5_bit_sls: FALSE |
| |
| |
| # Use 5-bit (instead of 4-bit) SLS in Japan MTP3 packets |
| # Use 5-bit (instead of 4-bit) SLS in Japan MTP3 packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mtp3.japan_5_bit_sls: FALSE |
| mtp3.japan_5_bit_sls: FALSE |
| |
| |
| # Format for point code in the address columns |
| # Format for point code in the address columns |
| # One of: Decimal, Hexadecimal, NI-Decimal, NI-Hexadecimal, Dashed |
| # One of: Decimal, Hexadecimal, NI-Decimal, NI-Hexadecimal, Dashed |
| # (case-insensitive). |
| # (case-insensitive). |
| mtp3.addr_format: Dashed |
| mtp3.addr_format: Dashed |
| |
| |
| # Decode the spare bits of the SIO as the MSU priority (a national option in ITU) |
| # Decode the spare bits of the SIO as the MSU priority (a national option in ITU) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mtp3.itu_priority: FALSE |
| mtp3.itu_priority: FALSE |
| |
| |
| # Whether the MySQL dissector should reassemble MySQL buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the MySQL dissector should reassemble MySQL buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mysql.desegment_buffers: TRUE |
| mysql.desegment_buffers: TRUE |
| |
| |
| # Whether the MySQL dissector should display the SQL query string in the INFO column. |
| # Whether the MySQL dissector should display the SQL query string in the INFO column. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| mysql.show_sql_query: FALSE |
| mysql.show_sql_query: FALSE |
| |
| |
| # Whether the Nasdaq ITCH dissector should decode Chi X extensions. |
| # Whether the Nasdaq ITCH dissector should decode Chi X extensions. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| nasdaq_itch.chi_x: TRUE |
| nasdaq_itch.chi_x: TRUE |
| |
| |
| # Whether the Nasdaq-SoupTCP dissector should reassemble messages spanning multiple TCP segments. |
| # Whether the Nasdaq-SoupTCP dissector should reassemble messages spanning multiple TCP segments. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| nasdaq_soup.desegment: TRUE |
| nasdaq_soup.desegment: TRUE |
| |
| |
| # TCP Ports range |
| # TCP Ports range |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| nasdaq_soup.tcp.port: |
| nasdaq_soup.tcp.port: |
| |
| |
| # Whether the NBD dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings |
| # Whether the NBD dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| nbd.desegment_nbd_messages: TRUE |
| nbd.desegment_nbd_messages: TRUE |
| |
| |
| # Whether the NBSS dissector should reassemble packets spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the NBSS dissector should reassemble packets spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| nbss.desegment_nbss_commands: TRUE |
| nbss.desegment_nbss_commands: TRUE |
| |
| |
| # Whether the NCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the NCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ncp.desegment: TRUE |
| ncp.desegment: TRUE |
| |
| |
| # Whether the NCP dissector should defragment NDS messages spanning multiple reply packets. |
| # Whether the NCP dissector should defragment NDS messages spanning multiple reply packets. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ncp.defragment_nds: TRUE |
| ncp.defragment_nds: TRUE |
| |
| |
| # Dissect the NetWare Information Structure as NetWare 5.x or higher or as older NetWare 3.x. |
| # Dissect the NetWare Information Structure as NetWare 5.x or higher or as older NetWare 3.x. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ncp.newstyle: TRUE |
| ncp.newstyle: TRUE |
| |
| |
| # Whether the NCP dissector should echo the NDS Entry ID to name resolves to the expert table. |
| # Whether the NCP dissector should echo the NDS Entry ID to name resolves to the expert table. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ncp.eid_2_expert: TRUE |
| ncp.eid_2_expert: TRUE |
| |
| |
| # Whether the NCP dissector should echo NCP connection information to the expert table. |
| # Whether the NCP dissector should echo NCP connection information to the expert table. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ncp.connection_2_expert: FALSE |
| ncp.connection_2_expert: FALSE |
| |
| |
| # Whether the NCP dissector should echo protocol errors to the expert table. |
| # Whether the NCP dissector should echo protocol errors to the expert table. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ncp.error_2_expert: TRUE |
| ncp.error_2_expert: TRUE |
| |
| |
| # Whether the NCP dissector should echo server information to the expert table. |
| # Whether the NCP dissector should echo server information to the expert table. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ncp.server_2_expert: TRUE |
| ncp.server_2_expert: TRUE |
| |
| |
| # Whether the NCP dissector should echo file open/close/oplock information to the expert table. |
| # Whether the NCP dissector should echo file open/close/oplock information to the expert table. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ncp.file_2_expert: FALSE |
| ncp.file_2_expert: FALSE |
| |
| |
| # Version of the NDMP protocol to assume if the version can not be automatically detected from the capture |
| # Version of the NDMP protocol to assume if the version can not be automatically detected from the capture |
| # One of: Version 2, Version 3, Version 4, Version 5 |
| # One of: Version 2, Version 3, Version 4, Version 5 |
| # (case-insensitive). |
| # (case-insensitive). |
| ndmp.default_protocol_version: Version 4 |
| ndmp.default_protocol_version: Version 4 |
| |
| |
| # Whether the NDMP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the NDMP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ndmp.desegment: TRUE |
| ndmp.desegment: TRUE |
| |
| |
| # Whether the dissector should defragment NDMP messages spanning multiple packets. |
| # Whether the dissector should defragment NDMP messages spanning multiple packets. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ndmp.defragment: TRUE |
| ndmp.defragment: TRUE |
| |
| |
| # Whether the NDPS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the NDPS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ndps.desegment_tcp: TRUE |
| ndps.desegment_tcp: TRUE |
| |
| |
| # Whether the NDPS dissector should reassemble fragmented NDPS messages spanning multiple SPX packets |
| # Whether the NDPS dissector should reassemble fragmented NDPS messages spanning multiple SPX packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ndps.desegment_spx: TRUE |
| ndps.desegment_spx: TRUE |
| |
| |
| # Whether or not the NDPS dissector should show object id's and other details |
| # Whether or not the NDPS dissector should show object id's and other details |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ndps.show_oid: FALSE |
| ndps.show_oid: FALSE |
| |
| |
| # Whether the NetBIOS dissector should defragment messages spanning multiple frames |
| # Whether the NetBIOS dissector should defragment messages spanning multiple frames |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| netbios.defragment: TRUE |
| netbios.defragment: TRUE |
| |
| |
| # port if other than the default |
| # port if other than the default |
| # A decimal number. |
| # A decimal number. |
| netdump.udp.port: 0 |
| netdump.udp.port: 0 |
| |
| |
| # The TCP port on which Monotone Netsync packets will be sent |
| # The TCP port on which Monotone Netsync packets will be sent |
| # A decimal number. |
| # A decimal number. |
| netsync.tcp_port: 5253 |
| netsync.tcp_port: 5253 |
| |
| |
| # Whether the Netsync dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the Netsync dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| netsync.desegment_netsync_messages: TRUE |
| netsync.desegment_netsync_messages: TRUE |
| |
| |
| # Always dissect this port's traffic as newmail notifications. Additional ports will be dynamically registered as they are seen in MAPI register push notification packets. |
| # Always dissect this port's traffic as newmail notifications. Additional ports will be dynamically registered as they are seen in MAPI register push notification packets. |
| # A decimal number. |
| # A decimal number. |
| newmail.default_port: 0 |
| newmail.default_port: 0 |
| |
| |
| # Whether the dissector should snoop the FH to filename mappings by looking inside certain packets |
| # Whether the dissector should snoop the FH to filename mappings by looking inside certain packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| nfs.file_name_snooping: FALSE |
| nfs.file_name_snooping: FALSE |
| |
| |
| # Whether the dissector should snoop the full pathname for files for matching FH's |
| # Whether the dissector should snoop the full pathname for files for matching FH's |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| nfs.file_full_name_snooping: FALSE |
| nfs.file_full_name_snooping: FALSE |
| |
| |
| # With this option display filters for nfs fhandles (nfs.fh.{name|full_name|hash}) will find both the request and response packets for a RPC call, even if the actual fhandle is only present in one of the packets |
| # With this option display filters for nfs fhandles (nfs.fh.{name|full_name|hash}) will find both the request and response packets for a RPC call, even if the actual fhandle is only present in one of the packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| nfs.fhandle_find_both_reqrep: FALSE |
| nfs.fhandle_find_both_reqrep: FALSE |
| |
| |
| # Decode all NFS file handles as if they are of this type |
| # Decode all NFS file handles as if they are of this type |
| # One of: Unknown, SVR4, KNFSD_LE, NFSD_LE, KNFSD_NEW, ONTAP_V3, ONTAP_V4, ONTAP_GX_V3 |
| # One of: Unknown, SVR4, KNFSD_LE, NFSD_LE, KNFSD_NEW, ONTAP_V3, ONTAP_V4, ONTAP_GX_V3 |
| # (case-insensitive). |
| # (case-insensitive). |
| nfs.default_fhandle_type: Unknown |
| nfs.default_fhandle_type: Unknown |
| |
| |
| # Whether the dissector will track and match MSG and RES calls for asynchronous NLM |
| # Whether the dissector will track and match MSG and RES calls for asynchronous NLM |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| nlm.msg_res_matching: FALSE |
| nlm.msg_res_matching: FALSE |
| |
| |
| # Check this to decode NORM traffic between clients |
| # Check this to decode NORM traffic between clients |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| norm.heuristic_norm: FALSE |
| norm.heuristic_norm: FALSE |
| |
| |
| # UDP ports to be decoded as NSIP (default: 2157,19999) |
| # UDP ports to be decoded as NSIP (default: 2157,19999) |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| nsip.udp.ports: 2157,19999 |
| nsip.udp.ports: 2157,19999 |
| |
| |
| # NT Password (used to decrypt payloads) |
| # NT Password (used to decrypt payloads) |
| # A string. |
| # A string. |
| ntlmssp.nt_password: |
| ntlmssp.nt_password: |
| |
| |
| # Dissect custom olsr.org message types (compatible with rfc routing agents) |
| # Dissect custom olsr.org message types (compatible with rfc routing agents) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| olsr.ff_olsrorg: TRUE |
| olsr.ff_olsrorg: TRUE |
| |
| |
| # Dissect custom nrlolsr tc message (incompatible with rfc routing agents) |
| # Dissect custom nrlolsr tc message (incompatible with rfc routing agents) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| olsr.nrlolsr: TRUE |
| olsr.nrlolsr: TRUE |
| |
| |
| # The TCP ports for the OPC UA TCP Binary Protocol |
| # The TCP ports for the OPC UA TCP Binary Protocol |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| opcua.tcp_ports: 4840 |
| opcua.tcp_ports: 4840 |
| |
| |
| # Whether the OPSI dissector should desegment all messages spanning multiple TCP segments |
| # Whether the OPSI dissector should desegment all messages spanning multiple TCP segments |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| opsi.desegment_opsi_messages: TRUE |
| opsi.desegment_opsi_messages: TRUE |
| |
| |
| # TCP port for OSI over TPKT |
| # TCP port for OSI over TPKT |
| # A decimal number. |
| # A decimal number. |
| osi.tpkt_port: 0 |
| osi.tpkt_port: 0 |
| |
| |
| # Whether segmented TPKT datagrams should be reassembled |
| # Whether segmented TPKT datagrams should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| osi.tpkt_reassemble: FALSE |
| osi.tpkt_reassemble: FALSE |
| |
| |
| # Set the port for P7 operations (if other than the default of 102) |
| # Set the port for P7 operations (if other than the default of 102) |
| # A decimal number. |
| # A decimal number. |
| p7.tcp.port: 102 |
| p7.tcp.port: 102 |
| |
| |
| # Port numbers used for P_Mul traffic |
| # Port numbers used for P_Mul traffic |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| p_mul.udp_ports: 2751,2752,2753,2754
|
| p_mul.udp_ports:
|
| |
| |
| # Reassemble fragmented P_Mul packets |
| # Reassemble fragmented P_Mul packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| p_mul.reassemble: TRUE |
| p_mul.reassemble: TRUE |
| |
| |
| # Make the P_Mul dissector use relative message id number instead of absolute ones |
| # Make the P_Mul dissector use relative message id number instead of absolute ones |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| p_mul.relative_msgid: TRUE |
| p_mul.relative_msgid: TRUE |
| |
| |
| # Calculate sequence/acknowledgement analysis |
| # Calculate sequence/acknowledgement analysis |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| p_mul.seq_ack_analysis: TRUE |
| p_mul.seq_ack_analysis: TRUE |
| |
| |
| # Type of content in Data_PDU |
| # Type of content in Data_PDU |
| # One of: No decoding, BER encoded ASN.1, Compressed Data Type |
| # One of: No decoding, BER encoded ASN.1, Compressed Data Type |
| # (case-insensitive). |
| # (case-insensitive). |
| p_mul.decode: No decoding |
| p_mul.decode: No decoding |
| |
| |
| # SCCP (and SUA) SSNs to decode as PCAP |
| # SCCP (and SUA) SSNs to decode as PCAP |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| pcap.ssn: |
| pcap.ssn: |
| |
| |
| # The UDP port on which Packet Cable Lawful Intercept packets will be sent |
| # The UDP port on which Packet Cable Lawful Intercept packets will be sent |
| # A decimal number. |
| # A decimal number. |
| pcli.udp_port: 9000 |
| pcli.udp_port: 9000 |
| |
| |
| # Show uncompressed User-Plane data as IP |
| # Show uncompressed User-Plane data as IP |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pdcp-lte.show_user_plane_as_ip: FALSE |
| pdcp-lte.show_user_plane_as_ip: FALSE |
| |
| |
| # Show unciphered Signalling-Plane data as RRC |
| # Show unciphered Signalling-Plane data as RRC |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pdcp-lte.show_signalling_plane_as_rrc: FALSE |
| pdcp-lte.show_signalling_plane_as_rrc: FALSE |
| |
| |
| # Attempt to decode ROHC data |
| # Attempt to decode ROHC data |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pdcp-lte.dissect_rohc: FALSE |
| pdcp-lte.dissect_rohc: FALSE |
| |
| |
| # Show ROHC feedback option tag & length |
| # Show ROHC feedback option tag & length |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pdcp-lte.show_feedback_option_tag_length: FALSE |
| pdcp-lte.show_feedback_option_tag_length: FALSE |
| |
| |
| # Whether the dissector should put the internal PER data in the tree or if it should hide it |
| # Whether the dissector should put the internal PER data in the tree or if it should hide it |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| per.display_internal_per_fields: FALSE |
| per.display_internal_per_fields: FALSE |
| |
| |
| # Whether to check the validity of the PGM checksum |
| # Whether to check the validity of the PGM checksum |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pgm.check_checksum: TRUE |
| pgm.check_checksum: TRUE |
| |
| |
| # PGM Encap is PGM packets encapsulated in UDP packets (Note: This option is off, i.e. port is 0, by default) |
| # PGM Encap is PGM packets encapsulated in UDP packets (Note: This option is off, i.e. port is 0, by default) |
| # A decimal number. |
| # A decimal number. |
| pgm.udp.encap_ucast_port: 0 |
| pgm.udp.encap_ucast_port: 0 |
| |
| |
| # PGM Encap is PGM packets encapsulated in UDP packets (Note: This option is off, i.e. port is 0, by default) |
| # PGM Encap is PGM packets encapsulated in UDP packets (Note: This option is off, i.e. port is 0, by default) |
| # A decimal number. |
| # A decimal number. |
| pgm.udp.encap_mcast_port: 0 |
| pgm.udp.encap_mcast_port: 0 |
| |
| |
| # Set the port for PGSQL messages (if different from the default of 5432) |
| # Set the port for PGSQL messages (if different from the default of 5432) |
| # A decimal number. |
| # A decimal number. |
| pgsql.tcp.port: 5432 |
| pgsql.tcp.port: 5432 |
| |
| |
| # The password to used to decrypt the encrypted elements within the PKCS#12 file |
| # The password to used to decrypt the encrypted elements within the PKCS#12 file |
| # A string. |
| # A string. |
| pkcs12.password: |
| pkcs12.password: |
| |
| |
| # Whether to try and decrypt the encrypted data within the PKCS#12 with a NULL password |
| # Whether to try and decrypt the encrypted data within the PKCS#12 with a NULL password |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pkcs12.try_null_password: FALSE |
| pkcs12.try_null_password: FALSE |
| |
| |
| # Decode packets on this UDP port as PacketCable CCC |
| # Decode packets on this UDP port as PacketCable CCC |
| # A decimal number. |
| # A decimal number. |
| pkt_ccc.udp_port: 0 |
| pkt_ccc.udp_port: 0 |
| |
| |
| # Whether the PN-RT summary line should be shown in the protocol tree |
| # Whether the PN-RT summary line should be shown in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pn_rt.summary_in_tree: TRUE |
| pn_rt.summary_in_tree: TRUE |
| |
| |
| # Whether the POP dissector should reassemble RETR and TOP responses and spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the POP dissector should reassemble RETR and TOP responses and spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pop.desegment_data: TRUE |
| pop.desegment_data: TRUE |
| |
| |
| # Whether fragmented 802.11 aggregated MPDUs should be reassembled |
| # Whether fragmented 802.11 aggregated MPDUs should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ppi.reassemble: TRUE |
| ppi.reassemble: TRUE |
| |
| |
| # The type of PPP frame checksum (none, 16-bit, 32-bit) |
| # The type of PPP frame checksum (none, 16-bit, 32-bit) |
| # One of: None, 16-Bit, 32-Bit |
| # One of: None, 16-Bit, 32-Bit |
| # (case-insensitive). |
| # (case-insensitive). |
| ppp.fcs_type: None |
| ppp.fcs_type: None |
| |
| |
| # Whether Van Jacobson-compressed PPP frames should be decompressed |
| # Whether Van Jacobson-compressed PPP frames should be decompressed |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ppp.decompress_vj: TRUE |
| ppp.decompress_vj: TRUE |
| |
| |
| # Default Protocol ID to be used for PPPMuxCP |
| # Default Protocol ID to be used for PPPMuxCP |
| # A hexadecimal number. |
| # A hexadecimal number. |
| ppp.default_proto_id: 0 |
| ppp.default_proto_id: 0 |
| |
| |
| # Show values of tags and lengths of data fields |
| # Show values of tags and lengths of data fields |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pppoed.show_tags_and_lengths: FALSE |
| pppoed.show_tags_and_lengths: FALSE |
| |
| |
| # A table that enumerates user protocols to be used against specific presentation context identifiers |
| # A table that enumerates user protocols to be used against specific presentation context identifiers |
| |
| |
| # Enable this dissector (default is false) |
| # Enable this dissector (default is false) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| prp.enable: FALSE |
| prp.enable: FALSE |
| |
| |
| # Whether the PVFS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the PVFS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| pvfs.desegment: TRUE |
| pvfs.desegment: TRUE |
| |
| |
| # Whether the Q.931 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the Q.931 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| q931.desegment_h323_messages: TRUE |
| q931.desegment_h323_messages: TRUE |
| |
| |
| # Reassemble segmented Q.931 messages (Q.931 - Annex H) |
| # Reassemble segmented Q.931 messages (Q.931 - Annex H) |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| q931.reassembly: TRUE |
| q931.reassembly: TRUE |
| |
| |
| # Set the UDP port for the Quake Server |
| # Set the UDP port for the Quake Server |
| # A decimal number. |
| # A decimal number. |
| quake.udp.port: 26000 |
| quake.udp.port: 26000 |
| |
| |
| # Set the UDP port for the Quake II Server |
| # Set the UDP port for the Quake II Server |
| # A decimal number. |
| # A decimal number. |
| quake2.udp.port: 27910 |
| quake2.udp.port: 27910 |
| |
| |
| # Set the UDP base port for the Quake III Arena Server |
| # Set the UDP base port for the Quake III Arena Server |
| # A decimal number. |
| # A decimal number. |
| quake3.udp.arena_port: 27960 |
| quake3.udp.arena_port: 27960 |
| |
| |
| # Set the UDP base port for the Quake III Arena Master Server |
| # Set the UDP base port for the Quake III Arena Master Server |
| # A decimal number. |
| # A decimal number. |
| quake3.udp.master_port: 27950 |
| quake3.udp.master_port: 27950 |
| |
| |
| # Set the UDP port for the QuakeWorld Server |
| # Set the UDP port for the QuakeWorld Server |
| # A decimal number. |
| # A decimal number. |
| quakeworld.udp.port: 27500 |
| quakeworld.udp.port: 27500 |
| |
| |
| # Radiotap has a bit to indicate whether the FCS is still on the frame or not. Some generators (e.g. AirPcap) use a non-standard radiotap flag 14 to put the FCS into the header. |
| # Radiotap has a bit to indicate whether the FCS is still on the frame or not. Some generators (e.g. AirPcap) use a non-standard radiotap flag 14 to put the FCS into the header. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| radiotap.bit14_fcs_in_header: FALSE |
| radiotap.bit14_fcs_in_header: FALSE |
| |
| |
| # Shared secret used to decode User Passwords |
| # Shared secret used to decode User Passwords |
| # A string. |
| # A string. |
| radius.shared_secret: |
| radius.shared_secret: |
| |
| |
| # Whether to add or not to the tree the AVP's payload length |
| # Whether to add or not to the tree the AVP's payload length |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| radius.show_length: FALSE |
| radius.show_length: FALSE |
| |
| |
| # An alternate UDP port to decode as RADIUS |
| # An alternate UDP port to decode as RADIUS |
| # A decimal number. |
| # A decimal number. |
| radius.alternate_port: 0 |
| radius.alternate_port: 0 |
| |
| |
| # The SCCP SubSystem Number for RANAP (default 142) |
| # The SCCP SubSystem Number for RANAP (default 142) |
| # A decimal number. |
| # A decimal number. |
| ranap.sccp_ssn: 142 |
| ranap.sccp_ssn: 142 |
| |
| |
| # Where available, show which protocol and frame caused this RDT stream to be created |
| # Where available, show which protocol and frame caused this RDT stream to be created |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rdt.show_setup_info: TRUE |
| rdt.show_setup_info: TRUE |
| |
| |
| # Register a client UDP port for RDT traffic |
| # Register a client UDP port for RDT traffic |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rdt.register_udp_port: FALSE |
| rdt.register_udp_port: FALSE |
| |
| |
| # Set the UDP port for clients |
| # Set the UDP port for clients |
| # A decimal number. |
| # A decimal number. |
| rdt.default_udp_port: 6970 |
| rdt.default_udp_port: 6970 |
| |
| |
| # Attempt to keep track of PDUs for UM channels, and point out problems |
| # Attempt to keep track of PDUs for UM channels, and point out problems |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rlc-lte.do_sequence_analysis: TRUE |
| rlc-lte.do_sequence_analysis: TRUE |
| |
| |
| # Whether the RPC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the RPC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rpc.desegment_rpc_over_tcp: TRUE |
| rpc.desegment_rpc_over_tcp: TRUE |
| |
| |
| # Whether the RPC dissector should defragment RPC-over-TCP messages. |
| # Whether the RPC dissector should defragment RPC-over-TCP messages. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rpc.defragment_rpc_over_tcp: TRUE |
| rpc.defragment_rpc_over_tcp: TRUE |
| |
| |
| # Set the maximum size of RPCoverTCP PDUs. If the size field of the record marker is larger than this value it will not be considered a valid RPC PDU. |
| # Set the maximum size of RPCoverTCP PDUs. If the size field of the record marker is larger than this value it will not be considered a valid RPC PDU. |
| # A decimal number. |
| # A decimal number. |
| rpc.max_tcp_pdu_size: 262144 |
| rpc.max_tcp_pdu_size: 4194304 |
| |
| |
| # Whether the RPC dissector should attempt to dissect RPC PDUs containing programs that are not known to Wireshark. This will make the heuristics significantly weaker and elevate the risk for falsely identifying and misdissecting packets significantly. |
| # Whether the RPC dissector should attempt to dissect RPC PDUs containing programs that are not known to Wireshark. This will make the heuristics significantly weaker and elevate the risk for falsely identifying and misdissecting packets significantly. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rpc.dissect_unknown_programs: FALSE |
| rpc.dissect_unknown_programs: FALSE |
| |
| |
| # Whether the RPC dissector should attempt to locate RPC PDU boundaries when initial fragment alignment is not known. This may cause false positives, or slow operation. |
| # Whether the RPC dissector should attempt to locate RPC PDU boundaries when initial fragment alignment is not known. This may cause false positives, or slow operation. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rpc.find_fragment_start: FALSE |
| rpc.find_fragment_start: FALSE |
| |
| |
| # Whether the RPCAP dissector should reassemble PDUs spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the RPCAP dissector should reassemble PDUs spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rpcap.desegment_pdus: TRUE |
| rpcap.desegment_pdus: TRUE |
| |
| |
| # Whether the packets should be decoded according to the link-layer type. |
| # Whether the packets should be decoded according to the link-layer type. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rpcap.decode_content: TRUE |
| rpcap.decode_content: TRUE |
| |
| |
| # Default link-layer type to use if not received a Open Reply package. |
| # Default link-layer type to use if not received a Open Reply package. |
| # A decimal number. |
| # A decimal number. |
| rpcap.linktype: 0 |
| rpcap.linktype: 0 |
| |
| |
| # Specifies whether Wireshark should decode and display sub-messages within BUNDLE messages |
| # Specifies whether Wireshark should decode and display sub-messages within BUNDLE messages |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rsvp.process_bundle: TRUE |
| rsvp.process_bundle: TRUE |
| |
| |
| # Set the TCP port for RSYNC messages |
| # Set the TCP port for RSYNC messages |
| # A decimal number. |
| # A decimal number. |
| rsync.tcp_port: 873 |
| rsync.tcp_port: 873 |
| |
| |
| # Whether the RSYNC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the RSYNC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rsync.desegment: TRUE |
| rsync.desegment: TRUE |
| |
| |
| # Where available, show which protocol and frame caused this RTCP stream to be created |
| # Where available, show which protocol and frame caused this RTCP stream to be created |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtcp.show_setup_info: TRUE |
| rtcp.show_setup_info: TRUE |
| |
| |
| # If call control SIP/H.323/RTSP/.. messages are missing in the trace, RTCP isn't decoded without this |
| # If call control SIP/H.323/RTSP/.. messages are missing in the trace, RTCP isn't decoded without this |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtcp.heuristic_rtcp: FALSE |
| rtcp.heuristic_rtcp: FALSE |
| |
| |
| # Try to work out network delay by comparing time between packets as captured and delays as seen by endpoint |
| # Try to work out network delay by comparing time between packets as captured and delays as seen by endpoint |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtcp.show_roundtrip_calculation: FALSE |
| rtcp.show_roundtrip_calculation: FALSE |
| |
| |
| # Minimum (absolute) calculated roundtrip delay time in milliseconds that should be reported |
| # Minimum (absolute) calculated roundtrip delay time in milliseconds that should be reported |
| # A decimal number. |
| # A decimal number. |
| rtcp.roundtrip_min_threshhold: 10 |
| rtcp.roundtrip_min_threshhold: 10 |
| |
| |
| # Whether the RTMPT dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the RTMPT dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtmpt.desegment: TRUE |
| rtmpt.desegment: TRUE |
| |
| |
| # Where available, show which protocol and frame caused this RTP stream to be created |
| # Where available, show which protocol and frame caused this RTP stream to be created |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtp.show_setup_info: TRUE |
| rtp.show_setup_info: TRUE |
| |
| |
| # If call control SIP/H323/RTSP/.. messages are missing in the trace, RTP isn't decoded without this |
| # If call control SIP/H323/RTSP/.. messages are missing in the trace, RTP isn't decoded without this |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtp.heuristic_rtp: FALSE |
| rtp.heuristic_rtp: FALSE |
| |
| |
| # Whether subdissector can request RTP streams to be reassembled |
| # Whether subdissector can request RTP streams to be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtp.desegment_rtp_streams: TRUE |
| rtp.desegment_rtp_streams: TRUE |
| |
| |
| # If an RTP version 0 packet is encountered, it can be treated as an invalid or ZRTP packet, a STUN packet, or a T.38 packet |
| # If an RTP version 0 packet is encountered, it can be treated as an invalid or ZRTP packet, a STUN packet, or a T.38 packet |
| # One of: Invalid or ZRTP packets, STUN packets, T.38 packets |
| # One of: Invalid or ZRTP packets, STUN packets, T.38 packets |
| # (case-insensitive). |
| # (case-insensitive). |
| rtp.version0_type: T.38 packets |
| rtp.version0_type: Invalid or ZRTP packets |
| |
| |
| # Payload Type for RFC2198 Redundant Audio Data |
| # Payload Type for RFC2198 Redundant Audio Data |
| # A decimal number. |
| # A decimal number. |
| rtp.rfc2198_payload_type: 99 |
| rtp.rfc2198_payload_type: 99 |
| |
| |
| # This is the value of the Payload Type field that specifies RTP Events |
| # This is the value of the Payload Type field that specifies RTP Events |
| # A decimal number. |
| # A decimal number. |
| rtpevent.event_payload_type_value: 101 |
| rtpevent.event_payload_type_value: 101 |
| |
| |
| # This is the value of the Payload Type field that specifies Cisco Named Signaling Events |
| # This is the value of the Payload Type field that specifies Cisco Named Signaling Events |
| # A decimal number. |
| # A decimal number. |
| rtpevent.cisco_nse_payload_type_value: 100 |
| rtpevent.cisco_nse_payload_type_value: 100 |
| |
| |
| # Specifies the maximum number of samples dissected in a DATA_BATCH submessage. Increasing this value may affect performances if the trace has a lot of big batched samples. |
| # Specifies the maximum number of samples dissected in a DATA_BATCH submessage. Increasing this value may affect performances if the trace has a lot of big batched samples. |
| # A decimal number. |
| # A decimal number. |
| rtps2.max_batch_samples_dissected: 16 |
| rtps2.max_batch_samples_dissected: 16 |
| |
| |
| # Whether segmented RTSE datagrams should be reassembled. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether segmented RTSE datagrams should be reassembled. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtse.reassemble: TRUE |
| rtse.reassemble: TRUE |
| |
| |
| # Set the TCP port for RTSP messages |
| # Set the TCP port for RTSP messages |
| # A decimal number. |
| # A decimal number. |
| rtsp.tcp.port: 554 |
| rtsp.tcp.port: 554 |
| |
| |
| # Set the alternate TCP port for RTSP messages |
| # Set the alternate TCP port for RTSP messages |
| # A decimal number. |
| # A decimal number. |
| rtsp.tcp.alternate_port: 8554 |
| rtsp.tcp.alternate_port: 8554 |
| |
| |
| # Whether the RTSP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the RTSP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtsp.desegment_headers: TRUE |
| rtsp.desegment_headers: TRUE |
| |
| |
| # Whether the RTSP dissector should use the "Content-length:" value to desegment the body of a request spanning multiple TCP segments |
| # Whether the RTSP dissector should use the "Content-length:" value to desegment the body of a request spanning multiple TCP segments |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| rtsp.desegment_body: TRUE |
| rtsp.desegment_body: TRUE |
| |
| |
| # Set the UDP port for Reliable UDP traffic |
| # Set the UDP port for Reliable UDP traffic |
| # A decimal number. |
| # A decimal number. |
| rudp.udp.port: 0 |
| rudp.udp.port: 0 |
| |
| |
| # Set the SCTP port for S1AP messages |
| # Set the SCTP port for S1AP messages |
| # A decimal number. |
| # A decimal number. |
| s1ap.sctp.port: 0 |
| s1ap.sctp.port: 0 |
| |
| |
| # Whether the S5066 dissector should reassemble PDUs spanning multiple TCP segments. The default is to use reassembly. |
| # Whether the S5066 dissector should reassemble PDUs spanning multiple TCP segments. The default is to use reassembly. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| s5066.desegment_pdus: TRUE |
| s5066.desegment_pdus: TRUE |
| |
| |
| # Whether the S5066 dissector should dissect this edition of the STANAG. This edition was never formally approved and is very rare. The common edition is edition 1.2. |
| # Whether the S5066 dissector should dissect this edition of the STANAG. This edition was never formally approved and is very rare. The common edition is edition 1.2. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| s5066.edition_one: FALSE |
| s5066.edition_one: FALSE |
| |
| |
| # Set the port for STANAG 5066. (If other than the default 5066. This number is registered with IANA.) |
| # Set the port for STANAG 5066. (If other than the default 5066. This number is registered with IANA.) |
| # A decimal number. |
| # A decimal number. |
| s5066.tcp.port: 5066 |
| s5066.tcp.port: 5066 |
| |
| |
| # The source point code (usually MSC) (to determine whether message is uplink or downlink) |
| # The source point code (usually MSC) (to determine whether message is uplink or downlink) |
| # A hexadecimal number. |
| # A hexadecimal number. |
| sccp.source_pc: 0 |
| sccp.source_pc: 0 |
| |
| |
| # Show parameter length in the protocol tree |
| # Show parameter length in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sccp.show_length: TRUE |
| sccp.show_length: FALSE |
| |
| |
| # Whether XUDT messages should be reassembled |
| # Whether XUDT messages should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sccp.defragment_xudt: TRUE |
| sccp.defragment_xudt: TRUE |
| |
| |
| # Whether to keep information about messages and their associations |
| # Whether to keep information about messages and their associations |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sccp.trace_sccp: FALSE |
| sccp.trace_sccp: FALSE |
| |
| |
| # Show SLR, DLR, and CAUSE Parameters in the Information Column of the Summary |
| # Show SLR, DLR, and CAUSE Parameters in the Information Column of the Summary |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sccp.show_more_info: TRUE |
| sccp.show_more_info: FALSE |
| |
| |
| # A table that enumerates user protocols to be used against specific PCs and SSNs |
| # A table that enumerates user protocols to be used against specific PCs and SSNs |
| |
| |
| # When Target Cannot Be Identified, Decode SCSI Messages As |
| # When Target Cannot Be Identified, Decode SCSI Messages As |
| # One of: Block Device, Sequential Device, Object Based Storage Device, Medium Changer Device, Multimedia Device |
| # One of: Block Device, Sequential Device, Object Based Storage Device, Medium Changer Device, Multimedia Device |
| # (case-insensitive). |
| # (case-insensitive). |
| scsi.decode_scsi_messages_as: Block Device |
| scsi.decode_scsi_messages_as: Block Device |
| |
| |
| # Whether fragmented SCSI DATA IN/OUT transfers should be reassembled |
| # Whether fragmented SCSI DATA IN/OUT transfers should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| scsi.defragment: FALSE |
| scsi.defragment: FALSE |
| |
| |
| # Show source and destination port numbers in the protocol tree |
| # Show source and destination port numbers in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sctp.show_port_numbers_in_tree: TRUE |
| sctp.show_port_numbers_in_tree: TRUE |
| |
| |
| # The type of checksum used in SCTP packets |
| # The type of checksum used in SCTP packets |
| # One of: None, Adler 32, CRC 32c, Automatic |
| # One of: None, Adler 32, CRC 32c, Automatic |
| # (case-insensitive). |
| # (case-insensitive). |
| sctp.checksum: CRC 32c |
| sctp.checksum: None |
| |
| |
| # Show always SCTP control chunks in the Info column |
| # Show always SCTP control chunks in the Info column |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sctp.show_always_control_chunks: TRUE |
| sctp.show_always_control_chunks: TRUE |
| |
| |
| # Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port or PPI |
| # Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port or PPI |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sctp.try_heuristic_first: FALSE |
| sctp.try_heuristic_first: FALSE |
| |
| |
| # Whether fragmented SCTP user messages should be reassembled |
| # Whether fragmented SCTP user messages should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sctp.reassembly: FALSE |
| sctp.reassembly: FALSE |
| |
| |
| # Match TSNs and their SACKs |
| # Match TSNs and their SACKs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sctp.tsn_analysis: FALSE |
| sctp.tsn_analysis: FALSE |
| |
| |
| # Dissect upper layer protocols |
| # Dissect upper layer protocols |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sctp.ulp_dissection: TRUE |
| sctp.ulp_dissection: TRUE |
| |
| |
| # Specifies that RTP/RTCP/T.38/MSRP/etc streams are decoded based upon port numbers found in SDP payload |
| # Specifies that RTP/RTCP/T.38/MSRP/etc streams are decoded based upon port numbers found in SDP payload |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sdp.establish_conversation: TRUE |
| sdp.establish_conversation: TRUE |
| |
| |
| # Set the port(s) for sFlow messages (default: 6343) |
| # Set the port(s) for sFlow messages (default: 6343) |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| sflow.ports: 6343 |
| sflow.ports: 6343 |
| |
| |
| # Enabling dissection makes it easy to view protocol details in each of the sampled headers. Disabling dissection may reduce noise caused when display filters match the contents of any sampled header(s). |
| # Enabling dissection makes it easy to view protocol details in each of the sampled headers. Disabling dissection may reduce noise caused when display filters match the contents of any sampled header(s). |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sflow.enable_dissection: TRUE |
| sflow.enable_dissection: TRUE |
| |
| |
| # This option only makes sense if dissection of sampled headers is enabled and probably not even then. |
| # This option only makes sense if dissection of sampled headers is enabled and probably not even then. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sflow.enable_analysis: FALSE |
| sflow.enable_analysis: FALSE |
| |
| |
| # Set UDP port 1 for SigComp messages |
| # Set UDP port 1 for SigComp messages |
| # A decimal number. |
| # A decimal number. |
| sigcomp.udp.port: 5555 |
| sigcomp.udp.port: 5555 |
| |
| |
| # Set UDP port 2 for SigComp messages |
| # Set UDP port 2 for SigComp messages |
| # A decimal number. |
| # A decimal number. |
| sigcomp.udp.port2: 6666 |
| sigcomp.udp.port2: 6666 |
| |
| |
| # Set TCP port 1 for SigComp messages |
| # Set TCP port 1 for SigComp messages |
| # A decimal number. |
| # A decimal number. |
| sigcomp.tcp.port: 5555 |
| sigcomp.tcp.port: 5555 |
| |
| |
| # Set TCP port 2 for SigComp messages |
| # Set TCP port 2 for SigComp messages |
| # A decimal number. |
| # A decimal number. |
| sigcomp.tcp.port2: 6666 |
| sigcomp.tcp.port2: 6666 |
| |
| |
| # Preference whether to Dissect the UDVM code or not |
| # Preference whether to Dissect the UDVM code or not |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sigcomp.display.udvm.code: TRUE |
| sigcomp.display.udvm.code: TRUE |
| |
| |
| # preference whether to display the bytecode in UDVM operands or not |
| # preference whether to display the bytecode in UDVM operands or not |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sigcomp.display.bytecode: FALSE |
| sigcomp.display.bytecode: FALSE |
| |
| |
| # preference whether to decompress message or not |
| # preference whether to decompress message or not |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sigcomp.decomp.msg: TRUE |
| sigcomp.decomp.msg: TRUE |
| |
| |
| # preference whether to display the decompressed message as raw text or not |
| # preference whether to display the decompressed message as raw text or not |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sigcomp.display.decomp.msg.as.txt: FALSE |
| sigcomp.display.decomp.msg.as.txt: FALSE |
| |
| |
| # 'No-Printout' = UDVM executes silently, then increasing detail about execution of UDVM instructions; Warning! CPU intense at high detail |
| # 'No-Printout' = UDVM executes silently, then increasing detail about execution of UDVM instructions; Warning! CPU intense at high detail |
| # One of: No-Printout, Low-detail, Medium-detail, High-detail |
| # One of: No-Printout, Low-detail, Medium-detail, High-detail |
| # (case-insensitive). |
| # (case-insensitive). |
| sigcomp.show.udvm.execution: No-Printout |
| sigcomp.show.udvm.execution: No-Printout |
| |
| |
| # Set the port for Simulcrypt messages ('0' means no port is assigned) |
| # Set the port for Simulcrypt messages ('0' means no port is assigned) |
| # A decimal number. |
| # A decimal number. |
| simulcrypt.tcp.port: 0 |
| simulcrypt.tcp.port: 0 |
| |
| |
| # Set the CA_system_ID used to decode ECM datagram as MIKEY |
| # Set the CA_system_ID used to decode ECM datagram as MIKEY |
| # A hexadecimal number. |
| # A hexadecimal number. |
| simulcrypt.ca_system_id_mikey: 0x9999 |
| simulcrypt.ca_system_id_mikey: 0x9999 |
| |
| |
| # SIP Server TCP Port |
| # SIP Server TCP Port |
| # A decimal number. |
| # A decimal number. |
| sip.tcp.port: 5060 |
| sip.tcp.port: 5060 |
| |
| |
| # SIP Server TLS Port |
| # SIP Server TLS Port |
| # A decimal number. |
| # A decimal number. |
| sip.tls.port: 5061 |
| sip.tls.port: 5061 |
| |
| |
| # Specifies that the raw text of the SIP message should be displayed in addition to the dissection tree |
| # Specifies that the raw text of the SIP message should be displayed in addition to the dissection tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sip.display_raw_text: TRUE |
| sip.display_raw_text: TRUE |
| |
| |
| # If enabled, only SIP/2.0 traffic will be dissected as SIP. Disable it to allow SIP traffic with a different version to be dissected as SIP. |
| # If enabled, only SIP/2.0 traffic will be dissected as SIP. Disable it to allow SIP traffic with a different version to be dissected as SIP. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sip.strict_sip_version: TRUE |
| sip.strict_sip_version: TRUE |
| |
| |
| # Whether the SIP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SIP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sip.desegment_headers: TRUE |
| sip.desegment_headers: TRUE |
| |
| |
| # Whether the SIP dissector should use the "Content-length:" value, if present, to reassemble the body of a request spanning multiple TCP segments, and reassemble chunked data spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SIP dissector should use the "Content-length:" value, if present, to reassemble the body of a request spanning multiple TCP segments, and reassemble chunked data spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sip.desegment_body: TRUE |
| sip.desegment_body: TRUE |
| |
| |
| # Whether the SCCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SCCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| skinny.desegment: TRUE |
| skinny.desegment: TRUE |
| |
| |
| # Whether the SoulSeek dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SoulSeek dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| slsk.desegment: TRUE |
| slsk.desegment: TRUE |
| |
| |
| # Whether the SoulSeek dissector should decompress all zlib compressed packets inside messages |
| # Whether the SoulSeek dissector should decompress all zlib compressed packets inside messages |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| slsk.decompress: TRUE |
| slsk.decompress: TRUE |
| |
| |
| # Whether the dissector should reassemble the payload of SMB Transaction commands spanning multiple SMB PDUs |
| # Whether the dissector should reassemble the payload of SMB Transaction commands spanning multiple SMB PDUs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| smb.trans_reassembly: TRUE |
| smb.trans_reassembly: TRUE |
| |
| |
| # Whether the dissector should reassemble DCERPC over SMB commands |
| # Whether the dissector should reassemble DCERPC over SMB commands |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| smb.dcerpc_reassembly: TRUE |
| smb.dcerpc_reassembly: TRUE |
| |
| |
| # Whether the dissector should snoop SMB and related CIFS protocols to discover and display Names associated with SIDs |
| # Whether the dissector should snoop SMB and related CIFS protocols to discover and display Names associated with SIDs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| smb.sid_name_snooping: FALSE |
| smb.sid_name_snooping: FALSE |
| |
| |
| # Whether the SMPP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SMPP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| smpp.reassemble_smpp_over_tcp: TRUE |
| smpp.reassemble_smpp_over_tcp: TRUE |
| |
| |
| # Whether the SMTP dissector should reassemble command and response lines spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SMTP dissector should reassemble command and response lines spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| smtp.desegment_lines: TRUE |
| smtp.desegment_lines: TRUE |
| |
| |
| # Whether the SMTP dissector should reassemble DATA command and lines spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SMTP dissector should reassemble DATA command and lines spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| smtp.desegment_data: TRUE |
| smtp.desegment_data: TRUE |
| |
| |
| # Whether fragmented BIUs should be reassembled |
| # Whether fragmented BIUs should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| sna.defragment: TRUE |
| sna.defragment: TRUE |
| |
| |
| # Whether the SNMP OID should be shown in the info column |
| # Whether the SNMP OID should be shown in the info column |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| snmp.display_oid: TRUE |
| snmp.display_oid: TRUE |
| |
| |
| # Whether the SNMP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SNMP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| snmp.desegment: TRUE |
| snmp.desegment: TRUE |
| |
| |
| # ON - display dissected variables inside SNMP tree, OFF - display dissected variables in root tree after SNMP |
| # ON - display dissected variables inside SNMP tree, OFF - display dissected variables in root tree after SNMP |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| snmp.var_in_tree: TRUE |
| snmp.var_in_tree: TRUE |
| |
| |
| # Table of engine-user associations used for authentication and decryption |
| # Table of engine-user associations used for authentication and decryption |
| |
| |
| # MIB settings can be changed in the Name Resolution preferences |
| # MIB settings can be changed in the Name Resolution preferences |
| |
| |
| # Whether the SRVLOC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SRVLOC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| srvloc.desegment_tcp: TRUE |
| srvloc.desegment_tcp: TRUE |
| |
| |
| # Set the UDP port for SSCOP messages encapsulated in UDP (0 to disable) |
| # Set the UDP port for SSCOP messages encapsulated in UDP (0 to disable) |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| sscop.udp.ports: |
| sscop.udp.ports: |
| |
| |
| # SSCOP payload (dissector to call on SSCOP payload) |
| # SSCOP payload (dissector to call on SSCOP payload) |
| # One of: Data (no further dissection), Q.2931, SSCF-NNI (MTP3-b), ALCAP, NBAP |
| # One of: Data (no further dissection), Q.2931, SSCF-NNI (MTP3-b), ALCAP, NBAP |
| # (case-insensitive). |
| # (case-insensitive). |
| sscop.payload: Q.2931 |
| sscop.payload: Q.2931 |
| |
| |
| # Whether the SSH dissector should reassemble SSH buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SSH dissector should reassemble SSH buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ssh.desegment_buffers: TRUE |
| ssh.desegment_buffers: TRUE |
| |
| |
| # Whether the SSL dissector should reassemble SSL records spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the SSL dissector should reassemble SSL records spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ssl.desegment_ssl_records: TRUE |
| ssl.desegment_ssl_records: TRUE |
| |
| |
| # Whether the SSL dissector should reassemble SSL Application Data spanning multiple SSL records. |
| # Whether the SSL dissector should reassemble SSL Application Data spanning multiple SSL records. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ssl.desegment_ssl_application_data: TRUE |
| ssl.desegment_ssl_application_data: TRUE |
| |
| |
| # Semicolon-separated list of private RSA keys used for SSL decryption; each list entry must be in the form of <ip>,<port>,<protocol>,<key_file_name>. <key_file_name> is the local file name of the RSA private key used by the specified server (or name of the file containing such a list) |
| # Semicolon-separated list of private RSA keys used for SSL decryption; each list entry must be in the form of <ip>,<port>,<protocol>,<key_file_name>. <key_file_name> is the local file name of the RSA private key used by the specified server (or name of the file containing such a list) |
| # A string. |
| # A string. |
| ssl.keys_list: |
| ssl.keys_list: |
| |
| |
| # Redirect SSL debug to file name; leave empty to disable debugging, or use "-" to redirect output to stderr |
| # Redirect SSL debug to file name; leave empty to disable debugging, or use "-" to redirect output to stderr |
| # |
| # |
| # A string. |
| # A string. |
| ssl.debug_file: |
| ssl.debug_file: |
| |
| |
| # Whether the StarTeam dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the StarTeam dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| starteam.desegment: TRUE |
| starteam.desegment: TRUE |
| |
| |
| # Whether the BPDU dissector should use 802.1t System ID Extensions when dissecting the Bridge Identifier |
| # Whether the BPDU dissector should use 802.1t System ID Extensions when dissecting the Bridge Identifier |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| stp.use_system_id_extension: TRUE |
| stp.use_system_id_extension: TRUE |
| |
| |
| # Version used by Wireshark |
| # Version used by Wireshark |
| # One of: Internet Draft version 08, RFC 3868 |
| # One of: Internet Draft version 08, RFC 3868 |
| # (case-insensitive). |
| # (case-insensitive). |
| sua.version: RFC 3868 |
| sua.version: RFC 3868 |
| |
| |
| # Set the port number for synchrophasor frames over UDP(if other than the default of 4713) |
| # Set the port number for synchrophasor frames over UDP(if other than the default of 4713) |
| # A decimal number. |
| # A decimal number. |
| synphasor.udp_port: 4713 |
| synphasor.udp_port: 4713 |
| |
| |
| # Set the port number for synchrophasor frames over TCP(if other than the default of 4712) |
| # Set the port number for synchrophasor frames over TCP(if other than the default of 4712) |
| # A decimal number. |
| # A decimal number. |
| synphasor.tcp_port: 4712 |
| synphasor.tcp_port: 4712 |
| |
| |
| # Whether the T.38 dissector should decode using the Pre-Corrigendum T.38 ASN.1 specification (1998). |
| # Whether the T.38 dissector should decode using the Pre-Corrigendum T.38 ASN.1 specification (1998). |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| t38.use_pre_corrigendum_asn1_specification: TRUE |
| t38.use_pre_corrigendum_asn1_specification: TRUE |
| |
| |
| # Whether a UDP packet that looks like RTP version 2 packet will be dissected as RTP packet or T.38 packet. If enabled there is a risk that T.38 UDPTL packets with sequence number higher than 32767 may be dissected as RTP. |
| # Whether a UDP packet that looks like RTP version 2 packet will be dissected as RTP packet or T.38 packet. If enabled there is a risk that T.38 UDPTL packets with sequence number higher than 32767 may be dissected as RTP. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| t38.dissect_possible_rtpv2_packets_as_rtp: FALSE |
| t38.dissect_possible_rtpv2_packets_as_rtp: FALSE |
| |
| |
| # Set the TCP port for T.38 messages |
| # Set the TCP port for T.38 messages |
| # A decimal number. |
| # A decimal number. |
| t38.tcp.port: 6004 |
| t38.tcp.port: 6004 |
| |
| |
| # Set the UDP port for T.38 messages |
| # Set the UDP port for T.38 messages |
| # A decimal number. |
| # A decimal number. |
| t38.udp.port: 6004 |
| t38.udp.port: 6004 |
| |
| |
| # Whether the dissector should reassemble T.38 PDUs spanning multiple TCP segments when TPKT is used over TCP. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the dissector should reassemble T.38 PDUs spanning multiple TCP segments when TPKT is used over TCP. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| t38.reassembly: TRUE |
| t38.reassembly: TRUE |
| |
| |
| # Whether T.38 is used with TPKT for TCP |
| # Whether T.38 is used with TPKT for TCP |
| # One of: Never, Always, Maybe |
| # One of: Never, Always, Maybe |
| # (case-insensitive). |
| # (case-insensitive). |
| t38.tpkt_usage: Maybe |
| t38.tpkt_usage: Maybe |
| |
| |
| # Where available, show which protocol and frame caused this T.38 stream to be created |
| # Where available, show which protocol and frame caused this T.38 stream to be created |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| t38.show_setup_info: TRUE |
| t38.show_setup_info: TRUE |
| |
| |
| # Whether the TACACS+ dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the TACACS+ dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tacplus.desegment: TRUE |
| tacplus.desegment: TRUE |
| |
| |
| # TACACS+ Encryption Key |
| # TACACS+ Encryption Key |
| # A string. |
| # A string. |
| tacplus.key: |
| tacplus.key: |
| |
| |
| # Whether the TALI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the TALI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tali.reassemble: TRUE |
| tali.reassemble: TRUE |
| |
| |
| # SCCP (and SUA) SSNs to decode as TCAP |
| # SCCP (and SUA) SSNs to decode as TCAP |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| tcap.ssn: |
| tcap.ssn: |
| |
| |
| # Activate the analyse for Response Time |
| # Activate the analyse for Response Time |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcap.srt: FALSE |
| tcap.srt: FALSE |
| |
| |
| # Statistics for Response Time |
| # Statistics for Response Time |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcap.persistentsrt: FALSE |
| tcap.persistentsrt: FALSE |
| |
| |
| # Maximal delay for message repetion |
| # Maximal delay for message repetion |
| # A decimal number. |
| # A decimal number. |
| tcap.repetitiontimeout: 10 |
| tcap.repetitiontimeout: 10 |
| |
| |
| # Maximal delay for message lost |
| # Maximal delay for message lost |
| # A decimal number. |
| # A decimal number. |
| tcap.losttimeout: 30 |
| tcap.losttimeout: 30 |
| |
| |
| # Whether the TCP summary line should be shown in the protocol tree |
| # Whether the TCP summary line should be shown in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcp.summary_in_tree: TRUE |
| tcp.summary_in_tree: TRUE |
| |
| |
| # Whether to validate the TCP checksum |
| # Whether to validate the TCP checksum |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcp.check_checksum: TRUE |
| tcp.check_checksum: FALSE |
| |
| |
| # Whether subdissector can request TCP streams to be reassembled |
| # Whether subdissector can request TCP streams to be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcp.desegment_tcp_streams: TRUE |
| tcp.desegment_tcp_streams: TRUE |
| |
| |
| # Make the TCP dissector analyze TCP sequence numbers to find and flag segment retransmissions, missing segments and RTT |
| # Make the TCP dissector analyze TCP sequence numbers to find and flag segment retransmissions, missing segments and RTT |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcp.analyze_sequence_numbers: TRUE |
| tcp.analyze_sequence_numbers: TRUE |
| |
| |
| # Make the TCP dissector use relative sequence numbers instead of absolute ones. To use this option you must also enable "Analyze TCP sequence numbers". This option will also try to track and adjust the window field according to any TCP window scaling options seen. |
| # Make the TCP dissector use relative sequence numbers instead of absolute ones. To use this option you must also enable "Analyze TCP sequence numbers". This option will also try to track and adjust the window field according to any TCP window scaling options seen. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcp.relative_sequence_numbers: TRUE |
| tcp.relative_sequence_numbers: TRUE |
| |
| |
| # Make the TCP dissector track the number on un-ACKed bytes of data are in flight per packet. To use this option you must also enable "Analyze TCP sequence numbers". This takes a lot of memory but allows you to track how much data are in flight at a time and graphing it in io-graphs |
| # Make the TCP dissector track the number on un-ACKed bytes of data are in flight per packet. To use this option you must also enable "Analyze TCP sequence numbers". This takes a lot of memory but allows you to track how much data are in flight at a time and graphing it in io-graphs |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcp.track_bytes_in_flight: TRUE |
| tcp.track_bytes_in_flight: TRUE |
| |
| |
| # Calculate timestamps relative to the first frame and the previous frame in the tcp conversation |
| # Calculate timestamps relative to the first frame and the previous frame in the tcp conversation |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcp.calculate_timestamps: FALSE |
| tcp.calculate_timestamps: FALSE |
| |
| |
| # Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port |
| # Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tcp.try_heuristic_first: FALSE |
| tcp.try_heuristic_first: FALSE |
| |
| |
| # Set the port for IPSEC/ISAKMP messagesIf other than the default of 10000) |
| # Set the port for IPSEC/ISAKMP messagesIf other than the default of 10000) |
| # A decimal number. |
| # A decimal number. |
| tcpencap.tcp.port: 10000 |
| tcpencap.tcp.port: 10000 |
| |
| |
| # Whether the TDS dissector should reassemble TDS buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the TDS dissector should reassemble TDS buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tds.desegment_buffers: TRUE |
| tds.desegment_buffers: TRUE |
| |
| |
| # Whether the TDS dissector should defragment messages spanning multiple Netlib buffers |
| # Whether the TDS dissector should defragment messages spanning multiple Netlib buffers |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tds.defragment: TRUE |
| tds.defragment: TRUE |
| |
| |
| # Hint as to version of TDS protocol being decoded |
| # Hint as to version of TDS protocol being decoded |
| # One of: Not Specified, TDS 4, TDS 5, TDS 7, TDS 8 |
| # One of: Not Specified, TDS 4, TDS 5, TDS 7, TDS 8 |
| # (case-insensitive). |
| # (case-insensitive). |
| tds.protocol_type: Not Specified |
| tds.protocol_type: Not Specified |
| |
| |
| # Hint as to whether to decode TDS protocol as little-endian or big-endian. (TDS7/8 always decoded as little-endian) |
| # Hint as to whether to decode TDS protocol as little-endian or big-endian. (TDS7/8 always decoded as little-endian) |
| # One of: Little Endian, Big Endian |
| # One of: Little Endian, Big Endian |
| # (case-insensitive). |
| # (case-insensitive). |
| tds.endian_type: Little Endian |
| tds.endian_type: Little Endian |
| |
| |
| # Additional TCP ports to decode as TDS |
| # Additional TCP ports to decode as TDS |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| tds.tcp_ports: |
| tds.tcp_ports: |
| |
| |
| # Check this to decode IPv6 traffic between Teredo clients and relays |
| # Check this to decode IPv6 traffic between Teredo clients and relays |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| teredo.heuristic_teredo: FALSE |
| teredo.heuristic_teredo: FALSE |
| |
| |
| # Whether TIPCv1 SEGMENTATION_MANAGER datagrams should be reassembled |
| # Whether TIPCv1 SEGMENTATION_MANAGER datagrams should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tipc.defragment: TRUE |
| tipc.defragment: TRUE |
| |
| |
| # Whether to try to dissect TIPC data or not |
| # Whether to try to dissect TIPC data or not |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tipc.dissect_tipc_data: TRUE |
| tipc.dissect_tipc_data: TRUE |
| |
| |
| # Try to decode a TIPCv2 packet using an heuristic sub-dissector before using a registered sub-dissector |
| # Try to decode a TIPCv2 packet using an heuristic sub-dissector before using a registered sub-dissector |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tipc.try_heuristic_first: FALSE |
| tipc.try_heuristic_first: FALSE |
| |
| |
| # TIPC 1.7 removes/adds fields (not) available in TIPC 1.5/1.6 while keeping the version number 2 in the packages. "ALL" shows all fields that were ever used in both versions. |
| # TIPC 1.7 removes/adds fields (not) available in TIPC 1.5/1.6 while keeping the version number 2 in the packages. "ALL" shows all fields that were ever used in both versions. |
| # One of: ALL, TIPC 1.5/1.6, TIPC 1.7 |
| # One of: ALL, TIPC 1.5/1.6, TIPC 1.7 |
| # (case-insensitive). |
| # (case-insensitive). |
| tipc.handle_v2_as: ALL |
| tipc.handle_v2_as: ALL |
| |
| |
| # Decode this TCP ports traffic as TIPC. Set to "0" to disable. |
| # Decode this TCP ports traffic as TIPC. Set to "0" to disable. |
| # A decimal number. |
| # A decimal number. |
| tipc.alternate_port: 0 |
| tipc.alternate_port: 0 |
| |
| |
| # Whether the TIPC-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the TIPC-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tipc.desegment: TRUE |
| tipc.desegment: TRUE |
| |
| |
| # Whether the TNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the TNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tns.desegment_tns_messages: TRUE |
| tns.desegment_tns_messages: TRUE |
| |
| |
| # Whether the TPKT dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the TPKT dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tpkt.desegment: TRUE |
| tpkt.desegment: TRUE |
| |
| |
| # No description |
| # No description |
| # A decimal number. |
| # A decimal number. |
| tpncp.tcp.trunkpack_port: 2424 |
| tpncp.tcp.trunkpack_port: 2424 |
| |
| |
| # No description |
| # No description |
| # A decimal number. |
| # A decimal number. |
| tpncp.udp.trunkpack_port: 2424 |
| tpncp.udp.trunkpack_port: 2424 |
| |
| |
| # Whether Linux mangling of the link-layer header should be checked for and worked around |
| # Whether Linux mangling of the link-layer header should be checked for and worked around |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| tr.fix_linux_botches: FALSE |
| tr.fix_linux_botches: FALSE |
| |
| |
| # Critical Traffic Mask (base hex) |
| # Critical Traffic Mask (base hex) |
| # A hexadecimal number. |
| # A hexadecimal number. |
| tte.ct_mask_value: 0 |
| tte.ct_mask_value: 0 |
| |
| |
| # Critical Traffic Marker (base hex) |
| # Critical Traffic Marker (base hex) |
| # A hexadecimal number. |
| # A hexadecimal number. |
| tte.ct_marker_value: 0xffffffff |
| tte.ct_marker_value: 0xffffffff |
| |
| |
| # Whether the UCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the UCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ucp.desegment_ucp_messages: TRUE |
| ucp.desegment_ucp_messages: TRUE |
| |
| |
| # Whether the UDP summary line should be shown in the protocol tree |
| # Whether the UDP summary line should be shown in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| udp.summary_in_tree: TRUE |
| udp.summary_in_tree: TRUE |
| |
| |
| # Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port |
| # Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| udp.try_heuristic_first: FALSE |
| udp.try_heuristic_first: FALSE |
| |
| |
| # Whether to validate the UDP checksum |
| # Whether to validate the UDP checksum |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| udp.check_checksum: FALSE |
| udp.check_checksum: FALSE |
| |
| |
| # Collect process flow information from IPFIX |
| # Collect process flow information from IPFIX |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| udp.process_info: FALSE |
| udp.process_info: FALSE |
| |
| |
| # Ignore an invalid checksum coverage field and continue dissection |
| # Ignore an invalid checksum coverage field and continue dissection |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| udplite.ignore_checksum_coverage: TRUE |
| udplite.ignore_checksum_coverage: TRUE |
| |
| |
| # Whether to validate the UDPlite checksum |
| # Whether to validate the UDPlite checksum |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| udplite.check_checksum: TRUE |
| udplite.check_checksum: FALSE |
| |
| |
| # Whether the ULP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the ULP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ulp.desegment_ulp_messages: TRUE |
| ulp.desegment_ulp_messages: TRUE |
| |
| |
| # Set the TCP port for Ulp messages(IANA registerd port is 7275) |
| # Set the TCP port for Ulp messages(IANA registerd port is 7275) |
| # A decimal number. |
| # A decimal number. |
| ulp.tcp.port: 7275 |
| ulp.tcp.port: 7275 |
| |
| |
| # Whether the UMA dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the UMA dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| uma.desegment_ucp_messages: TRUE |
| uma.desegment_ucp_messages: TRUE |
| |
| |
| # TCP ports to be decoded as UMA (default: 14001,14001) |
| # TCP ports to be decoded as UMA (default: 14001,14001) |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| uma.tcp.ports: 14001,14001 |
| uma.tcp.ports: 14001,14001 |
| |
| |
| # UNISTIM port (default 5000) |
| # UNISTIM port (default 5000) |
| # A decimal number. |
| # A decimal number. |
| unistim.udp.port: 0 |
| unistim.udp.port: 0 |
| |
| |
| # A table that enumerates the various protocols to be used against a certain user DLT |
| # A table that enumerates the various protocols to be used against a certain user DLT |
| |
| |
| # Whether the vlan summary line should be shown in the protocol tree |
| # Whether the vlan summary line should be shown in the protocol tree |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| vlan.summary_in_tree: TRUE |
| vlan.summary_in_tree: TRUE |
| |
| |
| # The (hexadecimal) Ethertype used to indicate 802.1QinQ VLAN in VLAN tunneling. |
| # The (hexadecimal) Ethertype used to indicate 802.1QinQ VLAN in VLAN tunneling. |
| # A hexadecimal number. |
| # A hexadecimal number. |
| vlan.qinq_ethertype: 0x9100 |
| vlan.qinq_ethertype: 0x9100 |
| |
| |
| # Whether the VNC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the VNC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| vnc.desegment: TRUE |
| vnc.desegment: TRUE |
| |
| |
| # Decode this port's traffic as VNC in addition to the default ports (5500, 5501, 5900, 5901) |
| # Decode this port's traffic as VNC in addition to the default ports (5500, 5501, 5900, 5901) |
| # A decimal number. |
| # A decimal number. |
| vnc.alternate_port: 0 |
| vnc.alternate_port: 0 |
| |
| |
| # Enable this preference if you want to view the WBXML tokens without the representation in a media type (e.g., WML). Tokens will show up as Tag_0x12, attrStart_0x08 or attrValue_0x0B for example. |
| # Enable this preference if you want to view the WBXML tokens without the representation in a media type (e.g., WML). Tokens will show up as Tag_0x12, attrStart_0x08 or attrValue_0x0B for example. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wbxml.skip_wbxml_token_mapping: FALSE |
| wbxml.skip_wbxml_token_mapping: FALSE |
| |
| |
| # Enable this preference if you want to skip the parsing of the WBXML tokens that constitute the body of the WBXML document. Only the WBXML header will be dissected (and visualized) then. |
| # Enable this preference if you want to skip the parsing of the WBXML tokens that constitute the body of the WBXML document. Only the WBXML header will be dissected (and visualized) then. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wbxml.disable_wbxml_token_parsing: FALSE |
| wbxml.disable_wbxml_token_parsing: FALSE |
| |
| |
| # Show transaction ID direction bit separately from the rest of the transaction ID field. |
| # Show transaction ID direction bit separately from the rest of the transaction ID field. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wimaxasncp.show_transaction_id_d_bit: FALSE |
| wimaxasncp.show_transaction_id_d_bit: FALSE |
| |
| |
| # Print debug output to the console. |
| # Print debug output to the console. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wimaxasncp.debug_enabled: FALSE |
| wimaxasncp.debug_enabled: FALSE |
| |
| |
| # Set UDP port for WiMAX ASN Control Plane Protocol |
| # Set UDP port for WiMAX ASN Control Plane Protocol |
| # A decimal number. |
| # A decimal number. |
| wimaxasncp.udp.wimax_port: 2231 |
| wimaxasncp.udp.wimax_port: 2231 |
| |
| |
| # Whether the WINS-Replication dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the WINS-Replication dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| winsrepl.reassemble: TRUE |
| winsrepl.reassemble: TRUE |
| |
| |
| # Whether fragmented 802.11 datagrams should be reassembled |
| # Whether fragmented 802.11 datagrams should be reassembled |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wlan.defragment: TRUE |
| wlan.defragment: TRUE |
| |
| |
| # Don't dissect 802.11n draft HT elements (which might contain duplicate information). |
| # Don't dissect 802.11n draft HT elements (which might contain duplicate information). |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wlan.ignore_draft_ht: FALSE |
| wlan.ignore_draft_ht: FALSE |
| |
| |
| # Whether retransmitted 802.11 frames should be subdissected |
| # Whether retransmitted 802.11 frames should be subdissected |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wlan.retransmitted: TRUE |
| wlan.retransmitted: TRUE |
| |
| |
| # Some 802.11 cards include the FCS at the end of a packet, others do not. |
| # Some 802.11 cards include the FCS at the end of a packet, others do not. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wlan.check_fcs: FALSE |
| wlan.check_fcs: FALSE |
| |
| |
| # Some 802.11 cards leave the Protection bit set even though the packet is decrypted, and some also leave the IV (initialization vector). |
| # Some 802.11 cards leave the Protection bit set even though the packet is decrypted, and some also leave the IV (initialization vector). |
| # One of: No, Yes - without IV, Yes - with IV |
| # One of: No, Yes - without IV, Yes - with IV |
| # (case-insensitive). |
| # (case-insensitive). |
| wlan.ignore_wep: No |
| wlan.ignore_wep: No |
| |
| |
| # Enable WEP and WPA/WPA2 decryption |
| # Enable WEP and WPA/WPA2 decryption |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wlan.enable_decryption: FALSE |
| wlan.enable_decryption: FALSE |
| |
| |
| # Valid key formats |
| # Valid key formats |
| |
| |
| # Key #1 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #1 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key1: |
| wlan.wep_key1: |
| |
| |
| # Key #2 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #2 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key2: |
| wlan.wep_key2: |
| |
| |
| # Key #3 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #3 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key3: |
| wlan.wep_key3: |
| |
| |
| # Key #4 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #4 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key4: |
| wlan.wep_key4: |
| |
| |
| # Key #5 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #5 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key5: |
| wlan.wep_key5: |
| |
| |
| # Key #6 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #6 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key6: |
| wlan.wep_key6: |
| |
| |
| # Key #7 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #7 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key7: |
| wlan.wep_key7: |
| |
| |
| # Key #8 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #8 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key8: |
| wlan.wep_key8: |
| |
| |
| # Key #9 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #9 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key9: |
| wlan.wep_key9: |
| |
| |
| # Key #10 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #10 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key10: |
| wlan.wep_key10: |
| |
| |
| # Key #11 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #11 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key11: |
| wlan.wep_key11: |
| |
| |
| # Key #12 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #12 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key12: |
| wlan.wep_key12: |
| |
| |
| # Key #13 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #13 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key13: |
| wlan.wep_key13: |
| |
| |
| # Key #14 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #14 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key14: |
| wlan.wep_key14: |
| |
| |
| # Key #15 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #15 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key15: |
| wlan.wep_key15: |
| |
| |
| # Key #16 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #16 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key16: |
| wlan.wep_key16: |
| |
| |
| # Key #17 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #17 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key17: |
| wlan.wep_key17: |
| |
| |
| # Key #18 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #18 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key18: |
| wlan.wep_key18: |
| |
| |
| # Key #19 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #19 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key19: |
| wlan.wep_key19: |
| |
| |
| # Key #20 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #20 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key20: |
| wlan.wep_key20: |
| |
| |
| # Key #21 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #21 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key21: |
| wlan.wep_key21: |
| |
| |
| # Key #22 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #22 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key22: |
| wlan.wep_key22: |
| |
| |
| # Key #23 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #23 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key23: |
| wlan.wep_key23: |
| |
| |
| # Key #24 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #24 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key24: |
| wlan.wep_key24: |
| |
| |
| # Key #25 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #25 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key25: |
| wlan.wep_key25: |
| |
| |
| # Key #26 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #26 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key26: |
| wlan.wep_key26: |
| |
| |
| # Key #27 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #27 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key27: |
| wlan.wep_key27: |
| |
| |
| # Key #28 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #28 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key28: |
| wlan.wep_key28: |
| |
| |
| # Key #29 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #29 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key29: |
| wlan.wep_key29: |
| |
| |
| # Key #30 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #30 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key30: |
| wlan.wep_key30: |
| |
| |
| # Key #31 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #31 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key31: |
| wlan.wep_key31: |
| |
| |
| # Key #32 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #32 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key32: |
| wlan.wep_key32: |
| |
| |
| # Key #33 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #33 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key33: |
| wlan.wep_key33: |
| |
| |
| # Key #34 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #34 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key34: |
| wlan.wep_key34: |
| |
| |
| # Key #35 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #35 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key35: |
| wlan.wep_key35: |
| |
| |
| # Key #36 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #36 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key36: |
| wlan.wep_key36: |
| |
| |
| # Key #37 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #37 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key37: |
| wlan.wep_key37: |
| |
| |
| # Key #38 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #38 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key38: |
| wlan.wep_key38: |
| |
| |
| # Key #39 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #39 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key39: |
| wlan.wep_key39: |
| |
| |
| # Key #40 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #40 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key40: |
| wlan.wep_key40: |
| |
| |
| # Key #41 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #41 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key41: |
| wlan.wep_key41: |
| |
| |
| # Key #42 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #42 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key42: |
| wlan.wep_key42: |
| |
| |
| # Key #43 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #43 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key43: |
| wlan.wep_key43: |
| |
| |
| # Key #44 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #44 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key44: |
| wlan.wep_key44: |
| |
| |
| # Key #45 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #45 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key45: |
| wlan.wep_key45: |
| |
| |
| # Key #46 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #46 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key46: |
| wlan.wep_key46: |
| |
| |
| # Key #47 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #47 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key47: |
| wlan.wep_key47: |
| |
| |
| # Key #48 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #48 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key48: |
| wlan.wep_key48: |
| |
| |
| # Key #49 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #49 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key49: |
| wlan.wep_key49: |
| |
| |
| # Key #50 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #50 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key50: |
| wlan.wep_key50: |
| |
| |
| # Key #51 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #51 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key51: |
| wlan.wep_key51: |
| |
| |
| # Key #52 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #52 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key52: |
| wlan.wep_key52: |
| |
| |
| # Key #53 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #53 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key53: |
| wlan.wep_key53: |
| |
| |
| # Key #54 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #54 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key54: |
| wlan.wep_key54: |
| |
| |
| # Key #55 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #55 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key55: |
| wlan.wep_key55: |
| |
| |
| # Key #56 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #56 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key56: |
| wlan.wep_key56: |
| |
| |
| # Key #57 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #57 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key57: |
| wlan.wep_key57: |
| |
| |
| # Key #58 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #58 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key58: |
| wlan.wep_key58: |
| |
| |
| # Key #59 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #59 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key59: |
| wlan.wep_key59: |
| |
| |
| # Key #60 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #60 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key60: |
| wlan.wep_key60: |
| |
| |
| # Key #61 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #61 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key61: |
| wlan.wep_key61: |
| |
| |
| # Key #62 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #62 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key62: |
| wlan.wep_key62: |
| |
| |
| # Key #63 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #63 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key63: |
| wlan.wep_key63: |
| |
| |
| # Key #64 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # Key #64 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key> |
| # A string. |
| # A string. |
| wlan.wep_key64: |
| wlan.wep_key64: |
| |
| |
| # Set the maximum Basic CID used in the Wimax decoder (if other than the default of 320). Note: The maximum Primary CID is double the maximum Basic CID. |
| # Set the maximum Basic CID used in the Wimax decoder (if other than the default of 320). Note: The maximum Primary CID is double the maximum Basic CID. |
| # A decimal number. |
| # A decimal number. |
| wmx.basic_cid_max: 320 |
| wmx.basic_cid_max: 320 |
| |
| |
| # Set to TRUE to use the Corrigendum 2 version of Wimax message decoding. Set to FALSE to use the 802.16e-2005 version. |
| # Set to TRUE to use the Corrigendum 2 version of Wimax message decoding. Set to FALSE to use the 802.16e-2005 version. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wmx.corrigendum_2_version: FALSE |
| wmx.corrigendum_2_version: FALSE |
| |
| |
| # Whether the wow dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the wow dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| wow.desegment: TRUE |
| wow.desegment: TRUE |
| |
| |
| # (Hexadecimal) Ethertype used to indicate IEEE 802.15.4 frame. |
| # (Hexadecimal) Ethertype used to indicate IEEE 802.15.4 frame. |
| # A hexadecimal number. |
| # A hexadecimal number. |
| wpan.802154_ethertype: 0x809a |
| wpan.802154_ethertype: 0x809a |
| |
| |
| # Whether the X11 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the X11 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| x11.desegment: TRUE |
| x11.desegment: TRUE |
| |
| |
| # If CALL REQUEST not seen or didn't specify protocol, dissect as QLLC/SNA |
| # If CALL REQUEST not seen or didn't specify protocol, dissect as QLLC/SNA |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| x25.payload_is_qllc_sna: FALSE |
| x25.payload_is_qllc_sna: FALSE |
| |
| |
| # If CALL REQUEST has no data, assume the protocol handled is COTP |
| # If CALL REQUEST has no data, assume the protocol handled is COTP |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| x25.call_request_nodata_is_cotp: FALSE |
| x25.call_request_nodata_is_cotp: FALSE |
| |
| |
| # If CALL REQUEST not seen or didn't specify protocol, check user data before checking heuristic dissectors |
| # If CALL REQUEST not seen or didn't specify protocol, check user data before checking heuristic dissectors |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| x25.payload_check_data: FALSE |
| x25.payload_check_data: FALSE |
| |
| |
| # Reassemble fragmented X.25 packets |
| # Reassemble fragmented X.25 packets |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| x25.reassemble: TRUE |
| x25.reassemble: TRUE |
| |
| |
| # Set the port for P1 operations (if other than the default of 102) |
| # Set the port for P1 operations (if other than the default of 102) |
| # A decimal number. |
| # A decimal number. |
| x411.tcp.port: 102 |
| x411.tcp.port: 102 |
| |
| |
| # Try to recognize XML for unknown media types |
| # Try to recognize XML for unknown media types |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| xml.heuristic: FALSE |
| xml.heuristic: FALSE |
| |
| |
| # Try to recognize XML for unknown TCP ports |
| # Try to recognize XML for unknown TCP ports |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| xml.heuristic_tcp: FALSE |
| xml.heuristic_tcp: FALSE |
| |
| |
| # TCP Ports range |
| # TCP Ports range |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| # A string denoting an positive integer range (e.g., "1-20,30-40"). |
| xml.tcp.port: |
| xml.tcp.port: |
| |
| |
| # Try to recognize XML for unknown UDP ports |
| # Try to recognize XML for unknown UDP ports |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| xml.heuristic_udp: FALSE |
| xml.heuristic_udp: FALSE |
| |
| |
| # Whether the X.25-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings |
| # Whether the X.25-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| xot.desegment: TRUE |
| xot.desegment: TRUE |
| |
| |
| # Whether the X.25-over-TCP dissector should reassemble all X.25 packets before calling the X25 dissector. If the TCP packets arrive out-of-order, the X.25 reassembly can otherwise fail. To use this option, you should also enable "Reassemble X.25-over-TCP messages spanning multiple TCP segments", "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings and "Reassemble fragmented X.25 packets" in the X.25 protocol settings. |
| # Whether the X.25-over-TCP dissector should reassemble all X.25 packets before calling the X25 dissector. If the TCP packets arrive out-of-order, the X.25 reassembly can otherwise fail. To use this option, you should also enable "Reassemble X.25-over-TCP messages spanning multiple TCP segments", "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings and "Reassemble fragmented X.25 packets" in the X.25 protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| xot.x25_desegment: FALSE |
| xot.x25_desegment: FALSE |
| |
| |
| # Whether the YMSG dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # Whether the YMSG dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings. |
| # TRUE or FALSE (case-insensitive). |
| # TRUE or FALSE (case-insensitive). |
| ymsg.desegment: TRUE |
| ymsg.desegment: TRUE |
| |
| |
| # Specifies the security level to use in the decryption process. This value is ignored for ZigBee 2004 and unsecured networks. |
| # Specifies the security level to use in the decryption process. This value is ignored for ZigBee 2004 and unsecured networks. |
| # One of: No Security, No Encryption, 32-bit Integrity Protection, No Encryption, 64-bit Integrity Protection, No Encryption, 128-bit Integrity Protection, AES-128 Encryption, No Integrity Protection, AES-128 Encryption, 32-bit Integrity Protection, AES-128 Encryption, 64-bit Integrity Protection, AES-128 Encryption, 128-bit Integrity Protection |
| # One of: No Security, No Encryption, 32-bit Integrity Protection, No Encryption, 64-bit Integrity Protection, No Encryption, 128-bit Integrity Protection, AES-128 Encryption, No Integrity Protection, AES-128 Encryption, 32-bit Integrity Protection, AES-128 Encryption, 64-bit Integrity Protection, AES-128 Encryption, 128-bit Integrity Protection |
| # (case-insensitive). |
| # (case-insensitive). |
| zbee.nwk.seclevel: AES-128 Encryption, 32-bit Integrity Protection |
| zbee.nwk.seclevel: AES-128 Encryption, 32-bit Integrity Protection |
| |
| |
| # Specifies the network key to use for decryption. |
| # Specifies the network key to use for decryption. |
| # A string. |
| # A string. |
| zbee.nwk.nwkkey: |
| zbee.nwk.nwkkey: |
| |
| |
| # The Extended address of the trust center. |
| # The Extended address of the trust center. |
| # A string. |
| # A string. |
| zbee.nwk.tcaddr: |
| zbee.nwk.tcaddr: |
| |
| |
| # Specifies the trust center link key to use for decryption. |
| # Specifies the trust center link key to use for decryption. |
| # A string. |
| # A string. |
| zbee.nwk.tclinkkey: |
| zbee.nwk.tclinkkey: |
| |
| |
| # Set the port for ZEP Protocol |
| # Set the port for ZEP Protocol |
| # Default port is 17754 |
| # Default port is 17754 |
| # A decimal number. |
| # A decimal number. |
| zep.udp.port: 17754 |
| zep.udp.port: 17754 |
| |
| |