Wireshark-users: Re: [Wireshark-users] SIP trace with tshark?
From: Nicholas Saunders <saunders.nicholas@xxxxxxxxx>
Date: Sun, 6 Sep 2020 17:10:42 -0700
It says that this isn't a valid capture filter due to a syntax error:


nicholas $
nicholas $ sudo  tshark -f udp.port==5060,sip
Running as user "root" and group "root". This could be dangerous.
Capturing on 'enp0s25'
tshark: Invalid capture filter "udp.port==5060,sip" for interface 'enp0s25'.

That string isn't a valid capture filter (can't parse filter expression: syntax error).
See the User's Guide for a description of the capture filter syntax.
0 packets captured
nicholas $


so I'm still reading the manual, but could sure use a pointer here.



thanks,


Nick


On 2020-09-06 5:02 a.m., Jaap Keuter wrote:
On 6 Sep 2020, at 10:59, Nicholas Saunders <saunders.nicholas@xxxxxxxxx> wrote:

How do I monitor port 5060 for SIP traffic?  Something like:


sudo  tshark -d udp.port==5060,http

obviously, not http.



thanks,


Nick
Hi,

By default the SIP dissector is quite capable to pick up UDP packets on port 5060 for itself, so configuration like this is usually not needed. Otherwise see what ‘sip’ instead of ‘http’ brings.

Thanks,
Jaap

___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users@xxxxxxxxxxxxx>
Archives:    https://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users
              mailto:wireshark-users-request@xxxxxxxxxxxxx?subject=unsubscribe