Considering that streaming media either uses UDP or RTSP traffic, I would start looking at top talkers on those protocols. Then I would look at the details of the conversations on the network. UDP traffic can mean a lot of different things.
Windows Media streaming uses TCP and UDP port 1755 to...
What do you want to achieve with this?
The reason why I ask; You will end up with 18 x 20meg capture files to go through...
What is your objective?
groeten!
Depends what type of hardware / OS it is and what version of sniffer distributed you want to put back on it.
If it is one of the old Sniffer Pentium 2 boxes (which I assume) then you have not got much hope.
These sniffers are seriously out of date.
But if you have a CD with the old software...
google
www.packet-level.com
www.networkgeneral.com
www.ethereal.com
www.microsoft.com
www.cisco.com
A tcp/ip book
etc
etc
You don't need to learn to understand captures, you need to learn about conversations and protocols.
Use a sniffer. Put a filter on the specific address and capture the data.
Then you can see what kind of protocol is being used and most likely will figure out what the 'problem' is.
No I don't think this is possible. Considering that the payload that is going to pass through the tunnel is given a PPP header and then placed inside the GRE packet. The GRE packet carries the data between the two tunnel endpoints.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.