

The "Filter Expression" dialog box can help you build display filters. Display comparison operators eq, Equal ip.src10.10.0.5 ne Not equal ip.src10.10.0.5 gt, >, Greater than frame.len > 20 lt, <. For display filters, try the display filters page on the Wireshark wiki. For example, to capture only packets sent to port 80, use: dst tcp port 80Ĭouple that with an http display filter, or use: tcp.dstport = 80 & httpįor more on capture filters, read " Filtering while capturing" from the Wireshark user guide, the capture filters page on the Wireshark wiki, or pcap-filter (7) man page. For more information on capture filter syntax, refer to the pcap-filter man page. Which is the same as saying, keep only IPv6 packets. As the name suggests, capture filters are applied during capturing and use a different syntax than Wiresharks display filters, which are applied after packets have already been captured when working with a capture file.

What you could also have done is: ip 0 & 0xf0 0圆0. If you want to measure the number of connections rather than the amount of data, you can limit the capture or display filters to one side of the communication. So what your filter do is grab the first byte of the IP header and AND it with 0xF0 to be sure it's keeping the version part (upper nibble) and then check if it is different from 0x40 ( IPv4 packet). Instead of retyping complex capture filters, follow the steps below to save them in the bookmark menu: Launch Wireshark and navigate to the bookmark option. Note that a filter of http is not equivalent to the other two, which will include handshake and termination packets. Ping packets should use an ICMP type of 8 (echo) or 0 (echo reply), so you could use a capture filter of: icmpĪnd a display filter of: icmp.type = 8 || icmp.type = 0įor HTTP, you can use a capture filter of: tcp port 80
