You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
NETMON = No # Must be installed separately Supports TruncatePackets, FilterString
36
37
WIRESHARK = No # WireShark can see VPN traffic, must be installed separately Supports TruncatePackets, FilterString
37
38
Pktmon = No # Windows 2019 and later, Windows 11 and later, Windows 10 builds equivalent to Windows 2019. Supports TruncatePackets, FilterString, TCPEvents
38
39
TruncatePackets = No # Whether to capture full packet payload or just the beginning portion
39
-
TCPEvents = No# For NETSH: collect TCPIP and Winsock AFD events
40
+
TCPEvents = NO# For NETSH, PSNETCAPTURE, PkyMon: collect TCPIP, Winsock AFD, Firewall, and DNS events
40
41
41
-
# FilterString = IPv4.Address=10.10.10.10 Ethernet.Type=IPv4 # NETSH filter string example; no port filtering; only a single = used in comparisons; For help: netsh trace show CaptureFilterHelp
42
-
# FilterString = ipv4.address==10.10.10.10 and tcp.port==1433 # NETMON filter string example; double == used in comparisons
43
-
# FilterString = -f "host 10.10.10.10 and port 1433" # WIRSHARK filter string example; no = signs; for help run Wireshark | Capture | Capture Filters ... menu
44
-
# FilterString = -t tcp -i 10.10.10.10 -p 1433 # PKTMON filter string example; not expression-based; spaces separate multiple values for IP addresses and ports
42
+
# FilterString = IPv4.Address=10.10.10.10 Ethernet.Type=IPv4 # NETSH filter string example; no port filtering; single = used in comparisons; For help: netsh trace show CaptureFilterHelp
43
+
# FilterString = -EtherType 0x0800 -IPAddresses 10.10.10.10 -IpProtocols 6,17 # PSNETCAPTURE filter string example; 0x800 = IPV4, 0x86DD = IPV6, 6 = TCP, 17 = UDP - omit to not filter on a particular item
44
+
# FilterString = ipv4.address==10.10.10.10 and tcp.port==1433 # NETMON filter string example; double == used in comparisons
45
+
# FilterString = -f "host 10.10.10.10 and port 1433" # WIRSHARK filter string example; not expression-based; for help run Wireshark | Capture | Capture Filters ... menu
46
+
# FilterString = -t tcp -i 10.10.10.10 -p 1433 # PKTMON filter string example; not expression-based; spaces separate multiple values for IP addresses and ports
0 commit comments