Table of Contents
- 10.1. Introduction
- 10.2. Start Wireshark from the command line
- 10.3. Packet colorization
- 10.4. Control Protocol dissection
- 10.5. Preferences
- 10.6. Configuration Profiles
- 10.7. User Table
- 10.8. Display Filter Macros
- 10.9. ESS Category Attributes
- 10.10. GeoIP Database Paths
- 10.11. IKEv2 decryption table
- 10.12. Object Identifiers
- 10.13. PRES Users Context List
- 10.14. SCCP users Table
- 10.15. SMI (MIB and PIB) Modules
- 10.16. SMI (MIB and PIB) Paths
- 10.17. SNMP Enterprise Specific Trap Types
- 10.18. SNMP users Table
- 10.19. Tektronix K12xx/15 RF5 protocols Table
- 10.20. User DLTs protocol table
Wireshark’s default behaviour will usually suit your needs pretty well. However, as you become more familiar with Wireshark, it can be customized in various ways to suit your needs even better. In this chapter we explore:
- How to start Wireshark with command line parameters
- How to colorize the packet list
- How to control protocol dissection
- How to use the various preference settings