Wireshark Display Filters Cheat Sheet

Efficient packet analysis in Wireshark relies heavily on the use of precise display filters (of which there are a LOT). To assist with this, I’ve updated and compiled a downloadable and searchable pdf cheat sheet of the essential Wireshark display filters for quick reference.

Whether you’re troubleshooting or conducting detailed network analysis, hopefully this list will help save some time.

Feel free to print it out and hang it up, bookmark it, or share a link with your colleagues and peers.

Free Wireshark Display Filter Cheat Sheet

Preview of page 1 of the wireshark display filter cheat sheet pdf.
Preview of page 2 of the wireshark display filter cheat sheet pdf.

Click on the Wireshark display filter chart to view the printable, searchable PDF version. Scroll down below for tables with descriptions for each filter (ctrl+f to search for specific filter).

ARP

FilterDescription
arp.dst.hw_macFilters ARP packets by the destination hardware (MAC) address.
arp.proto.sizeDisplays ARP packets based on the size of the protocol address (typically 4 bytes for IPv4).
arp.dst.proto_ipv4Filters ARP packets based on the destination IPv4 address.
arp.proto.typeFilters ARP packets based on the protocol type (e.g., IPv4 is 0x0800).
arp.hw.sizeDisplays ARP packets based on the size of the hardware address (typically 6 bytes for MAC addresses).
arp.src.hw_macFilters ARP packets by the source hardware (MAC) address.
arp.hw.typeFilters ARP packets based on the hardware type (e.g., Ethernet is 1).
arp.src.proto_ipv4Filters ARP packets based on the source IPv4 address.
arp.opcodeFilters ARP packets by operation code (e.g., 1 for ARP request, 2 for ARP reply).

BGP

FilterDescription
bgp.aggregator_asFilters BGP packets based on the AS number of the route aggregator.
bgp.aggregator_originFilters BGP packets based on the IP address of the route aggregator.
bgp.as_pathFilters BGP packets based on the AS path attribute (list of AS numbers traversed).
bgp.cluster_identifierFilters BGP packets based on the cluster identifier in route reflector setups.
bgp.cluster_listFilters BGP packets based on the cluster list (route reflector clusters traversed).
bgp.community_asFilters BGP packets based on the AS number in the BGP community attribute.
bgp.community_valueFilters BGP packets based on the community value (tag applied to routes).
bgp.local_prefFilters BGP packets based on the local preference attribute, used for route selection.
bgp.mp_nlri_tnl_idFilters BGP packets based on the tunnel identifier in the NLRI (Network Layer Reachability Information).
bgp.mp_reach_nlri_ipv4_prefixFilters BGP packets that advertise reachable IPv4 prefixes in MP-BGP (Multiprotocol BGP).
bgp.mp_unreach_nlri_ipv4_prefixFilters BGP packets that advertise unreachable IPv4 prefixes in MP-BGP.
bgp.multi_exit_discFilters BGP packets based on the Multi-Exit Discriminator (MED) attribute.
bgp.next_hopFilters BGP packets based on the next-hop IP address for the advertised route.
bgp.nlri_prefixFilters BGP packets based on the advertised network prefix in the NLRI.
bgp.originFilters BGP packets based on the origin attribute, indicating the origin of the route (IGP, EGP, or incomplete).
bgp.originator_idFilters BGP packets based on the originator ID in route reflector setups.
bgp.typeFilters BGP packets based on the BGP message type (e.g., Open, Update, Notification).
bgp.withdrawn_prefixFilters BGP packets based on the withdrawn network prefixes in an Update message.

Ethernet

FilterDescription
eth.addrFilters packets based on the Ethernet address (can match either source or destination).
eth.dstFilters packets based on the destination Ethernet (MAC) address.
eth.igFilters packets based on the individual/group (IG) bit in the destination address.
eth.lenFilters packets based on the Ethernet frame length (payload size).
eth.lgFilters packets based on the local/global (LG) bit in the Ethernet address.
eth.multicastFilters packets that are Ethernet multicast (group) frames.
eth.srcFilters packets based on the source Ethernet (MAC) address.
eth.trailerFilters packets based on the trailer portion of the Ethernet frame.
eth.typeFilters packets based on the Ethernet type field (indicates the upper-layer protocol, e.g., IPv4, ARP).

Filter Operators

OperatorDescription
eq or ==Filters packets where the value of a field is equal to the specified value.
ne or !=Filters packets where the value of a field is not equal to the specified value.
gt or >Filters packets where the value of a field is greater than the specified value.
lt or <Filters packets where the value of a field is less than the specified value.
ge or >=Filters packets where the value of a field is greater than or equal to the specified value.
le or <=Filters packets where the value of a field is less than or equal to the specified value.

Filter Logic

OperatorDescription
and or && (Logical AND)Filters packets that meet all specified conditions. Both conditions must be true.
or or || (Logical OR)Filters packets that meet at least one of the specified conditions. Either can be true.
xor or ^^ (Logical XOR)Filters packets where exactly one of the specified conditions is true, but not both.
not or ! (Logical NOT)Filters packets that do not meet the specified condition, i.e., inverts the filter condition.
[n] […] (Substring operator)Filters specific bytes in a packet, allowing extraction or comparison of a particular byte range.

Frame Relay

FilterDescription
fr.becnFilters packets with the Backward Explicit Congestion Notification (BECN) bit set.
fr.chdlctypeFilters packets based on the Frame Relay header Channel Type (CHDLC type).
fr.controlFilters packets based on the Frame Relay control field.
fr.control.fFilters packets based on the Frame Relay control F-bit (final bit).
fr.control.ftypeFilters packets based on the Frame Relay frame type (I, S, or U frame).
fr.control.n_rFilters packets based on the N(R) field, which is the receive sequence number.
fr.control.n_sFilters packets based on the N(S) field, which is the send sequence number.
fr.control.pFilters packets based on the Frame Relay control P-bit (poll bit).
fr.control.s_ftypeFilters packets based on the supervisory frame type.
fr.control.u_modifier_cmdFilters packets based on the U-frame command modifier.
fr.control.u_modifier_respFilters packets based on the U-frame response modifier.
fr.crFilters packets based on the Frame Relay command/response (C/R) bit.
fr.dcFilters packets based on the discard eligibility (DE) congestion control bit.
fr.deFilters packets that are marked with the Discard Eligibility (DE) bit.
fr.dlciFilters packets based on the Data Link Connection Identifier (DLCI) value.
fr.dlcore_controlFilters packets based on the core DLCI control field.
fr.eaFilters packets based on the extended address (EA) bit.
fr.fecnFilters packets with the Forward Explicit Congestion Notification (FECN) bit set.
fr.lower_dlciFilters packets based on the lower bits of the DLCI field.
fr.nlpidFilters packets based on the Network Layer Protocol Identifier (NLPID).
fr.second_dlciFilters packets based on the second DLCI in multi-DLCI frames.
fr.snap.ouiFilters packets based on the Organizationally Unique Identifier (OUI) in SNAP.
fr.snap.pidFilters packets based on the Protocol Identifier (PID) in SNAP headers.
fr.snaptypeFilters packets based on the SNAP type field (upper-layer protocol).
fr.third_dlciFilters packets based on the third DLCI in multi-DLCI frames.
fr.upper_dlciFilters packets based on the upper bits of the DLCI field.

HTTP

FilterDescription
http.acceptFilters HTTP packets based on the Accept header, indicating accepted media types.
http.accept_encodingFilters HTTP packets based on the Accept-Encoding header, indicating accepted encoding formats.
http.accept_languageFilters HTTP packets based on the Accept-Language header, indicating preferred languages.
http.authbasicFilters HTTP packets containing basic authentication credentials.
http.authorizationFilters HTTP packets based on the Authorization header, used for user authentication.
http.cache_controlFilters HTTP packets based on the Cache-Control header, which specifies caching directives.
http.connectionFilters HTTP packets based on the Connection header, indicating connection control (e.g., keep-alive).
http.content_encodingFilters HTTP packets based on the Content-Encoding header, specifying how the body is encoded.
http.content_lengthFilters HTTP packets based on the Content-Length header, indicating the size of the message body.
http.content_typeFilters HTTP packets based on the Content-Type header, specifying the media type of the body.
http.cookieFilters HTTP packets based on the Cookie header, containing client-side data.
http.dateFilters HTTP packets based on the Date header, indicating the date and time of the message.
http.hostFilters HTTP packets based on the Host header, specifying the target host of the request.
http.last_modifiedFilters HTTP packets based on the Last-Modified header, indicating the last modification date of the resource.
http.locationFilters HTTP packets based on the Location header, used in redirects to specify a new URL.
http.notificationFilters HTTP packets related to server-side notifications.
http.proxy_authenticateFilters HTTP packets based on the Proxy-Authenticate header, requesting proxy authentication.
http.proxy_authorizationFilters HTTP packets based on the Proxy-Authorization header, providing credentials to a proxy.
http.proxy_connect_hostFilters HTTP packets based on the proxy connection host.
http.proxy_connect_portFilters HTTP packets based on the proxy connection port.
http.refererFilters HTTP packets based on the Referer header, indicating the URL of the resource that linked to the request.
http.requestFilters HTTP request packets.
http.request.methodFilters HTTP packets based on the request method (e.g., GET, POST, PUT).
http.request.uriFilters HTTP packets based on the request URI (Uniform Resource Identifier).
http.request.versionFilters HTTP packets based on the version of the HTTP request (e.g., HTTP/1.1).
http.responseFilters HTTP response packets.
http.response.codeFilters HTTP packets based on the response status code (e.g., 200, 404).
http.serverFilters HTTP packets based on the Server header, indicating server information.
http.set_cookieFilters HTTP packets based on the Set-Cookie header, used by the server to set cookies on the client.
http.transfer_encodingFilters HTTP packets based on the Transfer-Encoding header, indicating how the message body is transferred.
http.user_agentFilters HTTP packets based on the User-Agent header, indicating the client software (e.g., browser).
http.www_authenticateFilters HTTP packets based on the WWW-Authenticate header, requesting client authentication.
http.x_forwarded_forFilters HTTP packets based on the X-Forwarded-For header, indicating the original client IP address behind a proxy.

ICMP

FilterDescription
icmp.checksumFilters packets based on the ICMP checksum value, used for error detection.
icmp.checksum_badFilters packets with an incorrect ICMP checksum, indicating potential corruption.
icmp.codeFilters packets based on the ICMP code, which provides additional information about the message type.
icmp.identFilters packets based on the identifier field, often used to match requests and replies.
icmp.mtuFilters packets based on the Maximum Transmission Unit (MTU) value, used in ICMP fragmentation-related messages.
icmp.redir_gwFilters packets based on the gateway address in ICMP redirect messages.
icmp.seqFilters packets based on the sequence number, used to match ICMP echo requests and replies.
icmp.typeFilters packets based on the ICMP message type (e.g., Echo Request, Echo Reply, Destination Unreachable).

ICMPv6

FilterDescription
icmpv6.all_compFilters all ICMPv6 packets related to mobility, such as binding and home address.
icmpv6.checksumFilters packets based on the ICMPv6 checksum, used for error detection.
icmpv6.checksum_badFilters packets with an incorrect ICMPv6 checksum, indicating packet corruption.
icmpv6.codeFilters packets based on the ICMPv6 code, providing additional information about the message type.
icmpv6.compFilters packets related to mobility (e.g., binding updates and acknowledgments).
icmpv6.haad.ha_addrsFilters packets based on the Home Agent (HA) address list in Home Agent Address Discovery.
icmpv6.identifierFilters packets based on the ICMPv6 identifier, used to match requests and replies.
icmpv6.optionFilters packets based on ICMPv6 option fields, found in Neighbor Discovery and Router Advertisement messages.
icmpv6.option.cgaFilters packets based on the Cryptographically Generated Address (CGA) option.
icmpv6.option.lengthFilters packets based on the length of ICMPv6 options.
icmpv6.option.name_typeFilters packets based on the type of name option (e.g., Fully Qualified Domain Name).
icmpv6.option.name_type.fqdnFilters packets with a Fully Qualified Domain Name (FQDN) name option.
icmpv6.option.name_x501Filters packets based on X.501 Distinguished Name in ICMPv6 options.
icmpv6.option.rsa.key_hashFilters packets based on the RSA key hash in ICMPv6 Secure Neighbor Discovery (SEND) options.
icmpv6.option.typeFilters packets based on the type of ICMPv6 option.
icmpv6.ra.cur_hop_limitFilters Router Advertisement packets based on the current hop limit field.
icmpv6.ra.reachable_timeFilters Router Advertisement packets based on the reachable time field, indicating how long a node is reachable.
icmpv6.ra.retrans_timerFilters Router Advertisement packets based on the retransmission timer value.
icmpv6.ra.router_lifetimeFilters Router Advertisement packets based on the router lifetime value.
icmpv6.recursive_dns_servFilters ICMPv6 packets based on Recursive DNS Server options.
icmpv6.typeFilters packets based on the ICMPv6 message type (e.g., Echo Request, Router Solicitation, Neighbor Advertisement).

IEEE 802.1Q

FilterDescription
vlan.cfiFilters packets based on the Canonical Format Indicator (CFI) bit, which indicates Ethernet frame format (used in bridging).
vlan.etypeFilters packets based on the Ethernet type field in the VLAN tag, indicating the upper-layer protocol (e.g., IPv4, ARP).
vlan.idFilters packets based on the VLAN Identifier (VID), which specifies the VLAN to which the frame belongs.
vlan.lenFilters packets based on the length of the VLAN-tagged Ethernet frame.
vlan.priorityFilters packets based on the Priority Code Point (PCP), which is used for Quality of Service (QoS) to prioritize VLAN traffic.
vlan.trailerFilters packets based on the trailer portion of a VLAN-tagged Ethernet frame.

IPv4

FilterDescription
ip.addrFilters packets based on any IP address (source or destination) present in the packet.
ip.checksumFilters packets based on the IP checksum value, used for error detection.
ip.checksum_badFilters packets with an incorrect IP checksum, indicating possible packet corruption.
ip.checksum_goodFilters packets with a valid IP checksum, confirming integrity.
ip.dsfieldFilters packets based on the Differentiated Services field, which is used for QoS marking.
ip.dsfield.ceFilters packets that have the Congestion Experienced (CE) bit set in the Differentiated Services field.
ip.dsfield.dscpFilters packets based on the Differentiated Services Code Point (DSCP) value for traffic prioritization.
ip.dsfield.ectFilters packets that have the Explicit Congestion Notification (ECT) bit set.
ip.dstFilters packets based on the destination IP address.
ip.dst_hostFilters packets based on the destination host name.
ip.flagsFilters packets based on the IP flags field, which indicates control information for fragmentation.
ip.flags.dfFilters packets with the “Don’t Fragment” (DF) flag set, indicating that fragmentation is not allowed.
ip.flags.mfFilters packets with the “More Fragments” (MF) flag set, indicating that more fragments follow.
ip.flags.rbFilters packets with the “Reserved” bit set in the IP flags.
ip.frag_offsetFilters packets based on the fragment offset field, indicating the position of the fragment in the original packet.
ip.fragmentFilters packets that are fragmented, indicating they are parts of a larger packet.
ip.fragment.errorFilters packets with errors related to fragmentation.
ip.fragment.multipletailsFilters packets that have multiple fragment tails, indicating potential fragmentation issues.
ip.fragment.overlapFilters packets that have overlapping fragments, which can cause issues in reassembly.
ip.fragment.overlap.conflictFilters packets where overlapping fragments conflict with each other during reassembly.
ip.fragment.toolongfragmentFilters packets that are fragments deemed too long for their original packet structure.
ip.fragmentsFilters packets that are part of fragmented IP packets.
ip.hdr_lenFilters packets based on the length of the IP header, indicating the size of the header in bytes.
ip.hostFilters packets based on the host IP address, applicable in certain protocols.
ip.idFilters packets based on the IP identification field, used for matching fragments of the same packet.
ip.lenFilters packets based on the total length of the IP packet, including the header and data.
ip.protoFilters packets based on the IP protocol number, indicating the encapsulated protocol (e.g., TCP, UDP).
ip.reassembled_inFilters packets that have been reassembled from fragments, showing the reassembly status.
ip.srcFilters packets based on the source IP address.
ip.src_hostFilters packets based on the source host name.
ip.tosFilters packets based on the Type of Service (ToS) field in the IP header, used for QoS.
ip.tos.costFilters packets based on the cost parameter in the Type of Service field.
ip.tos.delayFilters packets based on the delay parameter in the Type of Service field.
ip.tos.precedenceFilters packets based on the precedence parameter in the Type of Service field.
ip.tos.reliabilityFilters packets based on the reliability parameter in the Type of Service field.
ip.tos.throughputFilters packets based on the throughput parameter in the Type of Service field.
ip.ttlFilters packets based on the Time to Live (TTL) value, which indicates the packet’s lifespan.
ip.versionFilters packets based on the IP version (e.g., IPv4 or IPv6) used in the packet.

IPv6

FilterDescription
ipv6.addrFilters packets based on any IPv6 address (source or destination) present in the packet.
ipv6.classFilters packets based on the IPv6 traffic class, which is used for QoS marking.
ipv6.dstFilters packets based on the destination IPv6 address.
ipv6.dst_hostFilters packets based on the destination host name.
ipv6.dst_optFilters packets that include IPv6 destination options in the header.
ipv6.flowFilters packets based on the flow label field in the IPv6 header, used for packet classification.
ipv6.fragmentFilters packets that are fragmented, indicating they are parts of a larger packet.
ipv6.fragment.errorFilters packets with errors related to fragmentation.
ipv6.fragment.idFilters packets based on the fragment identification field, used for matching fragments.
ipv6.fragment.moreFilters packets with the “More Fragments” flag set, indicating that more fragments follow.
ipv6.fragment.multipletailsFilters packets that have multiple fragment tails, indicating potential fragmentation issues.
ipv6.fragment.offsetFilters packets based on the fragment offset field, indicating the position of the fragment in the original packet.
ipv6.fragment.overlapFilters packets that have overlapping fragments, which can cause issues in reassembly.
ipv6.fragment.overlap.conflictFilters packets where overlapping fragments conflict with each other during reassembly.
ipv6.fragment.toolongfragmentFilters packets that are fragments deemed too long for their original packet structure.
ipv6.fragmentsFilters packets that are part of fragmented IPv6 packets.
ipv6.hlimFilters packets based on the Hop Limit (TTL equivalent) value, indicating the packet’s lifespan.
ipv6.hop_optFilters packets that contain hop-by-hop options in the IPv6 header.
ipv6.hostFilters packets based on the host IPv6 address, applicable in certain protocols.
ipv6.mipv6_home_addressFilters packets based on the Mobile IPv6 home address.
ipv6.mipv6_lengthFilters packets based on the length of Mobile IPv6 options.
ipv6.mipv6_typeFilters packets based on the type of Mobile IPv6 option.
ipv6.nxtFilters packets based on the next header field in the IPv6 header, indicating the upper-layer protocol.
ipv6.opt.pad1Filters packets that contain a Pad1 option in the IPv6 header.
ipv6.opt.padnFilters packets that contain a PadN option in the IPv6 header.
ipv6.plenFilters packets based on the payload length field in the IPv6 header.
ipv6.reassembled_inFilters packets that have been reassembled from fragments, showing the reassembly status.
ipv6.routing_hdrFilters packets that contain a routing header in the IPv6 header.
ipv6.routing_hdr.addrFilters packets based on the addresses specified in the IPv6 routing header.
ipv6.routing_hdr.leftFilters packets based on the number of routing header addresses left to process.
ipv6.routing_hdr.typeFilters packets based on the type of routing header used in the IPv6 packet.
ipv6.srcFilters packets based on the source IPv6 address.
ipv6.src_hostFilters packets based on the source host name.
ipv6.versionFilters packets based on the IPv6 version field in the header.

MPLS

FilterDescription
mpls.bottomFilters packets based on the bottom of the stack (BoS) bit, indicating whether the label is the last in the MPLS label stack.
mpls.cw.controlFilters packets based on the control field of the MPLS Cell Loss Priority (CLP) in the Control Word (CW).
mpls.cw.resFilters packets based on the Reserved bits in the MPLS Control Word (CW), which are generally not used.
mpls.expFilters packets based on the Experimental (EXP) bits, which are used for Quality of Service (QoS) marking.
mpls.labelFilters packets based on the MPLS label value, which is used for forwarding decisions.
mpls.oam.bip16Filters packets based on the Bidirectional Maintenance (BIP) 16 value, used for performance monitoring.
mpls.oam.defect_locationFilters packets based on the location of the defect detected in the MPLS network.
mpls.oam.defect_typeFilters packets based on the type of defect identified during Operations, Administration, and Maintenance (OAM).
mpls.oam.frequencyFilters packets based on the frequency of the OAM message transmission for maintenance purposes.
mpls.oam.function_typeFilters packets based on the type of OAM function being performed, indicating the maintenance task.
mpls.oam.ttsiFilters packets based on the Time To Signal (TTSI) interval for OAM operations.
mpls.ttlFilters packets based on the Time to Live (TTL) value, which indicates how many hops a packet can take before being discarded.

PPP

FilterDescription
ppp.addressFilters packets based on the address field in the PPP header, typically used for identifying the endpoint.
ppp.controlFilters packets based on the control field in the PPP header, which is used for various control information.
ppp.directionFilters packets based on the direction of the PPP frame, indicating whether it is incoming or outgoing.
ppp.protocolFilters packets based on the protocol field in the PPP header, which indicates the encapsulated protocol being used.

RIP

FilterDescription
rip.auth.passwdFilters packets based on the RIP authentication password, used for securing RIP messages.
rip.auth.typeFilters packets based on the type of authentication used in RIP, indicating the authentication mechanism.
rip.commandFilters packets based on the RIP command field, which specifies the type of RIP message (e.g., request or response).
rip.familyFilters packets based on the address family field, indicating the type of address used (e.g., IPv4).
rip.ipFilters packets based on the IP address included in the RIP routing information.
rip.metricFilters packets based on the metric value, which indicates the cost of the route in RIP.
rip.netmaskFilters packets based on the netmask associated with the IP address in the routing information.
rip.next_hopFilters packets based on the next-hop IP address specified in the RIP routing update.
rip.route_tagFilters packets based on the route tag, used for identifying routes in RIP updates.
rip.routing_domainFilters packets based on the routing domain, typically used in multiprotocol environments.
rip.versionFilters packets based on the version of RIP being used (RIP v1 or RIP v2).

TCP

FilterDescription
tcp.ackFilters packets that have the ACK (Acknowledgment) flag set, indicating acknowledgment of received data.
tcp.checksumFilters packets based on the TCP checksum value, used for error detection.
tcp.checksum_badFilters packets with an incorrect TCP checksum, indicating possible packet corruption.
tcp.checksum_goodFilters packets with a valid TCP checksum, confirming integrity.
tcp.continuation_toFilters packets that are continuation segments, indicating they are part of a multi-segment transmission.
tcp.dstportFilters packets based on the destination TCP port number.
tcp.flagsFilters packets based on the TCP flags field, which contains control bits for the TCP segment.
tcp.flags.ackFilters packets where the ACK flag is set, indicating acknowledgment of received segments.
tcp.flags.cwrFilters packets with the Congestion Window Reduced (CWR) flag set, used to indicate network congestion handling.
tcp.flags.ecnFilters packets with the Explicit Congestion Notification (ECN) flag set, indicating congestion notification.
tcp.flags.finFilters packets where the FIN (Finish) flag is set, indicating the sender has finished sending data.
tcp.flags.pushFilters packets where the PUSH flag is set, indicating immediate data delivery to the application layer.
tcp.flags.resetFilters packets with the RESET (RST) flag set, indicating a connection reset.
tcp.flags.synFilters packets where the SYN (Synchronize) flag is set, used for initiating a TCP connection.
tcp.flags.urgFilters packets where the URG (Urgent) flag is set, indicating urgent data is present.
tcp.hdr_lenFilters packets based on the length of the TCP header, indicating the size of the header in bytes.
tcp.lenFilters packets based on the length of the TCP segment’s payload.
tcp.nxtseqFilters packets based on the next sequence number expected, useful for tracking segment order.
tcp.optionsFilters packets based on the presence of TCP options in the header.
tcp.options.ccFilters packets that include the TCP cumulative acknowledgment option.
tcp.options.ccechoFilters packets that include the TCP cumulative acknowledgment echo option.
tcp.options.ccnewFilters packets that include the TCP new cumulative acknowledgment option.
tcp.options.echoFilters packets that include the TCP echo option, used for diagnostics.
tcp.options.echo_replyFilters packets that include the TCP echo reply option.
tcp.options.md5Filters packets that include the MD5 option for data integrity verification.
tcp.options.mssFilters packets that specify the Maximum Segment Size (MSS) option, indicating the largest segment size.
tcp.options.mss_valFilters packets based on the value of the Maximum Segment Size (MSS) option.
tcp.options.qsFilters packets that include the TCP Quick-Start option for improved bandwidth usage.
tcp.options.sackFilters packets that include the Selective Acknowledgment (SACK) option, allowing for more efficient retransmissions.
tcp.options.sack_leFilters packets that include the SACK left edge option.
tcp.options.sack_permFilters packets that include the SACK permitted option.
tcp.options.sack_reFilters packets that include the SACK re-ordering option.
tcp.options.time_stampFilters packets that include the TCP timestamp option, used for round-trip time measurement.
tcp.options.wscaleFilters packets that include the TCP Window Scale option for larger window sizes.
tcp.options.wscale_valFilters packets based on the value of the TCP Window Scale option.
tcp.pdu.last_frameFilters packets based on the last frame of a Protocol Data Unit (PDU).
tcp.pdu.sizeFilters packets based on the size of a Protocol Data Unit (PDU).
tcp.pdu.timeFilters packets based on the time at which a Protocol Data Unit (PDU) was captured.
tcp.portFilters packets based on the TCP port number, applicable for both source and destination ports.
tcp.reassembled_inFilters packets that have been reassembled from fragments, showing the reassembly status.
tcp.segmentFilters packets that are part of TCP segments.
tcp.segment.errorFilters packets with errors related to TCP segment transmission.
tcp.segment.multipletailsFilters packets that have multiple TCP segment tails, indicating potential issues.
tcp.segment.overlapFilters packets that have overlapping segments, which can cause issues in reassembly.
tcp.segment.overlap.conflictFilters packets where overlapping segments conflict with each other during reassembly.
tcp.segment.toolongfragmentFilters packets that are segments deemed too long for their original packet structure.
tcp.segmentsFilters packets that are part of TCP segments.
tcp.seqFilters packets based on the sequence number of the TCP segment, indicating the order of segments.
tcp.srcportFilters packets based on the source TCP port number.
tcp.time_deltaFilters packets based on the time delta between packets, useful for timing analysis.
tcp.time_relativeFilters packets based on the relative time from the first packet in the capture.
tcp.urgent_pointerFilters packets based on the value of the urgent pointer field, indicating urgent data.
tcp.window_sizeFilters packets based on the TCP window size, indicating how much data can be sent before needing an acknowledgment.

UDP

FilterDescription
udp.checksumFilters packets based on the UDP checksum value, used for error detection in the UDP segment.
udp.checksum_badFilters packets with an incorrect UDP checksum, indicating possible packet corruption.
udp.checksum_goodFilters packets with a valid UDP checksum, confirming integrity.
udp.dstportFilters packets based on the destination UDP port number.
udp.lengthFilters packets based on the length of the UDP segment, including both header and payload.
udp.portFilters packets based on the UDP port number, applicable for both source and destination ports.
udp.srcportFilters packets based on the source UDP port number.

VTP

FilterDescription
vtp.codeFilters packets based on the VTP message type code, indicating the specific VTP operation.
vtp.conf_rev_numFilters packets based on the configuration revision number, which indicates the version of the VTP configuration.
vtp.followersFilters packets based on the number of followers (clients) that a VTP server has.
vtp.mdFilters packets based on the VTP message digest, used for integrity checks of VTP messages.
vtp.md_lenFilters packets based on the length of the message digest field in VTP messages.
vtp.md5_digestFilters packets based on the MD5 digest used for authentication in VTP.
vtp.seq_numFilters packets based on the sequence number, used for ordering VTP messages.
vtp.start_valueFilters packets based on the starting value of the VTP configuration revision number.
vtp.upd_idFilters packets based on the update identifier for tracking VTP updates.
vtp.upd_tsFilters packets based on the timestamp of the VTP update message.
vtp.versionFilters packets based on the version of VTP being used (e.g., VTP version 1, 2, or 3).
vtp.vlan_info.802_10_indexFilters packets based on the 802.10 index for VLAN information within VTP messages.
vtp.vlan_info.isl_vlan_idFilters packets based on the Inter-Switch Link (ISL) VLAN ID included in VTP updates.
vtp.vlan_info.lenFilters packets based on the length of the VLAN information field in VTP messages.
vtp.vlan_info.mtu_sizeFilters packets based on the maximum transmission unit (MTU) size specified for the VLAN.
vtp.vlan_info.status.vlan_suspFilters packets based on the VLAN status, indicating whether the VLAN is suspended or active.
vtp.vlan_info.tlv_lenFilters packets based on the length of the Type-Length-Value (TLV) field in VTP messages.
vtp.vlan_info.tlv_typeFilters packets based on the type of the TLV field in VTP messages, indicating the kind of information carried.
vtp.vlan_info.vlan_nameFilters packets based on the name of the VLAN specified in VTP messages.
vtp.vlan_info.vlan_name_lenFilters packets based on the length of the VLAN name field in VTP messages.
vtp.vlan_info.vlan_typeFilters packets based on the type of VLAN specified in VTP updates (e.g., static or dynamic).

Recommended Tool: ManageEngine OpManager

  • Multi-vendor Network Monitoring
  • Simple Installation & Setup
  • Intuitive UI
  • Complete Visibility
  • Intelligent Detections
  • Easy Resolutions

Leave a Reply

Your email address will not be published. Required fields are marked *