How to Filter on TCP Header Information Using Microsoft Network MonitorID: Q231920
|
This article describes how to apply filters in Microsoft Network Monitor to view Transmission Control Protocol (TCP) header information in the Capture Summary window.
When you view a capture using Network Monitor, the "Last Protocol In Frame" is displayed in the Capture Summary window by default. This is true even when you apply filters to view only TCP information. Therefore, a frame that contains Server Message Blocks (SMBs) shows SMB summary information. For example:
SMB C write spool file, FID = 0xc005, Write 48 bytes
To view the TCP header information, you need to open the frame.
+FRAME: Base frame properties
+ETHERNET: ETYPE = 0x0800 : Protocol = IP: DOD Internet Protocol
+IP: ID = 0x7DEC; Proto = TCP; Len: 132
+TCP: .AP..., len: 92, seq: 175699528-175699619, ack: 227842390, win:16500, src: 3221 dst: 139 (NBT Session)
+NBT: SS: Session Message, Len: 88
+SMB: C write spool file, FID = 0xc005, Write 48 bytes
When viewing a TCP trace, it is more convenient to have the TCP information displayed in the Capture Summary window. This lets you view the TCP header information without having to open the frame.
TCP .AP..., len: 92, seq: 175699528-175699619, ack: 227842390, win:16500, src: 3221 dst: 139 (NBT Session)
Additional query words: sniff trace netmon bloodhound
Keywords : kbnetwork kbtool
Version : WINDOWS:3.11,95,98,98 Second Edition; winnt:3.1,3.5,3.51,4.0,4.0 SP1,4.0 SP2,4.0 SP3,4.0 SP4
Platform : WINDOWS winnt
Issue type : kbinfo
Last Reviewed: July 26, 1999