System information

Manual:Tools/Packet Sniffer
84
pim - protocol independent multicast
rspf - radio shortest path first
rdp - reliable datagram protocol
st - st datagram mode
tcp - transmission control protocol
udp - user datagram protocol
vmtp - versatile message transport
vrrp - virtual router redundancy protocol
xns-idp - xerox xns idp
xtp - xpress transfer protocol
Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used):
arp - Address Resolution Protocol
ip - Internet Protocol
ipv6 - Internet Protocol next generation
ipx - Internetwork Packet Exchange
rarp - Reverse Address Resolution Protocol
Sniffed packets that are devised for sniffer server are ignoredSpecifies om which direction filtering will be
applied.Interface name on which sniffer will be running. all indicates that sniffer will sniff packets on all
interfaces.Memory amount used to store sniffed data.Whether to rewrite older sniffed data when memory limit is
reached.Save in the memory only packet's headers not the whole packet.Defines whether to send sniffed packets to
streaming serverTazmen Sniffer Protocol (TZSP) stream receiver
Example
In the following example streaming-server will be added, streaming will be enabled, file-name will be set to test
and packet sniffer will be started and stopped after some time:
[admin@MikroTik] tool sniffer> set streaming-server=192.168.0.240 \
\... streaming-enabled=yes file-name=test.pcap
[admin@MikroTik] tool sniffer> print
interface: all
only-headers: no
memory-limit: 100KiB
memory-scroll: yes
file-name: test.pcap
file-limit: 1000KiB
streaming-enabled: yes
streaming-server: 192.168.0.240
filter-stream: yes
filter-mac-address:
filter-mac-protocol:
filter-ip-address:
filter-ip-protocol:
filter-port:
filter-direction: any
running: no
[admin@MikroTik] tool sniffer> start