User Guide
Menu Item Accelerator Description
Firewall ACL
Rules
This allows you to create command-line ACL rules for many
different firewall products, including Cisco IOS, Linux Net-
filter (iptables), OpenBSD pf and Windows Firewall (via net-
sh). Rules for MAC addresses, IPv4 addresses, TCP and
UDP ports, and IPv4+port combinations are supported.
It is assumed that the rules will be applied to an outside inter-
face.
------
Enabled Proto-
cols...
Shift+Ctrl+R
This menu item allows the user to enable/disable protocol
dissectors, see Section 9.4.1, “The "Enabled Protocols" dia-
log box”
Decode As...
This menu item allows the user to force Wireshark to decode
certain packets as a particular protocol, see Section 9.4.2,
“User Specified Decodes”
User Specified
Decodes...
This menu item allows the user to force Wireshark to decode
certain packets as a particular protocol, see Section 9.4.3,
“Show User Specified Decodes”
------
Follow TCP
Stream
This menu item brings up a separate window and displays all
the TCP segments captured that are on the same TCP connec-
tion as a selected packet, see Section 7.2, “Following TCP
streams”
Follow SSL
Stream
Same functionality as "Follow TCP Stream" but for SSL
streams. XXX - how to provide the SSL keys?
Expert Info
Open a dialog showing some expert information about the
captured packets in a log style display. The amount of in-
formation will depend on the protocol and varies from very
detailed to none existing. This is currently a work in pro-
gress. XXX - add a new section about this and link from here
Expert Info
Composite
Same information as in "Expert Info" but trying to group
items together for faster analysis.
User Interface
45