]> git.wh0rd.org - home.git/blame - .wireshark/preferences
PS1: shorten slightly & add PS0 recovery
[home.git] / .wireshark / preferences
CommitLineData
5b61754d
MF
1# Configuration file for Wireshark 1.0.0.
2#
3# This file is regenerated each time preferences are saved within
4# Wireshark. Making manual changes should be safe, however.
5
6######## User Interface ########
7
8# Vertical scrollbars should be on right side?
9# TRUE or FALSE (case-insensitive).
10gui.scrollbar_on_right: TRUE
11
12# Packet-list selection bar can be used to browse w/o selecting?
13# TRUE or FALSE (case-insensitive).
14gui.packet_list_sel_browse: FALSE
15
16# Protocol-tree selection bar can be used to browse w/o selecting?
17# TRUE or FALSE (case-insensitive).
18gui.protocol_tree_sel_browse: FALSE
19
20# Alternating colors in TreeViews?
21# TRUE or FALSE (case-insensitive).
22gui.tree_view_altern_colors: FALSE
23
24# Place filter toolbar inside the statusbar?
25# TRUE or FALSE (case-insensitive).
26gui.filter_toolbar_show_in_statusbar: FALSE
27
28# Protocol-tree line style.
29# One of: NONE, SOLID, DOTTED, TABBED
30gui.protocol_tree_line_style: NONE
31
32# Protocol-tree expander style.
33# One of: NONE, SQUARE, TRIANGLE, CIRCULAR
34gui.protocol_tree_expander_style: SQUARE
35
36# Hex dump highlight style.
37# One of: BOLD, INVERSE
38gui.hex_dump_highlight_style: INVERSE
39
40# Main Toolbar style.
41# One of: ICONS, TEXT, BOTH
42gui.toolbar_main_style: ICONS
43
44# Save window position at exit?
45# TRUE or FALSE (case-insensitive).
46gui.geometry.save.position: FALSE
47
48# Save window size at exit?
49# TRUE or FALSE (case-insensitive).
50gui.geometry.save.size: TRUE
51
52# Save window maximized state at exit (GTK2 only)?
53# TRUE or FALSE (case-insensitive).
54gui.geometry.save.maximized: TRUE
55
56# Open a console window (WIN32 only)?
57# One of: NEVER, AUTOMATIC, ALWAYS
58gui.console_open: NEVER
59
60# The max. number of items in the open recent files list.
61# A decimal number.
62gui.recent_files_count.max: 10
63
64# Where to start the File Open dialog box.
65# One of: LAST_OPENED, SPECIFIED
66gui.fileopen.style: LAST_OPENED
67
68# Directory to start in when opening File Open dialog.
69gui.fileopen.dir:
70
71# The preview timeout in the File Open dialog.
72# A decimal number (in seconds).
73gui.fileopen.preview: 3
74
75# Ask to save unsaved capture files?
76# TRUE or FALSE (case-insensitive).
77gui.ask_unsaved: FALSE
78
79# Wrap to beginning/end of file during search?
80# TRUE or FALSE (case-insensitive).
81gui.find_wrap: TRUE
82
83# Settings dialogs use a save button?
84# TRUE or FALSE (case-insensitive).
85gui.use_pref_save: FALSE
86
87# The path to the webbrowser.
88# Ex: mozilla %s
89gui.webbrowser: xdg-open %s
90
91# Custom window title. (Prepended to existing titles.)
92gui.window_title:
93
94######## User Interface: Layout ########
95
96# Layout type (1-6).
97gui.layout_type: 1
98
99# Layout content of the panes (1-3).
100# One of: NONE, PLIST, PDETAILS, PBYTES
101gui.layout_content_1: PLIST
102gui.layout_content_2: PDETAILS
103gui.layout_content_3: PBYTES
104
105######## User Interface: Columns ########
106
107# Packet list column format.
108# Each pair of strings consists of a column title and its format.
109column.format: "No.", "%m", "Time", "%t", "Source", "%s", "Destination",
110 "%d", "Protocol", "%p", "Info", "%i"
111
112######## User Interface: Font ########
113
114# Font name for packet list, protocol tree, and hex dump panes (GTK version 1).
115gui.font_name: -misc-fixed-medium-r-semicondensed-*-*-100-*-*-*-*-iso8859-1
116
117# Font name for packet list, protocol tree, and hex dump panes (GTK version 2).
118gui.gtk2.font_name: Monospace 10
119
120######## User Interface: Colors ########
121
122# Color preferences for a marked frame.
123# Each value is a six digit hexadecimal color value in the form rrggbb.
124gui.marked_frame.fg: ffffff
125gui.marked_frame.bg: 000000
126
127# TCP stream window color preferences.
128# Each value is a six digit hexadecimal color value in the form rrggbb.
129stream.client.fg: 7f0000
130stream.client.bg: fbeded
131stream.server.fg: 00007f
132stream.server.bg: ededfb
133
134######## Console: logging level ########
135# (debugging only, not in the Preferences dialog)
136# A bitmask of glib log levels:
137# G_LOG_LEVEL_ERROR = 4
138# G_LOG_LEVEL_CRITICAL = 8
139# G_LOG_LEVEL_WARNING = 16
140# G_LOG_LEVEL_MESSAGE = 32
141# G_LOG_LEVEL_INFO = 64
142# G_LOG_LEVEL_DEBUG = 128
143console.log.level: 28
144
145####### Capture ########
146
147# Default capture device
148capture.device: eth0
149
150# Capture in promiscuous mode?
151# TRUE or FALSE (case-insensitive).
152capture.prom_mode: TRUE
153
154# Update packet list in real time during capture?
155# TRUE or FALSE (case-insensitive).
156capture.real_time_update: TRUE
157
158# Scroll packet list during capture?
159# TRUE or FALSE (case-insensitive).
160capture.auto_scroll: TRUE
161
162# Show capture info dialog while capturing?
163# TRUE or FALSE (case-insensitive).
164capture.show_info: FALSE
165
166######## Printing ########
167
168# Can be one of "text" or "postscript".
169print.format: text
170
171# Can be one of "command" or "file".
172print.destination: command
173
174# This is the file that gets written to when the destination is set to "file"
175print.file: wireshark.out
176
177# Output gets piped to this command when the destination is set to "command"
178print.command: lpr
179
180####### Name Resolution ########
181
182# Resolve addresses to names?
183# TRUE or FALSE (case-insensitive), or a list of address types to resolve.
184name_resolve: mt
185
186# Name resolution concurrency.
187# A decimal number.
188name_resolve_concurrency: 500
189
190####### RTP Player ########
191
192# Maximum visible channels in RTP Player window.
193# An integer value greater than 0.
194rtp_player.max_visible: 4
195
196####### Protocols ########
197
198# Enable this option to recognise all traffic on RTP dynamic payload type 96 (0x60) as FEC data corresponding to Pro-MPEG Code of Practice #3 release 2
199# TRUE or FALSE (case-insensitive).
2002dparityfec.enable: FALSE
201
202# Enable Architecture for Control Networks dissector (ANSI BSR E1.17)
203# TRUE or FALSE (case-insensitive).
204acn.heuristic_acn: FALSE
205
206# Enable Streaming DMX extension dissector (ANSI BSR E1.31)
207# TRUE or FALSE (case-insensitive).
208acn.dmx_enable: FALSE
209
210# Display format
211# One of: Hex , Decimal, Percent
212# (case-insensitive).
213acn.dmx_display_view: Hex
214
215# Display zeros instead of dots
216# TRUE or FALSE (case-insensitive).
217acn.dmx_display_zeros: FALSE
218
219# Display leading zeros on levels
220# TRUE or FALSE (case-insensitive).
221acn.dmx_display_leading_zeros: FALSE
222
223# Display line format
224# One of: 20 per line, 16 per line
225# (case-insensitive).
226acn.dmx_display_line_format: 20 per line
227
228# Set the UDP port for AudioCodes Trunk Traces.Use http://x.x.x.x/TrunkTraces to enable the traces in the Blade
229# A decimal number.
230actrace.udp_port: 2428
231
232# Set the TCP port for AgentX(if other than the default of 705)
233# A decimal number.
234agentx.tcp.agentx_port: 705
235
236# Whether the AH payload decode should be placed in a subtree
237# TRUE or FALSE (case-insensitive).
238ah.place_ah_payload_in_subtree: FALSE
239
240# Whether the AIM dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
241# TRUE or FALSE (case-insensitive).
242aim.desegment: TRUE
243
244# Whether that payload of UDP packets with a specific destination port should be automatically dissected as ALC packets
245# TRUE or FALSE (case-insensitive).
246alc.default.udp_port.enabled: FALSE
247
248# Specifies the UDP destination port for automatic dissection of ALC packets
249# A decimal number.
250alc.default.udp_port: 4001
251
252# Whether the LCT header Codepoint field should be considered the FEC Encoding ID of carried object
253# TRUE or FALSE (case-insensitive).
254alc.lct.codepoint_as_fec_id: TRUE
255
256# How to decode LCT header extention 192
257# One of: Don't decode, Decode as FLUTE extension (EXT_FDT)
258# (case-insensitive).
259alc.lct.ext.192: Decode as FLUTE extension (EXT_FDT)
260
261# How to decode LCT header extention 193
262# One of: Don't decode, Decode as FLUTE extension (EXT_CENC)
263# (case-insensitive).
264alc.lct.ext.193: Decode as FLUTE extension (EXT_CENC)
265
266# Whether persistent call leg information is to be kept
267# TRUE or FALSE (case-insensitive).
268alcap.leg_info: TRUE
269
270# The dynamic payload type which will be interpreted as AMR
271# A decimal number.
272amr.dynamic.payload.type: 0
273
274# Type of AMR encoding of the payload
275# One of: RFC 3267 octet aligned, RFC 3267 BW-efficient, AMR IF1, AMR IF2
276# (case-insensitive).
277amr.encoding.version: RFC 3267 octet aligned
278
279# The AMR mode
280# One of: Narrowband AMR, Wideband AMR
281# (case-insensitive).
282amr.mode: Narrowband AMR
283
284# (if other than the default of IOS 4.0.1)
285# One of: IS-634 rev. 0, TSB-80, IS-634-A, IOS 2.x, IOS 3.x, IOS 4.0.1, IOS 5.0.1
286# (case-insensitive).
287ansi_a_bsmap.global_variant: IOS 4.0.1
288
289# ANSI MAP SSNs to decode as ANSI MAP
290# A string denoting an positive integer range (e.g., "1-20,30-40").
291ansi_map.map.ssn: 5-14
292
293# Attempt to detect excessive rate of ARP requests
294# TRUE or FALSE (case-insensitive).
295arp.detect_request_storms: FALSE
296
297# Number of requests needed within period to indicate a storm
298# A decimal number.
299arp.detect_storm_number_of_packets: 30
300
301# Period in milliseconds during which a packet storm may be detected
302# A decimal number.
303arp.detect_storm_period: 100
304
305# Attempt to detect duplicate use of IP addresses
306# TRUE or FALSE (case-insensitive).
307arp.detect_duplicate_ips: TRUE
308
309# The UDP port on which Art-Net packets will be sent
310# A decimal number.
311artnet.udp_port: 6454
312
313# The way DMX values are displayed
314# One of: Percent, Hexadecimal, Decimal
315# (case-insensitive).
316artnet.dmx_disp_chan_val_type: Percent
317
318# The way DMX channel numbers are displayed
319# One of: Hexadecimal, Decimal
320# (case-insensitive).
321artnet.dmx_disp_chan_nr_type: Hexadecimal
322
323# The number of columns for the DMX display
324# One of: 6, 10, 12, 16, 24
325# (case-insensitive).
326artnet.dmx_disp_col_count: 16
327
328# The TCP ports on which ASN.1 messages will be read
329# A string denoting an positive integer range (e.g., "1-20,30-40").
330asn1.tcp_ports: 0
331
332# The UDP ports on which ASN.1 messages will be read
333# A string denoting an positive integer range (e.g., "1-20,30-40").
334asn1.udp_ports: 0
335
336# The SCTP ports on which ASN.1 messages will be read
337# A string denoting an positive integer range (e.g., "1-20,30-40").
338asn1.sctp_ports: 0
339
340# Desegment ASN.1 messages that span TCP segments
341# TRUE or FALSE (case-insensitive).
342asn1.desegment_messages: TRUE
343
344# Compiled ASN.1 description of ASN.1 types
345# A string.
346asn1.file:
347
348# Name of top level PDU
349# A string.
350asn1.pdu_name: ASN1
351
352# Offset for non-reassembled packets, wrong if this happens on other than the first packet!
353# A decimal number.
354asn1.first_pdu_offset: 0
355
356# Show full names for all values
357# TRUE or FALSE (case-insensitive).
358asn1.flat: FALSE
359
360# Allow this recursion level for eliminated type references
361# One of: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
362# (case-insensitive).
363asn1.type_recursion: 1
364
365# Extra output useful for debuging
366# TRUE or FALSE (case-insensitive).
367asn1.debug: FALSE
368
369# log to file $TMP/wireshark.log
370# TRUE or FALSE (case-insensitive).
371asn1.verbose_log: FALSE
372
373# Autodection between LANE and SSCOP is hard. As default LANE is preferred
374# TRUE or FALSE (case-insensitive).
375atm.dissect_lane_as_sscop: FALSE
376
377# Whether the ATP dissector should reassemble messages spanning multiple DDP packets
378# TRUE or FALSE (case-insensitive).
379atp.desegment: TRUE
380
381# Set the port for BEEP messages (if other than the default of 10288)
382# A decimal number.
383beep.tcp.port: 10288
384
385# Specifies that BEEP requires CRLF as a terminator, and not just CR or LF
386# TRUE or FALSE (case-insensitive).
387beep.strict_header_terminator: TRUE
388
389# Whether the dissector should also display internal ASN.1 BER details such as Identifier and Length fields
390# TRUE or FALSE (case-insensitive).
391ber.show_internals: FALSE
392
393# Whether the dissector should decode unexpected tags as ASN.1 BER encoded data
394# TRUE or FALSE (case-insensitive).
395ber.decode_unexpected: FALSE
396
397# Whether the dissector should try decoding OCTET STRINGs as constructed ASN.1 BER encoded data
398# TRUE or FALSE (case-insensitive).
399ber.decode_octetstring: FALSE
400
401# Whether the BGP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
402# TRUE or FALSE (case-insensitive).
403bgp.desegment: TRUE
404
405# BGP dissector detect the length of the AS number in AS_PATH attributes automatically or manually (NOTE: Automatic detection is not 100% accurate)
406# One of: Auto-detect, 2 octet, 4 octet
407# (case-insensitive).
408bgp.asn_len: Auto-detect
409
410# Whether the BitTorrent dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
411# TRUE or FALSE (case-insensitive).
412bittorrent.desegment: TRUE
413
414# Enabling this will tell which BitTorrent client that produced the handshake message
415# TRUE or FALSE (case-insensitive).
416bittorrent.decode_client: FALSE
417
418# Novell Servers option 85 can be configured as a string instead of address
419# TRUE or FALSE (case-insensitive).
420bootp.novellserverstring: FALSE
421
422# The PacketCable CCC protocol version
423# One of: PKT-SP-PROV-I05-021127, IETF Draft 5, RFC 3495
424# (case-insensitive).
425bootp.pkt.ccc.protocol_version: RFC 3495
426
427# Option Number for PacketCable CableLabs Client Configuration
428# A decimal number.
429bootp.pkt.ccc.option: 122
430
431# For the sake of sub-dissectors registering to accept data from the BSSAP/BSAP dissector, this defines whether it is identified as BSSAP or BSAP.
432# One of: BSSAP, BSAP
433# (case-insensitive).
434bssap.bsap_or_bssap: BSSAP
435
436# Set Subsystem number used for BSSAP/BSSAP+
437# A decimal number.
438bssap.ssn: 98
439
440# Decode NRI (for use with SGSN in Pool)
441# TRUE or FALSE (case-insensitive).
442bssgp.decode_nri: FALSE
443
444# NRI length, in bits
445# A decimal number.
446bssgp.nri_length: 4
447
448# Whether the ACL dissector should reassemble fragmented PDUs
449# TRUE or FALSE (case-insensitive).
450bthci_acl.btacl_reassembly: TRUE
451
452# Set an additional UDP port, besides the standard X'BAC0' (47808) port.
453# A decimal number.
454bvlc.additional_udp_port: 0
455
456# The date format: (DD/MM) or (MM/DD)
457# One of: DD/MM/YYYY, MM/DD/YYYY
458# (case-insensitive).
459camel.date.format: DD/MM/YYYY
460
461# TCAP Subsystem numbers used for Camel
462# A string denoting an positive integer range (e.g., "1-20,30-40").
463camel.tcap.ssn: 6-9
464
465# Activate the analyse for Response Time
466# TRUE or FALSE (case-insensitive).
467camel.srt: FALSE
468
469# Statistics for Response Time
470# TRUE or FALSE (case-insensitive).
471camel.persistentsrt: FALSE
472
473# Whether the CAST dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
474# TRUE or FALSE (case-insensitive).
475cast.reassembly: TRUE
476
477# Set the port(s) for NetFlow messages (default: 2055,9996)
478# A string denoting an positive integer range (e.g., "1-20,30-40").
479cflow.netflow.ports: 2055,9996
480
481# Set the port(s) for IPFIX messages (default: 4739)
482# A string denoting an positive integer range (e.g., "1-20,30-40").
483cflow.ipfix.ports: 4739
484
485# The type of CHDLC frame checksum (none, 16-bit, 32-bit)
486# One of: None, 16-Bit, 32-Bit
487# (case-insensitive).
488chdlc.fcs_type: None
489
490# The version of CIGI with which to dissect packets
491# One of: From Packet, CIGI 2, CIGI 3
492# (case-insensitive).
493cigi.version: From Packet
494
495# The byte order with which to dissect CIGI packets (CIGI3)
496# One of: From Packet, Big-Endian, Little-Endian
497# (case-insensitive).
498cigi.byte_order: From Packet
499
500# IPv4 address or hostname of the host
501# A string.
502cigi.host:
503
504# IPv4 address or hostname of the image generator
505# A string.
506cigi.ig:
507
508# NSAP selector for Transport Protocol (last byte in hex)
509# A hexadecimal number.
510clnp.tp_nsap_selector: 0x21
511
512# Always try to decode NSDU as transport PDUs
513# TRUE or FALSE (case-insensitive).
514clnp.always_decode_transport: FALSE
515
516# Whether segmented CLNP datagrams should be reassembled
517# TRUE or FALSE (case-insensitive).
518clnp.reassemble: TRUE
519
520# Whether the CMP-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
521# TRUE or FALSE (case-insensitive).
522cmp.desegment: TRUE
523
524# Set the TCP port for COPS messages
525# A decimal number.
526cops.tcp.cops_port: 3288
527
528# Whether the COPS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
529# TRUE or FALSE (case-insensitive).
530cops.desegment: TRUE
531
532# Decode the COPS messages using PacketCable clients. (Select port 2126)
533# TRUE or FALSE (case-insensitive).
534cops.packetcable: TRUE
535
536# PIB settings can be changed in the Name Resolution preferences
537
538# Whether segmented COTP datagrams should be reassembled. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
539# TRUE or FALSE (case-insensitive).
540cotp.reassemble: TRUE
541
542# How TSAPs should be displayed
543# One of: As strings if printable, As strings, As bytes
544# (case-insensitive).
545cotp.tsap_display: As strings if printable
546
547# Set the port for CPFI messages (if other than the default of 5000)
548# A decimal number.
549cpfi.udp.port: 5000
550
551# Set the port for InstanceToInstance messages (if other than the default of 5001)
552# A decimal number.
553cpfi.udp.port2: 5001
554
555# Control the way the '-->' is displayed. When enabled, keeps the 'lowest valued' endpoint of the src-dest pair on the left, and the arrow moves to distinguish source from dest. When disabled, keeps the arrow pointing right so the source of the frame is always on the left.
556# TRUE or FALSE (case-insensitive).
557cpfi.arrow_ctl: TRUE
558
559# Set the destination UDP port Cisco wireless IDS messages
560# A decimal number.
561cwids.udp.port: 0
562
563# Set the port for DAP operations (if other than the default of 102)
564# A decimal number.
565dap.tcp.port: 102
566
567# Whether the DCCP summary line should be shown in the protocol tree
568# TRUE or FALSE (case-insensitive).
569dccp.summary_in_tree: TRUE
570
571# Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port
572# TRUE or FALSE (case-insensitive).
573dccp.try_heuristic_first: FALSE
574
575# Whether to check the validity of the DCCP checksum
576# TRUE or FALSE (case-insensitive).
577dccp.check_checksum: TRUE
578
579# Whether the DCE/RPC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
580# TRUE or FALSE (case-insensitive).
581dcerpc.desegment_dcerpc: TRUE
582
583# Whether the DCE/RPC dissector should reassemble fragmented DCE/RPC PDUs
584# TRUE or FALSE (case-insensitive).
585dcerpc.reassemble_dcerpc: TRUE
586
587# Display some DCOM unmarshalled fields usually hidden
588# TRUE or FALSE (case-insensitive).
589dcom.display_unmarshalling_details: FALSE
590
591# If a payload looks like its embedded in an IP primitive message, and there is a wireshark dissector matching the DCT2000 protocol name, try parsing the payload using that dissector
592# TRUE or FALSE (case-insensitive).
593dct2000.ipprim_heuristic: TRUE
594
595# If a payload looks like its embedded in an SCTP primitive message, and there is a wireshark dissector matching the DCT2000 protocol name, try parsing the payload using that dissector
596# TRUE or FALSE (case-insensitive).
597dct2000.sctpprim_heuristic: TRUE
598
599# Set the port for DHCP failover communications
600# A decimal number.
601dhcpfo.tcp_port: 519
602
603# Whether the DHCP failover dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
604# TRUE or FALSE (case-insensitive).
605dhcpfo.desegment: TRUE
606
607# TCP ports to be decoded as Diameter (default: 3868,3868)
608# A string denoting an positive integer range (e.g., "1-20,30-40").
609diameter.tcp.ports: 3868,3868
610
611# Set the SCTP port for Diameter messages
612# A decimal number.
613diameter.sctp.port: 3868
614
615# Whether the Diameter dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
616# TRUE or FALSE (case-insensitive).
617diameter.desegment: TRUE
618
619# Set the UDP port for DIS messages
620# A decimal number.
621dis.udp.port: 3000
622
623# Set the port for DISP operations (if other than the default of 102)
624# A decimal number.
625disp.tcp.port: 102
626
627# Set the TCP port for DISTCC messages
628# A decimal number.
629distcc.tcp.port: 3632
630
631# Whether the DISTCC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
632# TRUE or FALSE (case-insensitive).
633distcc.desegment_distcc_over_tcp: TRUE
634
635# Set the TCP port for Distributed Lock Manager
636# A decimal number.
637dlm3.tcp.port: 21064
638
639# Set the SCTP port for Distributed Lock Manager
640# A decimal number.
641dlm3.sctp.port: 21064
642
643# Port numbers used for DMP traffic
644# A string denoting an positive integer range (e.g., "1-20,30-40").
645dmp.udp_ports:
646
647# Calculate sequence/acknowledgement analysis
648# TRUE or FALSE (case-insensitive).
649dmp.seq_ack_analysis: TRUE
650
651# Align identifiers in info list (does not align when retransmission or duplicate acknowledgement indication)
652# TRUE or FALSE (case-insensitive).
653dmp.align_ids: FALSE
654
655# Print subject as body id in free text messages with subject
656# TRUE or FALSE (case-insensitive).
657dmp.subject_as_id: FALSE
658
659# Format of the structured message id
660# One of: None, 1 Byte value, 2 Byte value, 4 Byte value, 8 Byte value, Fixed text string, Zero terminated text string
661# (case-insensitive).
662dmp.struct_print: None
663
664# Used to set where the structured message id starts in the User Data
665# A decimal number.
666dmp.struct_offset: 0
667
668# Used to set length of fixed text string in the structured message id format (maximum 128 characters)
669# A decimal number.
670dmp.struct_length: 1
671
672# Whether the DNP3 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
673# TRUE or FALSE (case-insensitive).
674dnp3.desegment: TRUE
675
676# Whether the DNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
677# TRUE or FALSE (case-insensitive).
678dns.desegment_dns_messages: TRUE
679
680# Set the port for DOP operations (if other than the default of 102)
681# A decimal number.
682dop.tcp.port: 102
683
684# Whether the DRDA dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
685# TRUE or FALSE (case-insensitive).
686drda.desegment: TRUE
687
688# Whether the DSI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
689# TRUE or FALSE (case-insensitive).
690dsi.desegment: TRUE
691
692# Set the port for DSP operations (if other than the default of 102)
693# A decimal number.
694dsp.tcp.port: 102
695
696# Set the TDP port for the DTPT Server
697# A decimal number.
698dtpt.tcp.port: 5721
699
700# Allow only packets with Major=0x03//Minor=0xFF as DVMRP V3 packets
701# TRUE or FALSE (case-insensitive).
702dvmrp.strict_v3: FALSE
703
704# Whether the eDonkey dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
705# TRUE or FALSE (case-insensitive).
706edonkey.desegment: TRUE
707
708# Whether the EtherNet/IP dissector should desegment all messages spanning multiple TCP segments
709# TRUE or FALSE (case-insensitive).
710enip.desegment: TRUE
711
712# The UDP port on which ENTTEC packets will be sent
713# A decimal number.
714enttec.udp_port: 3333
715
716# The TCP port on which ENTTEC packets will be sent
717# A decimal number.
718enttec.tcp_port: 3333
719
720# The way DMX values are displayed
721# One of: Percent, Hexadecimal, Decimal
722# (case-insensitive).
723enttec.dmx_disp_chan_val_type: Percent
724
725# The way DMX channel numbers are displayed
726# One of: Hexadecimal, Decimal
727# (case-insensitive).
728enttec.dmx_disp_chan_nr_type: Hexadecimal
729
730# The number of columns for the DMX display
731# One of: 6, 10, 12, 16, 24
732# (case-insensitive).
733enttec.dmx_disp_col_count: 16
734
735# If you are capturing in networks with multiplexed or slow nodes, this can be useful
736# TRUE or FALSE (case-insensitive).
737epl.show_soc_flags: FALSE
738
739# Protocol encapsulated in HDLC records
740# One of: Cisco HDLC, PPP serial, Frame Relay, SS7 MTP2, Raw data
741# (case-insensitive).
742erf.erfhdlc: SS7 MTP2
743
744# Protocol encapsulated in ATM records
745# One of: ATM, LLC, Raw data
746# (case-insensitive).
747erf.erfatm: Raw data
748
749# Protocol encapsulated in Ethernet records
750# One of: Ethernet with FCS, Ethernet, Raw data
751# (case-insensitive).
752erf.erfeth: Raw data
753
754# This is done only if the Decoding is not SET or the packet does not belong to a SA. Assumes a 12 byte auth (HMAC-SHA1-96/HMAC-MD5-96/AES-XCBC-MAC-96) and attempts decode based on the ethertype 13 bytes from packet end
755# TRUE or FALSE (case-insensitive).
756esp.enable_null_encryption_decode_heuristic: FALSE
757
758# Whether packets should be interpreted as coming from CheckPoint FireWall-1 monitor file if they look as if they do
759# TRUE or FALSE (case-insensitive).
760eth.interpret_as_fw1_monitor: FALSE
761
762# Set TCP port 1 for etheric messages
763# A decimal number.
764etheric.tcp.port1: 1806
765
766# Set TCP port 2 for etheric messages
767# A decimal number.
768etheric.tcp.port2: 10002
769
770# Controls the display of the session's username in the info column. This is only displayed if the packet containing it was seen during this capture session.
771# TRUE or FALSE (case-insensitive).
772exec.info_show_username: TRUE
773
774# Controls the display of the command being run on the server by this session in the info column. This is only displayed if the packet containing it was seen during this capture session.
775# TRUE or FALSE (case-insensitive).
776exec.info_show_command: FALSE
777
778# If enabled, reassembly of multi-frame sequences is done
779# TRUE or FALSE (case-insensitive).
780fc.reassemble: TRUE
781
782# This is the size of non-last frames in a multi-frame sequence
783# A decimal number.
784fc.max_frame_size: 1024
785
786# Whether the FCIP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
787# TRUE or FALSE (case-insensitive).
788fcip.desegment: TRUE
789
790# Port number used for FCIP
791# A decimal number.
792fcip.target_port: 3225
793
794# Whether the FDDI dissector should add 3-byte padding to all captured FDDI packets (useful with e.g. Tru64 UNIX tcpdump)
795# TRUE or FALSE (case-insensitive).
796fddi.padding: FALSE
797
798# With this option display filters for fmp fhandle a RPC call, even if the actual fhandle is only present in one of the packets
799# TRUE or FALSE (case-insensitive).
800fmp.fhandle_find_both_reqrep: FALSE
801
802# Encapsulation
803# One of: FRF 3.2/Cisco HDLC, GPRS Network Service, Raw Ethernet
804# (case-insensitive).
805fr.encap: FRF 3.2/Cisco HDLC
806
807# Show File Offset
808# TRUE or FALSE (case-insensitive).
809frame.show_file_off: FALSE
810
811# Treat all frames as DOCSIS Frames
812# TRUE or FALSE (case-insensitive).
813frame.force_docsis_encap: FALSE
814
815# Whether the FireWall-1 summary line should be shown in the protocol tree
816# TRUE or FALSE (case-insensitive).
817fw1.summary_in_tree: TRUE
818
819# Whether the Firewall-1 monitor file includes UUID information
820# TRUE or FALSE (case-insensitive).
821fw1.with_uuid: FALSE
822
823# Whether the interface list includes the chain position
824# TRUE or FALSE (case-insensitive).
825fw1.iflist_with_chain: FALSE
826
827# Whether the GIOP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
828# TRUE or FALSE (case-insensitive).
829giop.desegment_giop_messages: TRUE
830
831# File containing stringified IORs, one per line.
832# A string.
833giop.ior_txt: IOR.txt
834
835# Whether the Gryphon dissector should desegment all messages spanning multiple TCP segments
836# TRUE or FALSE (case-insensitive).
837gryphon.desegment: TRUE
838
839# Always decode a GSM Short Message as Connectionless WSP if a Port Number Information Element is present in the SMS User Data Header.
840# TRUE or FALSE (case-insensitive).
841gsm-sms-ud.port_number_udh_means_wsp: FALSE
842
843# Always try subdissection of the 1st fragment of a fragmented GSM Short Message. If reassembly is possible, the Short Message may be dissected twice (once as a short frame, once in its entirety).
844# TRUE or FALSE (case-insensitive).
845gsm-sms-ud.try_dissect_1st_fragment: FALSE
846
847# Prevent sub-dissectors from replacing column data with their own. Eg. Prevent WSP dissector overwriting SMPP information.
848# TRUE or FALSE (case-insensitive).
849gsm-sms-ud.prevent_dissectors_chg_cols: FALSE
850
851# TCAP Subsystem numbers used for GSM MAP
852# A string denoting an positive integer range (e.g., "1-20,30-40").
853gsm_map.tcap.ssn: 6-9
854
855# Whether or not to try reassembling GSSAPI blobs spanning multiple (SMB/SessionSetup) PDUs
856# TRUE or FALSE (case-insensitive).
857gss-api.gssapi_reassembly: TRUE
858
859# GTPv0 port (default 3386)
860# A decimal number.
861gtp.v0_port: 3386
862
863# GTPv1 control plane port (default 2123)
864# A decimal number.
865gtp.v1c_port: 2123
866
867# GTPv1 user plane port (default 2152)
868# A decimal number.
869gtp.v1u_port: 2152
870
871# Dissect T-PDU
872# TRUE or FALSE (case-insensitive).
873gtp.dissect_tpdu: TRUE
874
875# GTP ETSI order
876# TRUE or FALSE (case-insensitive).
877gtp.check_etsi: FALSE
878
879# Dissect GTP over TCP
880# TRUE or FALSE (case-insensitive).
881gtp.dissect_gtp_over_tcp: TRUE
882
883# H.225 Server TLS Port
884# A decimal number.
885h225.tls.port: 1300
886
887# Whether the H.225 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
888# TRUE or FALSE (case-insensitive).
889h225.reassembly: TRUE
890
891# ON - display tunnelled H.245 inside H.225.0 tree, OFF - display tunnelled H.245 in root tree after H.225.0
892# TRUE or FALSE (case-insensitive).
893h225.h245_in_tree: TRUE
894
895# ON - display tunnelled protocols inside H.225.0 tree, OFF - display tunnelled protocols in root tree after H.225.0
896# TRUE or FALSE (case-insensitive).
897h225.tp_in_tree: TRUE
898
899# Whether the H.245 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
900# TRUE or FALSE (case-insensitive).
901h245.reassembly: TRUE
902
903# Whether the dissector should show short names or the long names from the standard
904# TRUE or FALSE (case-insensitive).
905h245.shorttypes: FALSE
906
907# Mantain relationships between transactions and contexts and display an extra tree showing context data
908# TRUE or FALSE (case-insensitive).
909h248.ctx_info: FALSE
910
911# Port to be decoded as h248
912# A decimal number.
913h248.udp_port: 2945
914
915# Port to be decoded as h248
916# A decimal number.
917h248.tcp_port: 2945
918
919# Desegment H.248 messages that span more TCP segments
920# TRUE or FALSE (case-insensitive).
921h248.desegment: TRUE
922
923# The dynamic payload type which will be interpreted as H264
924# A decimal number.
925h263p.dynamic.payload.type: 0
926
927# The dynamic payload type which will be interpreted as H264
928# A decimal number.
929h264.dynamic.payload.type: 0
930
931# Port to be decoded as h501
932# A decimal number.
933h501.udp.port: 2099
934
935# Port to be decoded as h501
936# A decimal number.
937h501.tcp.port: 2099
938
939# Desegment H.501 messages that span more TCP segments
940# TRUE or FALSE (case-insensitive).
941h501.desegment: TRUE
942
943# Enable this dissector (default is false)
944# TRUE or FALSE (case-insensitive).
945hilscher.enable: FALSE
946
947# Whether the HTTP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
948# TRUE or FALSE (case-insensitive).
949http.desegment_headers: TRUE
950
951# Whether the HTTP dissector should use the "Content-length:" value, if present, to reassemble the body of a request spanning multiple TCP segments, and reassemble chunked data spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
952# TRUE or FALSE (case-insensitive).
953http.desegment_body: TRUE
954
955# Whether to reassemble bodies of entities that are transfered using the "Transfer-Encoding: chunked" method
956# TRUE or FALSE (case-insensitive).
957http.dechunk_body: TRUE
958
959# Whether to uncompress entity bodies that are compressed using "Content-Encoding: "
960# TRUE or FALSE (case-insensitive).
961http.decompress_body: TRUE
962
963# TCP Ports range
964# A string denoting an positive integer range (e.g., "1-20,30-40").
965http.tcp.port: 80,3128,3132,8080,8088,11371,3689,1900
966
967# SSL/TLS Ports range
968# A string denoting an positive integer range (e.g., "1-20,30-40").
969http.ssl.port: 443
970
971# Whether the 128th and following bytes of the ICMP payload should be decoded as MPLS extensions or as a portion of the original packet
972# TRUE or FALSE (case-insensitive).
973icmp.favor_icmp_mpls: FALSE
974
975# Ethertype used to indicate IEEE 802.1ah tag.
976# A hexadecimal number.
977ieee8021ah.8021ah_ethertype: 0x88f0
978
979# Whether the iFCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
980# TRUE or FALSE (case-insensitive).
981ifcp.desegment: TRUE
982
983# TCAP Subsystem numbers used for INAP
984# A string denoting an positive integer range (e.g., "1-20,30-40").
985inap.ssn: 106,241
986
987# Whether the IPv4 type-of-service field should be decoded as a Differentiated Services field (see RFC2474/RFC2475)
988# TRUE or FALSE (case-insensitive).
989ip.decode_tos_as_diffserv: TRUE
990
991# Whether fragmented IP datagrams should be reassembled
992# TRUE or FALSE (case-insensitive).
993ip.defragment: TRUE
994
995# Whether the IP summary line should be shown in the protocol tree
996# TRUE or FALSE (case-insensitive).
997ip.summary_in_tree: TRUE
998
999# Whether to validate the IP checksum
1000# TRUE or FALSE (case-insensitive).
1001ip.check_checksum: TRUE
1002
1003# Whether to correct for TSO-enabled hardware captures, such as spoofing the IP packet length
1004# TRUE or FALSE (case-insensitive).
1005ip.tso_support: FALSE
1006
1007# Whether the IPDC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1008# TRUE or FALSE (case-insensitive).
1009ipdc.desegment_ipdc_messages: TRUE
1010
1011# Set the IPDC monitoring port
1012# A decimal number.
1013ipdc.tcp.port: 6668
1014
1015# Whether fragmented IPv6 datagrams should be reassembled
1016# TRUE or FALSE (case-insensitive).
1017ipv6.defragment: TRUE
1018
1019# The iSCSI protocol version
1020# One of: Draft 08, Draft 09, Draft 11, Draft 12, Draft 13
1021# (case-insensitive).
1022iscsi.protocol_version: Draft 13
1023
1024# Whether the iSCSI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1025# TRUE or FALSE (case-insensitive).
1026iscsi.desegment_iscsi_messages: TRUE
1027
1028# When enabled, packets that appear bogus are ignored
1029# TRUE or FALSE (case-insensitive).
1030iscsi.bogus_pdu_filter: TRUE
1031
1032# Ignore packets that haven't set the F bit when they should have
1033# TRUE or FALSE (case-insensitive).
1034iscsi.demand_good_f_bit: FALSE
1035
1036# Treat packets whose data segment length is greater than this value as bogus
1037# A decimal number.
1038iscsi.bogus_pdu_max_data_len: 262144
1039
1040# Port number of iSCSI target
1041# A decimal number.
1042iscsi.target_port: 3260
1043
1044# When enabled, pdus are assumed to contain a data digest
1045# TRUE or FALSE (case-insensitive).
1046iscsi.enable_data_digests: FALSE
1047
1048# When enabled, data digests are assumed to be CRC32C
1049# TRUE or FALSE (case-insensitive).
1050iscsi.data_digest_is_crc32c: TRUE
1051
1052# The size of a data digest (bytes)
1053# A decimal number.
1054iscsi.data_digest_size: 4
1055
1056# Whether the iSNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1057# TRUE or FALSE (case-insensitive).
1058isns.desegment: TRUE
1059
1060# Show the CIC value (in addition to the message type) in the Info column
1061# TRUE or FALSE (case-insensitive).
1062isup.show_cic_in_info: TRUE
1063
1064# Whether APM messages datagrams should be reassembled
1065# TRUE or FALSE (case-insensitive).
1066isup.defragment_apm: TRUE
1067
1068# Set TCP port for ISUP Thin messages
1069# A decimal number.
1070isup_thin.tcp.port: 0
1071
1072# Support Implementers Guide (version 01)
1073# TRUE or FALSE (case-insensitive).
1074iua.support_ig: FALSE
1075
1076# Whether IuUP Payload bits should be dissected
1077# TRUE or FALSE (case-insensitive).
1078iuup.dissect_payload: FALSE
1079
1080# The payload contains a two byte pseudoheader indicating direction and circuit_id
1081# TRUE or FALSE (case-insensitive).
1082iuup.two_byte_pseudoheader: FALSE
1083
1084# The dynamic payload type which will be interpreted as IuUP
1085# A decimal number.
1086iuup.dynamic.payload.type: 0
1087
1088# Enable to have correctly typed MIME media dissected as JXTA Messages.
1089# TRUE or FALSE (case-insensitive).
1090jxta.msg.mediatype: TRUE
1091
1092# Whether the JXTA dissector should reassemble messages spanning multiple UDP/TCP/SCTP segments. To use this option you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings and enable "Reassemble fragmented IP datagrams" in the IP protocol settings.
1093# TRUE or FALSE (case-insensitive).
1094jxta.desegment: TRUE
1095
1096# Enable to inspect UDP datagrams for JXTA messages.
1097# TRUE or FALSE (case-insensitive).
1098jxta.udp.heuristic: TRUE
1099
1100# Enable to inspect TCP connections for JXTA conversations.
1101# TRUE or FALSE (case-insensitive).
1102jxta.tcp.heuristic: TRUE
1103
1104# Enable to inspect SCTP connections for JXTA conversations.
1105# TRUE or FALSE (case-insensitive).
1106jxta.sctp.heuristic: TRUE
1107
1108# A table of matches vs stack filenames and relative protocols
1109
1110# Whether the Kerberos dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1111# TRUE or FALSE (case-insensitive).
1112kerberos.desegment: TRUE
1113
1114# Whether the dissector should try to decrypt encrypted Kerberos blobs. This requires that the proper keytab file is installed as well.
1115# TRUE or FALSE (case-insensitive).
1116kerberos.decrypt: FALSE
1117
1118# The keytab file containing all the secrets
1119# A string.
1120kerberos.file: insert filename here
1121
1122# Set the port for Kismet Client/Server messages (if other than the default of 2501)
1123# A decimal number.
1124kismet.tcp.port: 2501
1125
1126# Whether the Kpasswd dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1127# TRUE or FALSE (case-insensitive).
1128kpasswd.desegment: TRUE
1129
1130# L2TPv3 Cookie Size
1131# One of: None, 4 Byte Cookie, 8 Byte Cookie
1132# (case-insensitive).
1133l2tp.cookie_size: 4 Byte Cookie
1134
1135# L2TPv3 L2-Specific Sublayer
1136# One of: None, Default L2-Specific, ATM-Specific, LAPD-Specific
1137# (case-insensitive).
1138l2tp.l2_specific: Default L2-Specific
1139
1140# Decode L2TPv3 packet contents as this protocol
1141# One of: Ethernet, Cisco HDLC, Frame Relay, PPP, IP, MPLS, AAL5, LAPD
1142# (case-insensitive).
1143l2tp.protocol: Cisco HDLC
1144
1145# Use SAPI values as specified in TS 48 056
1146# TRUE or FALSE (case-insensitive).
1147lapd.use_gsm_sapi_values: FALSE
1148
1149# Whether the Laplink dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1150# TRUE or FALSE (case-insensitive).
1151laplink.desegment_laplink_over_tcp: TRUE
1152
1153# Whether the LDAP dissector should reassemble messages spanning multiple TCP segments.To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1154# TRUE or FALSE (case-insensitive).
1155ldap.desegment_ldap_messages: TRUE
1156
1157# Set the port for LDAP operations
1158# A decimal number.
1159ldap.tcp.port: 389
1160
1161# Set the port for LDAP operations over SSL
1162# A decimal number.
1163ldap.ssl.port: 636
1164
1165# Set the TCP port for messages (if other than the default of 646)
1166# A decimal number.
1167ldp.tcp.port: 646
1168
1169# Set the UDP port for messages (if other than the default of 646)
1170# A decimal number.
1171ldp.udp.port: 646
1172
1173# Whether the LDP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1174# TRUE or FALSE (case-insensitive).
1175ldp.desegment_ldp_messages: TRUE
1176
1177# Set UDP port for LGE Monitor messages
1178# A decimal number.
1179lge_monitor.udp.port: 0
1180
1181# Whether to autodetect the cipher bit (because it might be set on unciphered data)
1182# TRUE or FALSE (case-insensitive).
1183llcgprs.autodetect_cipher_bit: FALSE
1184
1185# Dissect this ethertype as LLT traffic in addition to the default, 0xCAFE.
1186# A hexadecimal number.
1187llt.alternate_ethertype: 0
1188
1189# UDP port number to use for LMP
1190# A decimal number.
1191lmp.udp_port: 701
1192
1193# Set the TCP or UDP port for Pegasus LSC messages
1194# A decimal number.
1195lsc.port: 0
1196
1197# Swap frame control bytes (needed for some APs
1198# TRUE or FALSE (case-insensitive).
1199lwapp.swap_fc: FALSE
1200
1201# Set the UDP port for lwres daemon(if other than the default of 921)
1202# A decimal number.
1203lwres.udp.lwres_port: 921
1204
1205# Version used by Wireshark
1206# One of: Internet Draft version 2, Internet Draft version 8, Internet Draft version 12
1207# (case-insensitive).
1208m2pa.version: Internet Draft version 12
1209
1210# Set the port for M2PA messages (Default of 3565)
1211# A decimal number.
1212m2pa.port: 3565
1213
1214# The value of the parameter tag for protocol data 1
1215# One of: 0x000e (Draft 7), 0x0300 (RFC3331)
1216# (case-insensitive).
1217m2ua.protocol_data_1_tag: 0x0300 (RFC3331)
1218
1219# Version used by Wireshark
1220# One of: Internet Draft version 5, Internet Draft version 6, Internet Draft version 7, RFC 3332
1221# (case-insensitive).
1222m3ua.version: RFC 3332
1223
1224# Whether the dissector should decrypt MAPI PDUs
1225# TRUE or FALSE (case-insensitive).
1226mapi.decrypt: FALSE
1227
1228# The name of the file containing the mate module's configuration
1229# A string.
1230mate.config:
1231
1232# A frame is considered for decoding as MDSHDR if either ethertype is 0xFCFC or zero. Turn this flag off if you you don't want ethertype zero to be decoded as MDSHDR. This might be useful to avoid problems with test frames.
1233# TRUE or FALSE (case-insensitive).
1234mdshdr.decode_if_etype_zero: TRUE
1235
1236# Set the TCP port for MEGACO text messages
1237# A decimal number.
1238megaco.tcp.txt_port: 2944
1239
1240# Set the UDP port for MEGACO text messages
1241# A decimal number.
1242megaco.udp.txt_port: 2944
1243
1244# Specifies that the raw text of the MEGACO message should be displayed instead of (or in addition to) the dissection tree
1245# TRUE or FALSE (case-insensitive).
1246megaco.display_raw_text: TRUE
1247
1248# Specifies that the dissection tree of the MEGACO message should be displayed instead of (or in addition to) the raw text
1249# TRUE or FALSE (case-insensitive).
1250megaco.display_dissect_tree: TRUE
1251
1252# Mantain relationships between transactions and contexts and display an extra tree showing context data
1253# TRUE or FALSE (case-insensitive).
1254megaco.ctx_info: FALSE
1255
1256# Set the UDP port for gateway messages (if other than the default of 2427)
1257# A decimal number.
1258mgcp.tcp.gateway_port: 2427
1259
1260# Set the TCP port for gateway messages (if other than the default of 2427)
1261# A decimal number.
1262mgcp.udp.gateway_port: 2427
1263
1264# Set the TCP port for callagent messages (if other than the default of 2727)
1265# A decimal number.
1266mgcp.tcp.callagent_port: 2727
1267
1268# Set the UDP port for callagent messages (if other than the default of 2727)
1269# A decimal number.
1270mgcp.udp.callagent_port: 2727
1271
1272# Specifies that the raw text of the MGCP message should be displayed instead of (or in addition to) the dissection tree
1273# TRUE or FALSE (case-insensitive).
1274mgcp.display_raw_text: FALSE
1275
1276# Display the number of MGCP messages found in a packet in the protocol column.
1277# TRUE or FALSE (case-insensitive).
1278mgcp.display_mgcp_message_count: FALSE
1279
1280# Set the port for MIKEY messages (if other than the default of 2269)
1281# A decimal number.
1282mikey.udp.port: 2269
1283
1284# Set the port for MIKEY messages (if other than the default of 2269)
1285# A decimal number.
1286mikey.tcp.port: 2269
1287
1288# Display multipart bodies with no media type dissector as raw text (may cause problems with binary data).
1289# TRUE or FALSE (case-insensitive).
1290mime_multipart.display_unknown_body_as_text: FALSE
1291
1292# Remove any base64 content-transfer encoding from bodies. This supports export of the body and its further dissection.
1293# TRUE or FALSE (case-insensitive).
1294mime_multipart.remove_base64_encoding: FALSE
1295
1296# Set the UDP port for messages (if other than the default of 3503)
1297# A decimal number.
1298mpls-echo.udp.port: 3503
1299
1300# Whether the MQ dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1301# TRUE or FALSE (case-insensitive).
1302mq.desegment: TRUE
1303
1304# Whether the MQ dissector should reassemble MQ messages spanning multiple TSH segments
1305# TRUE or FALSE (case-insensitive).
1306mq.reassembly: TRUE
1307
1308# Specifies that the raw text of the MSRP message should be displayed in addition to the dissection tree
1309# TRUE or FALSE (case-insensitive).
1310msrp.display_raw_text: TRUE
1311
1312# Where available, show which protocol and frame caused this MSRP stream to be created
1313# TRUE or FALSE (case-insensitive).
1314msrp.show_setup_info: TRUE
1315
1316# Whether the MTP2 dissector should use extended sequence numbers as described in Q.703, Annex A as a default.
1317# TRUE or FALSE (case-insensitive).
1318mtp2.use_extended_sequence_numbers: FALSE
1319
1320# The SS7 standard used in MTP3 packets
1321# One of: ITU, ANSI, Chinese ITU, Japan
1322# (case-insensitive).
1323mtp3.standard: ITU
1324
1325# The structure of the pointcodes in ITU networks
1326# One of: Unstructured, 3-8-3, 4-3-4-3
1327# (case-insensitive).
1328mtp3.itu_pc_structure: Unstructured
1329
1330# The structure of the pointcodes in Japan networks
1331# One of: Unstructured, 7-4-5, 3-4-4-5
1332# (case-insensitive).
1333mtp3.japan_pc_structure: Unstructured
1334
1335# Use 5-bit (instead of 8-bit) SLS in ANSI MTP3 packets
1336# TRUE or FALSE (case-insensitive).
1337mtp3.ansi_5_bit_sls: FALSE
1338
1339# Use 5-bit (instead of 4-bit) SLS in Japan MTP3 packets
1340# TRUE or FALSE (case-insensitive).
1341mtp3.japan_5_bit_sls: FALSE
1342
1343# Format for point code in the address columns
1344# One of: Decimal, Hexadecimal, NI-Decimal, NI-Hexadecimal, Dashed
1345# (case-insensitive).
1346mtp3.addr_format: Dashed
1347
1348# Decode the spare bits of the SIO as the MSU priority (a national option in ITU)
1349# TRUE or FALSE (case-insensitive).
1350mtp3.itu_priority: FALSE
1351
1352# Whether the MySQL dissector should reassemble MySQL buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1353# TRUE or FALSE (case-insensitive).
1354mysql.desegment_buffers: TRUE
1355
1356# Whether the MySQL dissector should display the SQL query string in the INFO column.
1357# TRUE or FALSE (case-insensitive).
1358mysql.show_sql_query: FALSE
1359
1360# Whether the NBD dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings
1361# TRUE or FALSE (case-insensitive).
1362nbd.desegment_nbd_messages: TRUE
1363
1364# Whether the NBSS dissector should reassemble packets spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1365# TRUE or FALSE (case-insensitive).
1366nbss.desegment_nbss_commands: TRUE
1367
1368# Whether the NCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1369# TRUE or FALSE (case-insensitive).
1370ncp.desegment: TRUE
1371
1372# Whether the NCP dissector should defragment NDS messages spanning multiple reply packets.
1373# TRUE or FALSE (case-insensitive).
1374ncp.defragment_nds: TRUE
1375
1376# Dissect the NetWare Information Structure as NetWare 5.x or higher or as older NetWare 3.x.
1377# TRUE or FALSE (case-insensitive).
1378ncp.newstyle: TRUE
1379
1380# Whether the NCP dissector should echo the NDS Entry ID to name resolves to the expert table.
1381# TRUE or FALSE (case-insensitive).
1382ncp.eid_2_expert: TRUE
1383
1384# Whether the NCP dissector should echo NCP connection information to the expert table.
1385# TRUE or FALSE (case-insensitive).
1386ncp.connection_2_expert: FALSE
1387
1388# Whether the NCP dissector should echo protocol errors to the expert table.
1389# TRUE or FALSE (case-insensitive).
1390ncp.error_2_expert: TRUE
1391
1392# Whether the NCP dissector should echo server information to the expert table.
1393# TRUE or FALSE (case-insensitive).
1394ncp.server_2_expert: TRUE
1395
1396# Whether the NCP dissector should echo file open/close/oplock information to the expert table.
1397# TRUE or FALSE (case-insensitive).
1398ncp.file_2_expert: FALSE
1399
1400# Version of the NDMP protocol to assume if the version can not be automatically detected from the capture
1401# One of: Version 2, Version 3, Version 4, Version 5
1402# (case-insensitive).
1403ndmp.default_protocol_version: Version 4
1404
1405# Whether the NDMP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1406# TRUE or FALSE (case-insensitive).
1407ndmp.desegment: TRUE
1408
1409# Whether the dissector should defragment NDMP messages spanning multiple packets.
1410# TRUE or FALSE (case-insensitive).
1411ndmp.defragment: TRUE
1412
1413# Whether the NDPS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1414# TRUE or FALSE (case-insensitive).
1415ndps.desegment_tcp: TRUE
1416
1417# Whether the NDPS dissector should reassemble fragmented NDPS messages spanning multiple SPX packets
1418# TRUE or FALSE (case-insensitive).
1419ndps.desegment_spx: TRUE
1420
1421# Whether or not the NDPS dissector should show object id's and other details
1422# TRUE or FALSE (case-insensitive).
1423ndps.show_oid: FALSE
1424
1425# Whether the NetBIOS dissector should defragment messages spanning multiple frames
1426# TRUE or FALSE (case-insensitive).
1427netbios.defragment: TRUE
1428
1429# The TCP port on which Monotone Netsync packets will be sent
1430# A decimal number.
1431netsync.tcp_port: 5253
1432
1433# Whether the Netsync dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1434# TRUE or FALSE (case-insensitive).
1435netsync.desegment_netsync_messages: TRUE
1436
1437# Always dissect this port's traffic as newmail notifications. Additional ports will be dynamically registered as they are seen in MAPI register push notification packets.
1438# A decimal number.
1439newmail.default_port: 0
1440
1441# Whether the dissector should snoop the FH to filename mappings by looking inside certain packets
1442# TRUE or FALSE (case-insensitive).
1443nfs.file_name_snooping: FALSE
1444
1445# Whether the dissector should snoop the full pathname for files for matching FH's
1446# TRUE or FALSE (case-insensitive).
1447nfs.file_full_name_snooping: FALSE
1448
1449# With this option display filters for nfs fhandles (nfs.fh.{name|full_name|hash}) will find both the request and response packets for a RPC call, even if the actual fhandle is only present in one of the packets
1450# TRUE or FALSE (case-insensitive).
1451nfs.fhandle_find_both_reqrep: FALSE
1452
1453# Decode all NFS file handles as if they are of this type
1454# One of: Unknown, SVR4, KNFSD_LE, NFSD_LE, KNFSD_NEW, ONTAP_V3, ONTAP_V4, ONTAP_GX_V3
1455# (case-insensitive).
1456nfs.default_fhandle_type: Unknown
1457
1458# Whether the dissector will track and match MSG and RES calls for asynchronous NLM
1459# TRUE or FALSE (case-insensitive).
1460nlm.msg_res_matching: FALSE
1461
1462# Check this to decode NORM traffic between clients
1463# TRUE or FALSE (case-insensitive).
1464norm.heuristic_norm: FALSE
1465
1466# UDP ports to be decoded as NSIP (default: 2157,19999)
1467# A string denoting an positive integer range (e.g., "1-20,30-40").
1468nsip.udp.ports: 2157,19999
1469
1470# NT Password (used to decrypt payloads)
1471# A string.
1472ntlmssp.nt_password:
1473
1474# Whether the OPSI dissector should desegment all messages spanning multiple TCP segments
1475# TRUE or FALSE (case-insensitive).
1476opsi.desegment_opsi_messages: TRUE
1477
1478# TCP port for OSI over TPKT
1479# A decimal number.
1480osi.tpkt_port: 0
1481
1482# Whether segmented TPKT datagrams should be reassembled
1483# TRUE or FALSE (case-insensitive).
1484osi.tpkt_reassemble: FALSE
1485
1486# Set the port for P7 operations (if other than the default of 102)
1487# A decimal number.
1488p7.tcp.port: 102
1489
1490# Port numbers used for P_Mul traffic
1491# A string denoting an positive integer range (e.g., "1-20,30-40").
1492p_mul.udp_ports:
1493
1494# Reassemble fragmented P_Mul packets
1495# TRUE or FALSE (case-insensitive).
1496p_mul.reassemble: TRUE
1497
1498# Make the P_Mul dissector use relative message id number instead of absolute ones
1499# TRUE or FALSE (case-insensitive).
1500p_mul.relative_msgid: TRUE
1501
1502# Calculate sequence/acknowledgement analysis
1503# TRUE or FALSE (case-insensitive).
1504p_mul.seq_ack_analysis: TRUE
1505
1506# Type of content in Data_PDU
1507# One of: No decoding, Compressed Data Type
1508# (case-insensitive).
1509p_mul.decode: No decoding
1510
1511# SCCP (and SUA) SSNs to decode as PCAP
1512# A string denoting an positive integer range (e.g., "1-20,30-40").
1513pcap.ssn:
1514
1515# The UDP port on which Packet Cable Lawful Intercept packets will be sent
1516# A decimal number.
1517pcli.udp_port: 9000
1518
1519# Whether the dissector should put the internal PER data in the tree or if it should hide it
1520# TRUE or FALSE (case-insensitive).
1521per.display_internal_per_fields: FALSE
1522
1523# Whether to check the validity of the PGM checksum
1524# TRUE or FALSE (case-insensitive).
1525pgm.check_checksum: TRUE
1526
1527# PGM Encap is PGM packets encapsulated in UDP packets (Note: This option is off, i.e. port is 0, by default)
1528# A decimal number.
1529pgm.udp.encap_ucast_port: 0
1530
1531# PGM Encap is PGM packets encapsulated in UDP packets (Note: This option is off, i.e. port is 0, by default)
1532# A decimal number.
1533pgm.udp.encap_mcast_port: 0
1534
1535# Set the port for PGSQL messages (if different from the default of 5432)
1536# A decimal number.
1537pgsql.tcp.port: 5432
1538
1539# The password to used to decrypt the encrypted elements within the PKCS#12 file
1540# A string.
1541pkcs12.password:
1542
1543# Whether to try and decrypt the encrypted data within the PKCS#12 with a NULL password
1544# TRUE or FALSE (case-insensitive).
1545pkcs12.try_null_password: FALSE
1546
1547# Decode packets on this UDP port as PacketCable CCC
1548# A decimal number.
1549pkt_ccc.udp_port: 0
1550
1551# Whether the PN-RT summary line should be shown in the protocol tree
1552# TRUE or FALSE (case-insensitive).
1553pn_rt.summary_in_tree: TRUE
1554
1555# Whether fragmented 802.11 aggregated MPDUs should be reassembled
1556# TRUE or FALSE (case-insensitive).
1557ppi.reassemble: TRUE
1558
1559# The type of PPP frame checksum (none, 16-bit, 32-bit)
1560# One of: None, 16-Bit, 32-Bit
1561# (case-insensitive).
1562ppp.fcs_type: None
1563
1564# Whether Van Jacobson-compressed PPP frames should be decompressed
1565# TRUE or FALSE (case-insensitive).
1566ppp.decompress_vj: TRUE
1567
1568# Default Protocol ID to be used for PPPMuxCP
1569# A hexadecimal number.
1570ppp.default_proto_id: 0
1571
1572# Show values of tags and lengths of data fields
1573# TRUE or FALSE (case-insensitive).
1574pppoed.show_tags_and_lengths: FALSE
1575
1576# Enable this dissector (default is false)
1577# TRUE or FALSE (case-insensitive).
1578prp.enable: FALSE
1579
1580# Whether the PVFS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1581# TRUE or FALSE (case-insensitive).
1582pvfs.desegment: TRUE
1583
1584# Whether the Q.931 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1585# TRUE or FALSE (case-insensitive).
1586q931.desegment_h323_messages: TRUE
1587
1588# Reassemble segmented Q.931 messages (Q.931 - Annex H)
1589# TRUE or FALSE (case-insensitive).
1590q931.reassembly: TRUE
1591
1592# Set the UDP port for the Quake Server
1593# A decimal number.
1594quake.udp.port: 26000
1595
1596# Set the UDP port for the Quake II Server
1597# A decimal number.
1598quake2.udp.port: 27910
1599
1600# Set the UDP base port for the Quake III Arena Server
1601# A decimal number.
1602quake3.udp.arena_port: 27960
1603
1604# Set the UDP base port for the Quake III Arena Master Server
1605# A decimal number.
1606quake3.udp.master_port: 27950
1607
1608# Set the UDP port for the QuakeWorld Server
1609# A decimal number.
1610quakeworld.udp.port: 27500
1611
1612# Shared secret used to decode User Passwords
1613# A string.
1614radius.shared_secret:
1615
1616# Whether to add or not to the tree the AVP's payload length
1617# TRUE or FALSE (case-insensitive).
1618radius.show_length: FALSE
1619
1620# An alternate UDP port to decode as RADIUS
1621# A decimal number.
1622radius.alternate_port: 0
1623
1624# Where available, show which protocol and frame caused this RDT stream to be created
1625# TRUE or FALSE (case-insensitive).
1626rdt.show_setup_info: TRUE
1627
1628# Register a client UDP port for RDT traffic
1629# TRUE or FALSE (case-insensitive).
1630rdt.register_udp_port: FALSE
1631
1632# Set the UDP port for clients
1633# A decimal number.
1634rdt.default_udp_port: 6970
1635
1636# Whether the RPC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1637# TRUE or FALSE (case-insensitive).
1638rpc.desegment_rpc_over_tcp: TRUE
1639
1640# Whether the RPC dissector should defragment RPC-over-TCP messages.
1641# TRUE or FALSE (case-insensitive).
1642rpc.defragment_rpc_over_tcp: TRUE
1643
1644# Set the maximum size of RPCoverTCP PDUs. If the size field of the record marker is larger than this value it will not be considered a valid RPC PDU.
1645# A decimal number.
1646rpc.max_tcp_pdu_size: 262144
1647
1648# Whether the RPC dissector should attempt to dissect RPC PDUs containing programs that are not known to Wireshark. This will make the heuristics significantly weaker and elevate the risk for falsely identifying and misdissecting packets significantly.
1649# TRUE or FALSE (case-insensitive).
1650rpc.dissect_unknown_programs: FALSE
1651
1652# Whether the RPC dissector should attempt to locate RPC PDU boundaries when initial fragment alignment is not known. This may cause false positives, or slow operation.
1653# TRUE or FALSE (case-insensitive).
1654rpc.find_fragment_start: FALSE
1655
1656# Specifies whether Wireshark should decode and display sub-messages within BUNDLE messages
1657# TRUE or FALSE (case-insensitive).
1658rsvp.process_bundle: TRUE
1659
1660# Set the TCP port for RSYNC messages
1661# A decimal number.
1662rsync.tcp_port: 873
1663
1664# Whether the RSYNC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1665# TRUE or FALSE (case-insensitive).
1666rsync.desegment: TRUE
1667
1668# Where available, show which protocol and frame caused this RTCP stream to be created
1669# TRUE or FALSE (case-insensitive).
1670rtcp.show_setup_info: TRUE
1671
1672# If call control SIP/H.323/RTSP/.. messages are missing in the trace, RTCP isn't decoded without this
1673# TRUE or FALSE (case-insensitive).
1674rtcp.heuristic_rtcp: FALSE
1675
1676# Try to work out network delay by comparing time between packets as captured and delays as seen by endpoint
1677# TRUE or FALSE (case-insensitive).
1678rtcp.show_roundtrip_calculation: FALSE
1679
1680# Minimum (absolute) calculated roundtrip delay time in milliseconds that should be reported
1681# A decimal number.
1682rtcp.roundtrip_min_threshhold: 10
1683
1684# Whether the RTMPT dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1685# TRUE or FALSE (case-insensitive).
1686rtmpt.desegment: TRUE
1687
1688# Where available, show which protocol and frame caused this RTP stream to be created
1689# TRUE or FALSE (case-insensitive).
1690rtp.show_setup_info: TRUE
1691
1692# If call control SIP/H323/RTSP/.. messages are missing in the trace, RTP isn't decoded without this
1693# TRUE or FALSE (case-insensitive).
1694rtp.heuristic_rtp: FALSE
1695
1696# Whether subdissector can request RTP streams to be reassembled
1697# TRUE or FALSE (case-insensitive).
1698rtp.desegment_rtp_streams: TRUE
1699
1700# If an RTP version 0 packet is encountered, it can be treated as an invalid packet, a STUN packet, or a T.38 packet
1701# One of: Invalid RTP packets, STUN packets, T.38 packets
1702# (case-insensitive).
1703rtp.version0_type: Invalid RTP packets
1704
1705# Payload Type for RFC2198 Redundant Audio Data
1706# A decimal number.
1707rtp.rfc2198_payload_type: 99
1708
1709# This is the value of the Payload Type fieldthat specifies RTP Events
1710# A decimal number.
1711rtpevent.event_payload_type_value: 101
1712
1713# Whether segmented RTSE datagrams should be reassembled. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1714# TRUE or FALSE (case-insensitive).
1715rtse.reassemble: TRUE
1716
1717# Set the TCP port for RTSP messages
1718# A decimal number.
1719rtsp.tcp.port: 554
1720
1721# Set the alternate TCP port for RTSP messages
1722# A decimal number.
1723rtsp.tcp.alternate_port: 8554
1724
1725# Whether the RTSP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1726# TRUE or FALSE (case-insensitive).
1727rtsp.desegment_headers: TRUE
1728
1729# Whether the RTSP dissector should use the "Content-length:" value to desegment the body of a request spanning multiple TCP segments
1730# TRUE or FALSE (case-insensitive).
1731rtsp.desegment_body: TRUE
1732
1733# Set the UDP port for Reliable UDP traffic
1734# A decimal number.
1735rudp.udp.port: 0
1736
1737# Whether the S5066 dissector should reassemble PDUs spanning multiple TCP segments. The default is to use reassembly.
1738# TRUE or FALSE (case-insensitive).
1739s5066.desegment_pdus: TRUE
1740
1741# Whether the S5066 dissector should dissect editon 1 of the STANAG. This editon was never formally approved and is very rare. The common edition is editon 1.2.
1742# TRUE or FALSE (case-insensitive).
1743s5066.edition_one: FALSE
1744
1745# Set the port for STANAG 5066. (If other than the default 5066. This number is registered with IANA.)
1746# A decimal number.
1747s5066.tcp.port: 5066
1748
1749# The source point code (usually MSC) (to determine whether message is uplink or downlink)
1750# A hexadecimal number.
1751sccp.source_pc: 0
1752
1753# Show parameter length in the protocol tree
1754# TRUE or FALSE (case-insensitive).
1755sccp.show_length: FALSE
1756
1757# Whether XUDT messages should be reassembled
1758# TRUE or FALSE (case-insensitive).
1759sccp.defragment_xudt: TRUE
1760
1761# Whether to keep infomation about messages and their associations
1762# TRUE or FALSE (case-insensitive).
1763sccp.trace_sccp: FALSE
1764
1765# Show SLR, DLR, and CAUSE Parameters in the Information Column of the Summary
1766# TRUE or FALSE (case-insensitive).
1767sccp.show_more_info: FALSE
1768
1769# A table that enumerates user protocols to be used against specific PCs and SSNs
1770
1771# When Target Cannot Be Identified, Decode SCSI Messages As
1772# One of: Block Device, Sequential Device, Object Based Storage Device, Medium Changer Device, Multimedia Device
1773# (case-insensitive).
1774scsi.decode_scsi_messages_as: Block Device
1775
1776# Whether fragmented SCSI DATA IN/OUT transfers should be reassembled
1777# TRUE or FALSE (case-insensitive).
1778scsi.defragment: FALSE
1779
1780# Show source and destination port numbers in the protocol tree
1781# TRUE or FALSE (case-insensitive).
1782sctp.show_port_numbers_in_tree: TRUE
1783
1784# The type of checksum used in SCTP packets
1785# One of: None, Adler 32, CRC 32c, Automatic
1786# (case-insensitive).
1787sctp.checksum: CRC 32c
1788
1789# Show always SCTP control chunks in the Info column
1790# TRUE or FALSE (case-insensitive).
1791sctp.show_always_control_chunks: TRUE
1792
1793# Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port or PPI
1794# TRUE or FALSE (case-insensitive).
1795sctp.try_heuristic_first: FALSE
1796
1797# Whether fragmented SCTP user messages should be reassembled
1798# TRUE or FALSE (case-insensitive).
1799sctp.reassembly: FALSE
1800
1801# Match TSNs and their SACKs
1802# TRUE or FALSE (case-insensitive).
1803sctp.tsn_analysis: FALSE
1804
1805# Specifies that RTP/RTCP/T.38/MSRP/etc streams are decoded based upon port numbers found in SDP payload
1806# TRUE or FALSE (case-insensitive).
1807sdp.establish_conversation: TRUE
1808
1809# Set the port(s) for sFlow messages (default: 6343)
1810# A string denoting an positive integer range (e.g., "1-20,30-40").
1811sflow.ports: 6343
1812
1813# Enabling dissection makes it easy to view protocol details in each of the sampled headers. Disabling dissection may reduce noise caused when display filters match the contents of any sampled header(s).
1814# TRUE or FALSE (case-insensitive).
1815sflow.enable_dissection: TRUE
1816
1817# This option only makes sense if dissection of sampled headers is enabled and probably not even then.
1818# TRUE or FALSE (case-insensitive).
1819sflow.enable_analysis: FALSE
1820
1821# Set UDP port 1 for SigComp messages
1822# A decimal number.
1823sigcomp.udp.port: 5555
1824
1825# Set UDP port 2 for SigComp messages
1826# A decimal number.
1827sigcomp.udp.port2: 6666
1828
1829# Set TCP port 1 for SigComp messages
1830# A decimal number.
1831sigcomp.tcp.port: 5555
1832
1833# Set TCP port 2 for SigComp messages
1834# A decimal number.
1835sigcomp.tcp.port2: 6666
1836
1837# Preference whether to Dissect the UDVM code or not
1838# TRUE or FALSE (case-insensitive).
1839sigcomp.display.udvm.code: TRUE
1840
1841# preference whether to display the bytecode in UDVM operands or not
1842# TRUE or FALSE (case-insensitive).
1843sigcomp.display.bytecode: FALSE
1844
1845# preference whether to decompress message or not
1846# TRUE or FALSE (case-insensitive).
1847sigcomp.decomp.msg: TRUE
1848
1849# preference whether to display the decompressed message as raw text or not
1850# TRUE or FALSE (case-insensitive).
1851sigcomp.display.decomp.msg.as.txt: FALSE
1852
1853# 0 = UDVM executes silently, then increasing detail about execution of UDVM instructions, Warning! CPU intense at high detail
1854# One of: No-Printout, Low-detail, Medium-detail, High-detail
1855# (case-insensitive).
1856sigcomp.show.udvm.execution: No-Printout
1857
1858# SIP Server TCP Port
1859# A decimal number.
1860sip.tcp.port: 5060
1861
1862# SIP Server TLS Port
1863# A decimal number.
1864sip.tls.port: 5061
1865
1866# Specifies that the raw text of the SIP message should be displayed in addition to the dissection tree
1867# TRUE or FALSE (case-insensitive).
1868sip.display_raw_text: FALSE
1869
1870# If enabled, only SIP/2.0 traffic will be dissected as SIP. Disable it to allow SIP traffic with a different version to be dissected as SIP.
1871# TRUE or FALSE (case-insensitive).
1872sip.strict_sip_version: TRUE
1873
1874# Whether the SIP dissector should reassemble headers of a request spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1875# TRUE or FALSE (case-insensitive).
1876sip.desegment_headers: TRUE
1877
1878# Whether the SIP dissector should use the "Content-length:" value, if present, to reassemble the body of a request spanning multiple TCP segments, and reassemble chunked data spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1879# TRUE or FALSE (case-insensitive).
1880sip.desegment_body: TRUE
1881
1882# Whether the SCCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1883# TRUE or FALSE (case-insensitive).
1884skinny.desegment: TRUE
1885
1886# Whether the SoulSeek dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1887# TRUE or FALSE (case-insensitive).
1888slsk.desegment: TRUE
1889
1890# Whether the SoulSeek dissector should decompress all zlib compressed packets inside messages
1891# TRUE or FALSE (case-insensitive).
1892slsk.decompress: TRUE
1893
1894# Whether the dissector should reassemble the payload of SMB Transaction commands spanning multiple SMB PDUs
1895# TRUE or FALSE (case-insensitive).
1896smb.trans_reassembly: TRUE
1897
1898# Whether the dissector should reassemble DCERPC over SMB commands
1899# TRUE or FALSE (case-insensitive).
1900smb.dcerpc_reassembly: TRUE
1901
1902# Whether the dissector should snoop SMB and related CIFS protocols to discover and display Names associated with SIDs
1903# TRUE or FALSE (case-insensitive).
1904smb.sid_name_snooping: FALSE
1905
1906# Whether the SMPP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1907# TRUE or FALSE (case-insensitive).
1908smpp.reassemble_smpp_over_tcp: TRUE
1909
1910# Whether the SMTP dissector should reassemble command and response lines spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1911# TRUE or FALSE (case-insensitive).
1912smtp.desegment_lines: TRUE
1913
1914# Whether the SMTP dissector should reassemble DATA command and lines spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1915# TRUE or FALSE (case-insensitive).
1916smtp.desegment_data: TRUE
1917
1918# Whether fragmented BIUs should be reassembled
1919# TRUE or FALSE (case-insensitive).
1920sna.defragment: TRUE
1921
1922# Whether the SNMP OID should be shown in the info column
1923# TRUE or FALSE (case-insensitive).
1924snmp.display_oid: TRUE
1925
1926# Whether the SNMP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1927# TRUE or FALSE (case-insensitive).
1928snmp.desegment: TRUE
1929
1930# ON - display dissected variables inside SNMP tree, OFF - display dissected variables in root tree after SNMP
1931# TRUE or FALSE (case-insensitive).
1932snmp.var_in_tree: TRUE
1933
1934# Table of engine-user associations used for authentication and decryption
1935
1936# MIB settings can be changed in the Name Resolution preferences
1937
1938# Whether the SRVLOC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1939# TRUE or FALSE (case-insensitive).
1940srvloc.desegment_tcp: TRUE
1941
1942# Set the UDP port for SSCOP messages encapsulated in UDP (0 to disable)
1943# A string denoting an positive integer range (e.g., "1-20,30-40").
1944sscop.udp.ports:
1945
1946# SSCOP payload (dissector to call on SSCOP payload)
1947# One of: Data (no further dissection), Q.2931, SSCF-NNI (MTP3-b), ALCAP, NBAP
1948# (case-insensitive).
1949sscop.payload: Q.2931
1950
1951# Whether the SSH dissector should reassemble SSH buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1952# TRUE or FALSE (case-insensitive).
1953ssh.desegment_buffers: TRUE
1954
1955# Whether the SSL dissector should reassemble SSL records spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1956# TRUE or FALSE (case-insensitive).
1957ssl.desegment_ssl_records: TRUE
1958
1959# Whether the SSL dissector should reassemble SSL Application Data spanning multiple SSL records.
1960# TRUE or FALSE (case-insensitive).
1961ssl.desegment_ssl_application_data: TRUE
1962
1963# Whether the StarTeam dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1964# TRUE or FALSE (case-insensitive).
1965starteam.desegment: TRUE
1966
1967# Version used by Wireshark
1968# One of: Internet Draft version 08, RFC 3868
1969# (case-insensitive).
1970sua.version: RFC 3868
1971
1972# Whether the T.38 dissector should decode using the Pre-Corrigendum T.38 ASN.1 specification (1998).
1973# TRUE or FALSE (case-insensitive).
1974t38.use_pre_corrigendum_asn1_specification: TRUE
1975
1976# Whether a UDP packet that looks like RTP version 2 packet will be dissected as RTP packet or T.38 packet. If enabled there is a risk that T.38 UDPTL packets with sequence number higher than 32767 may be dissected as RTP.
1977# TRUE or FALSE (case-insensitive).
1978t38.dissect_possible_rtpv2_packets_as_rtp: FALSE
1979
1980# Set the TCP port for T.38 messages
1981# A decimal number.
1982t38.tcp.port: 6004
1983
1984# Set the UDP port for T.38 messages
1985# A decimal number.
1986t38.udp.port: 6004
1987
1988# Whether the dissector should reassemble T.38 PDUs spanning multiple TCP segments when TPKT is used over TCP. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
1989# TRUE or FALSE (case-insensitive).
1990t38.reassembly: TRUE
1991
1992# Whether T.38 is used with TPKT for TCP
1993# One of: Never, Always, Maybe
1994# (case-insensitive).
1995t38.tpkt_usage: Maybe
1996
1997# Where available, show which protocol and frame caused this T.38 stream to be created
1998# TRUE or FALSE (case-insensitive).
1999t38.show_setup_info: TRUE
2000
2001# Whether the TACACS+ dissector should reasssemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2002# TRUE or FALSE (case-insensitive).
2003tacplus.desegment: TRUE
2004
2005# TACACS+ Encryption Key
2006# A string.
2007tacplus.key:
2008
2009# Whether the TALI dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2010# TRUE or FALSE (case-insensitive).
2011tali.reassemble: TRUE
2012
2013# SCCP (and SUA) SSNs to decode as TCAP
2014# A string denoting an positive integer range (e.g., "1-20,30-40").
2015tcap.ssn:
2016
2017# Activate the analyse for Response Time
2018# TRUE or FALSE (case-insensitive).
2019tcap.srt: FALSE
2020
2021# Statistics for Response Time
2022# TRUE or FALSE (case-insensitive).
2023tcap.persistentsrt: FALSE
2024
2025# Maximal delay for message repetion
2026# A decimal number.
2027tcap.repetitiontimeout: 10
2028
2029# Maximal delay for message lost
2030# A decimal number.
2031tcap.losttimeout: 30
2032
2033# Whether the TCP summary line should be shown in the protocol tree
2034# TRUE or FALSE (case-insensitive).
2035tcp.summary_in_tree: TRUE
2036
2037# Whether to validate the TCP checksum
2038# TRUE or FALSE (case-insensitive).
2039tcp.check_checksum: TRUE
2040
2041# Whether subdissector can request TCP streams to be reassembled
2042# TRUE or FALSE (case-insensitive).
2043tcp.desegment_tcp_streams: TRUE
2044
2045# Make the TCP dissector analyze TCP sequence numbers to find and flag segment retransmissions, missing segments and RTT
2046# TRUE or FALSE (case-insensitive).
2047tcp.analyze_sequence_numbers: TRUE
2048
2049# Make the TCP dissector use relative sequence numbers instead of absolute ones. To use this option you must also enable "Analyze TCP sequence numbers". This option will also try to track and adjust the window field according to any TCP window scaling options seen.
2050# TRUE or FALSE (case-insensitive).
2051tcp.relative_sequence_numbers: TRUE
2052
2053# Calculate timestamps relative to the first frame and the previous frame in the tcp conversation
2054# TRUE or FALSE (case-insensitive).
2055tcp.calculate_timestamps: FALSE
2056
2057# Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port
2058# TRUE or FALSE (case-insensitive).
2059tcp.try_heuristic_first: FALSE
2060
2061# Set the port for IPSEC/ISAKMP messagesIf other than the default of 10000)
2062# A decimal number.
2063tcpencap.tcp.port: 10000
2064
2065# Whether the TDS dissector should reassemble TDS buffers spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2066# TRUE or FALSE (case-insensitive).
2067tds.desegment_buffers: TRUE
2068
2069# Whether the TDS dissector should defragment messages spanning multiple Netlib buffers
2070# TRUE or FALSE (case-insensitive).
2071tds.defragment: TRUE
2072
2073# Hint as to version of TDS protocol being decoded
2074# One of: Not Specified, TDS 4, TDS 5, TDS 7, TDS 8
2075# (case-insensitive).
2076tds.protocol_type: Not Specified
2077
2078# Hint as to whether to decode TDS protocol as little-endian or big-endian. (TDS7/8 always decoded as little-endian)
2079# One of: Little Endian, Big Endian
2080# (case-insensitive).
2081tds.endian_type: Little Endian
2082
2083# Additional TCP ports to decode as TDS
2084# A string denoting an positive integer range (e.g., "1-20,30-40").
2085tds.tcp_ports:
2086
2087# Check this to decode IPv6 traffic between Teredo clients and relays
2088# TRUE or FALSE (case-insensitive).
2089teredo.heuristic_teredo: FALSE
2090
2091# Whether TIPCv1 SEGMENTATION_MANAGER datagrams should be reassembled
2092# TRUE or FALSE (case-insensitive).
2093tipc.defragment: TRUE
2094
2095# Whether to try to dissect TIPC data or not
2096# TRUE or FALSE (case-insensitive).
2097tipc.dissect_tipc_data: TRUE
2098
2099# Try to decode a TIPCv2 packet using an heuristic sub-dissector before using a registered sub-dissector
2100# TRUE or FALSE (case-insensitive).
2101tipc.try_heuristic_first: FALSE
2102
2103# TIPC 1.7 removes/adds fields (not) available in TIPC 1.5/1.6 while keeping the version number 2 in the packages. "ALL" shows all fields that were ever used in both versions.
2104# One of: ALL, TIPC 1.5/1.6, TIPC 1.7
2105# (case-insensitive).
2106tipc.handle_v2_as: ALL
2107
2108# Decode this TCP ports traffic as TIPC. Set to "0" to disable.
2109# A decimal number.
2110tipc.alternate_port: 0
2111
2112# Whether the TIPC-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2113# TRUE or FALSE (case-insensitive).
2114tipc.desegment: TRUE
2115
2116# Whether the TNS dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2117# TRUE or FALSE (case-insensitive).
2118tns.desegment_tns_messages: TRUE
2119
2120# Whether the TPKT dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2121# TRUE or FALSE (case-insensitive).
2122tpkt.desegment: TRUE
2123
2124#
2125# A decimal number.
2126tpncp.tcp.trunkpack_port: 2424
2127
2128#
2129# A decimal number.
2130tpncp.udp.trunkpack_port: 2424
2131
2132# Whether Linux mangling of the link-layer header should be checked for and worked around
2133# TRUE or FALSE (case-insensitive).
2134tr.fix_linux_botches: FALSE
2135
2136# Whether the UCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2137# TRUE or FALSE (case-insensitive).
2138ucp.desegment_ucp_messages: TRUE
2139
2140# Whether the UDP summary line should be shown in the protocol tree
2141# TRUE or FALSE (case-insensitive).
2142udp.summary_in_tree: TRUE
2143
2144# Try to decode a packet using an heuristic sub-dissector before using a sub-dissector registered to a specific port
2145# TRUE or FALSE (case-insensitive).
2146udp.try_heuristic_first: FALSE
2147
2148# Whether to validate the UDP checksum
2149# TRUE or FALSE (case-insensitive).
2150udp.check_checksum: TRUE
2151
2152# Ignore an invalid checksum coverage field and continue dissection
2153# TRUE or FALSE (case-insensitive).
2154udplite.ignore_checksum_coverage: TRUE
2155
2156# Whether to validate the UDPlite checksum
2157# TRUE or FALSE (case-insensitive).
2158udplite.check_checksum: TRUE
2159
2160# Whether the ULP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2161# TRUE or FALSE (case-insensitive).
2162ulp.desegment_ulp_messages: TRUE
2163
2164# Set the TCP port for Ulp messages(IANA registerd port is 7275)
2165# A decimal number.
2166ulp.tcp.port: 7275
2167
2168# Whether the UMA dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2169# TRUE or FALSE (case-insensitive).
2170uma.desegment_ucp_messages: TRUE
2171
2172# TCP ports to be decoded as UMA (default: 14001,14001)
2173# A string denoting an positive integer range (e.g., "1-20,30-40").
2174uma.udp.ports: 14001,14001
2175
2176# A table that enumerates the various protocols to be used against a cartain user DLT
2177
2178# Whether the vlan summary line should be shown in the protocol tree
2179# TRUE or FALSE (case-insensitive).
2180vlan.summary_in_tree: TRUE
2181
2182# The Ethertype used to indicate 802.1QinQ VLAN in VLAN tunneling.
2183# A hexadecimal number.
2184vlan.qinq_ethertype: 0x9100
2185
2186# Whether the VNC dissector should reasss emble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2187# TRUE or FALSE (case-insensitive).
2188vnc.desegment: TRUE
2189
2190# Decode this port's traffic as VNC in addition to the default ports (5500, 5501, 5900, 5901)
2191# A decimal number.
2192vnc.alternate_port: 0
2193
2194# Enable this preference if you want to view the WBXML tokens without the representation in a media type (e.g., WML). Tokens will show up as Tag_0x12, attrStart_0x08 or attrValue_0x0B for example.
2195# TRUE or FALSE (case-insensitive).
2196wbxml.skip_wbxml_token_mapping: FALSE
2197
2198# Enable this preference if you want to skip the parsing of the WBXML tokens that constitute the body of the WBXML document. Only the WBXML header will be dissected (and visualized) then.
2199# TRUE or FALSE (case-insensitive).
2200wbxml.disable_wbxml_token_parsing: FALSE
2201
2202# Show transaction ID direction bit separately from the rest of the transaction ID field.
2203# TRUE or FALSE (case-insensitive).
2204wimaxasncp.show_transaction_id_d_bit: FALSE
2205
2206# Print debug output to the console.
2207# TRUE or FALSE (case-insensitive).
2208wimaxasncp.debug_enabled: FALSE
2209
2210# Set UDP port for WiMAX ASN Control Plane Protocol
2211# A decimal number.
2212wimaxasncp.udp.wimax_port: 2231
2213
2214# Whether the WINS-Replication dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2215# TRUE or FALSE (case-insensitive).
2216winsrepl.reassemble: TRUE
2217
2218# Whether fragmented 802.11 datagrams should be reassembled
2219# TRUE or FALSE (case-insensitive).
2220wlan.defragment: TRUE
2221
2222# Don't dissect 802.11n draft HT elements (which might contain duplicate information).
2223# TRUE or FALSE (case-insensitive).
2224wlan.ignore_draft_ht: FALSE
2225
2226# Whether retransmitted 802.11 frames should be subdissected
2227# TRUE or FALSE (case-insensitive).
2228wlan.retransmitted: TRUE
2229
2230# Some 802.11 cards include the FCS at the end of a packet, others do not.
2231# TRUE or FALSE (case-insensitive).
2232wlan.check_fcs: FALSE
2233
2234# Some 802.11 cards leave the Protection bit set even though the packet is decrypted, and some also leave the IV (initialization vector).
2235# One of: No, Yes - without IV, Yes - with IV
2236# (case-insensitive).
2237wlan.ignore_wep: No
2238
2239# Enable WEP and WPA/WPA2 decryption
2240# TRUE or FALSE (case-insensitive).
2241wlan.enable_decryption: FALSE
2242
2243# Valid key formats
2244
2245# Key #1 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2246# A string.
2247wlan.wep_key1:
2248
2249# Key #2 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2250# A string.
2251wlan.wep_key2:
2252
2253# Key #3 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2254# A string.
2255wlan.wep_key3:
2256
2257# Key #4 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2258# A string.
2259wlan.wep_key4:
2260
2261# Key #5 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2262# A string.
2263wlan.wep_key5:
2264
2265# Key #6 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2266# A string.
2267wlan.wep_key6:
2268
2269# Key #7 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2270# A string.
2271wlan.wep_key7:
2272
2273# Key #8 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2274# A string.
2275wlan.wep_key8:
2276
2277# Key #9 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2278# A string.
2279wlan.wep_key9:
2280
2281# Key #10 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2282# A string.
2283wlan.wep_key10:
2284
2285# Key #11 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2286# A string.
2287wlan.wep_key11:
2288
2289# Key #12 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2290# A string.
2291wlan.wep_key12:
2292
2293# Key #13 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2294# A string.
2295wlan.wep_key13:
2296
2297# Key #14 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2298# A string.
2299wlan.wep_key14:
2300
2301# Key #15 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2302# A string.
2303wlan.wep_key15:
2304
2305# Key #16 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2306# A string.
2307wlan.wep_key16:
2308
2309# Key #17 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2310# A string.
2311wlan.wep_key17:
2312
2313# Key #18 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2314# A string.
2315wlan.wep_key18:
2316
2317# Key #19 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2318# A string.
2319wlan.wep_key19:
2320
2321# Key #20 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2322# A string.
2323wlan.wep_key20:
2324
2325# Key #21 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2326# A string.
2327wlan.wep_key21:
2328
2329# Key #22 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2330# A string.
2331wlan.wep_key22:
2332
2333# Key #23 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2334# A string.
2335wlan.wep_key23:
2336
2337# Key #24 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2338# A string.
2339wlan.wep_key24:
2340
2341# Key #25 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2342# A string.
2343wlan.wep_key25:
2344
2345# Key #26 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2346# A string.
2347wlan.wep_key26:
2348
2349# Key #27 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2350# A string.
2351wlan.wep_key27:
2352
2353# Key #28 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2354# A string.
2355wlan.wep_key28:
2356
2357# Key #29 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2358# A string.
2359wlan.wep_key29:
2360
2361# Key #30 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2362# A string.
2363wlan.wep_key30:
2364
2365# Key #31 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2366# A string.
2367wlan.wep_key31:
2368
2369# Key #32 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2370# A string.
2371wlan.wep_key32:
2372
2373# Key #33 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2374# A string.
2375wlan.wep_key33:
2376
2377# Key #34 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2378# A string.
2379wlan.wep_key34:
2380
2381# Key #35 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2382# A string.
2383wlan.wep_key35:
2384
2385# Key #36 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2386# A string.
2387wlan.wep_key36:
2388
2389# Key #37 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2390# A string.
2391wlan.wep_key37:
2392
2393# Key #38 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2394# A string.
2395wlan.wep_key38:
2396
2397# Key #39 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2398# A string.
2399wlan.wep_key39:
2400
2401# Key #40 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2402# A string.
2403wlan.wep_key40:
2404
2405# Key #41 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2406# A string.
2407wlan.wep_key41:
2408
2409# Key #42 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2410# A string.
2411wlan.wep_key42:
2412
2413# Key #43 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2414# A string.
2415wlan.wep_key43:
2416
2417# Key #44 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2418# A string.
2419wlan.wep_key44:
2420
2421# Key #45 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2422# A string.
2423wlan.wep_key45:
2424
2425# Key #46 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2426# A string.
2427wlan.wep_key46:
2428
2429# Key #47 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2430# A string.
2431wlan.wep_key47:
2432
2433# Key #48 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2434# A string.
2435wlan.wep_key48:
2436
2437# Key #49 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2438# A string.
2439wlan.wep_key49:
2440
2441# Key #50 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2442# A string.
2443wlan.wep_key50:
2444
2445# Key #51 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2446# A string.
2447wlan.wep_key51:
2448
2449# Key #52 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2450# A string.
2451wlan.wep_key52:
2452
2453# Key #53 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2454# A string.
2455wlan.wep_key53:
2456
2457# Key #54 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2458# A string.
2459wlan.wep_key54:
2460
2461# Key #55 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2462# A string.
2463wlan.wep_key55:
2464
2465# Key #56 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2466# A string.
2467wlan.wep_key56:
2468
2469# Key #57 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2470# A string.
2471wlan.wep_key57:
2472
2473# Key #58 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2474# A string.
2475wlan.wep_key58:
2476
2477# Key #59 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2478# A string.
2479wlan.wep_key59:
2480
2481# Key #60 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2482# A string.
2483wlan.wep_key60:
2484
2485# Key #61 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2486# A string.
2487wlan.wep_key61:
2488
2489# Key #62 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2490# A string.
2491wlan.wep_key62:
2492
2493# Key #63 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2494# A string.
2495wlan.wep_key63:
2496
2497# Key #64 string can be: <wep hexadecimal key>; wep:<wep hexadecimal key>; wpa-pwd:<passphrase>[:<ssid>]; wpa-psk:<wpa hexadecimal key>
2498# A string.
2499wlan.wep_key64:
2500
2501# Set the maximum Basic CID used in the Wimax decoder (if other than the default of 320). Note: The maximum Primary CID is double the maximum Basic CID.
2502# A decimal number.
2503wmx.basic_cid_max: 320
2504
2505# Set to TRUE to use the Corrigendum 2 version of Wimax message decoding. Set to FALSE to use the 802.16e-2005 version.
2506# TRUE or FALSE (case-insensitive).
2507wmx.corrigendum_2_version: FALSE
2508
2509# If CALL REQUEST not seen or didn't specify protocol, dissect as QLLC/SNA
2510# TRUE or FALSE (case-insensitive).
2511x.25.payload_is_qllc_sna: FALSE
2512
2513# If CALL REQUEST has no data, assume the protocol handled is COTP
2514# TRUE or FALSE (case-insensitive).
2515x.25.call_request_nodata_is_cotp: FALSE
2516
2517# If CALL REQUEST not seen or didn't specify protocol, check user data before checking heuristic dissectors
2518# TRUE or FALSE (case-insensitive).
2519x.25.payload_check_data: FALSE
2520
2521# Reassemble fragmented X.25 packets
2522# TRUE or FALSE (case-insensitive).
2523x.25.reassemble: TRUE
2524
2525# Whether the X11 dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2526# TRUE or FALSE (case-insensitive).
2527x11.desegment: TRUE
2528
2529# Set the port for P1 operations (if other than the default of 102)
2530# A decimal number.
2531x411.tcp.port: 102
2532
2533# Try to recognize XML for unknown media types
2534# TRUE or FALSE (case-insensitive).
2535xml.heuristic: FALSE
2536
2537# Try to recognize XML for unknown TCP ports
2538# TRUE or FALSE (case-insensitive).
2539xml.heuristic_tcp: FALSE
2540
2541# TCP Ports range
2542# A string denoting an positive integer range (e.g., "1-20,30-40").
2543xml.tcp.port:
2544
2545# Try to recognize XML for unknown UDP ports
2546# TRUE or FALSE (case-insensitive).
2547xml.heuristic_udp: FALSE
2548
2549# Whether the X.25-over-TCP dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2550# TRUE or FALSE (case-insensitive).
2551xot.desegment: TRUE
2552
2553# Whether the YMSG dissector should reasssemble messages spanning multiple TCP segments. To use this option, you must also enable "Allow subdissectors to reassemble TCP streams" in the TCP protocol settings.
2554# TRUE or FALSE (case-insensitive).
2555ymsg.desegment: TRUE