forked from the-tcpdump-group/tcpdump-htdocs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtcpdump.1.html
2642 lines (2037 loc) · 69.2 KB
/
tcpdump.1.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML><HEAD><TITLE>Man page of TCPDUMP</TITLE>
<LINK REL="stylesheet" type="text/css" href="../style_manpages.css">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</HEAD><BODY>
<H1>Man page of TCPDUMP</H1>
Section: User Commands (1)<BR>Updated: 21 December 2020<BR><A HREF="#index">Index</A>
<A HREF="/manpages/">Return to Main Contents</A><HR>
<A NAME="lbAB"> </A>
<H2>NAME</H2>
tcpdump - dump traffic on a network
<A NAME="lbAC"> </A>
<H2>SYNOPSIS</H2>
<B>tcpdump</B>
[
<B>-AbdDefhHIJKlLnNOpqStuUvxX#</B>
] [
<B>-B</B>
<I>buffer_size</I>
]
<BR>
<BR>
[
<B>-c</B>
<I>count</I>
]
[
<B>--count</B>
]
[
<B>-C</B>
<I>file_size</I>
]
<BR>
[
<B>-E</B>
<I><A HREF="mailto:spi@ipaddr">spi@ipaddr</A> algo:secret,...</I>
]
<BR>
[
<B>-F</B>
<I>file</I>
]
[
<B>-G</B>
<I>rotate_seconds</I>
]
[
<B>-i</B>
<I>interface</I>
]
<BR>
[
<B>--immediate-mode</B>
]
[
<B>-j</B>
<I>tstamp_type</I>
]
[
<B>-m</B>
<I>module</I>
]
<BR>
[
<B>-M</B>
<I>secret</I>
]
[
<B>--number</B>
]
[
<B>--print</B>
]
[
<B>-Q</B>
<I>in|out|inout</I>
]
<BR>
[
<B>-r</B>
<I>file</I>
]
[
<B>-s</B>
<I>snaplen</I>
]
[
<B>-T</B>
<I>type</I>
]
[
<B>--version</B>
]
<BR>
[
<B>-V</B>
<I>file</I>
]
[
<B>-w</B>
<I>file</I>
]
[
<B>-W</B>
<I>filecount</I>
]
[
<B>-y</B>
<I>datalinktype</I>
]
<BR>
[
<B>-z</B>
<I>postrotate-command</I>
]
[
<B>-Z</B>
<I>user</I>
]
<BR>
[
<B>--time-stamp-precision=</B><I>tstamp_precision</I>
]
<BR>
[
<B>--micro</B>
]
[
<B>--nano</B>
]
<BR>
[
<I>expression</I>
]
<BR>
<A NAME="lbAD"> </A>
<H2>DESCRIPTION</H2>
<P>
<I>Tcpdump</I> prints out a description of the contents of packets on a
network interface that match the Boolean <I>expression</I>; the
description is preceded by a time stamp, printed, by default, as hours,
minutes, seconds, and fractions of a second since midnight. It can also
be run with the
<B>-w</B>
flag, which causes it to save the packet data to a file for later
analysis, and/or with the
<B>-r</B>
flag, which causes it to read from a saved packet file rather than to
read packets from a network interface. It can also be run with the
<B>-V</B>
flag, which causes it to read a list of saved packet files. In all cases,
only packets that match
<I>expression</I>
will be processed by
<I>tcpdump</I>.
<P>
<I>Tcpdump</I>
will, if not run with the
<B>-c</B>
flag, continue capturing packets until it is interrupted by a SIGINT
signal (generated, for example, by typing your interrupt character,
typically control-C) or a SIGTERM signal (typically generated with the
<B>kill</B>(1)
command); if run with the
<B>-c</B>
flag, it will capture packets until it is interrupted by a SIGINT or
SIGTERM signal or the specified number of packets have been processed.
<P>
When
<I>tcpdump</I>
finishes capturing packets, it will report counts of:
<DL COMPACT>
<DT><DD>
packets ``captured'' (this is the number of packets that
<I>tcpdump</I>
has received and processed);
<DT><DD>
packets ``received by filter'' (the meaning of this depends on the OS on
which you're running
<I>tcpdump</I>,
and possibly on the way the OS was configured - if a filter was
specified on the command line, on some OSes it counts packets regardless
of whether they were matched by the filter expression and, even if they
were matched by the filter expression, regardless of whether
<I>tcpdump</I>
has read and processed them yet, on other OSes it counts only packets that were
matched by the filter expression regardless of whether
<I>tcpdump</I>
has read and processed them yet, and on other OSes it counts only
packets that were matched by the filter expression and were processed by
<I>tcpdump</I>);
<DT><DD>
packets ``dropped by kernel'' (this is the number of packets that were
dropped, due to a lack of buffer space, by the packet capture mechanism
in the OS on which
<I>tcpdump</I>
is running, if the OS reports that information to applications; if not,
it will be reported as 0).
</DL>
<P>
On platforms that support the SIGINFO signal, such as most BSDs
(including macOS) and Digital/Tru64 UNIX, it will report those counts
when it receives a SIGINFO signal (generated, for example, by typing
your ``status'' character, typically control-T, although on some
platforms, such as macOS, the ``status'' character is not set by
default, so you must set it with
<B>stty</B>(1)
in order to use it) and will continue capturing packets. On platforms that
do not support the SIGINFO signal, the same can be achieved by using the
SIGUSR1 signal.
<P>
Using the SIGUSR2 signal along with the
<B>-w</B>
flag will forcibly flush the packet buffer into the output file.
<P>
Reading packets from a network interface may require that you have
special privileges; see the
<A HREF='/manpages/pcap.3pcap.html'><B>pcap</B></A>(3PCAP)
man page for details. Reading a saved packet file doesn't require
special privileges.
<A NAME="lbAE"> </A>
<H2>OPTIONS</H2>
<DL COMPACT>
<DT><B>-A</B>
<DD>
Print each packet (minus its link level header) in ASCII. Handy for
capturing web pages.
<DT><B>-b</B>
<DD>
Print the AS number in BGP packets in ASDOT notation rather than ASPLAIN
notation.
<DT><B>-B</B><I> buffer_size</I>
<DD>
<DT><B>--buffer-size=</B><I>buffer_size</I>
<DD>
Set the operating system capture buffer size to <I>buffer_size</I>, in
units of KiB (1024 bytes).
<DT><B>-c</B><I> count</I>
<DD>
Exit after receiving <I>count</I> packets.
<DT><B>--count</B>
<DD>
Print only on stderr the packet count when reading capture file(s) instead
of parsing/printing the packets. If a filter is specified on the command
line, <I>tcpdump</I> counts only packets that were matched by the filter
expression.
<DT><B>-C</B><I> file_size</I>
<DD>
Before writing a raw packet to a savefile, check whether the file is
currently larger than <I>file_size</I> and, if so, close the current
savefile and open a new one. Savefiles after the first savefile will
have the name specified with the
<B>-w</B>
flag, with a number after it, starting at 1 and continuing upward.
The units of <I>file_size</I> are millions of bytes (1,000,000 bytes,
not 1,048,576 bytes).
<DT><B>-d</B>
<DD>
Dump the compiled packet-matching code in a human readable form to
standard output and stop.
<DT><DD>
Please mind that although code compilation is always DLT-specific,
typically it is impossible (and unnecessary) to specify which DLT to use
for the dump because <I>tcpdump</I> uses either the DLT of the input pcap
file specified with
<B>-r</B>,
or the default DLT of the network interface specified with
<B>-i</B>,
or the particular DLT of the network interface specified with
<B>-y</B>
and
<B>-i</B>
respectively. In these cases the dump shows the same exact code that
would filter the input file or the network interface without
<B>-d</B>.
<DT><DD>
However, when neither
<B>-r</B>
nor
<B>-i</B>
is specified, specifying
<B>-d</B>
prevents <I>tcpdump</I> from guessing a suitable network interface (see
<B>-i</B>).
In this case the DLT defaults to EN10MB and can be set to another valid
value manually with
<B>-y</B>.
<DT><B>-dd</B>
<DD>
Dump packet-matching code as a
<B>C</B>
program fragment.
<DT><B>-ddd</B>
<DD>
Dump packet-matching code as decimal numbers (preceded with a count).
<DT><B>-D</B>
<DD>
<DT><B>--list-interfaces</B>
<DD>
Print the list of the network interfaces available on the system and on
which
<I>tcpdump</I>
can capture packets. For each network interface, a number and an
interface name, possibly followed by a text description of the
interface, are printed. The interface name or the number can be supplied
to the
<B>-i</B>
flag to specify an interface on which to capture.
<DT><DD>
This can be useful on systems that don't have a command to list them
(e.g., Windows systems, or UNIX systems lacking
<B>ifconfig -a</B>);
the number can be useful on Windows 2000 and later systems, where the
interface name is a somewhat complex string.
<DT><DD>
The
<B>-D</B>
flag will not be supported if
<I>tcpdump</I>
was built with an older version of
<I>libpcap</I>
that lacks the
<B><A HREF='/manpages/pcap_findalldevs.3pcap.html'>pcap_findalldevs</A>(3PCAP)</B>
function.
<DT><B>-e</B>
<DD>
Print the link-level header on each dump line. This can be used, for
example, to print MAC layer addresses for protocols such as Ethernet and
IEEE 802.11.
<DT><B>-E</B>
<DD>
Use <I><A HREF="mailto:spi@ipaddr">spi@ipaddr</A> algo:secret</I> for decrypting IPsec ESP packets that
are addressed to <I>addr</I> and contain Security Parameter Index value
<I>spi</I>. This combination may be repeated with comma or newline separation.
<DT><DD>
Note that setting the secret for IPv4 ESP packets is supported at this time.
<DT><DD>
Algorithms may be
<B>des-cbc</B>,
<B>3des-cbc</B>,
<B>blowfish-cbc</B>,
<B>rc3-cbc</B>,
<B>cast128-cbc</B>, or
<B>none</B>.
The default is <B>des-cbc</B>.
The ability to decrypt packets is only present if <I>tcpdump</I> was compiled
with cryptography enabled.
<DT><DD>
<I>secret</I> is the ASCII text for ESP secret key.
If preceded by 0x, then a hex value will be read.
<DT><DD>
The option assumes RFC2406 ESP, not RFC1827 ESP.
The option is only for debugging purposes, and
the use of this option with a true `secret' key is discouraged.
By presenting IPsec secret key onto command line
you make it visible to others, via
<I>ps</I>(1)
and other occasions.
<DT><DD>
In addition to the above syntax, the syntax <I>file name</I> may be used
to have tcpdump read the provided file in. The file is opened upon
receiving the first ESP packet, so any special permissions that tcpdump
may have been given should already have been given up.
<DT><B>-f</B>
<DD>
Print `foreign' IPv4 addresses numerically rather than symbolically
(this option is intended to get around serious brain damage in
Sun's NIS server --- usually it hangs forever translating non-local
internet numbers).
<DT><DD>
The test for `foreign' IPv4 addresses is done using the IPv4 address and
netmask of the interface on which capture is being done. If that
address or netmask are not available, available, either because the
interface on which capture is being done has no address or netmask or
because the capture is being done on the Linux "any" interface, which
can capture on more than one interface, this option will not work
correctly.
<DT><B>-F</B><I> file</I>
<DD>
Use <I>file</I> as input for the filter expression.
An additional expression given on the command line is ignored.
<DT><B>-G</B><I> rotate_seconds</I>
<DD>
If specified, rotates the dump file specified with the
<B>-w</B>
option every <I>rotate_seconds</I> seconds.
Savefiles will have the name specified by
<B>-w</B>
which should include a time format as defined by
<B>strftime</B>(3).
If no time format is specified, each new file will overwrite the previous.
Whenever a generated filename is not unique, tcpdump will overwrite the
pre-existing data; providing a time specification that is coarser than the
capture period is therefore not advised.
<DT><DD>
If used in conjunction with the
<B>-C</B>
option, filenames will take the form of `<I>file</I><count>'.
<DT><B>-h</B>
<DD>
<DT><B>--help</B>
<DD>
Print the tcpdump and libpcap version strings, print a usage message,
and exit.
<DT><B>--version</B>
<DD>
Print the tcpdump and libpcap version strings and exit.
<DT><B>-H</B>
<DD>
Attempt to detect 802.11s draft mesh headers.
<DT><B>-i</B><I> interface</I>
<DD>
<DT><B>--interface=</B><I>interface</I>
<DD>
Listen, report the list of link-layer types, report the list of time
stamp types, or report the results of compiling a filter expression on
<I>interface</I>. If unspecified and if the
<B>-d</B>
flag is not given, <I>tcpdump</I> searches the system
interface list for the lowest numbered, configured up interface
(excluding loopback), which may turn out to be, for example, ``eth0''.
<DT><DD>
On Linux systems with 2.2 or later kernels, an
<I>interface</I>
argument of ``any'' can be used to capture packets from all interfaces.
Note that captures on the ``any'' device will not be done in promiscuous
mode.
<DT><DD>
If the
<B>-D</B>
flag is supported, an interface number as printed by that flag can be
used as the
<I>interface</I>
argument, if no interface on the system has that number as a name.
<DT><B>-I</B>
<DD>
<DT><B>--monitor-mode</B>
<DD>
Put the interface in "monitor mode"; this is supported only on IEEE
802.11 Wi-Fi interfaces, and supported only on some operating systems.
<DT><DD>
Note that in monitor mode the adapter might disassociate from the
network with which it's associated, so that you will not be able to use
any wireless networks with that adapter. This could prevent accessing
files on a network server, or resolving host names or network addresses,
if you are capturing in monitor mode and are not connected to another
network with another adapter.
<DT><DD>
This flag will affect the output of the
<B>-L</B>
flag. If
<B>-I</B>
isn't specified, only those link-layer types available when not in
monitor mode will be shown; if
<B>-I</B>
is specified, only those link-layer types available when in monitor mode
will be shown.
<DT><B>--immediate-mode</B>
<DD>
Capture in "immediate mode". In this mode, packets are delivered to
tcpdump as soon as they arrive, rather than being buffered for
efficiency. This is the default when printing packets rather than
saving packets to a ``savefile'' if the packets are being printed to a
terminal rather than to a file or pipe.
<DT><B>-j</B><I> tstamp_type</I>
<DD>
<DT><B>--time-stamp-type=</B><I>tstamp_type</I>
<DD>
Set the time stamp type for the capture to <I>tstamp_type</I>. The names
to use for the time stamp types are given in
<B><A HREF="/manpages/pcap-tstamp.7.html">pcap-tstamp</A></B>(7);
not all the types listed there will necessarily be valid for any given
interface.
<DT><B>-J</B>
<DD>
<DT><B>--list-time-stamp-types</B>
<DD>
List the supported time stamp types for the interface and exit. If the
time stamp type cannot be set for the interface, no time stamp types are
listed.
<DT><B>--time-stamp-precision=</B><I>tstamp_precision</I>
<DD>
When capturing, set the time stamp precision for the capture to
<I>tstamp_precision</I>. Note that availability of high precision time
stamps (nanoseconds) and their actual accuracy is platform and hardware
dependent. Also note that when writing captures made with nanosecond
accuracy to a savefile, the time stamps are written with nanosecond
resolution, and the file is written with a different magic number, to
indicate that the time stamps are in seconds and nanoseconds; not all
programs that read pcap savefiles will be able to read those captures.
<DT><DD>
When reading a savefile, convert time stamps to the precision specified
by <I>timestamp_precision</I>, and display them with that resolution. If
the precision specified is less than the precision of time stamps in the
file, the conversion will lose precision.
<DT><DD>
The supported values for <I>timestamp_precision</I> are <B>micro</B> for
microsecond resolution and <B>nano</B> for nanosecond resolution. The
default is microsecond resolution.
<DT><B>--micro</B>
<DD>
<DT><B>--nano</B>
<DD>
Shorthands for <B>--time-stamp-precision=micro</B> or
<B>--time-stamp-precision=nano</B>, adjusting the time stamp
precision accordingly. When reading packets from a savefile, using
<B>--micro</B> truncates time stamps if the savefile was created with
nanosecond precision. In contrast, a savefile created with microsecond
precision will have trailing zeroes added to the time stamp when
<B>--nano</B> is used.
<DT><B>-K</B>
<DD>
<DT><B>--dont-verify-checksums</B>
<DD>
Don't attempt to verify IP, TCP, or UDP checksums. This is useful for
interfaces that perform some or all of those checksum calculation in
hardware; otherwise, all outgoing TCP checksums will be flagged as bad.
<DT><B>-l</B>
<DD>
Make stdout line buffered.
Useful if you want to see the data
while capturing it.
E.g.,
<DT><DD>
<DL COMPACT><DT><DD>
<DL COMPACT><DT><DD>
<PRE>
<B>tcpdump -l | tee dat</B>
</PRE>
</DL>
</DL>
<DT><DD>
or
<DT><DD>
<DL COMPACT><DT><DD>
<DL COMPACT><DT><DD>
<PRE>
<B>tcpdump -l > dat & tail -f dat</B>
</PRE>
</DL>
</DL>
<DT><DD>
Note that on Windows,``line buffered'' means ``unbuffered'', so that
WinDump will write each character individually if
<B>-l</B>
is specified.
<DT><DD>
<B>-U</B>
is similar to
<B>-l</B>
in its behavior, but it will cause output to be ``packet-buffered'', so
that the output is written to stdout at the end of each packet rather
than at the end of each line; this is buffered on all platforms,
including Windows.
<DT><B>-L</B>
<DD>
<DT><B>--list-data-link-types</B>
<DD>
List the known data link types for the interface, in the specified mode,
and exit. The list of known data link types may be dependent on the
specified mode; for example, on some platforms, a Wi-Fi interface might
support one set of data link types when not in monitor mode (for
example, it might support only fake Ethernet headers, or might support
802.11 headers but not support 802.11 headers with radio information)
and another set of data link types when in monitor mode (for example, it
might support 802.11 headers, or 802.11 headers with radio information,
only in monitor mode).
<DT><B>-m</B><I> module</I>
<DD>
Load SMI MIB module definitions from file <I>module</I>.
This option
can be used several times to load several MIB modules into <I>tcpdump</I>.
<DT><B>-M</B><I> secret</I>
<DD>
Use <I>secret</I> as a shared secret for validating the digests found in
TCP segments with the TCP-MD5 option (RFC 2385), if present.
<DT><B>-n</B>
<DD>
Don't convert addresses (i.e., host addresses, port numbers, etc.) to names.
<DT><B>-N</B>
<DD>
Don't print domain name qualification of host names.
E.g.,
if you give this flag then <I>tcpdump</I> will print ``nic''
instead of ``nic.ddn.mil''.
<DT><B>-#</B>
<DD>
<DT><B>--number</B>
<DD>
Print an optional packet number at the beginning of the line.
<DT><B>-O</B>
<DD>
<DT><B>--no-optimize</B>
<DD>
Do not run the packet-matching code optimizer.
This is useful only
if you suspect a bug in the optimizer.
<DT><B>-p</B>
<DD>
<DT><B>--no-promiscuous-mode</B>
<DD>
<I>Don't</I> put the interface
into promiscuous mode.
Note that the interface might be in promiscuous
mode for some other reason; hence, `-p' cannot be used as an abbreviation for
`ether host {local-hw-addr} or ether broadcast'.
<DT><B>--print</B>
<DD>
Print parsed packet output, even if the raw packets are being saved to a
file with the
<B>-w</B>
flag.
<DT><B>-Q</B><I> direction</I>
<DD>
<DT><B>--direction=</B><I>direction</I>
<DD>
Choose send/receive direction <I>direction</I> for which packets should be
captured. Possible values are `in', `out' and `inout'. Not available
on all platforms.
<DT><B>-q</B>
<DD>
Quick (quiet?) output.
Print less protocol information so output
lines are shorter.
<DT><B>-r</B><I> file</I>
<DD>
Read packets from <I>file</I> (which was created with the
<B>-w</B>
option or by other tools that write pcap or pcapng files).
Standard input is used if <I>file</I> is ``-''.
<DT><B>-S</B>
<DD>
<DT><B>--absolute-tcp-sequence-numbers</B>
<DD>
Print absolute, rather than relative, TCP sequence numbers.
<DT><B>-s</B><I> snaplen</I>
<DD>
<DT><B>--snapshot-length=</B><I>snaplen</I>
<DD>
Snarf <I>snaplen</I> bytes of data from each packet rather than the
default of 262144 bytes.
Packets truncated because of a limited snapshot
are indicated in the output with ``[|<I>proto</I>]'', where <I>proto</I>
is the name of the protocol level at which the truncation has occurred.
<DT><DD>
Note that taking larger snapshots both increases
the amount of time it takes to process packets and, effectively,
decreases the amount of packet buffering.
This may cause packets to be
lost.
Note also that taking smaller snapshots will discard data from protocols
above the transport layer, which loses information that may be
important. NFS and AFS requests and replies, for example, are very
large, and much of the detail won't be available if a too-short snapshot
length is selected.
<DT><DD>
If you need to reduce the snapshot size below the default, you should
limit <I>snaplen</I> to the smallest number that will capture the
protocol information you're interested in. Setting
<I>snaplen</I> to 0 sets it to the default of 262144,
for backwards compatibility with recent older versions of
<I>tcpdump</I>.
<DT><B>-T</B><I> type</I>
<DD>
Force packets selected by "<I>expression</I>" to be interpreted the
specified <I>type</I>.
Currently known types are
<B>aodv</B> (Ad-hoc On-demand Distance Vector protocol),
<B>carp</B> (Common Address Redundancy Protocol),
<B>cnfp</B> (Cisco NetFlow protocol),
<B>domain</B> (Domain Name System),
<B>lmp</B> (Link Management Protocol),
<B>pgm</B> (Pragmatic General Multicast),
<B>pgm_zmtp1</B> (ZMTP/1.0 inside PGM/EPGM),
<B>ptp</B> (Precision Time Protocol),
<B>radius</B> (RADIUS),
<B>resp</B> (REdis Serialization Protocol),
<B>rpc</B> (Remote Procedure Call),
<B>rtcp</B> (Real-Time Applications control protocol),
<B>rtp</B> (Real-Time Applications protocol),
<B>snmp</B> (Simple Network Management Protocol),
<B>someip</B> (SOME/IP),
<B>tftp</B> (Trivial File Transfer Protocol),
<B>vat</B> (Visual Audio Tool),
<B>vxlan</B> (Virtual eXtensible Local Area Network),
<B>wb</B> (distributed White Board)
and
<B>zmtp1</B> (ZeroMQ Message Transport Protocol 1.0).
<DT><DD>
Note that the <B>pgm</B> type above affects UDP interpretation only, the native
PGM is always recognised as IP protocol 113 regardless. UDP-encapsulated PGM is
often called "EPGM" or "PGM/UDP".
<DT><DD>
Note that the <B>pgm_zmtp1</B> type above affects interpretation of both native
PGM and UDP at once. During the native PGM decoding the application data of an
ODATA/RDATA packet would be decoded as a ZeroMQ datagram with ZMTP/1.0 frames.
During the UDP decoding in addition to that any UDP packet would be treated as
an encapsulated PGM packet.
<DT><B>-t</B>
<DD>
<I>Don't</I> print a timestamp on each dump line.
<DT><B>-tt</B>
<DD>
Print the timestamp, as seconds since January 1, 1970, 00:00:00, UTC, and
fractions of a second since that time, on each dump line.
<DT><B>-ttt</B>
<DD>
Print a delta (microsecond or nanosecond resolution depending on the
<B>--time-stamp-precision</B>
option) between current and previous line on each dump line.
The default is microsecond resolution.
<DT><B>-tttt</B>
<DD>
Print a timestamp, as hours, minutes, seconds, and fractions of a second
since midnight, preceded by the date, on each dump line.
<DT><B>-ttttt</B>
<DD>
Print a delta (microsecond or nanosecond resolution depending on the
<B>--time-stamp-precision</B>
option) between current and first line on each dump line.
The default is microsecond resolution.
<DT><B>-u</B>
<DD>
Print undecoded NFS handles.
<DT><B>-U</B>
<DD>
<DT><B>--packet-buffered</B>
<DD>
If the
<B>-w</B>
option is not specified, or if it is specified but the
<B>--print</B>
flag is also specified, make the printed packet output
``packet-buffered''; i.e., as the description of the contents of each
packet is printed, it will be written to the standard output, rather
than, when not writing to a terminal, being written only when the output
buffer fills.
<DT><DD>
If the
<B>-w</B>
option is specified, make the saved raw packet output
``packet-buffered''; i.e., as each packet is saved, it will be written
to the output file, rather than being written only when the output
buffer fills.
<DT><DD>
The
<B>-U</B>
flag will not be supported if
<I>tcpdump</I>
was built with an older version of
<I>libpcap</I>