1 // WSUG Chapter Capture
5 == Capturing Live Network Data
11 Capturing live network data is one of the major features of Wireshark.
13 The Wireshark capture engine provides the following features:
15 * Capture from different kinds of network hardware such as Ethernet or 802.11.
17 * Simultaneously capture from multiple network interfaces.
19 * Stop the capture on different triggers such as the amount of captured data,
20 elapsed time, or the number of packets.
22 * Simultaneously show decoded packets while Wireshark is capturing.
24 * Filter packets, reducing the amount of data to be captured. See
25 <<ChCapCaptureFilterSection>>.
27 * Save packets in multiple files while doing a long-term capture, optionally
28 rotating through a fixed number of files (a “ringbuffer”). See
29 <<ChCapCaptureFiles>>.
31 The capture engine still lacks the following features:
33 * Stop capturing (or perform some other action) depending on the captured data.
35 [#ChCapPrerequisitesSection]
39 Setting up Wireshark to capture packets for the first time can be
40 tricky. A comprehensive guide “How To setup a Capture” is available at
41 {wireshark-wiki-url}CaptureSetup.
43 Here are some common pitfalls:
45 * You may need special privileges to start a live capture.
47 * You need to choose the right network interface to capture packet data from.
49 * You need to capture at the right place in the network to see the traffic you
52 If you have any problems setting up your capture environment, you should have a
53 look at the guide mentioned above.
55 [#ChCapCapturingSection]
59 The following methods can be used to start capturing packets with Wireshark:
61 * You can double-click on an interface in the <<ChCapInterfaceSection,welcome screen>>.
63 * You can select an interface in the <<ChCapInterfaceSection,welcome screen>>, then select menu:Capture[Start] or click the first toolbar button.
65 * You can get more detailed information about available interfaces using <<ChCapCaptureOptions>> (menu:Capture[Options...]).
67 * If you already know the name of the capture interface you can start Wireshark from the command line:
70 $ wireshark -i eth0 -k
73 This will start Wireshark capturing on interface `eth0`. More details can be found at <<ChCustCommandLine>>.
75 [#ChCapInterfaceSection]
77 === The “Capture” Section Of The Welcome Screen
79 When you open Wireshark without starting a capture or opening a capture file it will display the “Welcome Screen,” which lists any recently opened capture files and available capture interfaces.
80 Network activity for each interface will be shown in a sparkline next to the interface name.
81 It is possible to select more than one interface and capture from them simultaneously.
83 [#ChCapCaptureInterfacesMainWin32]
85 .Capture interfaces on Microsoft Windows
86 image::images/ws-capture-interfaces-main-win32.png[{screenshot-attrs}]
88 [#ChCapCaptureInterfacesMainMacos]
90 .Capture interfaces on macOS
91 image::images/ws-capture-interfaces-main-macos.png[{screenshot-attrs}]
93 Some interfaces allow or require configuration prior to capture.
94 This will be indicated by a configuration icon
95 (image:images/toolbar/x-capture-options.png[height=16,width=16])
96 to the left of the interface name.
97 Clicking on the icon will show the configuration dialog for that interface.
99 Hovering over an interface will show any associated IPv4 and IPv6 addresses and its capture filter.
101 Wireshark isn't limited to just network interfaces -- on most systems you can also capture USB, Bluetooth, and other types of packets.
102 Note also that an interface might be hidden if it’s inaccessible to Wireshark or if it has been hidden as described in <<ChCapManageInterfacesSection>>.
104 [#ChCapCaptureOptions]
106 === The “Capture Options” Dialog Box
108 When you select menu:Capture[Options...] (or use the corresponding item in the
109 main toolbar), Wireshark pops up the “Capture Options” dialog box as shown in
110 <<ChCapCaptureOptionsDialog>>.
111 If you are unsure which options to choose in this dialog box, leaving the defaults settings as they are should work well in many cases.
113 [#ChCapCaptureOptionsDialog]
114 .The “Capture Options” input tab
115 image::images/ws-capture-options.png[{screenshot-attrs}]
117 The “Input” tab contains the “Interface” table, which shows the following columns:
122 Some interfaces allow or require configuration prior to capture.
123 This will be indicated by a configuration icon
124 (image:images/toolbar/x-capture-options.png[height=16,width=16])
125 to the left of the interface name.
126 Clicking on the icon will show the configuration dialog for that interface.
129 A sparkline showing network activity over time.
132 The type of packet captured by this interface.
133 In some cases it is possible to change this.
134 See <<ChCapLinkLayerHeader>> for more details.
137 Lets you put this interface in promiscuous mode while capturing.
138 Note that another application might override this setting.
141 The snapshot length, or the number of bytes to capture for each packet.
142 You can set an explicit length if needed, e.g., for performance or privacy reasons.
145 The size of the kernel buffer that is reserved for capturing packets.
146 You can increase or decrease this as needed, but the default is usually sufficient.
149 Lets you capture full, raw 802.11 headers.
150 Support depends on the interface type, hardware, driver, and OS.
151 Note that enabling this might disconnect you from your wireless network.
154 The capture filter applied to this interface.
155 You can edit the filter by double-clicking on it.
156 See <<ChCapCaptureFilterSection>> for more details about capture filters.
158 Hovering over an interface or expanding it will show any associated IPv4 and IPv6 addresses.
160 If “Enable promiscuous mode on all interfaces” is enabled, the individual promiscuous mode settings above will be overridden.
162 “Capture filter for selected interfaces” can be used to set a filter for more than one interface at the same time.
164 btn:[Manage Interfaces] opens the <<ChCapManageInterfacesDialog>> where pipes can be defined, local interfaces scanned or hidden, or remote interfaces added.
166 btn:[Compile Selected BPFs] opens <<ChCapCompiledFilterOutputDialog>>, which shows you the compiled bytecode for your capture filter.
167 This can help to better understand the capture filter you created.
171 .Linux power user tip
173 The execution of BPFs can be sped up on Linux by turning on BPF Just In Time compilation by executing
176 $ echo 1 >/proc/sys/net/core/bpf_jit_enable
179 if it is not enabled already. To make the change persistent you can use
180 link:{sysfs-main-url}[sysfsutils].
183 .The “Capture Options” output tab
184 image::images/ws-capture-options-output.png[{screenshot-attrs}]
186 The “Output” tab shows the following information:
188 Capture to a permanent file::
191 This field allows you to specify the file name that will be used for the capture file.
192 It is left blank by default.
193 If left blank, the capture data will be stored in a temporary file.
194 See <<ChCapCaptureFiles>> for details.
195 You can also click on the button to the right of this field to browse through the filesystem.
198 Allows you to set the format of the capture file.
199 pcapng is the default and is more flexible than pcap.
200 pcapng might be required, e.g., if more than one interface is chosen for capturing.
201 See {wireshark-wiki-url}Development/PcapNg for more details on pcapng.
203 Create a new file automatically...::
204 Sets the conditions for switching a new capture file.
205 A new capture file can be created based on the following conditions:
206 * The number of packets in the capture file.
207 * The size of the capture file.
208 * The duration of the capture file.
209 * The wall clock time.
211 Use a ring buffer with::
213 Form a ring buffer of the capture files with the given number of files.
215 More details about capture files can be found in <<ChCapCaptureFiles>>.
217 .The “Capture Options” options tab
218 image::images/ws-capture-options-options.png[{screenshot-attrs}]
220 The “Options” tab shows the following information:
224 Update list of packets in real-time:::
225 Updates the packet list pane in real time during capture.
226 If you do not enable this, Wireshark will not display any packets until you stop the capture.
227 When you check this, Wireshark captures in a separate process and feeds the captures to the display process.
229 Automatically scroll during live capture:::
230 Scroll the packet list pane as new packets come in, so you are always looking at the most recent packet.
231 Automatic scrolling is temporarily disabled when manually scrolling upwards or performing a <<ChUseTabGo,"Go" action>> so that the selected packet can be examined.
232 It will resume upon manually scrolling to the end of the packet list.
233 If you do not specify this Wireshark adds new packets to the packet list but does not scroll the packet list pane.
234 This option has no effect if “Update list of packets in real-time” is disabled.
236 Show capture information during capture:::
237 If this option is enabled, the capture information dialog described in <<ChCapRunningSection>> will be shown while packets are captured.
241 Resolve MAC addresses:::
242 Translate MAC addresses into names.
244 Resolve network names:::
245 Translate network addresses into names.
247 Resolve transport names:::
248 Translate transport names (port numbers).
250 See <<ChAdvNameResolutionSection>> for more details on each of these options.
252 Stop capture automatically after...::
254 Capturing can be stopped based on the following conditions:
256 * The number of packets in the capture file.
257 * The number of capture files.
258 * The capture file size.
259 * The capture file duration.
261 You can double-click on an interface row in the “Input“ tab or click btn:[Start] from any tab to commence the capture. You can click btn:[Cancel] to apply your changes and close the dialog.
263 [#ChCapManageInterfacesSection]
265 === The “Manage Interfaces” Dialog Box
267 [#ChCapManageInterfacesDialog]
268 .The “Manage Interfaces” dialog box
269 image::images/ws-manage-interfaces.png[{screenshot-attrs}]
271 The “Manage Interfaces” dialog box initially shows the “Local Interfaces” tab, which lets you manage the following:
274 Whether or not to show or hide this interface in the welcome screen and the “Capture Options” dialog.
277 A name for the interface that is human readable.
280 The device name of the interface.
283 Can be used to add a descriptive comment for the interface.
285 // [[ChCapManageInterfacesPipesDialog]]
288 // image::images/ws-capture-options-manage-interfaces-pipes.png[{screenshot-attrs}]
290 The “Pipes” tab lets you capture from a named pipe.
291 To successfully add a pipe, its associated named pipe must have already been created.
292 Click btn:[{plus}] and type the name of the pipe including its path.
293 Alternatively, btn:[Browse] can be used to locate the pipe.
295 To remove a pipe from the list of interfaces, select it and press btn:[-].
297 // [[ChCapManageInterfacesDialog]]
299 // === The “Add New Interfaces” dialog box
301 // As a central point to manage interfaces this dialog box consists of three tabs
302 // to add or remove interfaces.
304 // .The “Add New Interfaces” dialog box
305 // image::images/ws-capture-options-manage-interfaces.png[{screenshot-attrs}]
307 // ==== Add or hide local interfaces
309 // [[ChCapManageInterfacesLocalDialog]]
310 // .The “Add New Interfaces - Local Interfaces” dialog box
311 // image::images/ws-capture-options-manage-interfaces-local.png[{screenshot-attrs}]
313 // The tab “Local Interfaces” contains a list of available local interfaces,
314 // including the hidden ones, which are not shown in the other lists.
316 // If a new local interface is added, for example, a wireless interface has been
317 // activated, it is not automatically added to the list to prevent the constant
318 // scanning for a change in the list of available interfaces. To renew the list a
319 // rescan can be done.
321 // One way to hide an interface is to change the preferences. If the “Hide”
322 // checkbox is activated and the btn:[Apply] button clicked, the interface will
323 // not be seen in the lists of the “Capture Interfaces” dialog box any more. The
324 // changes are also saved in the `preferences` file.
326 // ==== Add or hide remote interfaces
328 // [[ChCapManageInterfacesRemoteDialog]]
329 // .The “Add New Interfaces - Remote Interfaces” dialog box
330 // image::images/ws-capture-options-manage-interfaces-remote.png[{screenshot-attrs}]
332 On Microsoft Windows, the “Remote Interfaces” tab lets you capture from an interface on a different machine.
333 The Remote Packet Capture Protocol service must first be running on the target platform before Wireshark can connect to it.
335 On Linux or Unix you can capture (and do so more securely) through an SSH tunnel.
337 To add a new remote capture interface, click btn:[{plus}] and specify the following:
340 The IP address or host name of the target platform where the Remote Packet Capture Protocol service is listening.
341 The drop-down list contains the hosts that have previously been successfully contacted.
342 The list can be emptied by choosing “Clear list” from the drop-down list.
345 Set the port number where the Remote Packet Capture Protocol service is listening on.
346 Leave blank to use the default port (2002).
348 Null authentication::
349 Select this if you don’t need authentication to take place for a remote capture to be started.
350 This depends on the target platform.
351 This is exactly as secure as it appears, i.e., it is not secure at all.
353 Password authentication::
354 Lets you specify the username and password required to connect to the Remote Packet Capture Protocol service.
356 Each interface can optionally be hidden.
357 In contrast to the local interfaces, they are not saved in the `preferences` file.
361 Make sure you have outside access to port 2002 on the target platform.
362 This is the default port used by the Remote Packet Capture Protocol service.
365 To remove a host including all its interfaces from the list, select it and click the btn:[-] button.
367 // To access the Remote Capture Interfaces dialog use the “Remote Interfaces” tab of the “Manage Interfaces” dialog. See <<ChCapManageInterfacesRemoteDialog>> and select btn:[Add].
369 // [[ChCapInterfaceRemoteDialog]]
370 // .The “Remote Capture Interfaces” dialog box
371 // image::images/ws-capture-options-manage-interfaces-remote-plus.png[{screenshot-attrs}]
374 // ==== Remote Capture Settings
376 // The remote capture can be further fine tuned to match your situation. The
377 // btn:[Remote Interfaces] button in <<ChCapManageInterfacesDialog>> gives
378 // you this option. It pops up the dialog shown in
379 // <<ChCapInterfaceRemoteSettingsDialog>>.
381 // [[ChCapInterfaceRemoteSettingsDialog]]
382 // .The “Remote Capture Settings” dialog box
383 // image::images/ws-capture-options-remote-settings.png[{screenshot-attrs}]
385 // You can set the following parameters in this dialog:
387 // _Do not capture own RPCAP traffic_::
388 // This option sets a capture filter so that the traffic flowing back from the
389 // Remote Packet Capture Protocol service to Wireshark isn’t captured as well and
390 // also send back. The recursion in this saturates the link with duplicate traffic.
392 // You only should switch this off when capturing on an interface other than the
393 // interface connecting back to Wireshark.
395 // _Use UDP for data transfer_::
396 // Remote capture control and data flows over a TCP connection. This option allows
397 // you to choose a UDP stream for data transfer.
399 // _Sampling option None_::
400 // This option instructs the Remote Packet Capture Protocol service to send back
401 // all captured packets which have passed the capture filter. This is usually not a
402 // problem on a remote capture session with sufficient bandwidth.
404 // _Sampling option 1 of x packets_::
405 // This option limits the Remote Packet Capture Protocol service to send only a sub
406 // sampling of the captured data, in terms of number of packets. This allows
407 // capture over a narrow band remote capture session of a higher bandwidth
411 // _Sampling option 1 every x milliseconds_::
412 // This option limits the Remote Packet Capture Protocol service to send only a sub
413 // sampling of the captured data in terms of time. This allows capture over a
414 // narrow band capture session of a higher bandwidth interface.
416 // [[ChCapInterfaceDetailsSection]]
418 // === The “Interface Details” dialog box
420 // When you select Details from the Capture Interface menu, Wireshark pops up the
421 // “Interface Details” dialog box as shown in <<ChCapInterfaceDetailsDialog>>. This
422 // dialog shows various characteristics and statistics for the selected interface.
425 // .Microsoft Windows only
427 // This dialog is only available on Microsoft Windows
430 // [[ChCapInterfaceDetailsDialog]]
431 // .The “Interface Details” dialog box
432 // image::images/ws-capture-interface-details.png[{screenshot-attrs}]
434 [#ChCapCompiledFilterOutputSection]
436 === The “Compiled Filter Output” Dialog Box
438 This figure shows the results of compiling the BPF filter for the selected interfaces.
440 [#ChCapCompiledFilterOutputDialog]
442 .The “Compiled Filter Output” dialog box
443 image::images/ws-capture-options-compile-selected-bpfs.png[{medium-screenshot-attrs}]
445 In the list on the left the interface names are listed.
446 The results of compiling a filter for the selected interface are shown on the right.
450 === Capture files and file modes
452 While capturing, the underlying libpcap capturing engine will grab the packets
453 from the network card and keep the packet data in a (relatively) small kernel
454 buffer. This data is read by Wireshark and saved into a capture file.
456 By default, Wireshark saves packets to a temporary file. You can also tell
457 Wireshark to save to a specific (“permanent”) file and switch to a
458 different file after a given time has elapsed or a given number of packets
459 have been captured. These options are controlled in the
460 “Capture Options” dialog's “Output” tab.
462 [#ChCapCaptureOptionsOutputDialog]
463 .Capture output options
464 image::images/ws-capture-options-output.png[{screenshot-attrs}]
468 Working with large files (several hundred MB) can be quite slow. If you plan to do
469 a long-term capture or capturing from a high traffic network, think about using
470 one of the “Multiple files” options. This will spread the captured packets over
471 several smaller files which can be much more pleasant to work with.
474 Using the “Multiple files” option may cut context related information. Wireshark keeps
475 context information of the loaded packet data, so it can report context related
476 problems (like a stream error) and keeps information about context related
477 protocols (e.g., where data is exchanged at the establishing phase and only
478 referred to in later packets). As it keeps this information only for the loaded
479 file, using one of the multiple file modes may cut these contexts. If the
480 establishing phase is saved in one file and the things you would like to see is
481 in another, you might not see some of the valuable context related information.
483 Information about the folders used for capture files can be found in
486 [#ChCapTabCaptureFiles]
487 .Capture file mode selected by capture options
488 [options="header",cols="2,2,2,3,5"]
490 |File Name|“Create a new file...”|“Use a ring buffer...”|Mode|Resulting filename(s) used
491 |-|-|-|Single temporary file|wireshark_<interface name>XXXXXX.pcap[ng]
492 (<interface name> is the "friendly name" of the capture interface if available
493 and the system name if not, when capturing on a single interface, and
494 "N_interfaces" where N is the number of interfaces, when capturing on
495 multiple interfaces; XXXXXX is a unique 6 character alphanumeric sequence.)
496 |foo.cap|-|-|Single named file|foo.cap
497 |foo.cap|x|-|Multiple files, continuous|foo_00001_20250714110102.cap, foo_00002_20250714110318.cap, ...
498 |foo.cap|x|x|Multiple files, ring buffer|foo_00001_20250714110102.cap, foo_00002_20250714110318.cap, ...
501 Single temporary file::
502 A temporary file will be created and used (this is the default).
503 After capturing is stopped this file can be saved later under a user specified name.
506 A single capture file will be used.
507 Choose this mode if you want to place the new capture file in a specific folder.
509 Multiple files, continuous::
510 Like the “Single named file” mode, but a new file is created and used after reaching one of the multiple file switch conditions (one of the “Next file every...” values).
512 Multiple files, ring buffer::
513 Much like “Multiple files continuous”, reaching one of the multiple files switch
514 conditions (one of the “Next file every ...” values) will switch to the next
515 file. This will be a newly created file if value of “Ring buffer with n files”
516 is not reached, otherwise it will replace the oldest of the formerly used files
517 (thus forming a “ring”).
519 This mode will limit the maximum disk usage, even for an unlimited amount of
520 capture input data, only keeping the latest captured data.
522 [#ChCapLinkLayerHeader]
524 === Link-layer header type
526 In most cases you won’t have to modify link-layer header type. Some exceptions
529 If you are capturing on an Ethernet device you might be offered a choice of
530 “Ethernet” or “DOCSIS”. If you are capturing traffic from a Cisco Cable
531 Modem Termination System that is putting DOCSIS traffic onto the Ethernet to be
532 captured, select “DOCSIS”, otherwise select “Ethernet”.
534 If you are capturing on an 802.11 device on some versions of BSD you might be
535 offered a choice of “Ethernet” or “802.11”. “Ethernet” will cause the
536 captured packets to have fake (“cooked”) Ethernet headers. “802.11” will
537 cause them to have full IEEE 802.11 headers. Unless the capture needs to be read
538 by an application that doesn’t support 802.11 headers you should select
541 If you are capturing on an Endace DAG card connected to a synchronous serial
542 line you might be offered a choice of “PPP over serial” or “Cisco HDLC”. If
543 the protocol on the serial line is PPP, select “PPP over serial” and if the
544 protocol on the serial line is Cisco HDLC, select “Cisco HDLC”.
546 If you are capturing on an Endace DAG card connected to an ATM network you might
547 be offered a choice of “RFC 1483 IP-over-ATM” or “Sun raw ATM”. If the only
548 traffic being captured is RFC 1483 LLC-encapsulated IP, or if the capture needs
549 to be read by an application that doesn’t support SunATM headers, select “RFC
550 1483 IP-over-ATM”, otherwise select “Sun raw ATM”.
552 [#ChCapCaptureFilterSection]
554 === Filtering while capturing
556 Wireshark supports limiting the packet capture to packets that match a
557 _capture filter_. Wireshark capture filters are written in
558 libpcap filter language. Below is a brief overview of the libpcap filter
559 language's syntax. Complete documentation can be found at
560 the link:{pcap-filter-man-page-url}[pcap-filter man page]. You can find
561 many Capture Filter examples at {wireshark-wiki-url}CaptureFilters.
563 You enter the capture filter into the “Filter” field of the Wireshark
564 “Capture Options” dialog box, as shown in <<ChCapCaptureOptionsDialog>>.
566 A capture filter takes the form of a series of primitive expressions connected
567 by conjunctions (__and/or__) and optionally preceded by __not__:
570 [not] primitive [and|or [not] primitive ...]
573 An example is shown in <<ChCapExFilt1>>.
576 .A capture filter for telnet that captures traffic to and from a particular host
579 tcp port 23 and host 10.0.0.5
583 This example captures telnet traffic to and from the host 10.0.0.5, and shows
584 how to use two primitives and the __and__ conjunction. Another example is shown
585 in <<ChCapExFilt2>>, and shows how to capture all telnet traffic except that
589 .Capturing all telnet traffic not from 10.0.0.5
592 tcp port 23 and not src host 10.0.0.5
596 // XXX - add examples to the following list.
598 A primitive is simply one of the following: _[src|dst] host <host>_::
599 This primitive allows you to filter on a host IP address or name. You can
600 optionally precede the primitive with the keyword _src|dst_ to specify that you
601 are only interested in source or destination addresses. If these are not
602 present, packets where the specified address appears as either the source or the
603 destination address will be selected.
605 ether [src|dst] host <ehost>::
606 This primitive allows you to filter on Ethernet host addresses. You can
607 optionally include the keyword _src|dst_ between the keywords _ether_ and _host_
608 to specify that you are only interested in source or destination addresses. If
609 these are not present, packets where the specified address appears in either the
610 source or destination address will be selected.
612 gateway host <host>::
613 This primitive allows you to filter on packets that used _host_ as a gateway.
614 That is, where the Ethernet source or destination was _host_ but neither the
615 source nor destination IP address was _host_.
617 [src|dst] net <net> [{mask <mask>}|{len <len>}]::
618 This primitive allows you to filter on network numbers. You can optionally
619 precede this primitive with the keyword _src|dst_ to specify that you are only
620 interested in a source or destination network. If neither of these are present,
621 packets will be selected that have the specified network in either the source or
622 destination address. In addition, you can specify either the netmask or the CIDR
623 prefix for the network if they are different from your own.
626 [tcp|udp] [src|dst] port <port>::
627 This primitive allows you to filter on TCP and UDP port numbers. You can
628 optionally precede this primitive with the keywords _src|dst_ and _tcp|udp_
629 which allow you to specify that you are only interested in source or destination
630 ports and TCP or UDP packets respectively. The keywords _tcp|udp_ must appear
633 If these are not specified, packets will be selected for both the TCP and UDP
634 protocols and when the specified address appears in either the source or
635 destination port field.
637 less|greater <length>::
638 This primitive allows you to filter on packets whose length was less than or
639 equal to the specified length, or greater than or equal to the specified length,
642 ip|ether proto <protocol>::
643 This primitive allows you to filter on the specified protocol at either the
644 Ethernet layer or the IP layer.
646 ether|ip broadcast|multicast::
647 This primitive allows you to filter on either Ethernet or IP broadcasts or
650 <expr> relop <expr>::
651 This primitive allows you to create complex filter expressions that select bytes or ranges of bytes in packets.
652 Please see the pcap-filter man page at {pcap-filter-man-page-url} for more details.
655 [#ChCapCaptureAutoFilterSection]
657 ==== Automatic Remote Traffic Filtering
659 If Wireshark is running remotely (using e.g., SSH, an exported X11 window, a
660 terminal server, ...), the remote content has to be transported over the
661 network, adding a lot of (usually unimportant) packets to the actually
664 To avoid this, Wireshark tries to figure out if it’s remotely connected (by
665 looking at some specific environment variables) and automatically creates a
666 capture filter that matches aspects of the connection.
668 The following environment variables are analyzed:
670 `SSH_CONNECTION` (ssh)::
671 <remote IP> <remote port> <local IP> <local port>
675 <remote IP> <remote port> <local port>
678 `REMOTEHOST` (tcsh, others?)::
682 [remote name]:<display num>
685 `SESSIONNAME` (terminal server)::
688 On Windows it asks the operating system if it’s running in a Remote Desktop Services environment.
690 [#ChCapRunningSection]
692 === While a Capture is running ...
694 You might see the following dialog box while a capture is running:
696 [#ChCapCaptureInfoDialog]
697 .The “Capture Information” dialog box
698 image::images/ws-capture-info.png[{small-screenshot-attrs}]
700 This dialog box shows a list of protocols and their activity over time.
701 It can be enabled via the “capture.show_info” setting in the “Advanced”
706 ==== Stop the running capture
708 A running capture session will be stopped in one of the following ways:
710 . The btn:[Stop Capture] button in the “Capture Information” dialog box.
712 . The menu:Capture[Stop] menu item.
714 . The btn:[Stop] toolbar button.
716 . Pressing kbd:[Ctrl+E].
718 . The capture will be automatically stopped if one of the _Stop Conditions_ is
719 met, e.g., the maximum amount of data was captured.
721 [#ChCapRestartSection]
723 ==== Restart a running capture
725 A running capture session can be restarted with the same capture options as the
726 last time, this will remove all packets previously captured. This can be useful,
727 if some uninteresting packets are captured and there’s no need to keep them.
729 Restart is a convenience function and equivalent to a capture stop following by
730 an immediate capture start. A restart can be triggered in one of the following
733 . Using the menu:Capture[Restart] menu item.
735 . Using the btn:[Restart] toolbar button.
737 // End of WSUG Chapter Capture