Wireshark is a network protocol analyzer that captures network traffic and provides tools to analyze that network activity and visualize T.38 FoIP calls. If you've been asked to provide us with something like this, don't despair ... we're only expecting you to collect it, you don't have to do any of the analysis part!
LinuxAs the root user, enter the following command:
tcpdump -s 0 > filename.pcapA more elaborate, more selective version of that is:
tcpdump -s 1500 -i eth0 -w filename.pcapThe argument to -i will vary according to your setup. You can discover the name of your network interfaces using the ifconfig command. command. Place your test call, and then hit CTRL-C from the command line to exit the capture. Open the packet capture in Wireshark from any Windows, Linux or Mac OS X machine, the file format is portable. The file can be massively compressed using gzip for emailing or uploading to our support team. See man tcpdump for more information.
WindowsInstall Wireshark on your Microsoft Windows machine, and open the application. The following procedure is a general example, your specifics may vary.
- Determine what network connections (interfaces) you have, and on which interface the T.38 traffic will be seen
- Prepare (but to not initiate) a test fax call.
- Begin the capture by going to Capture on the menu bar, and then click 'Interfaces'
- Click Start on the desired network interface. Wireshark begins capturing network traffic.
- Send your test fax, keeping the packet capture running
- Click Stop on the Capture menu bar
- Save the capture for later use using File, and Save.