<html><head><meta http-equiv="Content-Type" content="text/html charset=windows-1252"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">Hi Sabet,<div class=""><br class=""></div><div class="">You can use ndndump tool (<a href="https://github.com/named-data/ndndump" class="">https://github.com/named-data/ndndump</a>) to perform analysis of pcap’ed data stream.</div><div class="">We are working on providing wireshark support and it should be available relatively soon (I cannot yet give any specific timeline for it).</div><div class=""><br class=""></div><div class="">—</div><div class="">Alex</div><div class=""><br class=""><div><blockquote type="cite" class=""><div class="">On Apr 8, 2015, at 2:04 AM, Muhammad Hosain Abdollahi Sabet <<a href="mailto:M.AbdollahiSabet@mail.sbu.ac.ir" class="">M.AbdollahiSabet@mail.sbu.ac.ir</a>> wrote:</div><br class="Apple-interchange-newline"><div class="">


<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" class="">
<meta name="Generator" content="MS Exchange Server version 6.5.7652.24" class="">
<title class="">wireshark filter?</title>

<div class="">
<!-- Converted from text/plain format --><p class=""><font size="2" class="">Hi there,<br class="">
Since ndnSIM can produce .pcap files, is there any l3 capture filter(bpf compatible maybe) for capturing packets with tcpdump/tshark, or wireshark display filters for analyzing .pcap files?<br class="">
<br class="">
Thanks,<br class="">
Sabet</font>
</p>

</div></div></blockquote></div><br class=""></div></body></html>