This article is not intended as a guide to using tshark or tcpdump. Links to the manuals for those products can be found in the More Information section of this article.
This article intends to provide customers with examples of the capture methods used by Veeam Support. There is an expectation that the reader will have some existing experience using Wireshark, tshark, or tcpdump.
This article provides examples of commands for packet capture in Windows (using tshark) and Linux (using tcpdump). This can be useful when testing connectivity and specific ports outside of Veeam software components, which is necessary to isolate network connectivity or throughput issues as part of other troubleshooting.
Note: tshark is a component of Wireshark and installed using the same installer.
.\tshark.exe -D
ip a
.\tshark.exe -i <Interface-ID> -s 80 -b filesize:500000 -b files:20 -w 'C:\TShark\Source.pcap' -f 'portrange 2500-3300 and host <Target-IP>'
tcpdump -i <Interface-ID> -s 80 -C 500 -W 20 -w /tmp/tcpdump/Source.pcap portrange 2500-3300 and host <Target-IP>
.\tshark.exe -i <Interface-ID> -s 80 -b filesize:500000 -b files:20 -w 'C:\TShark\Target.pcap' -f 'portrange 2500-3300 and host <Source-IP>'
tcpdump -i <Interface-ID> -s 80 -C 500 -W 20 -w /tmp/tcpdump/Target.pcap portrange 2500-3300 and host <Source-IP>
.\tshark.exe -i <Interface-ID> -s 80 -b filesize:500000 -b files:20 -w 'C:\TShark\VBR.pcap' -f 'port XXXX and host <Remote-Machine-IP>'
.\tshark.exe -i <Interface-ID> -s 80 -b filesize:500000 -b files:20 -w "C:\TShark\Server.pcap" -f 'port XXXX and host <VBR-IP>'
tcpdump -i <Interface-ID> -s 80 -C 500 -W 20 -w /tmp/tcpdump/Server.pcap port XXXX and host <VBR-IP>
Your feedback has been received and will be reviewed.
Please, try again later.
Please try select less.
This form is only for KB Feedback/Suggestions, if you need help with the software open a support case
Your feedback has been received and will be reviewed.
Please, try again later.