![]() ![]() If the RTP ports aren't easily predictable, I would configure Wireshark to write the packets to a file and then stream all traffic to Wireshark. I recommend capturing the SIP and RTP packets so Wireshark can do its thing. In that case, you would have to manually set Wireshark to decode the RTP session. I don't have a SIP/RTP session capture handy to reference, so I'm going from memory here: If you don't have the SIP packets, then I don't believe Wireshark will automatically detect the RTP sessions. It depends upon how the hosts are designed and configured. Sometimes the same ports are negotiated each time, and sometimes the ports are random. RTP decode is enabled by default in Wireshark.Īre you filtering out the RTP sessions so the RTP packets are not in the capture? RTP ports are negotiated in the SIP session.
0 Comments
Leave a Reply. |