On Wed, Feb 20, 2013 at 2:54 AM, Volkan YAZICI <volkan.yaz...@gmail.com> wrote:
> By default WireShark OpenFlow dissector intercepts packets on TCP port 6633,
> hence if you have controllers running on a port other than 6633, you are out
> of luck. I cannot be sure if this is really a feature or a bug yet. At the
> moment, I tackle this problem by making local controllers listen on
> different virtual IP addresses, but same port. OTOH, I am still looking for
> a more viable approach. Any ideas? (Yesterday, I sent a mail to its
> maintainer David Underhill about the issue, but no replies so far.)

You can right click on any packet in Wireshark and choose "Decode
As..." to have it decode a stream on a non-standard port as OpenFlow.

--
Nick
_______________________________________________
openflow-discuss mailing list
openflow-discuss@lists.stanford.edu
https://mailman.stanford.edu/mailman/listinfo/openflow-discuss

Reply via email to