On Wed, Feb 20, 2013 at 2:54 AM, Volkan YAZICI <volkan.yaz...@gmail.com> wrote: > By default WireShark OpenFlow dissector intercepts packets on TCP port 6633, > hence if you have controllers running on a port other than 6633, you are out > of luck. I cannot be sure if this is really a feature or a bug yet. At the > moment, I tackle this problem by making local controllers listen on > different virtual IP addresses, but same port. OTOH, I am still looking for > a more viable approach. Any ideas? (Yesterday, I sent a mail to its > maintainer David Underhill about the issue, but no replies so far.)
You can right click on any packet in Wireshark and choose "Decode As..." to have it decode a stream on a non-standard port as OpenFlow. -- Nick _______________________________________________ openflow-discuss mailing list openflow-discuss@lists.stanford.edu https://mailman.stanford.edu/mailman/listinfo/openflow-discuss