Works like a charm! Thanks so much!
On Wed, Feb 20, 2013 at 12:56 PM, Nicholas Bastin <nick.bas...@gmail.com>wrote: > On Wed, Feb 20, 2013 at 2:54 AM, Volkan YAZICI <volkan.yaz...@gmail.com> > wrote: > > By default WireShark OpenFlow dissector intercepts packets on TCP port > 6633, > > hence if you have controllers running on a port other than 6633, you are > out > > of luck. I cannot be sure if this is really a feature or a bug yet. At > the > > moment, I tackle this problem by making local controllers listen on > > different virtual IP addresses, but same port. OTOH, I am still looking > for > > a more viable approach. Any ideas? (Yesterday, I sent a mail to its > > maintainer David Underhill about the issue, but no replies so far.) > > You can right click on any packet in Wireshark and choose "Decode > As..." to have it decode a stream on a non-standard port as OpenFlow. > > -- > Nick >
_______________________________________________ openflow-discuss mailing list openflow-discuss@lists.stanford.edu https://mailman.stanford.edu/mailman/listinfo/openflow-discuss