Works like a charm! Thanks so much!

On Wed, Feb 20, 2013 at 12:56 PM, Nicholas Bastin <nick.bas...@gmail.com>wrote:

> On Wed, Feb 20, 2013 at 2:54 AM, Volkan YAZICI <volkan.yaz...@gmail.com>
> wrote:
> > By default WireShark OpenFlow dissector intercepts packets on TCP port
> 6633,
> > hence if you have controllers running on a port other than 6633, you are
> out
> > of luck. I cannot be sure if this is really a feature or a bug yet. At
> the
> > moment, I tackle this problem by making local controllers listen on
> > different virtual IP addresses, but same port. OTOH, I am still looking
> for
> > a more viable approach. Any ideas? (Yesterday, I sent a mail to its
> > maintainer David Underhill about the issue, but no replies so far.)
>
> You can right click on any packet in Wireshark and choose "Decode
> As..." to have it decode a stream on a non-standard port as OpenFlow.
>
> --
> Nick
>
_______________________________________________
openflow-discuss mailing list
openflow-discuss@lists.stanford.edu
https://mailman.stanford.edu/mailman/listinfo/openflow-discuss

Reply via email to