The pktmon command captures data at each layer/filter in the network stack in my test, the echo request is captured at 8 points in the stack and the echo reply at 10 points. If you have a copy of Microsoft Message Analyzer (MMA), there is no need to convert the. My next suggestion would have been to issue the commands pktmon start -capture -comp all -file-name ping.etl followed by ping -6 2001:4860:4860::8888, pktmon stop, pktmon etl2pcap ping.etl -out ping.pcapng and finally to analyse ping.pcapng with Wireshark. You did not answer the question about 3rd party anti-virus/firewall software, but the pktmon output suggests that no such product is installed/active.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |