Update capture options dialog description.

svn path=/trunk/; revision=35295
This commit is contained in:
Jaap Keuter 2010-12-29 18:16:50 +00:00
parent bf301e6d86
commit 87d362a3d1
1 changed files with 35 additions and 11 deletions

View File

@ -189,11 +189,10 @@ wireshark -i eth0 -k
<varlistentry><term><command>IP</command></term> <varlistentry><term><command>IP</command></term>
<listitem> <listitem>
<para> <para>
The first IP address Wireshark could resolve from this interface. The first IP address Wireshark could find for this interface.
If no address could be resolved (e.g. no DHCP server available), You can click on the address to cycle through other addresses
"unknown" will be displayed. If more than one IP address could be assigned to it, if available.
resolved, only the first is shown (unpredictable which one in that If no address could be found "unknown" will be displayed.
case).
</para> </para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -335,13 +334,21 @@ wireshark -i eth0 -k
</para> </para>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry><term><command>Remote setting (Windows only)</command></term> <varlistentry><term><command>Wireless settings (Windows only)</command></term>
<listitem>
<para>
Here you can set the settings for wireless capture using the AirPCap adapter.
For a detailed description, see the AirPCap Users Guide.
</para>
</listitem>
</varlistentry>
<varlistentry><term><command>Remote settings (Windows only)</command></term>
<listitem> <listitem>
<para> <para>
Here you can set the settings for remote capture. Here you can set the settings for remote capture.
For a detailed description, see <xref linkend="ChCapInterfaceRemoteSection"/> For a detailed description, see <xref linkend="ChCapInterfaceRemoteSection"/>
</para> </para>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry><term><command>Buffer size: n megabyte(s)</command></term> <varlistentry><term><command>Buffer size: n megabyte(s)</command></term>
<listitem> <listitem>
@ -351,10 +358,6 @@ wireshark -i eth0 -k
they are written to disk. If you encounter packet drops, try they are written to disk. If you encounter packet drops, try
increasing this value. increasing this value.
</para> </para>
<note>
<title>Note</title>
<para>This option is only available on Windows platforms.</para>
</note>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry> <varlistentry>
@ -387,6 +390,27 @@ wireshark -i eth0 -k
</note> </note>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry>
<term>
<command>Capture packets in monitor mode (Unix/Linux only)</command>
</term>
<listitem>
<para>
This checkbox allows you to setup the Wireless interface to capture
all traffic it can recieve, not just the traffic on the BSS to which
it is associated, which can happen even when you set promiscuous mode.
Also it might be necessary to turn this option on in order to see
IEEE 802.11 headers and/or radio information from the captured frames.
</para>
<note>
<title>Note</title>
<para>
In monitor mode the adapter might disassociate itself from the network
it was associated to.
</para>
</note>
</listitem>
</varlistentry>
<varlistentry> <varlistentry>
<term> <term>
<command>Capture packets in pcap-ng format</command> <command>Capture packets in pcap-ng format</command>