| Name | Filter | Description |
|---|---|---|
| Connection Reset | tcp.flags.reset==1 | Unexpected TCP resets could suggest a network failure or timeout. |
| Bad TCP packets | tcp.analysis.flags && !tcp.analysis.window_update | Issues in TCP flow, excluding sliding windows updates. |
| Slow RTT | tcp.analysis.ack_rtt > 0.1 | A high RTT or an increase over time might indicate network congestion. |
| TCP Waiting for App | tcp.time_delta > 0.1 | Indicative of potential application problems, not strictly a network issue. |
| Slow DNS | dns.time > 1 | Slow name resolution could negatively impact every command. |
| TCP Dup ACK | tcp.analysis.duplicate_ack | Repeated acknowledgements could signify packet loss. |
| TCP Retransmission | tcp.analysis.retransmission | Excessive retransmissions could indicate packet loss or network congestion. |
| High HTTP Response Time | http.time > 1 | Slow HTTP response times could impact web application performance. |
| Excessive ARP Broadcast | arp.isgratuitous == 1 | Excessive gratuitous ARP could indicate IP conflicts or other network issues. |
| ICMP Redirects | icmp.type==5 and icmp.code==1 | Could indicate suboptimal routing or other network configuration issues. |
| Application Dependencies | http.host == “www.espn.com” | For example, to load a site like www.espn.com, you must visit many hosts supplying content. This filter helps identify those hosts. |
| TCP Zero Window | tcp.window_size == 0 and !tcp.flags.reset | Indicates that the receiving application is unable to process the data as fast as it’s being sent, leading to network slowdown. |
| TCP Window Full | tcp.window_size_value == tcp.window_size and tcp.window_size > 0 | Indicates the receiver’s buffer is full. Can lead to slowdown or dropped packets if not managed properly. |
| Recovery Events | tcp.stream eq ${tcp.stream} and (tcp.analysis.window_update or tcp.analysis.zero_window) | To analyze TCP window zeroing and recovery events. |
| Slow DNS Responses | dns.flags.rcode eq 0 and dns.time gt .1 | To identify slow DNS responses to check if the delay is due to your local DNS resolver or due to recursion. |
| Removing Irrelevant Data | !(eth.dst == ff:ff:ff:ff:ff:ff or arp or stp) | To remove irrelevant data (like broadcasts and layer 2 protocols) from your analysis. |
| Incident Response Snapshot | tcp.flags.syn==1 or tcp.flags.fin==1 or tcp.flags.reset==1 or dns or tls.handshake.type==1 or tls.handshake.type==2 or tcp.port==3389 or tcp.port==22 or tcp.port==445 | To get a quick snapshot of the most important events in an incident response situation. |
| Video Traffic QoS | ip and (ip[1] & 0xfc) >> 2 == 0x20 || ip and (ip[1] & 0xfc) >> 2 == 0x22 | To capture traffic with the Assured Forwarding flag set to ensure QoS is correctly applied to video traffic. |
| Specific Device Identification | wlan.addr_resolved contains Nintendo or eth.addr_resolved contains Sony | To identify specific devices in your network using the OUI name instead of MAC address. |
| Duplicate IP Identification | arp.duplicate-address-frame | To identify duplicate IP addresses in your network. |
| Syn/FIN/RST Packets | tcp.flags&7 || (tcp.seq==1 && tcp.ack==1 && tcp.len==0) || tcp.len>1 | To view all SYN/FIN/RST packets, the final ACK of the 3-way-handshake, and all data packets. |
| Traffic Types | eth.ig==1, not eth.ig==1, eth.addr==ff:ff:ff:ff:ff:ff, and not eth.addr==ff:ff:ff:ff:ff:ff | To filter out specific types of traffic, like multicast, broadcast, or unicast frames. |
| Diagnosing TCP Issues | tcp.port==12345 AND icmp | To diagnose problems with an application running over a specific TCP port, by setting up pings between the two end points and waiting for the problem to occur. |