Ensure that you are familiar with this information before proceeding.
Downloaded and install Wireshark on to a suitable packet capturing computer
Run Wireshark, and configure it for capturing packets.
The configuration can be comprehensive (e.g. "capture everything") but we advise using filters to remove irrelevant packet data. For example, you could exclude HTTP traffic if you are only interested in SMTP or email-related traffic.
From the main screen of the application, click on Capture > Options.
Set the Interface to the active interface on your computer that acts as a packet capture device. If the computer has more than one network interface, the IP address of the selected interface is shown. You can determine which network range it connects to.
Check the box to turn on Capture packets in "promiscuous" mode so that it passes all traffic it receives. Most network cards normally use this feature specifically for packet capture.
Set the capture filter to the TCP/IP port number being captured. For email traffic, use port 25. For Web (HTTP) traffic, we suggest that no filter is set, and that all traffic is captured. We can see if Web pages make any kind of "back channel" connections on non-standard ports (for example, to database servers).
Click on Start to begin the packet capture. You can watch the packet capture in progress. If you do not see any data after a few seconds, verify that you have selected the correct network interface. It may be easy to confuse the wired and wireless Ethernet interfaces, or accidentally chose the wrong interface on a computer with multiple network interfaces. We usually recommend running the packet capture for 10 to 15 minutes, to collect sufficient information for analysis. Consult with the Support team representative in case a longer capture is required. After you have collected enough data, stop the capture.
Save the .cap file with an appropriate file name. Create a compressed archive of it, and send it to the Support team for analysis.
Imported Document ID: TECH226337
Subscribing will provide email updates when this Article is updated. Login is required.