Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How Not to capture RTP packets in SNGREP #486

Open
sajai20 opened this issue May 17, 2024 · 3 comments
Open

How Not to capture RTP packets in SNGREP #486

sajai20 opened this issue May 17, 2024 · 3 comments

Comments

@sajai20
Copy link

sajai20 commented May 17, 2024

Hi @Kaian do we have any option in sngrep to not capture RTP packets and only capture SIP packets to reduce high CPU utilization.

@davemidd
Copy link

davemidd commented May 17, 2024

The default behaviour is to not capture RTP. It will only capture RTP if you started it with the '-r' option (or enabled it in the configuration file.)

@sajai20
Copy link
Author

sajai20 commented May 20, 2024

@Kaian I have one more doubt do we have any option in sngrep not to capture packets from particular IP and port let's say i don't want to capture packet flowing from particular ip and port (host 192.168.151.144 and port 9840) . in sngrep i could see we can filter particular ip and port but not to exclude them

@davemidd
Copy link

davemidd commented May 20, 2024

@Kaian I have one more doubt do we have any option in sngrep not to capture packets from particular IP and port let's say i don't want to capture packet flowing from particular ip and port (host 192.168.151.144 and port 9840) . in sngrep i could see we can filter particular ip and port but not to exclude them

You should be able to use standard BPF filter syntax e.g. NOT host 1.2.3.4 and NOT port 123

(Plenty of references on the Internet e.g. https://biot.com/capstats/bpf.html)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

2 participants