There are certain situations when a recording problem can only be resolved if the Verba Technologies support team can take a closer look at the actual network traffic seen by the recorder.
For passive recorders it is an obvious action, but it can also be very useful for other recording methods to analyze the communication among the system components. This topic describes the officially supported ways to capture network traffic in Verba system.
Warning |
---|
Do not install Wireshark or other network-capturing program on the Verba server, since it may affect the systems low level network capturing capability. |
Built-in packet capture tool: verbacapture
The Verba Recording System comes with a built in packet capture tool called Verba Capture. This tool collects and stores network traffic without analyzing it or interfering with the recording progress. Recording failure situations can be efficiently solved by the Verba support and development team, using the results of this tool, since raw traffic analysis allows our team to recreate failures in our a environment. Verba Capture creates standard PCAP files that can be opened by Ethereal or WireShark.
You can get command line help by running the tool without parameters:
...
icon | false |
---|
...
The following example captures traffic from interface 3 into traffic.pcap
...
icon | false |
---|
...
You can finish packet capturing by pressing CTRL+C.
Using verbacapture to document a fault
- Open a windows command line: Start menu / Type 'cmd'
- Command: cd "C:\Program Files (x86)\Verba\bin"
- Command: verbacapture -i
- Identify the number of the port where you would like to capture (1,2,etc.)
- Command: verbacapture -c 3 traffic.pcap
(in this example 3 was the 3rd port, and traffic.pcap is the name of the file where you want to store the traffic) - Let the tool run, make the necessary phone calls where you find a recording problem
- Stop the tool by pressing CTRL-C
When you are submitting the resulting PCAP file, make sure you are also providing involved phone numbers and IP address information of the phones, the PBX and the gateways involved in your test calls, so our team can understand the data quickly.
...
applications. This can help identify network issues and bottlenecks, and analyze network and application level protocols.
We recommend using the following network capture tools:
- Wireshark
- Tshark
- Verba Packet Capture
Installing Wireshark and Tshark on Verba servers
You can download and install Wireshark (and the Tshark command line tool with it) on the Verba servers. To learn more about Wireshark and download the installer, visit https://www.wireshark.org/.
Warning |
---|
Do not remove the Winpcap driver when installing Wireshark. Otherwise, the system components relying on the Wincap drive will not work anymore |
Warning |
---|
Capturing on Recording Servers causes extra load on CPU and disk utilization and can interfere with the recording process which can lead to data loss under critical circumstances. The load of the packet capture on the Recording Servers should be always considered and if possible should only be used during non-busy hours. |
Tshark
Tshark is a high performance packet capture application that is part of the Wireshark installation package. It is a command line tool for high performance continuous capturing. It is useful when network traffic is high and/or capturing with Wireshark becomes unstable, and when we need to leave tracing on for a longer period of time (many hours or days).Examples
Get help:
Code Block |
---|
tshark -h |
List interfaces:
Code Block |
---|
tshark -D |
Start capturing with capture file rotation:
Code Block |
---|
tshark -i 3 -B 96 -b filesize:250000 -b files:100 -w c:\tmp\test.pcap -F pcap |
Where:
- -i specifies the interface with the ID retrieved by tshark –D
- -B sets capture buffer size in Mbyte. Default is 2 Mbyte, if there is a large traffic, you should go up to 96 Mbyte
- -b specifies the capture rotation: filesize:xxx max size of a single capture file in Kbytes, files:xxx the number of files after which the oldest one is overwritten. Using file rotation set based on available disk space we can make sure there will be enough space left for the other applications when we leave tracing on for a longer time.
- -w output file
- -F output format (could be pcap or pcapng. We prefer pcap, that can be directly processed by the passive recorder)
- -f can specify capture filter in BPF syntax, see below. Using an appropriate capture filter highly reduces the load on CPU and Disk
BPF filter syntax
For the full syntax, see https://biot.com/capstats/bpf.html or https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.3/com.ibm.qradar.doc/c_forensics_bpf.html.
Important filter examples:
Filtering all (src/dst) IP traffic of given host:
Code Block |
---|
host 10.110.77.200 |
Filtering inbound/outbound IP traffic of given host:
Code Block |
---|
src host 10.110.77.200 / dst host 10.110.77.200 |
Filtering for specific subnet:
Code Block |
---|
(src/dst) net 10.110.77.0/24 |
Filtering for specific TCP or UDP port:
Code Block |
---|
tcp/udp src/dst 443 |
Logical combination: or/and and grouping with () supported
Filtering for SIP (non secure, 5060 default port):
Code Block |
---|
traffic of 10.110.77.200 CUCM: (udp port 5060 or tcp port 5060) and host 10.110.77.200 |
Filtering for proxy-filter communication:
Code Block |
---|
tcp port 10201 |
Filtering for proxy-recorder communication:
Code Block |
---|
tcp port 11112 |
Filtering for recording director – media recorder communication:
Code Block |
---|
tcp port 10500 |
Wireshark
Wireshark is a GUI based packet trace analyzer. It can parse the real-time traffic capture or read a network packet capture file. The application can identify encapsulations and interpret and visualizes protocol data at all layers. It uses a different syntax than the BPF capture filter (used by Tshark). Filtering can only be applied to displaying the packets (and not capture filtering). For more information on display filters, see https://wiki.wireshark.org/DisplayFilters.
Display filter examples
Searching for string "xxxx" in the whole packet:
Code Block |
---|
frame contains "xxxx" |
Filtering for SIP or Skinny or H.323 call control packets:
Code Block |
---|
sip or sccp or h323 |
Filtering for HTTP messages:
Code Block |
---|
http |
Filtering for IP traffic of 10.110.77.200:
Code Block |
---|
ip.dst=="10.110.77.200" or ip.src=="10.110.77.200" |
Filtering for TCP traffic on 5060 port (works with udp as well):
Code Block |
---|
tcp.dstport==5060 or tcp.srcport==5060 |
Verba packet capture
The system comes with a built-in packet capture tool called Verba Packet Capture. This tool collects and stores network traffic without analyzing it or interfering with the recording progress, similar to Tshark. Verba Packet Capture creates standard PCAP files that can be opened by WireShark.
The tool is especially useful when troubleshooting proxy based recording issues because the tool can take into account the recorder settings and connect to the same proxies as a redundant/2N recorder pair of the recorder. That way it receives exactly the same traffic as the recorder service. The tool should be run on the servers where the Passive Recorder service runs.