Wireshark-users: [Wireshark-users] Dissecting rtp (real-time protocol)

From: "Mihovil Pupovac" <mihovil.pupovac@xxxxxxxxx>
Date: Wed, 17 Dec 2008 19:58:18 +0100
Hi,

I am sniffing rtp traffic with tshark. Rtp traffic is generated from a generator in a random manner, i.e., i cannot predict on which UDP port it will be sent or received. Tshark is dissecting this traffic as udp by default, but i would like to dissect is as rtp. Is this possible? Which command should i use?

I tried -d udp.port==xxxx,rtp  , but the problem with this is that i don't know what xxxx should be since i cannot predict on which UDP port the traffic will be sent.

Best regards,
Mihovil