You can try with this lua script:
-- register RTP to handle ports 50000-50011
do
local udp_port_table = DissectorTable.get("udp.port")
local rtp_dissector = Dissector.get("rtp")
for port=50000,50011 do
udp_port_table:add(port,rtp_dissector)
end
end
Change the for loop to use more port : e.g. for port=1,65000 do ...
To add a lua script you can look at
http://wiki.wireshark.org/Lua.
--
Benoit RAT
www.neub.co.nr
On Fri, Jan 16, 2009 at 3:32 AM, Guy Harris
<guy@xxxxxxxxxxxx> wrote:
On Jan 15, 2009, at 4:11 PM, Brian Hanson wrote:
> Hmm... I tried that, but it didn't seem to have any effect.
If not, then either it wasn't turned on correctly or the packets in
question don't look enough like RTP for the RTP dissector to accept
them as such.
Can you either provide us with a capture file where this doesn't work,
or a small subset of that capture file that demonstrates the problem?
Also, what version of Wireshark are you using?