From 672089ad7928cde907a347c1e9f71edc9e2c63ea Mon Sep 17 00:00:00 2001 From: Ad Schellevis Date: Tue, 3 Jan 2023 09:43:22 +0100 Subject: [PATCH] Interfaces/Diagnostics/Packet capture - add MAC option (https://github.com/opnsense/core/issues/6159) --- source/manual/diagnostics_interfaces.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/source/manual/diagnostics_interfaces.rst b/source/manual/diagnostics_interfaces.rst index 39c77117..8d57465f 100644 --- a/source/manual/diagnostics_interfaces.rst +++ b/source/manual/diagnostics_interfaces.rst @@ -119,12 +119,12 @@ Promiscuous When set, the system will capture all traffic presen Address Family Capture IPv4, IPv6 or both Invert Protocol Select all but the protocol selected below Protocol The protocol to filter on -Host Address This value is either the Source or Destination IP address or subnet in CIDR notation. +Host Address This value is either the Source or Destination IP/MAC address or subnet in CIDR notation. The packet capture will look for this address in either field. Matching can be negated by preceding the value with ":code:`not`". Multiple IP addresses or CIDR subnets may be specified as boolean expression. If you leave this field blank, all packets on the specified interface will be captured. - Example: :code:`not 10.0.0.0/24 not and not 11.0.0.1` + Example: :code:`not 10.0.0.0/24 not and not 11.0.0.1 or 00:0a:01:02:03:04` Invert Port Select all but the port selected below Port Port number to filter on (e.g. :code:`443` for standard https, :code:`22` for ssh) Packet Length The Packet length is the number of bytes of each packet that will be captured.