Testing Connectivity with Wireshark

KB ID: 2256
Product: Veeam Agent for Microsoft Windows
Veeam Backup & Replication
Veeam Cloud Connect
Version: All
Published: 2017-03-07
Last Modified: 2022-01-10
Get weekly article updates
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.

Cheers for trusting us with the spot in your mailbox!

Now you’re less likely to miss what’s been brewing in our knowledge base with this weekly digest

error icon

Oops! Something went wrong.

Please try again later.

Challenge

It becomes necessary to test connectivity and specific ports outside of Veeam software components to rule in or rule out network connectivity or throughput issues, usually as part of other troubleshooting.

Solution

Wireshark (formerly Ethereal) is a packet analyzer, free and open-source, useful for network troubleshooting and analysis. Contrasted with iperf which tests ports and throughput, Wireshark can return robust data showing outbound and inbound data, acknowledgements for TCP connections, and even on multiple interfaces concurrently.
 
Due in part to this robustness, it can produce extremely large captures, and it’s helpful to pare this down to a manageable data set: 
  • Limit the number of interfaces we capture for the duration
  • Apply capture filters to narrow down IP addresses and ports we watch for
Scripting can sometimes be used to terminate the capture as soon as certain text is seen, if there is a known and specific issue.

More information

The first thing to know is what connection(s) you need to monitor. You can start by picking only the necessary interfaces from Capture > Options > Manage Interfaces:
 
User-added image

The specific ports used for communicating between various components can be found in the Used Ports section of the User Guide.
 
For instance, if the focus of the investigation is traffic between a backup proxy agent and a repository agent on a single IP range, you can limit the capture to that IP range. Remember that this is a capture filter, not a display filter. The capture filter field will turn green if the filter is valid:
User-added image
This constrains the capture to traffic originating from that range of IP addresses, and no traffic originating from any other ranges will be captured. After configuring this correctly, you can run the capture and then use display filters to pare that down further. You can specify, at the most basic:

  1. ip.addr == 192.168.0.1
  2. tcp.port == 22 || tcp.port == 443
  3. http

The examples, in order, filter to a stated IP address, traffic on ports 22 and 443 (the || is a boolean OR operator), or only HTTP traffic. They should be entered into the display filter field at the top of a running or previously run capture. Both capture and display filters have a broad spectrum of options, and they are covered in the Wireshark wiki (link below).
 
The capture itself is pretty self-explanatory:
 
User-added image

The time format can be selected from a few options under the view menu. Source and target addresses are just as they say, as is protocol. The "length" refers to the overall packet length sent or received, and the details will show anything relevant (for instance, packets sent TCP but with no ACK response). You can get even more detail up to and including the content of that specific packet.
 
An important final note: Wireshark captures are inherently massive, especially if the capture filter is broad or not defined at all. Ensure you have adequate space on the machine running the capture if you suspect it will run for some time, as there is a risk that the capture will fill the storage.
 
Wireshark has some wiki-style and community resources for greater detail on its operation and uses in troubleshooting. Still, a familiarity with networking and the specific network environment will help far more and is generally a requirement for making sense of the returned data.
 
https://www.wireshark.org – Site for download
https://wiki.wireshark.org – Wireshark Wiki site (check here for capture and display filters)
https://ask.wireshark.org – Wireshark Q&A/Forum
 

Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Spelling error in text

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

Oops! Something went wrong.

Please try again later.

KB Feedback/Suggestion

This form is only for KB Feedback/Suggestions, if you need help with the software open a support case

By submitting, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Verify your email to continue your product download
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

error icon

Oops! Something went wrong.

Please try again later.