When using dumpcap.exe. –D I get: C:\Program Files\Wireshark>dumpcap.exe -D 1. \Device\NPF_{6EBFBFD2-1844-4BB7-BED0-95BA2FCCD536} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 2. \Device\NPF_{9FAA73F9-B079-4B95-851B-537B0CACB0CA} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 3. \Device\NPF_{FCDBB016-3861-4395-BE8E-6A1B2AB48433} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 4. \Device\NPF_{EBFD52C7-3B16-4A0A-85A2-18F4C57474CA} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 5. \Device\NPF_{95FD9084-714A-41F5-954A-72927551DF65} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 6. \Device\NPF_{D663C963-B384-4502-B441-F04402F3BFA1} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 7. \Device\NPF_{691FC7B1-7F40-478E-930A-50BC2A133097} (Broadcom L2 NDIS client driver) 8. \Device\NPF_{03854B4D-A439-4D1E-B0E8-5335C631C60B} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 9. \Device\NPF_{B9136CF4-2CA1-4295-8A52-047C8BD497FD} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 10. \Device\NPF_{B49753BC-C5B3-484E-A67F-657CEC0B765E} (HP NC364T PCIe Quad Port Gigabit Server Adapter) 11. \Device\NPF_{71239DC0-702E-4908-A069-BF8002A911A5} (HP NC364T PCIe Quad Port Gigabit Server Adapter) C:\Program Files\Wireshark> I think if Wireshark could provide the NetConnectionID like when using wmic that would be good. See what I get when using wmic command (3rd column is what I need): wmic:root\cli>nic get index,name,NetConnectionID Index Name NetConnectionID 1 RAS Async Adapter 2 WAN Miniport (L2TP) 3 WAN Miniport (PPTP) 4 WAN Miniport (PPPOE) 5 Direct Parallel 6 WAN Miniport (IP) 7 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBVZA-COR_Eth_9-37 8 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBVZB-COR_Eth_9-37 9 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBNS2 Port A2 10 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBNS2 Port B2 11 HP NC364T PCIe Quad Port Gigabit Server Adapter Free NC364T Adapter #5 12 HP NC364T PCIe Quad Port Gigabit Server Adapter Free NC364T Adapter #6 13 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBVZA-SVR_Eth_114-1-4 14 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBVZB-SVR_Eth_114-1-4 15 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBNS1 Port A2 16 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBNS1 Port B2 17 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBV1B_GIG_4-45_DMZ 18 HP NC364T PCIe Quad Port Gigabit Server Adapter QEBV1A_GIG_4-45_DMZ 19 HP NC382i DP Multifunction Gigabit Server Adapter Free NC382i Adapter 20 HP NC382i DP Multifunction Gigabit Server Adapter Free NC382i Adapter #2 21 HP NC382i DP Multifunction Gigabit Server Adapter Telemetry_QEBVZA-SVR_Eth_114-1-42 22 HP NC382i DP Multifunction Gigabit Server Adapter Free NC382i Adapter #4 wmic:root\cli> Regards On 10/16/2012 9:19 AM, andre.noel@xxxxxxx wrote:
Which text output (following the value that appears in the registry) is dumpcap.exe -D providing you with? regards. Andre Noel ___________________________________________________________________________ Sent via: Wireshark-users mailing list <wireshark-users@xxxxxxxxxxxxx> Archives: http://www.wireshark.org/lists/wireshark-users Unsubscribe: https://wireshark.org/mailman/options/wireshark-users mailto:wireshark-users-request@xxxxxxxxxxxxx?subject=unsubscribe |
- References:
- [Wireshark-users] How to easily identify multiple interfaces in wireshark...
- From: andre.noel@xxxxxxx
- Re: [Wireshark-users] How to easily identify multiple interfaces in wireshark...
- From: Kevin Cullimore
- [Wireshark-users] How to easily identify multiple interfaces in wireshark...
- Prev by Date: Re: [Wireshark-users] WireShark doesn't decode gzip'ed http traffic on Windows
- Next by Date: Re: [Wireshark-users] WireShark doesn't decode gzip'ed http traffic on Windows
- Previous by thread: Re: [Wireshark-users] How to easily identify multiple interfaces in wireshark...
- Next by thread: [Wireshark-users] No Packets?
- Index(es):