![]() Now let’s open the trace in MA and see what happens. For that we will use our trusty old friend, telnet.exe again.Īs described in the previous post, we start the trace using netsh.exe, connect to the port using telnet.exe and then stop the trace as highlighted in the screenshot below. Now let us look at what happens when a client tries to connect to a server on a port it is not listening on. In the previous post how a TCP session is setup successfully. Let us continue to build further on the first post. We also discussed various concepts such as Sequence and Acknowledgement numbers etc. ![]() The first post, which can be found here discussed how to capture a trace on a Windows machine, the basics of TCP session setup and teardown. Hi folks, Lakshman Hariharan here again with the second post in the series of posts introducing how to read network traces using Microsoft Message Analyzer, aka MA. First published on TechNet on Oct 12, 2014
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |