SQL Server Browser 与动态端口
来源:互联网 发布:淘宝旺旺客服 编辑:程序博客网 时间:2024/05/22 15:05
Source
Destination
协议
描述
Conv ID
1
192.168.1.2
192.168.1.1
TCP
TCP:Flags=......S., SrcPort=49157, DstPort=1433, PayloadLen=0, Seq=2592455720, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192
{TCP:2, IPv4:1}
2
192.168.1.1
192.168.1.2
TCP
TCP:Flags=...A..S., SrcPort=1433, DstPort=49157, PayloadLen=0, Seq=1781952765, Ack=2592455721, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152
{TCP:2, IPv4:1}
3
192.168.1.2
192.168.1.1
TCP
TCP:Flags=...A...., SrcPort=49157, DstPort=1433, PayloadLen=0, Seq=2592455721, Ack=1781952766, Win=256 (scale factor 0x8) = 65536
{TCP:2, IPv4:1}
4
192.168.1.2
192.168.1.1
TDS
TDS:Prelogin, Version = 7.1 (0x71000001), SPID = 0, PacketID = 0, Flags=...AP..., SrcPort=49157, DstPort=1433, PayloadLen=52, Seq=2592455721 - 2592455773, Ack=1781952766, Win=65536
{TDS:3, TCP:2, IPv4:1}
5
192.168.1.1
192.168.1.2
TDS
TDS:Response, Version = 7.1 (0x71000001), SPID = 0, PacketID = 1, Flags=...AP..., SrcPort=1433, DstPort=49157, PayloadLen=37, Seq=1781952766 - 1781952803, Ack=2592455773, Win=65536
{TDS:3, TCP:2, IPv4:1}
6
192.168.1.2
192.168.1.1
TLS
TLS:TLS Rec Layer-1 HandShake: Client Hello.
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
7
192.168.1.1
192.168.1.2
TLS
TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Hello Done.
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
8
192.168.1.2
192.168.1.1
TLS
TLS:TLS Rec Layer-1 HandShake: Client Key Exchange.; TLS Rec Layer-2 Cipher Change Spec; TLS Rec Layer-3 HandShake: Encrypted Handshake Message.
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
9
192.168.1.1
192.168.1.2
TLS
TLS:TLS Rec Layer-1 Cipher Change Spec; TLS Rec Layer-2 HandShake: Encrypted Handshake Message.
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
10
192.168.1.2
192.168.1.1
TLS
TLS:TLS Rec Layer-1 SSL Application Data
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
11
192.168.1.1
192.168.1.2
TDS
TDS:Response, Version = 7.1 (0x71000001), SPID = 51, PacketID = 1, Flags=...AP..., SrcPort=1433, DstPort=49157, PayloadLen=277, Seq=1781953480 - 1781953757, Ack=2592456290, Win=65024
{TDS:3, TCP:2, IPv4:1}
12
192.168.1.2
192.168.1.1
TCP
TCP:Flags=...A...., SrcPort=49157, DstPort=1433, PayloadLen=0, Seq=2592456290, Ack=1781953757, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
Source
Destination
协议
描述
Conv ID
1
192.168.1.2
192.168.1.1
TCP
TCP:Flags=...A...F, SrcPort=49157, DstPort=1433, PayloadLen=0, Seq=2592456290, Ack=1781953757, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
2
192.168.1.1
192.168.1.2
TCP
TCP:Flags=...A...., SrcPort=1433, DstPort=49157, PayloadLen=0, Seq=1781953757, Ack=2592456291, Win=254 (scale factor 0x8) = 65024
{TCP:2, IPv4:1}
3
192.168.1.1
192.168.1.2
TCP
TCP:Flags=...A...F, SrcPort=1433, DstPort=49157, PayloadLen=0, Seq=1781953757, Ack=2592456291, Win=254 (scale factor 0x8) = 65024
{TCP:2, IPv4:1}
4
192.168.1.2
192.168.1.1
TCP
TCP:Flags=...A...., SrcPort=49157, DstPort=1433, PayloadLen=0, Seq=2592456291, Ack=1781953758, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
Source
Destination
协议
描述
Conv ID
1
192.168.1.2
192.168.1.1
SSRP
SSRP:Windows stub parser: Requires full Common parsers. See the "How Do I Change Parser Set Options(Version 3.3 or before) or Configure Parser Profile (Version 3.4)" help topic for tips on loading these parser sets.
{UDP:1, IPv4:1}
2
192.168.1.2
192.168.1.1
TCP
TCP:Flags=......S., SrcPort=49158, DstPort=Microsoft-DS(445), PayloadLen=0, Seq=364029616, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192
{TCP:2, IPv4:1}
3
192.168.1.2
192.168.1.1
TCP
TCP:Flags=......S., SrcPort=49159, DstPort=Microsoft-DS(445), PayloadLen=0, Seq=64791044, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192
{TCP:3, IPv4:1}
4
192.168.1.2
192.168.1.1
TCP
TCP:[SynReTransmit #6]Flags=......S., SrcPort=49158, DstPort=Microsoft-DS(445), PayloadLen=0, Seq=364029616, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192
{TCP:2, IPv4:1}
5
192.168.1.2
192.168.1.1
TCP
TCP:[SynReTransmit #7]Flags=......S., SrcPort=49159, DstPort=Microsoft-DS(445), PayloadLen=0, Seq=64791044, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192
{TCP:3, IPv4:1}
6
192.168.1.2
192.168.1.1
TCP
TCP:[SynReTransmit #6]Flags=......S., SrcPort=49158, DstPort=Microsoft-DS(445), PayloadLen=0, Seq=364029616, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192
{TCP:2, IPv4:1}
7
192.168.1.2
192.168.1.1
TCP
TCP:[SynReTransmit #7]Flags=......S., SrcPort=49159, DstPort=Microsoft-DS(445), PayloadLen=0, Seq=64791044, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192
{TCP:3, IPv4:1}
Source
Destination
协议
描述
Conv ID
1
192.168.1.1
192.168.1.2
SSRP
SSRP:Windows stub parser: Requires full Common parsers. See the "How Do I Change Parser Set Options(Version 3.3 or before) or Configure Parser Profile (Version 3.4)" help topic for tips on loading these parser sets.
{UDP:1, IPv4:1}
2
192.168.1.2
192.168.1.1
TCP
TCP:Flags=......S., SrcPort=49160, DstPort=1433, PayloadLen=0, Seq=2123845617, Ack=0, Win=8192 ( Negotiating scale factor 0x8 ) = 8192
{TCP:2, IPv4:1}
3
192.168.1.1
192.168.1.2
TCP
TCP:Flags=...A..S., SrcPort=1433, DstPort=49160, PayloadLen=0, Seq=193862757, Ack=2123845618, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152
{TCP:2, IPv4:1}
4
192.168.1.2
192.168.1.1
TCP
TCP:Flags=...A...., SrcPort=49160, DstPort=1433, PayloadLen=0, Seq=2123845618, Ack=193862758, Win=256 (scale factor 0x8) = 65536
{TCP:2, IPv4:1}
5
192.168.1.2
192.168.1.1
TDS
TDS:Prelogin, Version = 7.1 (0x71000001), SPID = 0, PacketID = 0, Flags=...AP..., SrcPort=49160, DstPort=1433, PayloadLen=51, Seq=2123845618 - 2123845669, Ack=193862758, Win=65536
{TDS:3, TCP:2, IPv4:1}
6
192.168.1.1
192.168.1.2
TDS
TDS:Response, Version = 7.1 (0x71000001), SPID = 0, PacketID = 1, Flags=...AP..., SrcPort=1433, DstPort=49160, PayloadLen=37, Seq=193862758 - 193862795, Ack=2123845669, Win=65536
{TDS:3, TCP:2, IPv4:1}
7
192.168.1.2
192.168.1.1
TLS
TLS:TLS Rec Layer-1 HandShake: Encrypted Handshake Message.
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
8
192.168.1.1
192.168.1.2
TLS
TLS:TLS Rec Layer-1 HandShake: Encrypted Handshake Message.
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
9
192.168.1.2
192.168.1.1
TLS
TLS:TLS Rec Layer-1 HandShake: Encrypted Handshake Message.; TLS Rec Layer-2 Cipher Change Spec; TLS Rec Layer-3 HandShake: Encrypted Handshake Message.
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
10
192.168.1.1
192.168.1.2
TLS
TLS:TLS Rec Layer-1 Cipher Change Spec; TLS Rec Layer-2 HandShake: Encrypted Handshake Message.
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
11
192.168.1.2
192.168.1.1
TLS
TLS:TLS Rec Layer-1 SSL Application Data
{TLS:5, SSLVersionSelector:4, TDS:3, TCP:2, IPv4:1}
12
192.168.1.1
192.168.1.2
TDS
TDS:Response, Version = 7.1 (0x71000001), SPID = 52, PacketID = 1, Flags=...AP..., SrcPort=1433, DstPort=49160, PayloadLen=321, Seq=193863472 - 193863793, Ack=2123846202, Win=65024
{TDS:3, TCP:2, IPv4:1}
13
192.168.1.2
192.168.1.1
TCP
TCP:Flags=...A...., SrcPort=49160, DstPort=1433, PayloadLen=0, Seq=2123846202, Ack=193863793, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
14
192.168.1.2
192.168.1.1
TCP
TCP:[Keep alive]Flags=...A...., SrcPort=49160, DstPort=1433, PayloadLen=1, Seq=2123846201 - 2123846202, Ack=193863793, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
15
192.168.1.1
192.168.1.2
TCP
TCP:[Keep alive ack]Flags=...A...., SrcPort=1433, DstPort=49160, PayloadLen=0, Seq=193863793, Ack=2123846202, Win=254 (scale factor 0x8) = 65024
{TCP:2, IPv4:1}
16
192.168.1.1
192.168.1.2
TCP
TCP:[Keep alive]Flags=...A...., SrcPort=1433, DstPort=49160, PayloadLen=1, Seq=193863792 - 193863793, Ack=2123846202, Win=254 (scale factor 0x8) = 65024
{TCP:2, IPv4:1}
17
192.168.1.2
192.168.1.1
TCP
TCP:[Keep alive ack]Flags=...A...., SrcPort=49160, DstPort=1433, PayloadLen=0, Seq=2123846202, Ack=193863793, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
Source
Destination
协议
描述
Conv ID
1
192.168.1.2
192.168.1.1
TCP
TCP:[Keep alive]Flags=...A...., SrcPort=49160, DstPort=1433, PayloadLen=1, Seq=2123846201 - 2123846202, Ack=193863793, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
2
192.168.1.1
192.168.1.2
TCP
TCP:[Keep alive ack]Flags=...A...., SrcPort=1433, DstPort=49160, PayloadLen=0, Seq=193863793, Ack=2123846202, Win=254 (scale factor 0x8) = 65024
{TCP:2, IPv4:1}
3
192.168.1.1
192.168.1.2
TCP
TCP:[Keep alive]Flags=...A...., SrcPort=1433, DstPort=49160, PayloadLen=1, Seq=193863792 - 193863793, Ack=2123846202, Win=254 (scale factor 0x8) = 65024
{TCP:2, IPv4:1}
4
192.168.1.2
192.168.1.1
TCP
TCP:[Keep alive ack]Flags=...A...., SrcPort=49160, DstPort=1433, PayloadLen=0, Seq=2123846202, Ack=193863793, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
5
192.168.1.2
192.168.1.1
TCP
TCP:[Keep alive ack]Flags=...A...F, SrcPort=49160, DstPort=1433, PayloadLen=0, Seq=2123846202, Ack=193863793, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
6
192.168.1.1
192.168.1.2
TCP
TCP:Flags=...A...., SrcPort=1433, DstPort=49160, PayloadLen=0, Seq=193863793, Ack=2123846203, Win=254 (scale factor 0x8) = 65024
{TCP:2, IPv4:1}
7
192.168.1.1
192.168.1.2
TCP
TCP:Flags=...A...F, SrcPort=1433, DstPort=49160, PayloadLen=0, Seq=193863793, Ack=2123846203, Win=254 (scale factor 0x8) = 65024
{TCP:2, IPv4:1}
8
192.168.1.2
192.168.1.1
TCP
TCP:Flags=...A...., SrcPort=49160, DstPort=1433, PayloadLen=0, Seq=2123846203, Ack=193863794, Win=252 (scale factor 0x8) = 64512
{TCP:2, IPv4:1}
0 0
- SQL Server Browser 与动态端口
- SQL Server 动态端口 侦听
- SQL Server Browser 服务
- SQL Server Browser 服务
- 启动 SQL Server Browser
- SQL Server Browser是什么
- SQL Server Browser 服务
- SQL Server 2005的动态端口
- SQL Server 2008 动态端口的问题
- 如何对SQL Server配置动态端口?
- SQL Server Browser的功能
- SQL Server Browser 无法启动
- SQL Server Browser 无法启动
- SQL Server : Browser服务是干什么的
- SQL Server Browser的功能【转】
- SQL Server Browser的功能【转】
- SQL Server Browser服务的作用
- sql server browser禁用了怎么启动
- 项目实战-Jackson使用
- 2.观察者模式(Observer Pattern)
- 关于CSR8670按键处理
- 【整理】JQ样式篇——属性与样式
- linux kernel (proc文件系统)参数
- SQL Server Browser 与动态端口
- 深入源码理解Android Touch事件分发机制(下篇)
- 阅读 ANDROID 源码的一些姿势
- Linux下配置网络
- 【JAVA基础小问题】如何跳出当前的多重嵌套循环?
- 容器云平台使用体验:DaoCloud
- 考试题目“部落卫队”
- 3.装饰者模式(Decorator Pattern)
- Linux基本操作命令