tcpdump: verbose output suppressed, use -v[v]… for full protocol decode
listening on all_lan_sniff, link-type EN10MB (Ethernet), snapshot length 262144 bytes
16:24:35.197568 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 1317698032:1317698038, ack 4097534453, win 1407, length 6: HTTP
16:24:35.197568 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 0:6, ack 1, win 1407, length 6: HTTP
16:24:35.198503 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [P.], seq 1:11, ack 6, win 1024, length 10: HTTP
16:24:35.198503 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [P.], seq 1:11, ack 6, win 1024, length 10: HTTP
16:24:35.199326 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [.], ack 11, win 1407, length 0
16:24:35.199326 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [.], ack 11, win 1407, length 0
16:24:35.345900 IP 10.10.103.41.36663 > 10.10.103.255.6789: UDP, length 197
16:24:36.215788 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 6:325, ack 11, win 1407, length 319: HTTP
16:24:36.215788 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 6:325, ack 11, win 1407, length 319: HTTP
16:24:36.219440 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 325:382, ack 11, win 1407, length 57: HTTP
16:24:36.219440 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 325:382, ack 11, win 1407, length 57: HTTP
16:24:36.219591 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 382:434, ack 11, win 1407, length 52: HTTP
16:24:36.219591 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 382:434, ack 11, win 1407, length 52: HTTP
16:24:36.219712 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 434:482, ack 11, win 1407, length 48: HTTP
16:24:36.219712 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 434:482, ack 11, win 1407, length 48: HTTP
16:24:36.219838 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 482:533, ack 11, win 1407, length 51: HTTP
16:24:36.219838 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 482:533, ack 11, win 1407, length 51: HTTP
16:24:36.219839 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 382, win 1023, length 0
16:24:36.219839 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 382, win 1023, length 0
16:24:36.219931 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 533:644, ack 11, win 1407, length 111: HTTP
16:24:36.220073 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 644:755, ack 11, win 1407, length 111: HTTP
16:24:36.220073 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 644:755, ack 11, win 1407, length 111: HTTP
16:24:36.220074 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 533, win 1022, length 0
16:24:36.220074 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 533, win 1022, length 0
16:24:36.220190 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 755:885, ack 11, win 1407, length 130: HTTP
16:24:36.220190 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 755:885, ack 11, win 1407, length 130: HTTP
16:24:36.220305 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 885:980, ack 11, win 1407, length 95: HTTP
16:24:36.220305 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 885:980, ack 11, win 1407, length 95: HTTP
16:24:36.220306 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 755, win 1021, length 0
16:24:36.220306 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 755, win 1021, length 0
16:24:36.220421 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 980:1051, ack 11, win 1407, length 71: HTTP
16:24:36.220729 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 1051:1169, ack 11, win 1407, length 118: HTTP
16:24:36.220729 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 1051:1169, ack 11, win 1407, length 118: HTTP
16:24:36.220916 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 1051, win 1026, length 0
16:24:36.220916 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 1051, win 1026, length 0
16:24:36.245220 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 1169:1562, ack 11, win 1407, length 393: HTTP
16:24:36.245220 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 1169:1562, ack 11, win 1407, length 393: HTTP
16:24:36.245676 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 1562, win 1024, length 0
16:24:36.245676 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 1562, win 1024, length 0
16:24:36.292726 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 1562:1666, ack 11, win 1407, length 104: HTTP
16:24:36.298128 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [S], seq 211983368, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
16:24:36.298128 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [S], seq 211983368, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
16:24:36.298986 IP 10.26.84.217.51266 > 10.10.103.41.80: Flags [S], seq 3029706580, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
16:24:36.298986 IP 10.26.84.217.51266 > 10.10.103.41.80: Flags [S], seq 3029706580, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
16:24:36.299242 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [S.], seq 2611954217, ack 211983369, win 65535, options [mss 1460,nop,nop,sackOK,nop,wscale 6], length 0
16:24:36.299747 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [.], ack 1, win 1026, length 0
16:24:36.299896 IP 10.10.103.41.80 > 10.26.84.217.51266: Flags [S.], seq 2556126837, ack 3029706581, win 65535, options [mss 1460,nop,nop,sackOK,nop,wscale 6], length 0
16:24:36.300004 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [P.], seq 1:638, ack 1, win 1026, length 637: HTTP: GET /manager?action=getcurrentvol&voltype=1&=1682434723388 HTTP/1.1
16:24:36.300004 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [P.], seq 1:638, ack 1, win 1026, length 637: HTTP: GET /manager?action=getcurrentvol&voltype=1&=1682434723388 HTTP/1.1
16:24:36.300294 IP 10.26.84.217.51266 > 10.10.103.41.80: Flags [.], ack 1, win 1026, length 0
16:24:36.300294 IP 10.26.84.217.51266 > 10.10.103.41.80: Flags [.], ack 1, win 1026, length 0
16:24:36.300530 IP 10.26.84.217.51266 > 10.10.103.41.80: Flags [P.], seq 1:634, ack 1, win 1026, length 633: HTTP: GET /manager?action=getmaxvol&voltype=1&=1682434723387 HTTP/1.1
16:24:36.300530 IP 10.26.84.217.51266 > 10.10.103.41.80: Flags [P.], seq 1:634, ack 1, win 1026, length 633: HTTP: GET /manager?action=getmaxvol&voltype=1&=1682434723387 HTTP/1.1
16:24:36.301279 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [.], ack 638, win 1407, length 0
16:24:36.301279 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [.], ack 638, win 1407, length 0
16:24:36.301279 IP 10.10.103.41.80 > 10.26.84.217.51266: Flags [.], ack 634, win 1407, length 0
16:24:36.301279 IP 10.10.103.41.80 > 10.26.84.217.51266: Flags [.], ack 634, win 1407, length 0
16:24:36.308651 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [P.], seq 1:414, ack 638, win 1407, length 413: HTTP: HTTP/1.1 200 OK
16:24:36.308651 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [P.], seq 1:414, ack 638, win 1407, length 413: HTTP: HTTP/1.1 200 OK
16:24:36.312405 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [P.], seq 638:1264, ack 414, win 1024, length 626: HTTP: GET /manager?action=getdevvolume&=1682434723389 HTTP/1.1
16:24:36.312405 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [P.], seq 638:1264, ack 414, win 1024, length 626: HTTP: GET /manager?action=getdevvolume&=1682434723389 HTTP/1.1
16:24:36.317015 IP 10.10.103.41.80 > 10.26.84.217.51266: Flags [P.], seq 1:414, ack 634, win 1407, length 413: HTTP: HTTP/1.1 200 OK
16:24:36.317015 IP 10.10.103.41.80 > 10.26.84.217.51266: Flags [P.], seq 1:414, ack 634, win 1407, length 413: HTTP: HTTP/1.1 200 OK
16:24:36.317333 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 1666:2059, ack 11, win 1407, length 393: HTTP
16:24:36.317333 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 1666:2059, ack 11, win 1407, length 393: HTTP
16:24:36.317712 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 2059, win 1022, length 0
16:24:36.317712 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 2059, win 1022, length 0
16:24:36.334896 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [P.], seq 414:969, ack 1264, win 1445, length 555: HTTP: HTTP/1.1 200 OK
16:24:36.334896 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [P.], seq 414:969, ack 1264, win 1445, length 555: HTTP: HTTP/1.1 200 OK
16:24:36.335057 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 2059:2452, ack 11, win 1407, length 393: HTTP
16:24:36.335057 IP 10.10.103.41.80 > 10.26.84.217.50403: Flags [P.], seq 2059:2452, ack 11, win 1407, length 393: HTTP
16:24:36.368321 IP 10.26.84.217.51266 > 10.10.103.41.80: Flags [.], ack 414, win 1024, length 0
16:24:36.371155 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [P.], seq 1264:1894, ack 969, win 1022, length 630: HTTP: GET /manager?action=getalllinestatus&_=1682434723390 HTTP/1.1
16:24:36.378823 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [P.], seq 969:1798, ack 1894, win 1484, length 829: HTTP: HTTP/1.1 200 OK
16:24:36.378823 IP 10.10.103.41.80 > 10.26.84.217.51265: Flags [P.], seq 969:1798, ack 1894, win 1484, length 829: HTTP: HTTP/1.1 200 OK
16:24:36.384232 IP 10.26.84.217.50403 > 10.10.103.41.80: Flags [.], ack 2452, win 1021, length 0
16:24:36.432022 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [.], ack 1798, win 1026, length 0
16:24:36.432022 IP 10.26.84.217.51265 > 10.10.103.41.80: Flags [.], ack 1798, win 1026, length 0
16:24:38.346072 IP 10.10.103.41.36663 > 10.10.103.255.6789: UDP, length 197
— End Of Stream —
Multicast from Yealink T54W to GSC3505 speaker
JVogt
#21
JVogt
#24
It won’t let me upload because I am too new.
Other question would be if you guys had a work around to get these things to work with zoom phone.