Right now, the only thing that TraceWrangler can sanitize is the TCP port number. Maybe there will be more options in the future if a need for additional sanitization comes up.



Replace TCP ports by socket list: If a socket is found in a packet that matches the value in the original port column it will be replaced by the value in the replacement port column. This allows very specific port replacements, e.g. if you only want to replace ports for certain IP and port combinations. You can use the popup menu to import and export comma separated port lists to store and reuse ports at a later time.


Replace TCP ports by list: If a port is found in a packet that matches the value in the original column it will be replaced by the value in the replacement port column. You can use the popup menu to import and export comma separated port lists to store and reuse ports at a later time.


Randomize TCP ports: If a port wasn't found in the list and this setting is active, a new random port will be assigned. You can use the checkbox for Ignore System ports (1-1024) to automatically keep any port unchanged that is in the range of system ports.


Recalculate CRC: this works just like the IPv4 setting. Since sanitization may lead to a modified TCP layer, the CRC needs to be recalculated. And in case you want to keep bad checksums bad, TraceWrangler do it the same way as for IPv4.