DICOM and a Citrix NetScaler Load Balancer
We have dozens of DICOM modalities that send to a NetScaler, which distributes the inbound Associations among four DICOM routers in front of our VNA. On any given day, for any given modality location, we can experience slowness in the delivery of a radiology exam to the routers.
We have placed Wireshark on each of the four routers - but alas, the source IP is that of the NetScaler, and not the originating IP of the modality. And, we're told the IP of the modality cannot be spoofed to the routers. Consequently, we can't discriminate good traffic, from bad - we can't filter on the source of the troublesome data.
What's puzzling is that the management application on the routers reports the Originating AET of the modality; it's IN the inbound data to the router. But, as far as I know - Wireshark has no provision for filtering on Orig AET. Am I missing something? Is there another way to achieve my objective?
adTHANKSvance, Dan
(Sample pcap attached to 13164: DICOM dissection error)
Is
Originating AET
theCalling AE Title
?Yes, that's correct - the Originating AET is the Calling AET. And I'm sure the AET of interest appears in the log among the dozens of modalities that Associate with each router. But my ask is: How can I filter on transactions related to a specific AET? So that I don't blow out the log (I have) before I have the opportunity to collect sufficient data related to just the AET of interest?
I don't think it's possible with a capture filter.
It might be possible with a ring buffer of capture files to process them in a script, determine the
tcp.stream
orsrc/dest
port pair, then use that to extract the conversation to a new pcap file.Would really depend on being able to process the files before the ring buffer wraps and deletes the files.