Why does Wireshark detect activity from my Win11 laptop connected to a Sharktap network tap?
I read that the ethernet port would be automatically disabled to traffic and put into promiscuous mode for listening purposes in the instructions.
Somehow I got back that my Wireshark machine did a host announcement and sent standard query responses directed at hosts outside my network.
Did I read the theory of operation wrong or were the instructions on the Sharktap lying too?
Really seems odd to me!
So the quick start guide is for the Sharktap USB. Presumably you used the two Network ports to insert the Sharktap into some existing wired network; did you connect the USB TAP port into a USB port on the machine running Wireshark or did you use the Wired Tap Ethernet port and connect that to an Ethernet port on that machine?
I connected the ethernet port on the laptop running wiretap to the tap port on the shark tap just like all of the instructions said. That port is on the side. The through ports are on the end. all connected correctly.
All of that is neither here nor there if Wireshark can't shut up the ethernet port so that it mixes the laptop's ethernet to cry out for dchp while I'm doing a capture!
Never mind - nobody here has a clue either. Bunch of self proclaimed experts.