


There’s a bit of guess work involved here, but the RTP packets are UDP and more than likely the majority of the traffic is one way (Camera -> Recording Server). The next step is to filter out the video packet stream. I p.host=192.168.0.119 Packets filtered by camera host Create a filter on Wireshark to display only the packets from the H264 video source: In this case the camera has an IP address of 192.168.0.119. In the pcap file I am using, I was given the IP address of the camera which makes things easier.
