
If you now start your OPC UA Server and connect with your Client, you will capture all service calls on the network.
Select your network card and configure the Capture Filter. Configure the Protocol Preferences (add Ports you want to capture). After download, install Wireshark and follow the on screen instructions. This gives a very short step-by-step instruction to demonstrate how to use Wireshark for OPC UA protocol analyzing. The Win32 setup version can be found here: If you want to start right now you can download the latest build (Stable Release 1.2.1). The OPC UA protocol analyzing is integrated in the latest build of Wireshark and will be part of the next official release. OPC UA Plugin for Wireshark (SVN > 1.1.4 - 28168) If you're still using Ethereal, it is strongly recommended that you upgrade to Wireshark.
It is freely available as open source, and is released under the GNU General Public License version 2. Network professionals, security experts, developers, and educators around the world use it regularly.
It has a rich and powerful feature set and runs on most computing platforms including Windows, OS X, Linux, and UNIX. Wireshark® is the world's most popular network protocol analyzer. Ascolab has enabled the most commonly used network protocol analyzer called "Wireshark" for OPC UA protocol decoding.