If we want to get a TCP Dump of everything on port 5060 we can use the following command.  This will create a file called capture.pcap in the tmp directory of everything on port 5060. If the file is bigger than 50MB it will start another file.
 tcpdump -s0 -w/tmp/capture.pcap -C50 udp and port 5060
If we wanted to limit it to a specific IP address, like a phone or SIP carrier, we could do:
 tcpdump -s0 -w/tmp/capture.pcap -C50 udp and port 5060 and host

To easily view the SIP transaction, load the PCAP into wireshark and goto Telephony -> VoIP Calls. Then select the session you want to look at and click “Flow.”  If you’ve captured the RTP traffic (Option: -T rtp), you may be able to play the audio of the call as well.

Run tcpdump in the background from a screen session so you can disconnect while it runs. This also tags the file name with the host name and timestamp.

screen -dm tcpdump -s0 -w/tmp/capture-dep`hostname -s`-`date +%Y%m%d-%H%M%Z`.pcap -C150 udp and port 5060
 No labels