Is there a way to stop tcpdump
from (mis)interpreting protocols in captured packets?
It assumes that traffic coming from port 4500/udp is always IPSec traffic, 53/udp is DNS query, etc and tries to decode it. That's a problem for me because I can't parse the output properly.