When debugging/verifying a Mira network a packet sniffer will help showing the actual network traffic.
Quick start guide¶
The quickest way to getting a Packet sniffer running is to use a MiraUSB module.
Install packet sniffer firmware¶
On a MiraUSB module:
On a development board without DFU bootloader:
Run packet sniffer¶
(change serial-port, PAN-id and key as needed)
Install dissectors to wireshark config¶
On unix-like OSes:
Start wireshark and go to the menu Edit → Preferences → Protocols → DLT_USER (Wireshark → Preferences... → Protocols → DLT_USER on MacOS)
Click "Encapsulations Table Edit..."
Click on the "+" button.
Choose User 1 (DLT=148)
In the "Payload protocol" field of the new row, add "mirav2ip"
Click Ok and Ok
Open the fil.pcap file via the File → Open menu (Ctrl+O on GNU/linux).
On GNU/linux you can reload the pcap file by Ctrl+R (On Mac Cmd+R)
Make MiraUSB module go to DFU mode¶
To temporarly set the module in DFU mode, run the following command:
Packet sniffer software has been tested on the following platforms:
- ARMv7-A (Cortex A7, etc)
- ARMv8-A (Cortex A53, etc)
- Mac OS
For questions and requests, please contact LumenRadio.