Packet sniffer¶
When debugging/verifying a Mira network a packet sniffer will help showing the actual network traffic.
Quick start guide¶
The quickest way to getting a Packet sniffer running is to use a MiraUSB module.
Install packet sniffer firmware¶
On a MiraUSB module:
On a development board without DFU bootloader:
Run packet sniffer¶
./mira_sniffer.py -d /dev/[YOUR_SERIAL_DEVICE] -p 0x12ab34cd -k ab55aaffba55aaffcd55aaffdc55aaff -a 1 > fil.pcap
Note
(change serial-port, PAN-id and key as needed)
Install dissectors to wireshark config¶
On unix-like OSes:
On Windows:
-
Start wireshark and go to the menu Edit → Preferences → Protocols → DLT_USER (Wireshark → Preferences... → Protocols → DLT_USER on MacOS)
-
Click "Encapsulations Table Edit..."
-
Click on the "+" button.
-
Choose User 1 (DLT=148)
-
In the "Payload protocol" field of the new row, add "mirav2ip"
-
Click Ok and Ok
-
Open the fil.pcap file via the File → Open menu (Ctrl+O on GNU/linux).
Tip
On GNU/linux you can reload the pcap file by Ctrl+R (On Mac Cmd+R)
Make MiraUSB module go to DFU mode¶
To temporarly set the module in DFU mode, run the following command:
Platform support¶
Packet sniffer software has been tested on the following platforms:
- Linux
- x86_64
- ARMv7-A (Cortex A7, etc)
- ARMv8-A (Cortex A53, etc)
- Mac OS
- x86_64
- ARM64
For questions and requests, please contact LumenRadio.