

If IEEE 802.15.4 TAP disabled: TI CC24xx metadata.and expand the Protocols section, then click In Wireshark, go to Analyze, then click Enabled Protocols.To correctlyĭisplay these two protocols, edit the enabled protocols in Wireshark: Some Thread traffic might be analyzed as the ZigBee protocol. Check Automatically acquire Thread sequence counter.Ĭlick the OK button to save any protocol changes.Uncheck Use PAN ID as first two octets of master key.Enter "00000000" for the Thread sequence counter.Select Thread from the list of protocols and verify or change the following Select Thread hash from the Key hash column listbox. Enter the Thread network Master Key into the Decryption key column.button next to Decryption Keys, which is where youĪdd the Thread network Master Key for packet decryption. Set the Security Suite to "AES-128 Encryption, 32-bit IntegrityĬlick the Edit.Select IEEE 802.15.4 from the list of protocols and verify or change the This ensures TMF messages (like address solicit) are displayed. Select CoAP from the list of protocols and set CoAP UDP Port To get the Context ID for a specific on-mesh prefix, view the Thread Network Data Update other Context IDs with those prefixes. To show the addresses for other on-mesh prefixes configured on the gateway, Wireshark uses context configurations to parse the compressed IPv6 address andĭisplay the IPv6 source and destination addresses correctly. Update Context 0 with the Mesh Local Prefix for the target Thread.Uncheck Derive ID according to RFC 4944.Select 6LoWPAN from the list of protocols and verify or change the following To configure protocols, select Preferences. System, refer to Wireshark - platform-specific information about capture privileges.

Select Yes, then add the wireshark user and update file permissions: sudo adduser $USER wireshark sudo chmod +x /usr/bin/dumpcap macOS and Windowsĭownload and install Wireshark. When you get the dialog asking "Should non-superusers be able to capture packets?", To do so, reconfigure the package: sudo dpkg-reconfigure wireshark-common We recommend running Wireshark as a non- root user. Open a terminal and run the following commands to download and install Wireshark: sudo add-apt-repository ppa:wireshark-dev/stable sudo apt-get update sudo apt-get install wireshark You'll also need to configure Wireshark to properly show Thread packetsĪnd receive RSSI measurements.

To use Wireshark with Pyspinel, refer to the installation recommendations in the Into a promiscuous packet sniffer, generating a pcap (packet capture) stream toīe saved or piped directly into Wireshark. The Pyspinel sniffer tool connects to a Thread NCP or RCP device and converts it

Stack, such as IEEE 802.15.4, 6LoWPAN, IPv6, MLE (Mesh Link Establishment), UDP, Wireshark is an open-source tool that can decode network protocols in the Thread
