net: doc: Add info about net-capture.py script
Added net-capture.py script to net-tools project. The script can be used to view and save the captured network traffic to pcap file. Signed-off-by: Jukka Rissanen <jukka.rissanen@linux.intel.com>
This commit is contained in:
parent
790794ce84
commit
aaaef987a7
2 changed files with 38 additions and 3 deletions
|
@ -54,8 +54,43 @@ The actual interface will depend on how the capturing is configured.
|
||||||
You can then use Wireshark to monitor the proper network interface.
|
You can then use Wireshark to monitor the proper network interface.
|
||||||
|
|
||||||
After the tunneling interfaces have been created, you can use for example
|
After the tunneling interfaces have been created, you can use for example
|
||||||
``netcat`` to provide an UDP listener like this in terminal #2, so that the
|
``net-capture.py`` script from ``net-tools`` project to print or save the
|
||||||
host will not send port unreachable message to Zephyr:
|
captured network packets. The ``net-capture.py`` provides an UDP listener,
|
||||||
|
it can print the captured data to screen and optionally can also save the
|
||||||
|
data to a pcap file.
|
||||||
|
|
||||||
|
.. code-block:: console
|
||||||
|
|
||||||
|
$ ./net-capture.py -i zeth-ip6ip -w capture.pcap
|
||||||
|
[20210408Z14:33:08.959589] Ether / IP / ICMP 192.0.2.1 > 192.0.2.2 echo-request 0 / Raw
|
||||||
|
[20210408Z14:33:08.976178] Ether / IP / ICMP 192.0.2.2 > 192.0.2.1 echo-reply 0 / Raw
|
||||||
|
[20210408Z14:33:16.176303] Ether / IPv6 / ICMPv6 Echo Request (id: 0x9feb seq: 0x0)
|
||||||
|
[20210408Z14:33:16.195326] Ether / IPv6 / ICMPv6 Echo Reply (id: 0x9feb seq: 0x0)
|
||||||
|
[20210408Z14:33:21.194979] Ether / IPv6 / ICMPv6ND_NS / ICMPv6 Neighbor Discovery Option - Source Link-Layer Address 02:00:5e:00:53:3b
|
||||||
|
[20210408Z14:33:21.217528] Ether / IPv6 / ICMPv6ND_NA / ICMPv6 Neighbor Discovery Option - Destination Link-Layer Address 00:00:5e:00:53:ff
|
||||||
|
[20210408Z14:34:10.245408] Ether / IPv6 / UDP 2001:db8::2:47319 > 2001:db8::1:4242 / Raw
|
||||||
|
[20210408Z14:34:10.266542] Ether / IPv6 / UDP 2001:db8::1:4242 > 2001:db8::2:47319 / Raw
|
||||||
|
|
||||||
|
The ``net-capture.py`` has following command line options:
|
||||||
|
|
||||||
|
.. code-block:: console
|
||||||
|
|
||||||
|
Listen captured network data from Zephyr and save it optionally to pcap file.
|
||||||
|
./net-capture.py \
|
||||||
|
-i | --interface <network interface>
|
||||||
|
Listen this inferface for the data
|
||||||
|
[-p | --port <UDP port>]
|
||||||
|
UDP port (default is 4242) where the capture data is received
|
||||||
|
[-q | --quiet]
|
||||||
|
Do not print packet information
|
||||||
|
[-t | --type <L2 type of the data>]
|
||||||
|
Scapy L2 type name of the UDP payload, default is Ether
|
||||||
|
[-w | --write <pcap file name>]
|
||||||
|
Write the received data to file in PCAP format
|
||||||
|
|
||||||
|
Instead of the ``net-capture.py`` script, you can for example use ``netcat``
|
||||||
|
to provide an UDP listener so that the host will not send port unreachable
|
||||||
|
message to Zephyr:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
|
2
west.yml
2
west.yml
|
@ -97,7 +97,7 @@ manifest:
|
||||||
revision: 9f09bae7c0ad7df5e0a72731061125913fba61c7
|
revision: 9f09bae7c0ad7df5e0a72731061125913fba61c7
|
||||||
path: modules/lib/mcumgr
|
path: modules/lib/mcumgr
|
||||||
- name: net-tools
|
- name: net-tools
|
||||||
revision: 244d685184e7e983f47569be276d9d4c1b133016
|
revision: f49bd1354616fae4093bf36e5eaee43c51a55127
|
||||||
path: tools/net-tools
|
path: tools/net-tools
|
||||||
- name: hal_nxp
|
- name: hal_nxp
|
||||||
revision: ad8de4f9743aa7500f184bcf6c2cea07c041fe69
|
revision: ad8de4f9743aa7500f184bcf6c2cea07c041fe69
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue