Forum | Documentation | Website | Blog

Skip to content
Snippets Groups Projects
Commit 08b0a137 authored by Mark Yoder's avatar Mark Yoder
Browse files

Added Wireshark example

parent f1defb83
Branches
No related merge requests found
books/beaglebone-cookbook/11misc/figures/wireshark_ping.png

192 KiB

......@@ -353,11 +353,41 @@ packets to the named pipe:
.. code-block::
host$ ssh root@bone "tcpdump -s 0 -U -n -w - -i eth0 not port 22" > /tmp/remote
host$ ssh root@192.168.7.2 "tcpdump -s 0 -U -n -w - -i any not port 22" > /tmp/remote
.. tip::
For this to work you will need to follow in instructions in :ref:`root_login`.
Sharking the wpan radio
-----------------------
Now that you have Wireshark set up, you can view traffice from the Play's
wpan radio. First, set up the network by running:
.. code-block:: shell-session
bone:~$ beagleconnect-start-gateway
Go to Wireshark and in the field that says `Apply a display filter...` enter,
``wpan || 6lowpan || ipv6``. This will dispaly three types of packets.
Be sure to hit Enter.
Now generate some traffic:
.. code-block:: shell-session
bone:~$ ping6 -I lowpan0 2001:db8::1 -c 5 -p ca11ab1ebeef
.. _wireshark_ping:
.. figure:: figures/wireshark_ping.png
:align: center
:alt: Wireshark ping6 -I lowpan0 2001:db8::1 -c 5 -p ca11ab1ebeef
Wireshark ping6 -I lowpan0 2001:db8::1 -c 5 -p ca11ab1ebeef
You can see the pattern ``ca11ab1ebeef`` appears in the packets.
Converting a tmp117 to a tmp114
================================
......
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment