diff --git a/books/beaglebone-cookbook/11misc/figures/wireshark_ping.png b/books/beaglebone-cookbook/11misc/figures/wireshark_ping.png new file mode 100644 index 0000000000000000000000000000000000000000..f4e6e3c58076dbf092de9055edcc69cd1f66c4fa Binary files /dev/null and b/books/beaglebone-cookbook/11misc/figures/wireshark_ping.png differ diff --git a/books/beaglebone-cookbook/11misc/misc.rst b/books/beaglebone-cookbook/11misc/misc.rst index 013f85a8642e77da455468e2392eb241c603167b..5bb4fa96b46347cb2f51c8d5d50480c91c6d059c 100644 --- a/books/beaglebone-cookbook/11misc/misc.rst +++ b/books/beaglebone-cookbook/11misc/misc.rst @@ -353,11 +353,41 @@ packets to the named pipe: .. code-block:: - host$ ssh root@bone "tcpdump -s 0 -U -n -w - -i eth0 not port 22" > /tmp/remote + host$ ssh root@192.168.7.2 "tcpdump -s 0 -U -n -w - -i any not port 22" > /tmp/remote .. tip:: For this to work you will need to follow in instructions in :ref:`root_login`. +Sharking the wpan radio +----------------------- + +Now that you have Wireshark set up, you can view traffice from the Play's +wpan radio. First, set up the network by running: + +.. code-block:: shell-session + + bone:~$ beagleconnect-start-gateway + +Go to Wireshark and in the field that says `Apply a display filter...` enter, +``wpan || 6lowpan || ipv6``. This will dispaly three types of packets. +Be sure to hit Enter. + +Now generate some traffic: + +.. code-block:: shell-session + + bone:~$ ping6 -I lowpan0 2001:db8::1 -c 5 -p ca11ab1ebeef + +.. _wireshark_ping: + +.. figure:: figures/wireshark_ping.png + :align: center + :alt: Wireshark ping6 -I lowpan0 2001:db8::1 -c 5 -p ca11ab1ebeef + + Wireshark ping6 -I lowpan0 2001:db8::1 -c 5 -p ca11ab1ebeef + +You can see the pattern ``ca11ab1ebeef`` appears in the packets. + Converting a tmp117 to a tmp114 ================================