From c789ffcb7ca1ab7f997d8f88c7686732a21315a4 Mon Sep 17 00:00:00 2001 From: hml1810 Date: Fri, 21 Jun 2024 12:32:01 +0200 Subject: [PATCH] Update wireshark.md added information on how to generate pcaps on windows based computers. --- docs/development/wireshark.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/docs/development/wireshark.md b/docs/development/wireshark.md index a4c64c2fe..c8980fd5c 100644 --- a/docs/development/wireshark.md +++ b/docs/development/wireshark.md @@ -37,6 +37,13 @@ To tell the CFLIB to generate a PCAP file of what it thinks the CRTP traffic loo $ CRTP_PCAP_LOG=filename.pcap python3 examples/swarm/hl-commander-swarm.py $ wireshark filename.pcap ``` +and on Windows based computers in a shell window: + +```bash +> set CRTP_PCAP_LOG=filename.pcap +> python3 examples/swarm/hl-commander-swarm.py +> wireshark filename.pcap +``` To generate a PCAP file and open it with Wireshark. You can also use the text based `tshark` tool, and you can add a filter, for instance, only shoow CRTP port 8 (Highlevel setpoint): ```bash