Using the Wireshark Plugin to Analyze Packets Between vRouter and vRouter Agent on pkt0 Interface
Wireshark is a an application that analyzes packets from a network and displays the packet information in detail.
Contrail Networking Release
2008 and later supports the Wireshark agent_header.lua plugin, which enables you to capture and analyze the packets exchanged
between a vRouter data plane and vRouter agent. You can capture the packets by executing the vifdump -i 2
and the tcpdump -i pkt0
commands in DPDK mode and kernel
mode respectively. In release 2008, the Wireshark agent_header.lua plugin is supported
on Macintosh OS computers only. .Starting from release 2011, the Wireshark agent_header.lua plugin is supported on Macintosh
OS as well as Windows OS computers. Wireshark
also enables you to add agent header information to the captured
packets.
Before you begin
You must ensure that the Wireshark application is installed on your computer. You can download Wireshark from the Download Wireshark page.
Configuration
Follow these steps to configure the Wireshark plugin and dissect agent header information in a packet:
Follow these steps to configure the Wireshark plugin in a Windows OS computer and dissect agent header information in a packet:
Download the Wireshark plugin from GitHub: https://github.com/tungstenfabric/tf-vrouter/tree/master/utils/agent_hdr_plugin.
If you are using Windows 32-bit OS, copy the plugin in to the following Wireshark directory on your computer: C:\Program Files (x86)\Wireshark\.
If you are using Windows 64-bit OS, copy the plugin in to the following Wireshark directory on your computer: C:\Program Files\Wireshark\plugins\.
Verify that the agent_hdr.lua plugin is loaded successfully in Wireshark. Relaunch Wireshark and navigate to Help > About Wireshark > Plugins to verify that the plugin is loaded in the Plugins section.
Open command prompt in Run as administrator mode and navigate to C:\Program Files\Wireshark to use editcap. Pass the pcap file through editcap to add a custom encapsulation type for a packet:
editcap -T user0 <pcap-file-to-be-read> <output.pcap>
In Wireshark, navigate to Edit > Preferences > Protocols > DLT_USER > Edit Encapsulation Table.
In the Edit Encapsulation Table, add the
agent_hdr
as a payload protocol for the packet. See .-
Using Wireshark, open the modified pcap file you generated in step 4. Wireshark displays the parsed packets.
The agent_header.lua plugin is also available in contrail-tools container. You must perform the following steps to use the plugin from the contrail-tools container:
Log in to vRouter as a root user.
Use the following command to view the summary of eachpacket in the pcap file:
tshark3_2 -nr <pcap file> -o "uat:user_dlts:\"User 0(DLT=147)\",\"ag_hdr\",\"0\",\"\",\"0\",\"\"" -t ad
Use the following command to view detailed informationof the packets in the pcap file:
tshark3_2 -nr <pcap file> -o "uat:user_dlts:\"User0 (DLT=147)\",\"ag_hdr\",\"0\",\"\",\"0\",\"\"" -T pdml