Use the Port Capture tab in the Test Session window to configure your PCAP Captures from within the test session. WLAN capture configuration is also available to support Wifi.
Port Capture (PCAP) is also supported by :
NOTE: The Port Capture tab is persistent and lists the available ports for PCAP Capture. |
PCAP C&I Analysis: Select to have the Test Server (s) collect, integrate and analyze PCAPs, providing a zip file with Wireshark files to show UE contextual information. When enabled, PCAPs cannot be manually started / stopped and stop triggers are disabled.
Enabling the PCAP C&I Analysis parameter instructs each Test Server to combine locally generated PCAPs (on interfaces where OnStart is selected) with PCAPs from any SUT-Query/Pcap Test Cases. The merged pcaps will be stored in the integrated_pcap.zip file, with date/time/ts-index prefixed by the TAS and displayed on the LandSlide Test Results Page.
NOTE:
|
Enable IE Validation : Select for Initial support for UI based IE Validation for 4G, 5G Core and Service Based Interfaces. This is a licensed feature.
Associate Captures with Test Session (ACTS) | Select to have PCAP Files tied to your test session.
Associate Captures with Test Session (ACTS) Result filenames follow the same pattern as per-session results. The YELLOW files are ACTS results, and the blue outline are the old style, not-associated with test. ACTS capture file naming pattern: <FILE_START_DATE_TIME>__RID-<RID>__<n>_ts<TS_INDEX>__eth<n>_capture.pcap PCAP files are generated by ACTS (Associate Captures with Test Session) with the Test Session's start time, so that all result files associated with the Test Session all show up together. If you start and stop a capture multiple times to cause multiple files for a given port, we use an auto-incrementing extra integer to distinguish them. If you generate multiple PCAPs during test run, start/stop/start/stop, etc. each file will be added to the results, with a different <FILE_START_DATE_TIME>. You can have up to 8 separate PCAP files, but when you stop the PCAP the 9th time or later, it will just replace the 8th file over and over. Thus, you can stop capture 8 times and have 8 separate files. But the 9th time you stop a PCAP, the 8__tsN_tc_port_capture.pcap file is replaced. 10th time you stop, the 8__tsN_tc_port_capture.pcap file is replaced. |
|||||||||||||||
Enable IE Validation |
Enable IE Validation. Select for Initial support for UI based IE Validation for 4G, 5G Core and Service Based Interfaces. This is a licensed feature. Available in AMF Nodal, AMF Node, MME Nodal, MME Node, PGW Nodal, PGW Node, Service Based Nodal, Service Based Node, SGW Nodal, SGW Node, SMF Nodal, SMF Node and UPF Nodal, UPF Node. Additional details in topic IE Validation Tool. For list of messages that are currently supported, please refer to the message table.
|
|||||||||||||||
Active | Available for selection when a test is running. Use this option to Start or Stop Port Capture. You can capture packets for a maximum of 8 ports at a time per test server.
|
|||||||||||||||
OnStart | Available for selection when a test is not running. Select OnStart to inform the TAS-TSs to start the Port Capture when the test is started.
|
|||||||||||||||
TS, Port, Configuration/Filter | TS/Port: Indicates the Test Server and Port for capture. Configuration/Filter: Available for Editing when a test is not running. The Configuration/Filter allows you to set up a filter on various fields of outer IP header.
|
|||||||||||||||
Triggers to Stop Capture |
Available when you configure one or more of the eth ports used in the test session to start port capture OnStart. You may add one or more pass/fail criteria as triggers to stop the port capture. To add Pass/Fail Criteria as triggers to stop port capture:
You may select multiple criteria and click OK to add them to the eth port.
|
When running a test, you can start and stop the port capture by selecting a Test Server in the Active column. When you start port capture from the test session, it includes the configuration/filter you set.
NOTE: The packet capture function is a tool provided for debugging purposes. It is CPU intensive and is not recommended for use under heavy load. You can have up to 8 separate PCAP files, but when you stop the pcap the 9th time or later, it will just replace the 8th file over and over. |
Each mode has its advantages/disadvantages.
MODE |
Advantages |
Disadvantages |
Radiotap |
|
|
Sniffer |
|
|
IMPORTANT: AC Radiotap full capture with NO Filter can create large ascii text files. These large files can take several minutes to process and will not appear in the TAS results window until post processing is complete. DO NOT RERUN test case until processing is complete otherwise manual intervention (killing python script and deleting old captures) may be required to correct. **Manual Intervention - If running out of disk space due to large ascii wlan pcap text files - SSH to Test Server and CD to /usr/log and perform an "ls -l wlan*", if large files are found: 1. Perform a "ps aux' to see if any phython scripts, or tcpdump or tshark process are running; and Kill - 9 (to stop phython script, or tcpdump or tshark process). 2. Delete old Wlan files |
NOTE: For AC card type, Port capture (Active or OnStart) cannot execute when more than 63 UEs are configured. You will receive the following popup error:
|
The Capture has two modes based on whether or not the radio is being used in a UE group. If the radio is not associated with a UE Group, then the capture is in Sniffer mode and you must select a channel (and optional width) to listen on. If the radio is associated with a group, do not select a channel.
The features and capability of the script are shown in the following usage:
Usage: wifiPcap [data] [mgmt] [cntl] [include=<subTypeList>] [exclude=<subTypeList>] [<macAddr>] <interface> [<channel>[:<width>]]
# of Messages | Number of Messages in Capture - Default = 100K
|
|
Data Packets | Capture Only 802.11 data packets | |
Management Packets | Capture Only 802.11 Management packets | |
Control Packets | Capture Only 802.11 Control packets | |
Sub-Type Filters | Enable to Use the subtype filters - may include or exclude from list. | |
Include | Specify list of 802.11 subtypes to include | |
Exclude | Specify list of 802.11 subtypes to exclude | |
SubTypeList |
Comma separated list of 802.11 subtypes to include or exclude.
Valid Data subtypes : qos-data-cf-ack-poll, qos-data, data-cf-ack-poll, cf-poll, null, qos-data-cf-poll, data-cf-poll, data-cf-ack, qos-null, qos-cf-poll, cf-ack, data, qos-cf-ack-poll, qos-data-cf-ack, cf-ack-poll
Valid Management Subtypes: deauth, probe-req, reassoc-req, auth, reassoc-resp, beacon, disassoc, assoc-resp, atim, assoc-req, probe-resp, action
valid control subtypes are: cf-end, block-ack-req, block-ack, cts, ack, cf-end-ack, rts, ps-poll
|
|
MAC Address | Capture only specified Mac Address packets (send and receive) | |
Channel | Optional channel to capture on. Valid Channels are: 1-11,36,40,44,48,52,56,60,64,149,153,157,161,165 | |
Width | Optional channel width - Valid values are 20, 40 and 80. 20 - Corresponds to N Card 2.4GHz, 40 - Corresponds to N Card 5.0GHz, 80 - Corresponds to AC Card. |