Changes between Version 39 and Version 40 of GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight/Execute
- Timestamp:
- 01/31/17 14:47:16 (7 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight/Execute
v39 v40 166 166 }}} 167 167 168 When the Wireshark window pops up, you might still have to choose eth0 for a live capture. And you will want to use a filter to cut down on the chatter in the Wireshark window. One such filter might be to see what shows up on port 66 53. To do that type ''' ''tcp.port eq 6633'' ''' in the filter window, assuming that 6633 is the port that the controller is listening on. Once messages are captured, you can choose one, right click to "Decode as ...." and then choose ''OFP protocol'' to see its content.168 When the Wireshark window pops up, you might still have to choose eth0 for a live capture. And you will want to use a filter to cut down on the chatter in the Wireshark window. One such filter might be to see what shows up on port 6633. To do that type ''' ''tcp.port eq 6633'' ''' in the filter window, assuming that 6633 is the port that the controller is listening on. Once messages are captured, you can choose one, right click to "Decode as ...." and then choose ''OFP protocol'' to see its content. 169 169 170 170