Is there any python script that could veryfy operations of a Sniffer on a given port ( /dev/cuaU0 in my case)? The CLI interface is supposed to echo each character you type and report the default channel ( 11) after you use this command. You can try typing a command channel followed by a newline character (enter key). It exposes a text command line interface. You can use a serial terminal like minicom, screen, putty, etc and connect to the sniffer device. Is there any way I can talk to the DONGLE Sniffer over MiniCom (serial terminal application) in order to verify its operations? When you manage to run this combination, you could try flashing in FreeBSD itself and verify if everything works as expected. However, to make sure, I would recommend to try flashing the dongle using a PC running one of operating systems supported by nRF Connect for Desktop and use it with Wireshark running in FreeBSD. As long as the hex file is correctly stored in the dongle memory, I think the tool used to flash makes no difference. I've flashed mine using nRF Connect for Desktop. I have no experience with flashing the dongle using nrftool. I have managed to flash HEX into the DONGLE using nrftool and some blind DFU ZIP conversion. Thank you for sharing your experience with running 802.15.4 Sniffer on FreeBSD.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |