

#Airtool packet captures windows
With this method it is possible to do the capturing on the Jetson Nano and do the Wireshark interpretation on your favorite Windows client. The next step was to use a cross-connect cable between my Windows client and the Jetson Nano.

The Jetson Nano directly connected to the Windows client I have not tried to capture OFDMA traffic with this method I wrote an article on this method back in September 2019, see here. So it is possible to both do the capturing and the Wireshark interpretation directly on the Jetson Nano. The Jetson Nano is an independent unit and have connectors for keyboard, mouse and monitors. It will also capture all data frames in legacy frame formats like 802.11 a/b/g/n/ac.īut it will not capture 802.11ax multi-user traffic like the MU PPDU format during downlink and the Trigger-based PPDU format during uplink OFDMA transmission. This method is useful to capture the control and managements frames, and the single user 802.11ax frame formats on the selected channel.
#Airtool packet captures how to
Francois Verges have an excellent article on how to setup the Jetson Nano for remote packet capturing, see here. Then the WiFi community made a method for using this device as an wireless frame capturing device. Later he has evolved the use of the device in other articles on his website The Jetson Nano and single user 802.11 ax frame captureįirst of all, I need to send a thank you to John Kilpatrick who first described the use of the Jetson Nano as an sub-$200.
