1 This directory contains third-party software that may be useful for
6 The "ofp-tcpdump.patch" patch adds the ability to parse OpenFlow
7 messages to tcpdump. These instructions assume that tcpdump 4.3.0
8 is going to be used, but it should work with other versions that are not
9 substantially different. To begin, download tcpdump and apply the
12 wget http://www.tcpdump.org/release/tcpdump-4.3.0.tar.gz
13 tar xzf tcpdump-4.3.0.tar.gz
14 ln -s tcpdump-4.3.0 tcpdump
15 patch -p0 < ofp-tcpdump.patch
17 Then build the new version of tcpdump:
23 Clearly, tcpdump can only parse unencrypted packets, so you will need to
24 connect the controller and datapath using plain TCP. To look at the
25 traffic, tcpdump will be started in a manner similar to the following:
27 sudo ./tcpdump -s0 -i eth0 port 6633
29 The "-s0" flag indicates that tcpdump should capture the entire packet.
30 If the OpenFlow message is not received in its entirety, "[|openflow]" will
31 be printed instead of the OpenFlow message contents.
33 The verbosity of the output may be increased by adding additional "-v"
34 flags. If "-vvv" is used, the raw OpenFlow data is also printed in