I'm feeding a Wireshark PCAP file as in the following script to my DUT :
import os
from trex_stl_lib.api import *
# PCAP profile
class STLPcap(object):
def __init__ (self, pcap_file):
self.pcap_file = pcap_file
def get_streams (self, direction = 0, ipg_usec = 10.0, loop_count = 1, **kwargs):
profile = STLProfile.load_pcap(self.pcap_file, ipg_usec = ipg_usec, loop_count = loop_count)
return profile.get_streams()
# dynamic load - used for trex console or simulator
def register():
# get file relative to profile dir
return STLPcap(os.path.join(os.path.dirname(__file__), '256pkts.pcap'))
I have obtained this pcap file (256pkts.pcap) as a captured output from IXIA IxExplorer after doing a loopback. This packet capture already contains 4 Bytes of CRC / FCS. Now, the issue I'm facing is that, TRex also adds 4 Bytes of CRC, thus only 4 Bytes are stripped by the NIC and the 4 Bytes of CRC added already in IXIA is considered as part of the packet data, which results in my application on the DUT dropping the packets. Is there any way by which I can disable adding the extra 4 bytes of CRC from TRex? Or is there a way to remove the CRC from the pcap file on Wireshark? I tried googling for a way to remove it from Wireshark but no luck so far.
Thanks and Regards,
Aparna
--
You received this message because you are subscribed to the Google Groups "TRex Traffic Generator" group.
To unsubscribe from this group and stop receiving emails from it, send an email to trex-tgn+u...@googlegroups.com.
To post to this group, send email to trex...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/trex-tgn/8bf552c4-bddd-4aac-ae19-6a83c5c5fb63%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Hi,
editcap or tshark can remove crc from the pcap.
Itay
To view this discussion on the web visit https://groups.google.com/d/msgid/trex-tgn/CA%2BYxBo%2BdixTrkmfPtCyjB1fwEDxmLMVwv4eR3jO2CWAvrFYm%3Dg%40mail.gmail.com.