
No link can be established without USB power. Each PHY negotiates the ethernet connection separately. There is no direct connection between the ethernet TX/RX wires of the ports. RestrictionsĮthernet is intercepted by putting two PHYs between the two ports. Using an USB hub, and/or connecting multiple USB devices to an USB hub/host may reduce the maximum bandwidth at which capture is possible without capture overflows. USB 2.0 may work in low bandwidth scenarios. USB 3.0 or later host and cable are recommended.

For Linux, source code and build instructions are provided, which should work on any Linux distro. Windows 10 64 bit is required, but Windows 7 may work as well.

The software works on Windows, Linux, and macOS. (For example, you can test resilience of your ethernet connected device or software against random packet drops, test its behavior on flooding, or implement a network stack fuzzer.) This is interesting for development and security research. The debugger can block packets in one or both directions, corrupt packets, inject new packets. An IPC interface is provided for use cases like scripting. The userspace driver also provides a command line interface, which can be used to access advanced feature. The latter would show up in Wireshark, and confuse your development efforts.Ĭapture can be directly started from Wireshark (if installed correctly). Neither will it attempt to drop or filter packets received through it, nor will it attempt to send random packets to it (ARP etc.). This has the advantage that your OS will not mess with it. In particular, the device is not exposed as network device. Installing the device will not destabilize your system. You do not necessarily need elevated privileges. The device is accessed through a libusb userspace driver. Jumbo frames (ethernet packets longer than 1500 bytes) are supported and fully captured up to 16KB size.Ĭapture output is directly streamed to the PC. Some normally invisible low level details are explicitly logged, such as interpacket gaps and CRC errors. Ethernet packets which violate the specification are captured as far it is possible. Packets with incorrect CRC sums are not discarded. There is no processing of captured packets – preamble, SFD, and FCS are all left intact.

This device can log complete ethernet packets as received by the PHY. It helps when developing your own protocols layered on top of ethernet, developing your own MAC, or just for observing what is going on on your network. The intended purpose is low level debugging of anything above the ethernet physical layer, mainly using Wireshark and similar protocol analyzers.

It provides two ethernet ports, and each port forwards all traffic to the other port, as well as to a PC connected via USB. The Intona Ethernet Debugger is a device to capture packets between two Gigabit Ethernet devices.
