Prerequisites: You have added the ForwardingWiretap component to the MstpPort container in the Nav tree. You are an experienced
Wireshark user.
Perform the following steps:
- To configure the ForwardingWiretap component, double-click it in the Nav tree.
The
ForwardingWiretap property sheet opens.
- Change the
Address field either to the IP address of your computer or to a broadcast address (if the broadcast address of the controller matches
the broadcast address of the PC/laptop)Your computer should now be able to capture BACnet messages from the MS/TP trunk using Wireshark. Since the system forwards
these messages on a non-standard BACnet port, which no BACnet devices are using, Wireshark needs to be configured to decode
the messages as BVLC (BACnet Virtual Link Control) messages. Otherwise, the messages show up as “Source Port: xxxx” and “Destination
Port: yyyy,” which do not provide useful information.
- To configure Wireshark, right-click one of the UDP (User Datagram Protocol) packets and click
decode as.
A window opens for defining the destination port to associate with the protocol.
- Select the destination you specified when you set up the ForwardWiretap properties from the UDP list, locate
BVLC in the port(s) as list and click OK.The system now parses the messages as BACnet-APDUs (Application Protocol Data Units):
This table contains quite a few ICMP (Internet Control Message Protocol) reject messages. These messages are generated by
the PC’s TCP/IP stack. They indicate that no process is prepared to handle these messages. In other words, this is the operating
system’s way of letting the caller (the controller) know that there is “nobody home.”
- Do one of the following:
- Ignore the messages.
- Set up a BACnet filter to omit the ICMP reject messages from the capture.
- Set up a process to listen for these incoming messages and discard them.
- Set up the forwarder to send the messages to a broadcast address.
Configure sending to the broadcast address with care as every device on the network will receive the messages sent by the
forwarder.
CAUTION: Do not forward messages to 47808 (0xBAC0) or any other UDP port that real BACnet devices may be listening on. The messages
forwarded are properly formatted and could potentially command an unintended object to an unintended value.
Stripping out the ICMP messages leaves only the BACnet messages form the MS/TP trunk: