802.15.4 wireless sniffers like the USB-KW41Z are capable of capturing over-the-air traffic. The captured packets are passed to a network protocol decoder like Wireshark over a network interface tunnel built by the Kinetis Protocol Analyzer.
Select IEEE 802.15.4, click the Decryption Keys Edit... button
Create a new key entry by pressing the plus button, then set the following values and click OK Decryption key = 00112233445566778899aabbccddeeff Decryption key index = 1 Key hash = Thread hash
Find CoAP and configure it with CoAP UDP port number = 5683
Click Thread and select Decode CoAP for Thread with Thread sequence counter = 00000000 as shown below
At the 6LoWPAN preferences, add the Context 0 value of fd00:0db8::/64
Click OK and close Wireshark
Configure Kinetis Protocol Analyzer
Connect the USB-KW41Z to one of the USB ports on your computer
Open the device manager and look for the device connected port
Open the "Kinetis Protocol Analyzer Adapter" program
Make sure, you have a USB-KW41Z connected to your PC when opening the program because the Kinetis Protocol Adapter will start looking for kinetis sniffer hardware. Once the USB-KW41Z is detected, the previously identify COM port will be displayed
Select the desired IEEE 802.15.4 channel to scan in the Kinetis Protocol Analyzer window. This guide selects channel 12 as an example
Click on the Wireshark icon to open Wireshark Network Protocol Analyzer An error may appear while opening Wireshark, click OK and continue
Wireshark Network Analyzer will be opened. On the "Capture" option of the main window, select the Local Area Connection that was created by the Kinetis Protocol Analyzer, in this example, Kinetis Protocol Analyzer created "Local Area Connection 2", then click "Start" button.
USB-KW41Z will start to sniff and upcoming data will be displayed in the "Capture" window of the Wireshark Network Protocol Analyzer.