1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"><title>IProtocol Decodes: ICMP6</title>
<meta name="generator" content="KompoZer">
<link rel="stylesheet" type="text/css" href="plt-doc.css"></head>
<body>
<h2 style="text-align: left;">Network Layer Decodes</h2>
<h3>Class ICMP6</h3>
<p>Provides access to fields in an (IPv6) ICMP header.</p>
<table class="indent1">
<tbody>
<tr>
<td class="heading" colspan="2">Instance Variables</td>
</tr>
<tr>
<td class="name methodwidth"><strong>type</strong></td>
<td class="name descriptionwidth"><em>icmp.type ->
anInteger</em></td>
</tr>
<tr>
<td></td>
<td class="description">ICMP message type </td>
</tr>
<tr>
<td class="name"><strong>code</strong></td>
<td class="name"><em>icmp.code ->
anInteger</em></td>
</tr>
<tr>
<td></td>
<td class="description">ICMP message code </td>
</tr>
<tr>
<td class="name"><strong>checksum</strong></td>
<td class="name"><em>icmp.checksum ->
anInteger</em></td>
</tr>
<tr>
<td></td>
<td class="description">ICMP checksum </td>
</tr>
<tr><td style="font-weight: bold;" class="name">data</td><td class="name"><em>icmp.data ->
aByteArray</em></td>
</tr>
<tr>
<td></td><td class="description">All the ICMP bytes, i.e. header and payload.
Use this if you need to work with some of the ICMP message types that
python-libtrace doesn't decode fully</td>
</tr>
<tr>
<td style="font-weight: bold;" class="name">payload</td><td class="name"><em>icmp.payload ->anIP6 for types 1, 2, 3 and 4, otherwise aData</em></td>
</tr>
<tr>
<td></td><td class="description">Some ICMP messages carry content
from the packet that triggered them; icmp6.payload returns as much
as it can of the triggering packet</td>
</tr>
</tbody>
</table>
<p>The content of an (IPv6) ICMP header varies depending on its <span style="font-style: italic;">type</span> field. python-libtrace decodes the following types ...<span style="font-style: italic;"></span></p>
<span style="font-weight: bold;"></span><table class="indent1"><tbody><tr><td class="heading" colspan="2">Echo Request (type 128) and Echo Reply (type 129)</td></tr><tr><td class="name methodwidth"><strong style="font-weight: bold;"></strong><span style="font-weight: bold;">ident</span></td>
<td class="name descriptionwidth"><em>icmp6.echo.ident ->
anInteger</em></td>
</tr>
<tr>
<td></td>
<td class="description">Echo identifier </td>
</tr>
<tr>
<td class="name"><strong>sequence </strong></td>
<td class="name"><em>icmp6.echo.sequence ->
anInteger</em></td>
</tr>
<tr>
<td></td>
<td class="description">Echo sequence number </td>
</tr>
</tbody>
</table><br>
<span style="font-weight: bold;"></span><table class="indent1"><tbody><tr><td class="heading" colspan="2">Packet too big (type 2)</td></tr><tr><td class="name methodwidth"><strong style="font-weight: bold;"></strong><span style="font-weight: bold;">mtu</span></td>
<td class="name descriptionwidth"><em>icmp6.toobig.mtu ->
anInteger</em></td>
</tr>
<tr>
<td></td>
<td class="description">MTU of link causing problem. Used as part of the Path MTU Discovery process</td>
</tr>
</tbody>
</table><br>
<span style="font-weight: bold;"></span><table class="indent1"><tbody><tr><td class="heading" colspan="2">Parameter problem (type 4)</td></tr><tr><td class="name methodwidth"><strong style="font-weight: bold;"></strong><span style="font-weight: bold;">pointer</span></td>
<td class="name descriptionwidth"><em>icmp6.param.pointer->
anInteger</em></td>
</tr>
<tr>
<td></td>
<td class="description">Offset within the invoking packet where an error was detected</td>
</tr>
</tbody>
</table><br>
<span style="font-weight: bold;"></span><table class="indent1"><tbody><tr><td class="heading" colspan="2">Neighbour discovery (types 135-136), Redirect (type 137)</td></tr><tr><td class="name methodwidth"><strong style="font-weight: bold;"></strong><span style="font-weight: bold;">target_prefix</span></td>
<td class="name descriptionwidth"><em>icmp6.neighbour.target_prefix ->
anIPprefix</em></td>
</tr>
<tr>
<td></td>
<td class="description"> IPv6 address of the solicitation's target</td>
</tr>
<tr>
<td class="name"><strong>dest-prefix</strong></td>
<td class="name"><em>icmp6.neighbour.target.dest_prefix -> anIPprefix</em></td>
</tr>
<tr>
<td></td>
<td class="description">Source Address of the packet that triggered the redirect message </td>
</tr>
</tbody>
</table><br><p>Nevil Brownlee<br>
Thu, 16 Jan 14 (NZDT)</p>
</body></html>
|