Network Layer Decodes
Class ICMP6
Provides access to fields in an (IPv6) ICMP header.
| Instance Variables |
| type |
icmp.type ->
anInteger |
|
ICMP message type |
| code |
icmp.code ->
anInteger |
|
ICMP message code |
| checksum |
icmp.checksum ->
anInteger |
|
ICMP checksum |
| data | icmp.data ->
aByteArray |
| All the ICMP bytes, i.e. header and payload.
Use this if you need to work with some of the ICMP message types that
python-libtrace doesn't decode fully |
| payload | icmp.payload ->anIP6 for types 1, 2, 3 and 4, otherwise aByteArray |
| Some ICMP messages carry content
from the packet that triggered them; icmp6.payload returns as much
as it can of the triggering packet |
The content of an (IPv6) ICMP header varies depending on its type field. python-libtrace decodes the following types ...
| Echo Request (type 128) and Echo Reply (type 129) |
| ident |
icmp6.echo.ident ->
anInteger |
|
Echo identifier |
| sequence |
icmp6.echo.sequence ->
anInteger |
|
Echo sequence number |
| Packet too big (type 2) |
| mtu |
icmp6.toobig.mtu ->
anInteger |
|
MTU of link causing problem. Used as part of the Path MTU Discovery process |
| Parameter problem (type 4) |
| pointer |
icmp6.param.pointer->
anInteger |
|
Offset within the invoking packet where an error was detected |
| Neighbour discovery (types 135-136), Redirect (type 137) |
| target_prefix |
icmp6.neighbour.target_prefix ->
anIPprefix |
|
IPv6 address of the solicitation's target |
| dest-prefix |
icmp6.neighbour.target.dest_prefix -> anIPprefix |
|
Source Address of the packet that triggered the redirect message |
Nevil Brownlee
Sat, 22 Oct 16 (NZDT)