Processing Tab

Holds parameters related to protocol processing:

Figure 298 – Preferences, Processing tab – Top section

 

 

 

 

Figure 299 – Preferences, Processing tab – Bottom section

 

   Fragmentation Timeout:

Time in milliseconds from receiving the first fragment until the de-fragmentation process drops the message. This parameter is usually defined by the protocol documentation.

   Association Timeout:

Maximal time in milliseconds that the analyzer will 'look back' checking for association request for the association reply that was just received.

   Ack Timeout:

Maximal time in milliseconds that the analyzer will 'wait' for an acknowledgement of a message and still refer to it as an acknowledgement.

   NWL Routing Hops Timeout:

Maximal time in milliseconds that the analyzer will 'look back' and check for Network Layer Routing Hops messages and still refer to it as a NWL Routing message.

   RF4CE Ping Timeout:

Maximal time in milliseconds allowed for an RF4CE Ping request and until a Ping respond is received. After this time, the Ping response will not be associated to the initial Ping request.

   RF4CE Discovery Timeout:

Maximal time in milliseconds to allow for the RF4CE discovery process.

   Try All File Keys:, Try All Known Keys: and Use Keys From File

Set which keys to process. See par. ‎0.

   Force Keys Default Level: The user can force using the Default Key Level regardless of the Key Level set individually for each encryption key. This is accomplished by selecting the ‘Force Default Level’ checkbox (unless there is a specific different need, having ‘Force Default Level’ checkbox selected is recommended).

   MAC-2003 Security Suite:

If the user is interested to use deciphering algorithms based on the MAC-2003 Security Suite, he can choose the deciphering algorithm to use from the drop-down list:

0. None – Do not use the MAC-2003 Security Suite

1. AES-CTR

2. AES-CCM-128

3. AES-CCM-64

4. AES-CCM-32

5. AES-CBC-MAC-128

6. AES-CBC-MAC-64

7. AES-CBC-MAC-32

Notes:
MAC2003 Security Suite type can be set either through this form or through the Security section (See chapter
‎16 for details). Setting through one of these two methods is sufficient.
Unlike the plain Master key level (when MAC2003 Security Suite is set to '0. None'), levels 1 to 7 of the MAC2003 Security Key are not included in the data capture (.ANL) file. In such case in order to decipher the data of a given data capture file, the user needs to set the key manually.
When choosing MAC2003 level '1. AES CTR', the 'Try All Keys' option is ignored.

   TCP Fragmentation Timeout:

Unlike other protocols, TCP messages can be take quite a long time from the first message of a fragment is received and until the last message of the fragment is received (and in-between different fragments might be received asynchronously and without following the fragments' series order).
This variable sets the time in milliseconds from receiving the first TCP message fragment until the last fragment of the series is expected until the de-fragmentation process drops the message and sets a relevant error.

   TCP Max Segmentation Len:

This variable sets the maximal length of a full (de-fragmented) TCP message in number of received characters.

   HTTP Fragmentation Sequence Gap:

Max HTTP fragmentation sequence gap. When the sequence number of a new fragment exceeds this gap (from the end of the previous fragment), the old fragments are discarded.

   TCP Ack Timeout:

Maximal time in milliseconds that the analyzer will 'wait' for an acknowledgement of a TCP message and still refer to it as an acknowledgement.

   Smart Energy Version:

The user can choose between different Smart Energy profile versions when analyzing ZigBee Smart Energy V1.x based networks:

1.0 rev. 15

1.0 Jan. 2010

1.1 ver. 09

1.1 r18 October 7 2012

Extensions for UK April 2011

1.2 Dec 2012

1.2 Aug 2013

   Home Automation Version:

The user can choose between different HA (Human Interface Devices) profile versions when analyzing ZigBee HA based networks:

before 1.2 rev 29

1.2 rev 29

   HID Version:

The user can choose between different HID (Human Interface Devices) profile versions when analyzing ZigBee HID based networks:

rev. 08 August 2010

rev 10 Jan. 2011

rev 10 March 8 2011

GDP March 2011

June 2011 (HID r15, GDP r1)

January 2013

2.0 Feb 2014

   Light Link Version:

The user can choose between different LL (Light Link) profile versions when analyzing ZigBee LL based networks:

1.0 rev 10

1.1 rev 02

   Show Non Standard Profiles:

When checked the analyzer will analyze known clusters although the profile might be unknown (i.e. vendor specific or not released yet).

   TA Billing Cluster ID:

The user can change here the Telecom Services (AKA Telecom applications) Cluster ID in hex – to avoid Cluster ID conflicts

   E@H Appliance Events and Alerts Cluster ID:

The user can change here the Energy at Home Events and Alerts Cluster ID in hex – to avoid Cluster ID conflicts

   Power Profile Cluster ID:

The user can change here the Power Profile Cluster ID in hex – to avoid Cluster ID conflicts

   TA Information Cluster ID:

The user can change here the Telecom Services (AKA Telecom applications) Information Cluster ID in hex – to avoid Cluster ID conflicts

   Green Power Proxy Cluster ID:

The user can change here the Green Power Proxy Cluster ID in hex – to avoid Cluster ID conflicts

   TA Payment Cluster ID:

The user can change here the Telecom Services (AKA Telecom applications) Payment Cluster ID in hex – to avoid Cluster ID conflicts

   TA Appliance Identification Cluster ID:

The user can change here the Telecom Services (AKA Telecom applications) Appliance Identification Cluster ID in hex – to avoid Cluster ID conflicts

   Alpha Secure Access Control Cluster ID:

The user can change here the Alpha Secure Access Control Cluster ID in hex – to avoid Cluster ID conflicts

   Over The Air Updates Cluster ID:

The user can change here the Over The Air Updates Cluster ID in hex – to avoid Cluster ID conflicts

   TA7816 Tunnel Cluster ID:

The user can change here the TA7816 Tunnel Cluster ID in hex – to avoid Cluster ID conflicts

   Mark Traffic Gen Messages: - valid only when the Peryton-TG Add-On is installed

Mark Traffic-Generated messages from the same Perytons™ Protocol Analyzer especially to allow easy differentiation between them and messages captured through the front-end device/s.

   SE TOU Calendar Cluster ID:

The user can change here the SE TOU Calendar Cluster ID in hex – to avoid Cluster ID conflicts

   SE Device Management Cluster ID:

The user can change here the SE Device Management Cluster ID in hex – to avoid Cluster ID conflicts

   HA Appliance Statistics Cluster ID:

The user can change here the HA Appliance Statistics Cluster ID in hex – to avoid Cluster ID conflicts

   SE Events Cluster ID:

The user can change here the SE Events Cluster ID in hex – to avoid Cluster ID conflicts

   SE HTT Access Control Cluster ID:

The user can change here the SE HTT Access Control Cluster ID in hex – to avoid Cluster ID conflicts

   SE HTT Authorization Cluster ID:

The user can change here the SE HTT Authorization Cluster ID in hex – to avoid Cluster ID conflicts

   SE HTT Commissioning Cluster ID:

The user can change here the SE HTT Commissioning Cluster ID in hex – to avoid Cluster ID conflicts

   SE MDU Pairing Cluster ID:

The user can change here the SE MDU Pairing Cluster ID in hex – to avoid Cluster ID conflicts

   SE Energy Management Cluster ID:

The user can change here the SE Energy Management Cluster ID in hex – to avoid Cluster ID conflicts

   SE Schema File:

The user should set here the specific Schema File name that is used to de-compress EXI compressed payload