Skip to content

titom73/wireshark-ifa-decoder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Wireshark IFA 2.0 / INT-MX dissector (Lua)

Lua dissector for Wireshark that decodes Inband Flow Analyzer 2.0 (IFA 2.0) / INT-MX telemetry.

It supports two encapsulation modes:

  1. Native IFA 2.0 carried as IP Protocol 253 with a multi-hop metadata stack
  2. INT-MX postcard carried inside VXLAN (UDP/4789) and identified using marker MAC addresses

Tested with Arista EOS.

Example in Wireshark

Installation (simple)

  1. Make sure Wireshark has Lua enabled:

    • Preferences → Protocols → Lua
  2. Install the dissector into your Personal Lua Plugins folder:

    • In Wireshark: Help → About Wireshark → Folders
    • Look for Personal Lua Plugins and copy decoder/wireshark-int-decoder.lua into that directory
    • Or, on macOS, use one of the command-line options below (same goal, simpler updates)
  3. Restart Wireshark.

macOS (install from this repo)

If you want to keep this repository as the source (so updates are picked up automatically), you can symlink the Lua dissector into Wireshark’s personal plugins directory:

mkdir -p ~/.local/lib/wireshark/plugins/
ln -sf "$(pwd)/decoder/wireshark-int-decoder.lua" ~/.local/lib/wireshark/plugins/

macOS (no clone, download with curl)

If you don’t want to clone the repository, download the dissector directly into the plugins directory:

mkdir -p ~/.local/lib/wireshark/plugins/
curl -fsSL "https://raw.githubusercontent.com/titom73/wireshark-ifa-decoder/main/decoder/wireshark-int-decoder.lua" -o ~/.local/lib/wireshark/plugins/wireshark-int-decoder.lua

Usage

Open a capture that contains IFA 2.0 traffic. When the dissector runs, the Protocol column will show IFA 2.0, and the packet details will include an IFA 2.0 Telemetry tree.

Useful display filters:

  • ifa2 — frames decoded by this dissector
  • ip.proto == 253 — native IFA 2.0 (IP protocol 253)
  • udp.port == 4789 — VXLAN traffic (postcard mode is detected inside VXLAN)

Postcard detection details

For INT-MX postcard packets, the script runs as a post-dissector and looks for:

  • Outer UDP destination port 4789 (VXLAN)
  • Inner Ethernet marker MACs:
    • Destination starts with 00:11:01:00:00:XX
    • Source starts with 00:12:01:00:00:XX

Credits

License

GPL-2.0-only. See LICENSE.

About

A simple Inband Telemetry IFA2.0 decoder for waireshark

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Contributors

Languages