NWP Debugging Wi-Fi#
This section provides information about the prerequisites for debugging NWP issues.
NWP issues can be analyzed/debugged using the following methods:
Checking NWP responsiveness through debug logs.
Collecting and sharing RAM dumps with Silabs for detailed analysis.
Collecting and sharing sniffer logs with silabs for detailed analysis.
Checking NWP Responsiveness Through Debug Logs#
Trigger any query command from the application. For example:
Firmware Version: Use the
sl_si91x_get_firmware_version
command to get the firmware version.Network Parameters: If the device is connected to a network, use the
network_params
command.
Trigger a Ping test between the device and AP.
Collecting and Sharing RAM Dumps with Silabs for Detailed Analysis#
RAM dumps are used to debug NWP-related issues. We can collect a RAM dump as explained in the link below:
Collecting and Sharing Sniffer Logs with Silabs for Detailed Analysis#
In the following scenarios, debugging may require wireless sniffer logs (e.g., Wireshark):
If the NWP is in a responsive state and the issue is protocol-related (DHCP, DNS, MQTT, HTTP, etc.).
Wi-Fi connection failure.
TLS handshake failure.
Certificate-based authentication issues (e.g., EAP TLS, TTLS, PEAP, etc.,).
Collect certificates used for authentication.
If possible, obtain radius server logs.
Network application connection failure.
Data stall.
Interoperability issues (e.g., the SiWx91x module fails to connect to a specific Access Point (AP) while successfully
connecting to other APs).For TWT and power save related issues.
Example
EAPOL 4-Way Handshake Sniffer Capture
EAP Authentication Sniffer Capture
Note
For network application protocol issues, it is essential to capture all EAPOL (Extensible Authentication Protocol over LAN) Wi-Fi frames exchanged during the Wi-Fi authentication process in the sniffer log. Additionally, any decryption keys must be provided to facilitate the analysis.
For any EAP-related issues, capturing EAP packets is mandatory in the sniffer log.