OFP_Sniffer is an OpenFlow sniffer for troubleshooting production networks and learning purposes.
OFP_Sniffer works directly on Linux shell and dissects all OpenFlow messages on the wire. Using OFP_Sniffer, you can easily track OpenFlow messages and errors associated (if any), without opening X11 or Wireshark. OFP_Sniffer was written in Python 3.6 to support the AmLight SDN deployment (www.sdn.amlight.net). AmLight SDN uses Internet2 FlowSpace Firewall, OESS and On.Lab ONOS, and these apps were tested and are fully supported.
This tool started to be developed after a conversation with Andrew Ragusa (a.k.a. A.J) from Indiana University along the NITRD – Roadmap to Operating SDN-based Networks Workshop hosted by ESNET and Internet2. (Link to NITRD workshop: https://www.nitrd.gov/nitrdgroups/index.php?title=SDN_Operational_Issues_WS)
+ All Linux OS and Python 3.6
+ termcolor hexdump netaddr pcapy python-openflow & flask python 3.6 Module
Usage and Build:
git clone https://github.com/amlight/ofp_sniffer.git
pip3.6 install docs/requirements.txt
sudo python3.6 ofp_sniffer.py -f /docs/topology.json