Teledyne LeCroy UWBTracer User Manual User Manual
Page 204

Chapter 12: Recording Options
UWBTracer/Trainer User Manual
186
LeCroy Corporation
Device Tracking
After the analyzer is initialized/synchronized to a device on a channel, if the DUT changes
channels, the analyzer can follow a specific DUT to the other channel or it can stay on
the same channel and follow a beacon switch or a burst preamble of the DUT(s). The
device tracking options are:
•
Follow Channel Change: The analyzer follows the specified DUT to a different
channel if the DUT changes to a different channel.
•
Follow Beacon Switch: The analyzer stays on the same channel and follows a
beacon switch of any of the DUT(s) if the specified DUT changes to a different chan-
nel.
•
Follow Burst Preamble: The analyzer stays on the same channel and follows a
burst preamble of any of the DUT(s) if the specified DUT changes to a different
channel.
Devices to Track
Several DUTs may share the same channel to which the analyzer is synchronized. You
can set the analyzer to follow one or a subset of those DUTs.
To select a subset of the devices, you can select from a list of DUTs. Alternatively, you
can filter a subset from the set of devices by setting the MAC Address Mask and the
SrcID (Source ID) Mask. Only the devices matching the properties you set will be in the
subset of devices.
To set the devices to track, select Any Device or Only DUT. If you select Only DUT,
select the device from the list of devices. The MAC Addr (Address) Mask and the
SrcID (Source ID) Mask are listed in hexadecimal.
Encrypted/Decrypted Recording
You can show secured decrypted traffic, original (secured or not secured) traffic only, or
both types of traffic:
•
Decrypted (Secured) + Non-Secured Traffic Only: Records all non-secure
frames; records secure frames, and stores decrypted payload.
•
Original (Secured or Non-Secured) Traffic only: Records all non-secure and
secure frames unchanged.
•
Both: Interleaves Decrypted and Original Traffic.
For information about setting decryption connection contexts and temporal keys, see
Section 9.7, “Device List” on page 131.
(For information about encryption keys, association data, and 4-way handshakes, see
Section 11.5, “Secured Traffic” on page 171.)