<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Odd random L2CAP Fragment packets observed in Wireshark trace</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/122916/odd-random-l2cap-fragment-packets-observed-in-wireshark-trace</link><description>Greetings! 
 I am using Wireshark along with an nRF52840 dongle to monitor BLE traffic between a mobile app and connected peripheral and periodically I see some &amp;quot;L2CAP Fragment&amp;quot; packets that don&amp;#39;t appear to correlate to any (obvious) BLE transmissions</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 22 Jul 2025 08:07:52 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/122916/odd-random-l2cap-fragment-packets-observed-in-wireshark-trace" /><item><title>RE: Odd random L2CAP Fragment packets observed in Wireshark trace</title><link>https://devzone.nordicsemi.com/thread/543113?ContentTypeID=1</link><pubDate>Tue, 22 Jul 2025 08:07:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d1c052e6-fe9b-402c-933c-393804aae866</guid><dc:creator>Susheel Nuguru</dc:creator><description>&lt;p&gt;You can explicitly verify those random “L2CAP Fragment” lines by enabling SDU reassembly in Wireshark’s Bluetooth L2CAP preferences. After you do, Wireshark will stitch the fragments back together and show the full L2CAP signaling PDU. I am no expert in this so probably the Wireshare Wiki or &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/14627/wireshark-ble-l2cap-packet-reassembly"&gt;this devzone &lt;/a&gt;thread could help you.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Odd random L2CAP Fragment packets observed in Wireshark trace</title><link>https://devzone.nordicsemi.com/thread/542656?ContentTypeID=1</link><pubDate>Wed, 16 Jul 2025 13:53:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7145e57a-b406-46e8-ae05-0500dba90fe7</guid><dc:creator>Blue Five</dc:creator><description>&lt;p&gt;Thank you for the response. It was along the lines of what I was thinking.&lt;/p&gt;
&lt;p&gt;Is there a way to specifically verify that&amp;#39;s what these types of packets are?&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Odd random L2CAP Fragment packets observed in Wireshark trace</title><link>https://devzone.nordicsemi.com/thread/542601?ContentTypeID=1</link><pubDate>Wed, 16 Jul 2025 06:15:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5e3bd449-71b4-4d9f-b34d-37b2cbdea13b</guid><dc:creator>Susheel Nuguru</dc:creator><description>&lt;p&gt;During normal operation the peripheral’s BLE controller will occasionally send L2CAP signaling messages, most commonly connection-parameter update requests that get split across multiple link-layer packets. Your over-the-air sniffer sees these, but Xcode’s PacketLogger (which logs only HCI-level host traffic on the central) does not. They are perfectly normal behavior and harmless transmissions. If you would like to suppress them in Wireshark, simply filter out “L2CAP Fragment” PDUs or the specific L2CAP signaling codes you don’t need to see.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>