<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/29819/wireshark-2-4-3-cannot-detect-pca10031-com-port-interface</link><description>-Dear Nordic Devteam 
 Thanks for your endeavor for the nRF Sniffer 2 . Although it is a beta version, this is sincerely anticipating. 
 
 To set up the Sniffer you will need one of the following kits: 
 nRF51 Development Kit (PCA10028) v1.0 or later</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 25 Jan 2018 16:21:26 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/29819/wireshark-2-4-3-cannot-detect-pca10031-com-port-interface" /><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118430?ContentTypeID=1</link><pubDate>Thu, 25 Jan 2018 16:21:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c23f0bb9-116b-4c04-87b3-471cc6b65f62</guid><dc:creator>dcollier8</dc:creator><description>&lt;p&gt;I could not even see the interface toolbar or the sniffer in it. Per suggestion from Mango, this was because I did not execute nrf_sniffer.bat correctly. So I solved this as follows, and the problem is solved:&lt;/p&gt;
&lt;p&gt;Copy nrf_sniffer.bat and nrf_sniffer.py, and the folder SnifferAPI to this folder: C:\Program Files\Wireshark\extcap&lt;/p&gt;
&lt;p&gt;Then I reran this command from cmd.exe window:&lt;/p&gt;
&lt;p&gt;C:\Program Files\Wireshark\extcap&amp;gt;nrf_sniffer.bat --extcap-interfaces
extcap {version=2.0.0}{display=nRF Sniffer}{help=&lt;a href="http://www.nordicsemi.com/eng/P"&gt;www.nordicsemi.com/.../P&lt;/a&gt;
roducts/Bluetooth-low-energy/nRF-Sniffer#Downloads}
control {number=0}{type=selector}{display=Device}{tooltip=Device list}
control {number=1}{type=string}{display=Passkey / OOB key}{tooltip=6 digit tempo
rary key or 16 byte Out-of-band (OOB) key in hexadecimal starting with &amp;#39;0x&amp;#39;, big
endian format. If the entered key is shorter than 16 bytes, it will be zero-pad
ded in front&amp;#39;}{validation=\b^(([0-9]{6})|(0x[0-9a-fA-F]{1,32}))$\b}
control {number=2}{type=string}{display=Adv Hop}{default=37,38,39}{tooltip=Adver
tising channel hop sequence. Change the order in which the siffer switches adver
tising channels. Valid channels are 37, 38 and 39 separated by comma.}{validatio
n=^\s*((37|38|39)\s*,\s*){0,2}(37|38|39){1}\s*$}{required=true}
control {number=3}{type=button}{role=help}{display=Help}{tooltip=Access user gui
de (launches browser)}
control {number=4}{type=button}{role=restore}{display=Defaults}{tooltip=Resets t
he user interface and clears the log file}
control {number=5}{type=button}{role=logger}{display=Log}{tooltip=Log per interf
ace}
value {control=0}{value= }{display=All advertising devices}{default=true}&lt;/p&gt;
&lt;p&gt;The problem was then solved, and I can see the interface toolbar with the sniffer shown, which I then selected. However, the interface was then not added to the interfaces list to select for capture, what else needs to be done ?&lt;/p&gt;
&lt;p&gt;I am using Wireshark latest 2.4.4 version. Windows7 32 bit.  Device Manager shows Com port: Jlink CDC UART Port (Com19). Having other USB connections or unplugging them did not make any difference. All other software versions installed from the sniffer user guide are matched correctly, although I installed pyserial using install command: &amp;quot;python setup.py install&amp;quot;, since I could not get the pip command to be installed or work (HELP: anyone know how to install pip ?&lt;/p&gt;
&lt;p&gt;pyserial installation log, (does this look successful ?):&lt;/p&gt;
&lt;p&gt;C:\1code\pyserial-master&amp;gt;pip install pyserial
&amp;#39;pip&amp;#39; is not recognized as an internal or external command,
operable program or batch file.&lt;/p&gt;
&lt;p&gt;C:\1code\pyserial-master&amp;gt;python setup.py install
running install
install_dir c:\Python27\Lib\site-packages&lt;br /&gt;
running bdist_egg
running egg_info
creating pyserial.egg-info
writing pyserial.egg-info\PKG-INFO
writing top-level names to pyserial.egg-info\top_level.txt
writing dependency_links to pyserial.egg-info\dependency_links.txt
writing manifest file &amp;#39;pyserial.egg-info\SOURCES.txt&amp;#39;
reading manifest file &amp;#39;pyserial.egg-info\SOURCES.txt&amp;#39;
reading manifest template &amp;#39;MANIFEST.in&amp;#39;
writing manifest file &amp;#39;pyserial.egg-info\SOURCES.txt&amp;#39;
installing library code to build\bdist.win32\egg
running install_lib
running build_py
creating build
creating build\lib
creating build\lib\serial
copying serial\rfc2217.py -&amp;gt; build\lib\serial
copying serial\rs485.py -&amp;gt; build\lib\serial
copying serial\serialcli.py -&amp;gt; build\lib\serial
copying serial\serialjava.py -&amp;gt; build\lib\serial
copying serial\serialposix.py -&amp;gt; build\lib\serial
copying serial\serialutil.py -&amp;gt; build\lib\serial
copying serial\serialwin32.py -&amp;gt; build\lib\serial
copying serial\win32.py -&amp;gt; build\lib\serial
copying serial_&lt;em&gt;init&lt;/em&gt;&lt;em&gt;.py -&amp;gt; build\lib\serial
creating build\lib\serial\tools
copying serial\tools\hexlify_codec.py -&amp;gt; build\lib\serial\tools
copying serial\tools\list_ports.py -&amp;gt; build\lib\serial\tools
copying serial\tools\list_ports_common.py -&amp;gt; build\lib\serial\tools
copying serial\tools\list_ports_linux.py -&amp;gt; build\lib\serial\tools
copying serial\tools\list_ports_osx.py -&amp;gt; build\lib\serial\tools
copying serial\tools\list_ports_posix.py -&amp;gt; build\lib\serial\tools
copying serial\tools\list_ports_windows.py -&amp;gt; build\lib\serial\tools
copying serial\tools\miniterm.py -&amp;gt; build\lib\serial\tools
copying serial\tools_&lt;em&gt;init&lt;/em&gt;&lt;/em&gt;.py -&amp;gt; build\lib\serial\tools
creating build\lib\serial\urlhandler
copying serial\urlhandler\protocol_alt.py -&amp;gt; build\lib\serial\urlhandler
copying serial\urlhandler\protocol_hwgrep.py -&amp;gt; build\lib\serial\urlhandler
copying serial\urlhandler\protocol_loop.py -&amp;gt; build\lib\serial\urlhandler
copying serial\urlhandler\protocol_rfc2217.py -&amp;gt; build\lib\serial\urlhandler
copying serial\urlhandler\protocol_socket.py -&amp;gt; build\lib\serial\urlhandler
copying serial\urlhandler\protocol_spy.py -&amp;gt; build\lib\serial\urlhandler
copying serial\urlhandler_&lt;em&gt;init&lt;/em&gt;&lt;em&gt;.py -&amp;gt; build\lib\serial\urlhandler
creating build\lib\serial\threaded
copying serial\threaded_&lt;em&gt;init&lt;/em&gt;&lt;/em&gt;.py -&amp;gt; build\lib\serial\threaded
creating build\bdist.win32
creating build\bdist.win32\egg
creating build\bdist.win32\egg\serial
copying build\lib\serial\rfc2217.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\rs485.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialcli.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialjava.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialposix.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialutil.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialwin32.py -&amp;gt; build\bdist.win32\egg\serial
creating build\bdist.win32\egg\serial\threaded
copying build\lib\serial\threaded_&lt;em&gt;init&lt;/em&gt;_.py -&amp;gt; build\bdist.win32\egg\serial\th
readed
creating build\bdist.win32\egg\serial\tools
copying build\lib\serial\tools\hexlify_codec.py -&amp;gt; build\bdist.win32\egg\serial&lt;br /&gt;
tools
copying build\lib\serial\tools\list_ports.py -&amp;gt; build\bdist.win32\egg\serial\too
ls
copying build\lib\serial\tools\list_ports_common.py -&amp;gt; build\bdist.win32\egg\ser
ial\tools
copying build\lib\serial\tools\list_ports_linux.py -&amp;gt; build\bdist.win32\egg\seri
al\tools
copying build\lib\serial\tools\list_ports_osx.py -&amp;gt; build\bdist.win32\egg\serial
\tools
copying build\lib\serial\tools\list_ports_posix.py -&amp;gt; build\bdist.win32\egg\seri
al\tools
copying build\lib\serial\tools\list_ports_windows.py -&amp;gt; build\bdist.win32\egg\se
rial\tools
copying build\lib\serial\tools\miniterm.py -&amp;gt; build\bdist.win32\egg\serial\tools&lt;/p&gt;
&lt;p&gt;copying build\lib\serial\tools_&lt;em&gt;init&lt;/em&gt;_.py -&amp;gt; build\bdist.win32\egg\serial\tools&lt;/p&gt;
&lt;p&gt;creating build\bdist.win32\egg\serial\urlhandler
copying build\lib\serial\urlhandler\protocol_alt.py -&amp;gt; build\bdist.win32\egg\ser
ial\urlhandler
copying build\lib\serial\urlhandler\protocol_hwgrep.py -&amp;gt; build\bdist.win32\egg&lt;br /&gt;
serial\urlhandler
copying build\lib\serial\urlhandler\protocol_loop.py -&amp;gt; build\bdist.win32\egg\se
rial\urlhandler
copying build\lib\serial\urlhandler\protocol_rfc2217.py -&amp;gt; build\bdist.win32\egg
\serial\urlhandler
copying build\lib\serial\urlhandler\protocol_socket.py -&amp;gt; build\bdist.win32\egg&lt;br /&gt;
serial\urlhandler
copying build\lib\serial\urlhandler\protocol_spy.py -&amp;gt; build\bdist.win32\egg\ser
ial\urlhandler
copying build\lib\serial\urlhandler_&lt;em&gt;init&lt;/em&gt;&lt;em&gt;.py -&amp;gt; build\bdist.win32\egg\serial&lt;br /&gt;
urlhandler
copying build\lib\serial\win32.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial_&lt;em&gt;init&lt;/em&gt;&lt;/em&gt;.py -&amp;gt; build\bdist.win32\egg\serial
byte-compiling build\bdist.win32\egg\serial\rfc2217.py to rfc2217.pyc
byte-compiling build\bdist.win32\egg\serial\rs485.py to rs485.pyc
byte-compiling build\bdist.win32\egg\serial\serialcli.py to serialcli.pyc
byte-compiling build\bdist.win32\egg\serial\serialjava.py to serialjava.pyc
byte-compiling build\bdist.win32\egg\serial\serialposix.py to serialposix.pyc
byte-compiling build\bdist.win32\egg\serial\serialutil.py to serialutil.pyc
byte-compiling build\bdist.win32\egg\serial\serialwin32.py to serialwin32.pyc
byte-compiling build\bdist.win32\egg\serial\threaded_&lt;em&gt;init&lt;/em&gt;_.py to &lt;strong&gt;init&lt;/strong&gt;.pyc&lt;/p&gt;
&lt;p&gt;byte-compiling build\bdist.win32\egg\serial\tools\hexlify_codec.py to hexlify_co
dec.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports.py to list_ports.py
c
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_common.py to list_p
orts_common.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_linux.py to list_po
rts_linux.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_osx.py to list_port
s_osx.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_posix.py to list_po
rts_posix.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_windows.py to list_
ports_windows.pyc
byte-compiling build\bdist.win32\egg\serial\tools\miniterm.py to miniterm.pyc
byte-compiling build\bdist.win32\egg\serial\tools_&lt;em&gt;init&lt;/em&gt;&lt;em&gt;.py to &lt;strong&gt;init&lt;/strong&gt;.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_alt.py to protoc
ol_alt.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_hwgrep.py to pro
tocol_hwgrep.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_loop.py to proto
col_loop.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_rfc2217.py to pr
otocol_rfc2217.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_socket.py to pro
tocol_socket.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_spy.py to protoc
ol_spy.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler_&lt;em&gt;init&lt;/em&gt;&lt;/em&gt;.py to &lt;strong&gt;init&lt;/strong&gt;.p
yc
byte-compiling build\bdist.win32\egg\serial\win32.py to win32.pyc
byte-compiling build\bdist.win32\egg\serial_&lt;em&gt;init&lt;/em&gt;_.py to &lt;strong&gt;init&lt;/strong&gt;.pyc
creating build\bdist.win32\egg\EGG-INFO
installing scripts to build\bdist.win32\egg\EGG-INFO\scripts
running install_scripts
running build_scripts
creating build\scripts-2.7
copying and adjusting serial\tools\miniterm.py -&amp;gt; build\scripts-2.7
creating build\bdist.win32\egg\EGG-INFO\scripts
copying build\scripts-2.7\miniterm.py -&amp;gt; build\bdist.win32\egg\EGG-INFO\scripts
copying pyserial.egg-info\PKG-INFO -&amp;gt; build\bdist.win32\egg\EGG-INFO
copying pyserial.egg-info\SOURCES.txt -&amp;gt; build\bdist.win32\egg\EGG-INFO
copying pyserial.egg-info\dependency_links.txt -&amp;gt; build\bdist.win32\egg\EGG-INFO&lt;/p&gt;
&lt;p&gt;copying pyserial.egg-info\top_level.txt -&amp;gt; build\bdist.win32\egg\EGG-INFO
zip_safe flag not set; analyzing archive contents...
creating dist
creating &amp;#39;dist\pyserial-3.4-py2.7.egg&amp;#39; and adding &amp;#39;build\bdist.win32\egg&amp;#39; to it
removing &amp;#39;build\bdist.win32\egg&amp;#39; (and everything under it)
Processing pyserial-3.4-py2.7.egg
creating c:\python27\lib\site-packages\pyserial-3.4-py2.7.egg
Extracting pyserial-3.4-py2.7.egg to c:\python27\lib\site-packages
Adding pyserial 3.4 to easy-install.pth file
error: c:\python27\lib\site-packages\easy-install.pth: Permission denied&lt;/p&gt;
&lt;p&gt;C:\1code\pyserial-master&amp;gt;python setup.py install
running install
install_dir c:\Python27\Lib\site-packages&lt;br /&gt;
running bdist_egg
running egg_info
writing pyserial.egg-info\PKG-INFO
writing top-level names to pyserial.egg-info\top_level.txt
writing dependency_links to pyserial.egg-info\dependency_links.txt
reading manifest file &amp;#39;pyserial.egg-info\SOURCES.txt&amp;#39;
reading manifest template &amp;#39;MANIFEST.in&amp;#39;
writing manifest file &amp;#39;pyserial.egg-info\SOURCES.txt&amp;#39;
installing library code to build\bdist.win32\egg
running install_lib
running build_py
creating build\bdist.win32\egg
creating build\bdist.win32\egg\serial
copying build\lib\serial\rfc2217.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\rs485.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialcli.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialjava.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialposix.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialutil.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial\serialwin32.py -&amp;gt; build\bdist.win32\egg\serial
creating build\bdist.win32\egg\serial\threaded
copying build\lib\serial\threaded_&lt;em&gt;init&lt;/em&gt;_.py -&amp;gt; build\bdist.win32\egg\serial\th
readed
creating build\bdist.win32\egg\serial\tools
copying build\lib\serial\tools\hexlify_codec.py -&amp;gt; build\bdist.win32\egg\serial&lt;br /&gt;
tools
copying build\lib\serial\tools\list_ports.py -&amp;gt; build\bdist.win32\egg\serial\too
ls
copying build\lib\serial\tools\list_ports_common.py -&amp;gt; build\bdist.win32\egg\ser
ial\tools
copying build\lib\serial\tools\list_ports_linux.py -&amp;gt; build\bdist.win32\egg\seri
al\tools
copying build\lib\serial\tools\list_ports_osx.py -&amp;gt; build\bdist.win32\egg\serial
\tools
copying build\lib\serial\tools\list_ports_posix.py -&amp;gt; build\bdist.win32\egg\seri
al\tools
copying build\lib\serial\tools\list_ports_windows.py -&amp;gt; build\bdist.win32\egg\se
rial\tools
copying build\lib\serial\tools\miniterm.py -&amp;gt; build\bdist.win32\egg\serial\tools&lt;/p&gt;
&lt;p&gt;copying build\lib\serial\tools_&lt;em&gt;init&lt;/em&gt;_.py -&amp;gt; build\bdist.win32\egg\serial\tools&lt;/p&gt;
&lt;p&gt;creating build\bdist.win32\egg\serial\urlhandler
copying build\lib\serial\urlhandler\protocol_alt.py -&amp;gt; build\bdist.win32\egg\ser
ial\urlhandler
copying build\lib\serial\urlhandler\protocol_hwgrep.py -&amp;gt; build\bdist.win32\egg&lt;br /&gt;
serial\urlhandler
copying build\lib\serial\urlhandler\protocol_loop.py -&amp;gt; build\bdist.win32\egg\se
rial\urlhandler
copying build\lib\serial\urlhandler\protocol_rfc2217.py -&amp;gt; build\bdist.win32\egg
\serial\urlhandler
copying build\lib\serial\urlhandler\protocol_socket.py -&amp;gt; build\bdist.win32\egg&lt;br /&gt;
serial\urlhandler
copying build\lib\serial\urlhandler\protocol_spy.py -&amp;gt; build\bdist.win32\egg\ser
ial\urlhandler
copying build\lib\serial\urlhandler_&lt;em&gt;init&lt;/em&gt;&lt;em&gt;.py -&amp;gt; build\bdist.win32\egg\serial&lt;br /&gt;
urlhandler
copying build\lib\serial\win32.py -&amp;gt; build\bdist.win32\egg\serial
copying build\lib\serial_&lt;em&gt;init&lt;/em&gt;&lt;/em&gt;.py -&amp;gt; build\bdist.win32\egg\serial
byte-compiling build\bdist.win32\egg\serial\rfc2217.py to rfc2217.pyc
byte-compiling build\bdist.win32\egg\serial\rs485.py to rs485.pyc
byte-compiling build\bdist.win32\egg\serial\serialcli.py to serialcli.pyc
byte-compiling build\bdist.win32\egg\serial\serialjava.py to serialjava.pyc
byte-compiling build\bdist.win32\egg\serial\serialposix.py to serialposix.pyc
byte-compiling build\bdist.win32\egg\serial\serialutil.py to serialutil.pyc
byte-compiling build\bdist.win32\egg\serial\serialwin32.py to serialwin32.pyc
byte-compiling build\bdist.win32\egg\serial\threaded_&lt;em&gt;init&lt;/em&gt;_.py to &lt;strong&gt;init&lt;/strong&gt;.pyc&lt;/p&gt;
&lt;p&gt;byte-compiling build\bdist.win32\egg\serial\tools\hexlify_codec.py to hexlify_co
dec.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports.py to list_ports.py
c
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_common.py to list_p
orts_common.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_linux.py to list_po
rts_linux.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_osx.py to list_port
s_osx.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_posix.py to list_po
rts_posix.pyc
byte-compiling build\bdist.win32\egg\serial\tools\list_ports_windows.py to list_
ports_windows.pyc
byte-compiling build\bdist.win32\egg\serial\tools\miniterm.py to miniterm.pyc
byte-compiling build\bdist.win32\egg\serial\tools_&lt;em&gt;init&lt;/em&gt;&lt;em&gt;.py to &lt;strong&gt;init&lt;/strong&gt;.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_alt.py to protoc
ol_alt.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_hwgrep.py to pro
tocol_hwgrep.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_loop.py to proto
col_loop.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_rfc2217.py to pr
otocol_rfc2217.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_socket.py to pro
tocol_socket.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler\protocol_spy.py to protoc
ol_spy.pyc
byte-compiling build\bdist.win32\egg\serial\urlhandler_&lt;em&gt;init&lt;/em&gt;&lt;/em&gt;.py to &lt;strong&gt;init&lt;/strong&gt;.p
yc
byte-compiling build\bdist.win32\egg\serial\win32.py to win32.pyc
byte-compiling build\bdist.win32\egg\serial_&lt;em&gt;init&lt;/em&gt;_.py to &lt;strong&gt;init&lt;/strong&gt;.pyc
creating build\bdist.win32\egg\EGG-INFO
installing scripts to build\bdist.win32\egg\EGG-INFO\scripts
running install_scripts
running build_scripts
creating build\bdist.win32\egg\EGG-INFO\scripts
copying build\scripts-2.7\miniterm.py -&amp;gt; build\bdist.win32\egg\EGG-INFO\scripts
copying pyserial.egg-info\PKG-INFO -&amp;gt; build\bdist.win32\egg\EGG-INFO
copying pyserial.egg-info\SOURCES.txt -&amp;gt; build\bdist.win32\egg\EGG-INFO
copying pyserial.egg-info\dependency_links.txt -&amp;gt; build\bdist.win32\egg\EGG-INFO&lt;/p&gt;
&lt;p&gt;copying pyserial.egg-info\top_level.txt -&amp;gt; build\bdist.win32\egg\EGG-INFO
zip_safe flag not set; analyzing archive contents...
creating &amp;#39;dist\pyserial-3.4-py2.7.egg&amp;#39; and adding &amp;#39;build\bdist.win32\egg&amp;#39; to it
removing &amp;#39;build\bdist.win32\egg&amp;#39; (and everything under it)
Processing pyserial-3.4-py2.7.egg
removing &amp;#39;c:\python27\lib\site-packages\pyserial-3.4-py2.7.egg&amp;#39; (and everything
under it)
creating c:\python27\lib\site-packages\pyserial-3.4-py2.7.egg
Extracting pyserial-3.4-py2.7.egg to c:\python27\lib\site-packages
Adding pyserial 3.4 to easy-install.pth file
Installing miniterm.py script to c:\Python27\Scripts&lt;/p&gt;
&lt;p&gt;Installed c:\python27\lib\site-packages\pyserial-3.4-py2.7.egg
Processing dependencies for pyserial==3.4
Finished processing dependencies for pyserial==3.4&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;I found how to install pip here: &lt;a href="https://pip.pypa.io/en/stable/installing/"&gt;pip.pypa.io/.../&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;result log:
C:\1code\pyserial-master&amp;gt;python get-pip.py install
c:\Python27\lib\site-packages\setuptools\command\install_scripts.py:3: UserWarni
ng: Module pip was already imported from c:\users\dcollier\appdata\local\temp\tm
pzltby6\pip.zip\pip_&lt;em&gt;init&lt;/em&gt;&lt;em&gt;.py, but c:\python27\lib\site-packages is being adde
d to sys.path
from pkg_resources import Distribution, PathMetadata, ensure_directory
Collecting install
c:\users\dcollier\appdata\local\temp\tmpzltby6\pip.zip\pip_vendor\requests\pack
ages\urllib3\util\ssl&lt;/em&gt;.py:318: SNIMissingWarning: An HTTPS request has been made
, but the SNI (Subject Name Indication) extension to TLS is not available on thi
s platform. This may cause the server to present an incorrect TLS certificate, w
hich can cause validation failures. You can upgrade to a newer version of Python
to solve this. For more information, see &lt;a href="https://urllib3.readthedocs.io/en/late"&gt;urllib3.readthedocs.io/.../late&lt;/a&gt;
st/security.html#snimissingwarning.
c:\users\dcollier\appdata\local\temp\tmpzltby6\pip.zip\pip_vendor\requests\pack
ages\urllib3\util\ssl_.py:122: InsecurePlatformWarning: A true SSLContext object
is not available. This prevents urllib3 from configuring SSL appropriately and
may cause certain SSL connections to fail. You can upgrade to a newer version of
Python to solve this. For more information, see &lt;a href="https://urllib3.readthedocs.io/"&gt;urllib3.readthedocs.io/&lt;/a&gt;
en/latest/security.html#insecureplatformwarning.
Could not find a version that satisfies the requirement install (from versions
: )
No matching distribution found for install
c:\users\dcollier\appdata\local\temp\tmpzltby6\pip.zip\pip_vendor\requests\pack
ages\urllib3\util\ssl_.py:122: InsecurePlatformWarning: A true SSLContext object
is not available. This prevents urllib3 from configuring SSL appropriately and
may cause certain SSL connections to fail. You can upgrade to a newer version of
Python to solve this. For more information, see &lt;a href="https://urllib3.readthedocs.io/"&gt;urllib3.readthedocs.io/&lt;/a&gt;
en/latest/security.html#insecureplatformwarning.
You are using pip version 0.8.2, however version 9.0.1 is available.
You should consider upgrading via the &amp;#39;python -m pip install --upgrade pip&amp;#39; comm
and.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;still cannot run pip:&lt;/p&gt;
&lt;p&gt;C:\1code\pyserial-master&amp;gt;pip install pyserial
&amp;#39;pip&amp;#39; is not recognized as an internal or external command,
operable program or batch file.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Question: how to run &amp;quot;pip&amp;quot; commands ?
Answer: run from scripts subfolder under the python folder, eg. C:\Python27\Scripts&lt;/p&gt;
&lt;p&gt;I finally solved why the sniffer Com19 interface was not listed in the interfaces !&lt;/p&gt;
&lt;p&gt;It was because the sniffer was not erased and programmed correctly !&lt;/p&gt;
&lt;p&gt;here is how I followed the sniffer guide page 5 figure2, note used quotes around the hex file location for programming the sniffer:&lt;/p&gt;
&lt;p&gt;C:\Program Files\SEGGER\JLink_V616c&amp;gt;JLink.exe
SEGGER J-Link Commander V6.16c (Compiled Jun 16 2017 18:15:26)
DLL version V6.16c, compiled Jun 16 2017 18:14:49&lt;/p&gt;
&lt;p&gt;Connecting to J-Link via USB...O.K.
Firmware: J-Link OB-SAM3U128-V2-NordicSemi compiled Jun  9 2017 14:57:23
Hardware version: V1.00
S/N: 680894940
VTref = 3.300V&lt;/p&gt;
&lt;p&gt;Type &amp;quot;connect&amp;quot; to establish a target connection, &amp;#39;?&amp;#39; for help
J-Link&amp;gt;erase
Target connection not established yet but required for command.
Please specify device / core. : NRF52832_XXAA
Type &amp;#39;?&amp;#39; for selection dialog
Device&amp;gt;NRF51422_XXAA
Please specify target interface:
J) JTAG (Default)
S) SWD
TIF&amp;gt;s
Specify target interface speed [kHz]. : 4000 kHz
Speed&amp;gt;1000
Device &amp;quot;NRF51422_XXAA&amp;quot; selected.&lt;/p&gt;
&lt;p&gt;Connecting to target via SWD
Found SW-DP with ID 0x0BB11477
Scanning APs, stopping at first AHB-AP found.
AP[0] IDR: 0x04770021 (AHB-AP)
AHB-AP ROM: 0xF0000000 (Base addr. of first ROM table)
CPUID reg: 0x410CC200. Implementer code: 0x41 (ARM)
Found Cortex-M0 r0p0, Little endian.
FPUnit: 4 code (BP) slots and 0 literal slots
CoreSight components:
ROMTbl[0] @ F0000000
ROMTbl[0][0]: E00FF000, CID: B105100D, PID: 000BB471 ROM Table
ROMTbl[1] @ E00FF000
ROMTbl[1][0]: E000E000, CID: B105E00D, PID: 000BB008 SCS
ROMTbl[1][1]: E0001000, CID: B105E00D, PID: 000BB00A DWT
ROMTbl[1][2]: E0002000, CID: B105E00D, PID: 000BB00B FPB
ROMTbl[0][1]: F0002000, CID: B105900D, PID: 000BB9A3 ???
Cortex-M0 identified.
Erasing device (nRF51422_xxAA)...
J-Link: Flash download: Total time needed: 5.428s (Prepare: 0.045s, Compare: 0.0
00s, Erase: 5.376s, Program: 0.000s, Verify: 0.000s, Restore: 0.006s)
Erasing done.
J-Link&amp;gt;loadfile &amp;quot;C:\Program Files\Wireshark\extcap\nrf_sniffer_2.0.0-beta-1_5129
6aa\hex\sniffer_pca10028_51296aa.hex&amp;quot;
Downloading file [C:\Program Files\Wireshark\extcap\nrf_sniffer_2.0.0-beta-1_512
96aa\hex\sniffer_pca10028_51296aa.hex]...
J-Link: Flash download: Flash programming performed for 1 range (14336 bytes)
J-Link: Flash download: Total time needed: 0.390s (Prepare: 0.078s, Compare: 0.0
07s, Erase: 0.000s, Program: 0.259s, Verify: 0.000s, Restore: 0.045s)
O.K.
J-Link&amp;gt;r
Reset delay: 0 ms
Reset type NORMAL: Resets core &amp;amp; peripherals via SYSRESETREQ &amp;amp; VECTRESET bit.
Setting AIRCR.SYSRESETREQ
J-Link&amp;gt;g
J-Link&amp;gt;&lt;/p&gt;
&lt;p&gt;then toggled interface toolbar sniffer enable, interface appeared !&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118448?ContentTypeID=1</link><pubDate>Fri, 19 Jan 2018 01:22:56 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f496816a-ef42-44ef-b0d4-0e1c6478eb5a</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Hello, tjp3. I haven&amp;#39;t configured something specific to see the &lt;code&gt;COMx port&lt;/code&gt; interface.&lt;/p&gt;
&lt;p&gt;Can you check whether you are using the below versions?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Wireshark 2.4.2 or above&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;J-Link 6.16c (you need to up/downgrade if the version is different)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Python 2.7.x&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Pyserial&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Lastly, unzip &lt;code&gt;\nrf_sniffer.bat&lt;/code&gt; and other files in &lt;code&gt;C:\Program Files\Wireshark\extcap\&lt;/code&gt; before running the &lt;code&gt;nrf_sniffer.bat --extcap-interfaces&lt;/code&gt;, please.&lt;/p&gt;
&lt;p&gt;Although you have configured this and face the problem, can you create a new question thread, please?&lt;/p&gt;
&lt;p&gt;-Regards, MANGO&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118447?ContentTypeID=1</link><pubDate>Thu, 18 Jan 2018 13:11:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ffc81a8f-9841-4748-aa74-d0f777f3b569</guid><dc:creator>tjp3</dc:creator><description>&lt;p&gt;Hi I am facing similar problem. Can you explain what correct configuration have you done for rf_sniffer.bat --extcap-interfaces?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118446?ContentTypeID=1</link><pubDate>Wed, 17 Jan 2018 14:03:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c3d38624-8449-4640-8bb8-c171d556851e</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Hi, David. Yes, now Wireshark 2 detects COMx ports after &lt;code&gt;nrf_sniffer.bat --extcap-interfaces&lt;/code&gt; with correct configurations.&lt;/p&gt;
&lt;p&gt;-Regards, MANGO&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118445?ContentTypeID=1</link><pubDate>Wed, 17 Jan 2018 13:48:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:09e0d088-5493-4e5b-87f0-961f20ce6038</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;@MANGO is this fixed for you ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118441?ContentTypeID=1</link><pubDate>Tue, 16 Jan 2018 15:09:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:95d0f63f-4472-41bd-9de5-10b7901dc576</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;Please add a new question, and link to this one if relevant.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118440?ContentTypeID=1</link><pubDate>Tue, 16 Jan 2018 14:41:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a3a20d76-459f-4b91-b3bd-aa94f98fab9d</guid><dc:creator>2rp</dc:creator><description>&lt;p&gt;Cannot get this to work properly with nRF52 DK running the sniffer_pca10040_51296aa.hex included with nRF Sniffer version 2 (beta) on Windows 7 64-bit:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;nRF Sniffer 2.0.0-1.beta&lt;/li&gt;
&lt;li&gt;Wireshark 2.4.3&lt;/li&gt;
&lt;li&gt;Python 2.7.14&lt;/li&gt;
&lt;li&gt;pyserial 3.4&lt;/li&gt;
&lt;li&gt;nRFgo Studio 1.21.2&lt;/li&gt;
&lt;li&gt;Segger J-Link 6.16c&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Sniffer interface is available in Wireshark but only sometimes the nRF Sniffer COM6 (in my case) shows up but no traffic is ever captured.&lt;/p&gt;
&lt;p&gt;For example, I plug in the nRF52 DK and is enumerated as JLink CDC UART Port (COM6) in Device Manager. First time running C:\Program Files\Wireshark\extcap\nrf_sniffer.bat --extcap-interfaces shows “interface {value=COM6}{display=nRF Sniffer COM6}” as expected. But the interface disappears when running the command again right after. On the nRF52 DK LED2 is flashing when my peripheral is advertising so I assume the application is running ok. I have downgraded the hardware from J-Link 6.20b to 6.16c without any improvements.&lt;/p&gt;
&lt;p&gt;This explains why the interface is not always showing up in the Sniffer in Wireshark but what is causing this?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118429?ContentTypeID=1</link><pubDate>Wed, 10 Jan 2018 16:18:39 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f5c08aec-16aa-496f-a301-d927b2816cb5</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Sorry to hear that, Bjarke. I sometimes cannot see COM ports from Wireshark, too.&lt;/p&gt;
&lt;p&gt;I observed that if your &lt;code&gt;PCA10040&lt;/code&gt; sniffs packets, &lt;code&gt;LED2&lt;/code&gt; will blink rapidly.&lt;/p&gt;
&lt;p&gt;This is my assumption; if you execute Wireshark 2 while &lt;code&gt;PCA10040&lt;/code&gt; is capturing packets, most of the time, Wireshark fails to find the COM port.&lt;/p&gt;
&lt;p&gt;This might sound funny, but can you turn all your Bluetooth devices so that your &lt;code&gt;PCA10040&lt;/code&gt; cannot capture packets?&lt;/p&gt;
&lt;p&gt;Now connect your &lt;code&gt;PCA10040&lt;/code&gt; to your computer. If your &lt;code&gt;PCA10040&lt;/code&gt; is not capturing packets, &lt;code&gt;LED2&lt;/code&gt; will not blink.&lt;/p&gt;
&lt;p&gt;After checking this, turn on Wireshark 2 and you might see &lt;code&gt;COM x&lt;/code&gt; port.&lt;/p&gt;
&lt;p&gt;This is quite cumbersome, but give it a try, please.&lt;/p&gt;
&lt;p&gt;By the way, I &lt;a href="https://devzone.nordicsemi.com/question/187213/wireshark-243-sniffer-20-beta-minor-issues/"&gt;posted a question&lt;/a&gt; that summarizes a problem similar to yours.&lt;/p&gt;
&lt;p&gt;If you keep an eye on it, maybe it will help you, too.&lt;/p&gt;
&lt;p&gt;-BR&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118428?ContentTypeID=1</link><pubDate>Wed, 10 Jan 2018 14:56:27 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d5dbd81f-d24c-4551-bf11-8c1fd6b3c888</guid><dc:creator>Bjarke</dc:creator><description>&lt;p&gt;Hi Mango,&lt;/p&gt;
&lt;p&gt;I do have the interface toolbar, but not the interface COM port...it is just blank.
BR&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118437?ContentTypeID=1</link><pubDate>Wed, 10 Jan 2018 14:21:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2eaa9375-935c-42a2-bab6-97c13e34a782</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;I will relay to the developers. Thank you for the feedback.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118436?ContentTypeID=1</link><pubDate>Wed, 10 Jan 2018 12:33:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a4ff591f-794e-4268-b56b-6d46bebd61e9</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Hi, Petter. Well, that line created a concern for me.&lt;/p&gt;
&lt;p&gt;Since other plugins like &lt;code&gt;USBPcapCMD&lt;/code&gt; existed inside that file, I thought I had to create an extra directory.&lt;/p&gt;
&lt;p&gt;There could be other plugins that use the same file name like the &lt;code&gt;SnifferAPI&lt;/code&gt; and I didn&amp;#39;t want those to be mixed.&lt;/p&gt;
&lt;p&gt;That&amp;#39;s why I unzipped as &lt;code&gt;C:\Program Files\Wireshark\extcap\nrf_sniffer_2.0.0-beta-1_51296aa\extcap\nrf_sniffer.bat&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Eventually, my guess was wrong. &lt;strong&gt;However, looks like other users might have thought like I did and asked similar questions / the guide&amp;#39;s improvements.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Due to this reason, can the devteam elaborate on that instruction? Thanks for your time.&lt;/p&gt;
&lt;p&gt;-Warm Regards, MANGO&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118439?ContentTypeID=1</link><pubDate>Wed, 10 Jan 2018 11:10:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:34f21903-ccf8-4be5-a12a-2029bada9209</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;Yes, it can be. This is still in beta.&lt;/p&gt;
&lt;p&gt;The user guide says&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Unzip the ZIP&amp;#39;s extcap content to the Wireshark Extcap path found in &amp;quot;About Wireshark” (shown
here as C:\Program Files\Wireshark\extcap).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Isn&amp;#39;t it pretty clear that the content of the extcap folder in the ZIP should be unzipeed to C:\Program Files\Wireshark\extcap&lt;/p&gt;
&lt;p&gt;Don&amp;#39;t you think?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118438?ContentTypeID=1</link><pubDate>Wed, 10 Jan 2018 10:37:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1adaa3e2-ec83-4c38-b032-c5b2ab1ed5bf</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Thanks for your reply, Petter. Then can the user guide be revised later? Looks like other users posting questions that they cannot find the &lt;code&gt;Interface Toolbars&lt;/code&gt; in Wireshark 2.&lt;/p&gt;
&lt;p&gt;Maybe stating that this &lt;code&gt;Interface Toolbars&lt;/code&gt; can be visible after &lt;code&gt;nrf_sniffer.bat&lt;/code&gt; is executed successfully.&lt;/p&gt;
&lt;p&gt;Lastly, do I have to place &lt;code&gt;nrf_sniffer.bat&lt;/code&gt;, &lt;code&gt;nrf_sniffer.py&lt;/code&gt;, and &lt;code&gt;SnifferAP&lt;/code&gt;I at &lt;code&gt;C:\Program Files\Wireshark\extcap\&lt;/code&gt;, not at &lt;code&gt;C:\Program Files\Wireshark\extcap\nrf_sniffer_2.0.0-beta-1_51296aa\extcap&lt;/code&gt;?&lt;/p&gt;
&lt;p&gt;Let&amp;#39;s clear things up. Thanks for your cooperation.&lt;/p&gt;
&lt;p&gt;-Regards, MANGO&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118435?ContentTypeID=1</link><pubDate>Wed, 10 Jan 2018 09:40:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0ebb2670-2890-4508-a028-8da2e05bc54a</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;No prob :) It is not default no.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118433?ContentTypeID=1</link><pubDate>Tue, 09 Jan 2018 16:39:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fd471cbc-b64c-4ca3-8b96-ea23c439b73a</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Thanks for sharing your pictures, Petter. I have updated my question to show my side&amp;#39;s configuration.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;- &lt;code&gt;Is it listed like this?&lt;/code&gt; RE: Nope.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In short, I placed the file at &lt;code&gt;C:\Program Files\Wireshark\extcap\nrf_sniffer_2.0.0-beta-1_51296aa\extcap\nrf_sniffer.bat&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Whereas your picture says that the path is &lt;code&gt;C:\Program Files\Wireshark\extcap\nrf_sniffer.bat&lt;/code&gt;&lt;/strong&gt;, so I changed my file path, too.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;As you see my uploaded pictures, did I had to place &lt;code&gt;nrf_sniffer.bat&lt;/code&gt;, &lt;code&gt;nrf_sniffer.py&lt;/code&gt;, and &lt;code&gt;SnifferAPI&lt;/code&gt; at &lt;code&gt;C:\Program Files\Wireshark\extcap\&lt;/code&gt;, not at &lt;code&gt;C:\Program Files\Wireshark\extcap\nrf_sniffer_2.0.0-beta-1_51296aa\extcap&lt;/code&gt;?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The user guide confuses me where to place the files, so I wish you to clear this up.&lt;/p&gt;
&lt;ol start="2"&gt;
&lt;li&gt;Was the &lt;code&gt;Interface Toolbars&lt;/code&gt; appear after I run &lt;code&gt;nrf_sniffer.bat&lt;/code&gt;? So this is not a Wireshark default menu, is it?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;-Regards, MANGO&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118427?ContentTypeID=1</link><pubDate>Tue, 09 Jan 2018 16:14:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:93fad222-d211-4ef2-9e40-c9900013ebec</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Hi, Bjarke.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Did you have any progress on this issue?&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Kind of. I will add some pictures to my original question. Hope that helps.&lt;/p&gt;
&lt;p&gt;Also, please check &lt;code&gt;Petter Myhre&lt;/code&gt;&amp;#39;s comments, too.&lt;/p&gt;
&lt;p&gt;-Regards, MANGO&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118426?ContentTypeID=1</link><pubDate>Tue, 09 Jan 2018 11:08:06 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b1ebd0d0-ac39-470f-adcf-d7c8be54379c</guid><dc:creator>Bjarke</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I have the exact same issue, and I am on PC10040. Did you have any progress on this issue?&lt;/p&gt;
&lt;p&gt;BR
bjarke&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118434?ContentTypeID=1</link><pubDate>Mon, 08 Jan 2018 15:45:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:88a20beb-4d2f-49c8-841c-576af9f500aa</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;Is it listed like this?&lt;/p&gt;
&lt;p&gt;&lt;img src="https://devzone.nordicsemi.com/attachment/1dd02fb7eeb27b27c7d98ee222f4681f" alt="Plugin" /&gt;&lt;/p&gt;
&lt;p&gt;Interface Toolbars:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://devzone.nordicsemi.com/attachment/1fc8e440db571704f050b72a9248d206" alt="Interface" /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118432?ContentTypeID=1</link><pubDate>Sun, 07 Jan 2018 17:35:14 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2eda6b78-9880-4b5b-b79e-abb8c1e64032</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Hi, Petter.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Is nrf_sniffer.bat listed in Wireshark-&amp;gt;Help-&amp;gt;About Wireshark-&amp;gt;Plugins ?&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;RE: It is listed in &lt;code&gt;C:\Program Files\Wireshark\extcap\nrf_sniffer_2.0.0-beta-1_51296aa\extcap\nrf_sniffer.bat&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;This is the correct list, isn&amp;#39;t it?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;you should use NRF51422_XXAC&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Thanks for pointing that out. However, my Wireshark still does not show the COMx interface after retrying the whole steps.&lt;/p&gt;
&lt;p&gt;Since your side is working, did you clicked the &lt;code&gt;Interface Toolbars&lt;/code&gt; from Wireshark?&lt;/p&gt;
&lt;p&gt;From my side, and &lt;a href="https://devzone.nordicsemi.com/question/182613/wireshark-cant-show-me-the-interface-toolbars/"&gt;another thread&lt;/a&gt; says this, I cannot see that menu.&lt;/p&gt;
&lt;p&gt;Referring my previously &lt;a href="https://devzone.nordicsemi.com/attachment/13300563e0e755cb6348afbddce9e510"&gt;uploaded image&lt;/a&gt;, can you check that interface toolbar one more time, please?&lt;/p&gt;
&lt;p&gt;-Best Regards, MANGO&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118449?ContentTypeID=1</link><pubDate>Sat, 06 Jan 2018 21:41:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4f9486c2-7cf8-4732-a501-ef56b710be50</guid><dc:creator>Ignacio Lopez</dc:creator><description>&lt;p&gt;Couple of notes to improve the user guide 2.0:&lt;/p&gt;
&lt;p&gt;· It would be better to specify better which files are required to be copied to extcap&lt;/p&gt;
&lt;p&gt;· It could not find where it is explained how to install the pyserial.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://stackoverflow.com/questions/27596776/installing-and-using-pyserial-in-python-3-4-windows-8-1"&gt;stackoverflow.com/.../installing-and-using-pyserial-in-python-3-4-windows-8-1&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118431?ContentTypeID=1</link><pubDate>Tue, 02 Jan 2018 15:30:05 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:159a3de9-337d-4a3f-bcf3-d3c221ff8e47</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;I just tested with PCA10031 and Wireshark 2.4.3, seems to be working fine. I just programmed the sniffer hex with nrfjprog, you can try that. I noticed that you were using NRF51422_XXAA while the user guide says you should use NRF51422_XXAC (I&amp;#39;m not sure if that should matter though).&lt;/p&gt;
&lt;p&gt;Is nrf_sniffer.bat listed in Wireshark-&amp;gt;Help-&amp;gt;About Wireshark-&amp;gt;Plugins  ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118444?ContentTypeID=1</link><pubDate>Fri, 29 Dec 2017 16:24:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b788ce4a-d9b2-430c-94eb-3dba3aae968d</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Hi, David. I just downgraded the J-Link version to 6.16c. However, the result was same that &lt;code&gt;nRF5 Sniffer COMx&lt;/code&gt; interface doesn&amp;#39;t show up on my Wireshark 2.&lt;/p&gt;
&lt;p&gt;As mentioned in my first question 0,&lt;/p&gt;
&lt;p&gt;&lt;code&gt;I couldn&amp;#39;t find the Interface Toolbars. Would this be the problem? It would be a great help if you can elaborate why I don&amp;#39;t have that Interface Toolbars menu.&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;In Wireshark 2.4.3 (Windows version), in contrast to the &lt;code&gt;Troubleshooting guide&lt;/code&gt;, I cannot&lt;/p&gt;
&lt;p&gt;&lt;code&gt;“nRF Sniffer on xxxxx” doesn’t show up as one of the interfaces when I open Wireshark.&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;1. Click View in the Wireshark toolbar. 2. Select Interface Toolbars then click nRF Sniffer.&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Also, looks like another user had the same problem, described &lt;a href="https://devzone.nordicsemi.com/question/182613/wireshark-cant-show-me-the-interface-toolbars/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Can you help me with this &lt;code&gt;interface toolbars&lt;/code&gt;? This doesn&amp;#39;t show up when I Google it.&lt;/p&gt;
&lt;p&gt;-Regards&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118443?ContentTypeID=1</link><pubDate>Fri, 29 Dec 2017 08:14:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ca2d9cb7-c48f-44f7-800b-e5f2934cfa9e</guid><dc:creator>MANGO</dc:creator><description>&lt;p&gt;Thanks, David Edwin. Do I have to downgrade the Python version, too?&lt;/p&gt;
&lt;p&gt;The manual says&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;C:&amp;gt;python --version

Python 2.7.x
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;As you see my first screenshot, I have installed &lt;code&gt;Python 2.7.14&lt;/code&gt; on my Windows 10 desktop.&lt;/p&gt;
&lt;p&gt;Also, I have uploaded the screenshots after executing&lt;/p&gt;
&lt;p&gt;&lt;code&gt;python nrf_sniffer.py --extcap-interfaces&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;&lt;code&gt;nrf_sniffer.bat --extcap-interfaces&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Check the 3rd picture for the python execution and the first one for &lt;code&gt;nrf_sniffer.bat&lt;/code&gt; output.&lt;/p&gt;
&lt;p&gt;Are those messages show any problems?&lt;/p&gt;
&lt;p&gt;I tried to downgrade the J-Link firmware, but I was postponing that due to personal reasons.&lt;/p&gt;
&lt;p&gt;I will downgrade it now. In the meantime can you check the output messages? Are these messages expected ones?&lt;/p&gt;
&lt;p&gt;-Best Regards&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark 2.4.3 cannot detect PCA10031 COM port interface</title><link>https://devzone.nordicsemi.com/thread/118442?ContentTypeID=1</link><pubDate>Wed, 27 Dec 2017 13:59:29 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3f2ef803-8734-4fe3-9e5b-63381e8d7fd8</guid><dc:creator>David Edwin</dc:creator><description>&lt;ol&gt;
&lt;li&gt;You need to use jlink 6.16c as listed in the required software section in the &lt;a href="https://www.nordicsemi.com/eng/Products/Bluetooth-low-energy/nRF-Sniffer#Downloads"&gt;nRF Sniffer v2 user guide&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;You need to verify all the steps in the user guide v2 in sections 1, 2, 3. Verify that you have the correct python version.&lt;/li&gt;
&lt;li&gt;In addition since you are using a later version of segger jlink, you need to downgrade the jlink emulator firmware on the Nordicsemi DK board to 6.16c. Use the troubleshooting section in the user guide to do the downgrade of the jlink emulator firmware.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>