Hi,
I have successfully set up the nRF Sniffer V2 Beta 3 using nRF52-DK (PCA100040). It works very well with Wireshark integrated toolbar, I can select the specific device to follow and also limit the advertising channels for listening. I assume my Wireshark + extcap setup is correct.
I have also flashed the sniffer firmware to a bare nRF51822 (Waveshare Core51822 https://www.waveshare.com/wiki/Core51822) and I am able to see the packets in Wireshark, too. But after selecting specific device to follow, the sniffer hardware does not seem to react at all - it still returns the packets from all the devices, not just this selected one. The same for advertising channels - I can still see the packets from all channels despite limiting it to specific one in toolbar (what worked correctly with the nRF52-DK).
I have tried both sniffer_pca10000_1c2a221.hex and sniffer_pca10000_1c2a221.hex (sniffer_pca10000_1c2a221.hex does not work with my board for some reason).
Is my hardware incompatible with this firmware, or maybe my uart adapter (CP2102 built in Waveshare BLE400 www.waveshare.com/.../BLE400) does not handle 460800 baud rate correctly? Or is there a bug in '51 sniffer firmware maybe? I don't have nRF51-DK at the moment to confirm if it behaves the same.
I can see in the sniffer protocol commands specification that it is possible to switch baud rate (SWITCH_BAUD_RATE_REQ, 0x13), and I would like to try using lower values. But this option does not seem to be implemented in the sniffer.py extcap. Is it implemented in the sniffer firmware?
By the way - do you plan to opensource the sniffer firmware? That would help me to debug and patch such problems myself.
There is already opensource BtleJack (https://github.com/virtualabs/btlejack) that works pretty well with nRF51822, however it does not have such a nice Wireshark integration toolbar yet.