Network Layer Decodes
Class ICMP6
Provides access to fields in an (IPv6) ICMP header.
| Instance Variables | 
| type | icmp.type ->
anInteger | 
| 
 | ICMP message type | 
| code | icmp.code ->
anInteger | 
| 
 | ICMP message code | 
| checksum | icmp.checksum ->
anInteger | 
| 
 | ICMP checksum | 
| data | icmp.data ->
aByteArray | 
| 
 | All the ICMP bytes, i.e. header and payload. 
 Use this if you need to work with some of the ICMP message types that
python-libtrace doesn't decode fully | 
| payload | icmp.payload ->anIP6 for types 1, 2, 3 and 4, otherwise aByteArray | 
| 
 | Some ICMP messages carry content
from the packet that triggered them;  icmp6.payload returns as much
as it can of the triggering packet | 
The content of an  (IPv6) ICMP header varies depending on its type field.  python-libtrace decodes the following types ...
| Echo Request (type 128) and Echo Reply (type 129) | 
| ident | icmp6.echo.ident ->
anInteger | 
| 
 | Echo identifier | 
| sequence | icmp6.echo.sequence ->
anInteger | 
| 
 | Echo sequence number | 
| Packet too big (type 2) | 
| mtu | icmp6.toobig.mtu ->
anInteger | 
| 
 | MTU of link causing problem.  Used as part of the Path MTU Discovery process | 
| Parameter problem (type 4) | 
| pointer | icmp6.param.pointer->
anInteger | 
| 
 | Offset within the invoking packet where an error was detected | 
| Neighbour discovery (types 135-136), Redirect (type 137) | 
| target_prefix | icmp6.neighbour.target_prefix ->
anIPprefix | 
| 
 | IPv6 address of the solicitation's target | 
| dest-prefix | icmp6.neighbour.target.dest_prefix -> anIPprefix | 
| 
 | Source Address of the packet that triggered the redirect message | 
Nevil Brownlee
Sat, 22 Oct 16 (NZDT)