Understanding ZigbeeAlliance09 and NordicExamples Keys in Wireshark for nRF52 USB Sniffer

Hello everyone, I’m currently working on developing a product using Zigbee technology and have been using an nRF52840 USB dongle to sniff some Zigbee packets. I followed the instructions provided by Nordic Semiconductor, but I’m a bit puzzled about some key configurations mentioned in the documentation. Specifically, I’m trying to understand the purpose of the ZigbeeAlliance09 and NordicExamples keys and how they relate to my product’s NWK key, which I’ve set to 0x00000000000000000000000000001234.

From what I gather, these keys are crucial for decrypting and interpreting the packets captured by the sniffer. However, I’m not entirely sure how to modify them to ensure proper communication with my devices. I tried using the default values provided in the Nordic documentation, but I’m not certain if the packets I’m seeing in Wireshark are correctly decoded.

Here’s a snippet of what I captured:
plaintext
2024-11-10 09:20:26.824 [DEBUG] [ernal.transceiver.EnOceanTransceiver] - RADIO_ERP1 with RORG Unknown for payload 31CF3F00000509D5815BAD05A363E90101FFFFFFFF5500 received
2024-11-10 09:20:26.824 [DEBUG] [ernal.transceiver.EnOceanTransceiver] - Received unknown RORG

I’m wondering if there’s a way to verify if the keys are correctly configured or if there’s a specific process to derive these keys based on my product’s setup. Any insights or tips from the community would be greatly appreciated!

Looking forward to your thoughts and experiences. Thanks in advance for your help!