<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AP in sniffer mode - UDP/17 - &amp;quot;IP Fragmented IP Protocol&amp;quot; in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398630#M105929</link>
    <description>Ok, your capture-snip.png looks good, that's the way it should look, if the decoding is not correctly configured. &lt;BR /&gt;If you right click one of those packets and select Decode as -&amp;gt; Transport -&amp;gt; Peekremote, how does it look?</description>
    <pubDate>Wed, 13 Jun 2018 09:36:49 GMT</pubDate>
    <dc:creator>patoberli</dc:creator>
    <dc:date>2018-06-13T09:36:49Z</dc:date>
    <item>
      <title>AP in sniffer mode - UDP/17 - "IP Fragmented IP Protocol"</title>
      <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398065#M105924</link>
      <description>&lt;P&gt;HI everyone&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to sniff 802.11 frames using a 1702i Access Point joined to my controller.&lt;/P&gt;
&lt;P&gt;I followed the guide here:&amp;nbsp;&lt;A href="https://supportforums.cisco.com/t5/wireless-mobility-documents/collecting-a-wireless-sniffer-trace-using-the-cisco-lightweight/ta-p/3120458" target="_blank"&gt;https://supportforums.cisco.com/t5/wireless-mobility-documents/collecting-a-wireless-sniffer-trace-using-the-cisco-lightweight/ta-p/3120458&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am using Wireshark.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The output I am receiving on my PC running Wireshark is not shown as intended. It appears to be fragmented. Then I decided to put the WLC, AP (in sniffer-mode) and the PC running Wireshark in the same layer 2, just to make sure my firewall did not fragment the packets, but my Wireshark still shows the packets as "IP Fragmented IP Protocol" UDP/17.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The WLC is running 8.5.120.0 and my Wireshark version is 2.6.1.&lt;/P&gt;
&lt;P&gt;I am not using a capture filter.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please see attached screenshot and drawing of my network.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards A&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 15:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398065#M105924</guid>
      <dc:creator>ahk000002</dc:creator>
      <dc:date>2021-07-05T15:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: AP in sniffer mode - UDP/17 - "IP Fragmented IP Protocol"</title>
      <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398086#M105925</link>
      <description>You should use a capture filter for udp 5555 source and udp 5000 as the host. Or else you will see the fragment. Then you can use the display filters to look at only what you want to see. &lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jun 2018 14:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398086#M105925</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2018-06-12T14:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: AP in sniffer mode - UDP/17 - "IP Fragmented IP Protocol"</title>
      <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398094#M105926</link>
      <description>&lt;P&gt;Hi Scott&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the quick reply! I am trying the capture filter "udp port 5555", but this filter does not show any packages at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see attached screenshot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advise?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jun 2018 14:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398094#M105926</guid>
      <dc:creator>ahk000002</dc:creator>
      <dc:date>2018-06-12T14:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: AP in sniffer mode - UDP/17 - "IP Fragmented IP Protocol"</title>
      <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398610#M105927</link>
      <description>Can you show a screenshot with the capture filter disabled? Just to see how the packets look that you are receiving. &lt;BR /&gt;You capture on a wired interface on the computer, right?</description>
      <pubDate>Wed, 13 Jun 2018 08:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398610#M105927</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2018-06-13T08:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: AP in sniffer mode - UDP/17 - "IP Fragmented IP Protocol"</title>
      <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398628#M105928</link>
      <description>&lt;P&gt;Hi Patoberli!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for taking your time to help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes I am capturing on the wired port on my PC.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See attached screenshot. The packets are just regular IP packets like I would except to see under normal &lt;SPAN&gt;circumstances if I just starts to capture traffic on my wired port&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the meantime I tried using another 1700 series AP as my sniffer and another laptop as well. It is, sadly, still the issue persists. The packets from the WLC to my client is these wired "UDP/17 - Fragmented IP protocol" packets.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 09:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398628#M105928</guid>
      <dc:creator>ahk000002</dc:creator>
      <dc:date>2018-06-13T09:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: AP in sniffer mode - UDP/17 - "IP Fragmented IP Protocol"</title>
      <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398630#M105929</link>
      <description>Ok, your capture-snip.png looks good, that's the way it should look, if the decoding is not correctly configured. &lt;BR /&gt;If you right click one of those packets and select Decode as -&amp;gt; Transport -&amp;gt; Peekremote, how does it look?</description>
      <pubDate>Wed, 13 Jun 2018 09:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398630#M105929</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2018-06-13T09:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: AP in sniffer mode - UDP/17 - "IP Fragmented IP Protocol"</title>
      <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398635#M105930</link>
      <description>&lt;P&gt;This is how it should look:&lt;BR /&gt;&lt;BR /&gt;[cid:image001.png@01D4030B.267BACF0]&lt;BR /&gt;&lt;BR /&gt;Only mind the top line.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;In case the picture doesn't show, here once again.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 09:50:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3398635#M105930</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2018-06-13T09:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: AP in sniffer mode - UDP/17 - "IP Fragmented IP Protocol"</title>
      <link>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3399298#M105931</link>
      <description>&lt;P&gt;Hi again!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I managed to solve the issue. Apparently Symantec Endpoint Protection was messing up the packets. The AV is running a local IPS system on the host computers. It is setup under "Network and Host Exploit Mitigation Settings" of your client/server preference.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As soon as I disabled Symantec the packets were no longer fragmented.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you everyone for your inputs and helpful comments!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards A&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jun 2018 07:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-in-sniffer-mode-udp-17-quot-ip-fragmented-ip-protocol-quot/m-p/3399298#M105931</guid>
      <dc:creator>ahk000002</dc:creator>
      <dc:date>2018-06-14T07:22:14Z</dc:date>
    </item>
  </channel>
</rss>

