<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If your intention is to see in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907819#M164343</link>
    <description>&lt;P&gt;If your intention is to see secured SSID client &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;data&lt;/STRONG&gt;&lt;/SPAN&gt; traffic while it goes from AP to WLC, that won't help.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For a PSK secured SSID&amp;nbsp;, you can decrypt as long as you capture full conversation including 4 way handshake. See below post on that&lt;/P&gt;
&lt;P&gt;&lt;A href="https://mrncciew.com/2014/08/16/decrypt-wpa2-psk-using-wireshark/"&gt;https://mrncciew.com/2014/08/16/decrypt-wpa2-psk-using-wireshark/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If it is 802.1X SSID traffic, there is no way to decrypt &amp;amp; see what's exactly in it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Need to mention, once you capture WLC trunk port traffic you would able to see traffic goes to wired network (AP -&amp;gt; &lt;STRONG&gt;WLC -&amp;gt; Wired Network&lt;/STRONG&gt;) from WLC, this traffic is not encrypted &amp;amp; you would able to see that traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Rasika&lt;/P&gt;
&lt;P&gt;*** Pls rate all useful responses ***&lt;/P&gt;</description>
    <pubDate>Fri, 27 May 2016 19:59:06 GMT</pubDate>
    <dc:creator>Rasika Nayanajith</dc:creator>
    <dc:date>2016-05-27T19:59:06Z</dc:date>
    <item>
      <title>Client Packet capture question</title>
      <link>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907816#M164340</link>
      <description>&lt;P&gt;If I have a client MAC address and I span WLC port and truy to capture client traffic in wireshark using client MAC will I be able to?&amp;nbsp; Or will it only show me WLC's MAC?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 12:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907816#M164340</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2021-07-05T12:07:54Z</dc:date>
    </item>
    <item>
      <title>If that traffic is encrypted</title>
      <link>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907817#M164341</link>
      <description>&lt;P&gt;If that traffic is encrypted (eg 802.1X SSID &amp;nbsp;or PSK) then you may not see client mac address.&lt;/P&gt;
&lt;P&gt;You will see AP &amp;amp; WLC addresses in CAPWAP headers &amp;amp; not client address. If it is open SSID traffic, you will see client address in Data section.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Rasika&lt;/P&gt;
&lt;P&gt;*** Pls rate all useful responses ***&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 23:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907817#M164341</guid>
      <dc:creator>Rasika Nayanajith</dc:creator>
      <dc:date>2016-05-26T23:37:37Z</dc:date>
    </item>
    <item>
      <title>Ah gotcha thank you for your</title>
      <link>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907818#M164342</link>
      <description>&lt;P&gt;Ah gotcha thank you for your reply.&amp;nbsp; Would it make a difference if I trunk the port where AP is connected?&amp;nbsp; One of my colleague was telling me that it is possible to see it by trunking the port on the AP and then spanning the WLC port.&lt;/P&gt;
&lt;P&gt;I'm inclined to believe we will get the same results however best way to capture client traffic would be to use some kind of WLAN packet capture or utilize the AP in sniffer mode or do a capture on the WLC itself.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2016 11:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907818#M164342</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2016-05-27T11:48:46Z</dc:date>
    </item>
    <item>
      <title>If your intention is to see</title>
      <link>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907819#M164343</link>
      <description>&lt;P&gt;If your intention is to see secured SSID client &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;data&lt;/STRONG&gt;&lt;/SPAN&gt; traffic while it goes from AP to WLC, that won't help.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For a PSK secured SSID&amp;nbsp;, you can decrypt as long as you capture full conversation including 4 way handshake. See below post on that&lt;/P&gt;
&lt;P&gt;&lt;A href="https://mrncciew.com/2014/08/16/decrypt-wpa2-psk-using-wireshark/"&gt;https://mrncciew.com/2014/08/16/decrypt-wpa2-psk-using-wireshark/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If it is 802.1X SSID traffic, there is no way to decrypt &amp;amp; see what's exactly in it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Need to mention, once you capture WLC trunk port traffic you would able to see traffic goes to wired network (AP -&amp;gt; &lt;STRONG&gt;WLC -&amp;gt; Wired Network&lt;/STRONG&gt;) from WLC, this traffic is not encrypted &amp;amp; you would able to see that traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Rasika&lt;/P&gt;
&lt;P&gt;*** Pls rate all useful responses ***&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2016 19:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-packet-capture-question/m-p/2907819#M164343</guid>
      <dc:creator>Rasika Nayanajith</dc:creator>
      <dc:date>2016-05-27T19:59:06Z</dc:date>
    </item>
  </channel>
</rss>

