<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WLC remote capturing (SNIFF MODE) in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wlc-remote-capturing-sniff-mode/m-p/1162764#M48398</link>
    <description>&lt;P&gt;Hi Board,&lt;/P&gt;&lt;P&gt;There's the sniffing option in the APs modes. After enabling it, rebooting the AP and adjusting the sniffed channel and destination, the controller sends packets to UDP/5000 with the destination address of the configured destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far so good.&lt;/P&gt;&lt;P&gt;What capturing tool is used to decode the UDP packets as 802.11 packets. I guess, that the UDP payload is the original 802.11 packet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So has anyone done something like that before? The documentation is very poor on that topic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh - I'm using some 4.2 Version &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance! Wbr&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 04 Jul 2021 00:07:53 GMT</pubDate>
    <dc:creator>Johannes Luther</dc:creator>
    <dc:date>2021-07-04T00:07:53Z</dc:date>
    <item>
      <title>WLC remote capturing (SNIFF MODE)</title>
      <link>https://community.cisco.com/t5/wireless/wlc-remote-capturing-sniff-mode/m-p/1162764#M48398</link>
      <description>&lt;P&gt;Hi Board,&lt;/P&gt;&lt;P&gt;There's the sniffing option in the APs modes. After enabling it, rebooting the AP and adjusting the sniffed channel and destination, the controller sends packets to UDP/5000 with the destination address of the configured destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far so good.&lt;/P&gt;&lt;P&gt;What capturing tool is used to decode the UDP packets as 802.11 packets. I guess, that the UDP payload is the original 802.11 packet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So has anyone done something like that before? The documentation is very poor on that topic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh - I'm using some 4.2 Version &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance! Wbr&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 00:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-remote-capturing-sniff-mode/m-p/1162764#M48398</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2021-07-04T00:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: WLC remote capturing (SNIFF MODE)</title>
      <link>https://community.cisco.com/t5/wireless/wlc-remote-capturing-sniff-mode/m-p/1162765#M48399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The controller enables you to configure an access point as a network "sniffer," which captures and forwards all the packets on a particular channel to a remote machine that runs packet analyzer software. These packets contain information on timestamp, signal strength, packet size, and so on. Sniffers allow you to monitor and record network activity and to detect problems. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring Wireless Sniffing:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/wireless/controller/5.2/configuration/guide/c52err.html#wp1042843" target="_blank"&gt;http://www.cisco.com/en/US/docs/wireless/controller/5.2/configuration/guide/c52err.html#wp1042843&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Feb 2009 15:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-remote-capturing-sniff-mode/m-p/1162765#M48399</guid>
      <dc:creator />
      <dc:date>2009-02-13T15:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: WLC remote capturing (SNIFF MODE)</title>
      <link>https://community.cisco.com/t5/wireless/wlc-remote-capturing-sniff-mode/m-p/1162766#M48400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, but how to configure wireless sniffing is crystal clear. That wasn't my question after all. How do I enable Wireshark to capture/interprete that traffic. And I doesn't talk about capturing UDP Packets from the controller with the 802.11 packet as UDP-payload. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Feb 2009 15:44:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-remote-capturing-sniff-mode/m-p/1162766#M48400</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2009-02-13T15:44:05Z</dc:date>
    </item>
  </channel>
</rss>

