<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AP Sniffer to Wireshark in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ap-sniffer-to-wireshark/m-p/1396633#M61904</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After more careful reading on similar posts, I found the answer - posted by Olivier Nicolas.&amp;nbsp; Thank you Olivier.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-message-small" href="https://community.cisco.com/message/1289396#1289396"&gt;https://supportforums.cisco.com/message/1289396#1289396&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They should include this in the documentation for the controller where they talk about setting up the AP and radio.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure AP Sniffer mode as describe in the previous link.&lt;/P&gt;&lt;P&gt;The&amp;nbsp; "Server IP address" is the address of the host where Wireshark is&amp;nbsp; installed.&lt;/P&gt;&lt;P&gt;The WLC will sent UDP packets (with source port 5555)&amp;nbsp; to the Wireshark host (with destination port 5000).&lt;/P&gt;&lt;P&gt;In Wireshark,&amp;nbsp; follow the UDP stream and then decode UDP destination 5000 as "AIROPEEK"&amp;nbsp; transport protocol.&lt;/P&gt;&lt;P&gt;You should now be able the see the frames&amp;nbsp; captured by the AP on the selected channel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Apr 2010 12:58:23 GMT</pubDate>
    <dc:creator>jsmbrown</dc:creator>
    <dc:date>2010-04-09T12:58:23Z</dc:date>
    <item>
      <title>AP Sniffer to Wireshark</title>
      <link>https://community.cisco.com/t5/wireless/ap-sniffer-to-wireshark/m-p/1396632#M61903</link>
      <description>&lt;P&gt;I recently set up an Access Point as a sniffer in the controller and told the b/g radio the IP address of the workstation running Wireshark.&amp;nbsp; I see packets coming from the controller in the packet capture.&amp;nbsp; However, those packets do not look like regular wireless packets.&amp;nbsp; I was hoping to see the beacons and such.&amp;nbsp; Is there a way to decode wireshark to leave off the controller headers?&amp;nbsp; Is there a plug-in for Wireshark I am missing to make the traces read as though my machine did the wireless sniff instead?&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 01:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-sniffer-to-wireshark/m-p/1396632#M61903</guid>
      <dc:creator>jsmbrown</dc:creator>
      <dc:date>2021-07-04T01:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: AP Sniffer to Wireshark</title>
      <link>https://community.cisco.com/t5/wireless/ap-sniffer-to-wireshark/m-p/1396633#M61904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After more careful reading on similar posts, I found the answer - posted by Olivier Nicolas.&amp;nbsp; Thank you Olivier.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-message-small" href="https://community.cisco.com/message/1289396#1289396"&gt;https://supportforums.cisco.com/message/1289396#1289396&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They should include this in the documentation for the controller where they talk about setting up the AP and radio.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure AP Sniffer mode as describe in the previous link.&lt;/P&gt;&lt;P&gt;The&amp;nbsp; "Server IP address" is the address of the host where Wireshark is&amp;nbsp; installed.&lt;/P&gt;&lt;P&gt;The WLC will sent UDP packets (with source port 5555)&amp;nbsp; to the Wireshark host (with destination port 5000).&lt;/P&gt;&lt;P&gt;In Wireshark,&amp;nbsp; follow the UDP stream and then decode UDP destination 5000 as "AIROPEEK"&amp;nbsp; transport protocol.&lt;/P&gt;&lt;P&gt;You should now be able the see the frames&amp;nbsp; captured by the AP on the selected channel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 12:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-sniffer-to-wireshark/m-p/1396633#M61904</guid>
      <dc:creator>jsmbrown</dc:creator>
      <dc:date>2010-04-09T12:58:23Z</dc:date>
    </item>
  </channel>
</rss>

