![]() Now you can see the Protocol change to 802. In these cases, you may see an error on the receiving interface call a Giant Packet (mostly on cisco devices you can see the Giant error). You can simply right-click & choose “Decode As” option shown below. If a large packet is sent, it may not be accepted by the receiving end’s connected interface, and therefore the packet may be dropped. To be able see inside packets detail, you have to decode these frames as “PEEKREMOTE”. I have filtered the traffic as the vWLC source IP address. Capturing data on the LAN adapter of the workstation would look something like this: Now lets look for the packet capture in Wireshark. Next step is to Enable “Sniff” under Sniffer Channel Assignment, select Channel and Enter workstation IP address. Hover your mouse on the blue drop down and select “configure”. Navigate to “Wireless” and select either 802.11a/n/ac or 802.11b/g/n, Depending on the Band and channel you want to scan. By default Wireshark will save the packet trace in libpcap format. Just click on the File menu option and select Save As. Next step is to configure the Access Point to Capture frame on certain channel. Save the packet trace in any supported format. Under General TAB, select AP mode “Sniffer” I have assigned Static IP to the Access Point. Wireshark Version 1.10.1, This one of the versions of Wireshark that would help decoding captured frames as PEEKREMOTEĬonvert the AP to Sniffer Mode as shown Below, selecting sniffer mode, and applying the change the AP will reboot.Network layout used for the demonstration: ![]() There are few options available in today’s market, the one will be discussing today is using of Cisco Access Point and Wireshark to Capture and analyze the captured data. ![]() The ability to capture wireless frames for analysis at a remote location without having to travel to the site adds benefits, by focusing the time on troubleshooting the issue and restoring a stable WLAN function to the End user. ![]()
0 Comments
Leave a Reply. |