AP1131AG, WLC44002 and remote capture

Unanswered Question
Apr 30th, 2008
User Badges:


we have installed a WLC 4402 with about 50 AP1131AG. This works all fine. Now I changed one AP's role to sniffer, and I like to use wireshark for the capturing, but I struggle with the syntax of rpcap adapter command. Can someone help me with this?



  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
ericgarnel Wed, 04/30/2008 - 05:31
User Badges:
  • Gold, 750 points or more


•The capture interface can be specified either in the capture dialog box or via the -i option at the command line when invoking Ethereal.

ethereal -i rpcap://[:]/

For example:

ethereal -i rpcap://

This url is helpful:


This is from ethereal (now wireshark)


A Cisco example:


You will still have to define your filters in wireshark of course

ericgarnel Wed, 04/30/2008 - 05:34
User Badges:
  • Gold, 750 points or more

Here is the syntax from the controller:

This is on, thus the aeropeek ref

>config ap sniff 802.11b enable ?

Enter a valid 802.11b/g channel to be sniffed

(South_A) >config ap sniff 802.11b enable 11 ?

Enter Sniffer server (remote Airopeek) IP address.

(South_A) >config ap sniff 802.11b enable 11

tvolk Mon, 05/05/2008 - 06:21
User Badges:

I did all this configs, but I use the wireshark and not Airopeek..., today I was capturing the communication between the wireshark and the access-point. The access-point is sending after a TCP-Syn to port 2002 a TCP-reset.



ericgarnel Mon, 05/05/2008 - 06:27
User Badges:
  • Gold, 750 points or more

Wireshark is supported in 5.x

ericgarnel Mon, 05/05/2008 - 06:45
User Badges:
  • Gold, 750 points or more

Try this link:


"Wireshark sniffer support-The controller enables you to configure an access point as a network "sniffer," which captures and forwards all the packets on a particular channel to a remote machine that runs packet analyzer software. These packets contain information on timestamp, signal strength, packet size, and so on. Sniffers allow you to monitor and record network activity and to detect problems. In previous controller software releases, only the following packet analyzers are supported: Wildpackets Omnipeek and Airopeek and the AirMagnet Enterprise Analyzer. In controller software release, the Wireshark packet analyzer is also supported."

Per your link...


Configure parameters.


Configure access point.


Sniffer command.

802.11b {enable | disable}

Enable or disable sniffing.


Channel to be sniffed.


The IP address of the remote machine running Omnipeek, Airopeek,

AirMagnet, or Wireshark


Access point configured as the sniffer.



This Discussion



Trending Topics - Security & Network