I recently set up an Access Point as a sniffer in the controller and told the b/g radio the IP address of the workstation running Wireshark. I see packets coming from the controller in the packet capture. However, those packets do not look like regular wireless packets. I was hoping to see the beacons and such. Is there a way to decode wireshark to leave off the controller headers? Is there a plug-in for Wireshark I am missing to make the traces read as though my machine did the wireless sniff instead?
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...