No. There isn't, unless you hack it out from one of the WEP crackers.
It is a fairly strong convention that passwords / security phrases are not displayed in plain text, ever.
If the PSK is not documented (and you don't know it) your only option is to change it to something you know (and will document, right?) or hack it out .. which should be easy enough with the variety of tools available (ala WEPcrack).
Well, that was what I was afraid of..... Thanks for the info anyway! The system is actually using WPA1 & WPA2 (TKIP) for the Voice WLAN. I imagine that would mean I am really in bad shape of trying to figure it out then given WEP is easier to crack. Ugh!
Well, I am gonna change it and YES document it! Ha Ha!
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...