View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

WL0010 - WLC Access Point Sniffer Mode

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0
Lab Document: 
<Please login to see the content>
Video Download: 
Title: WL0010 - Video Download $8.00
Purchase WL0010 - Video Download $8.00
The video shows you how to perform wireless packet capture on Cisco Wireless Controller using an access point in a sniffer mode. We will attempt the capture on 5GHz band for both 40 and 80 MHz channel width. Captured 802.11 frames will be analyzed with a focus on Beacon frame.  
 
Topic:
  • AP Sniffer Mode
  • Wireless Packet Capture on 40MHz and 80MHz channel width
  • Beacon Frame Analysis

About Author

Metha Chiewanichakorn, CCIE#23585 (Ent. Infra, Sec, SP), is a Cisco networking enthusiast with years of experience in the industry. He is currently working as a consulting engineer for a Cisco partner. As a founder of and an instructor at labminutes.com, Metha enjoys learning and challenges himself with new technologies.

2 comments

Hi Methaa,

Recently, I tried the "Sniffer" mode by following the video's procedures but the captured packets forwarded to Wireshark cannot be decoded properly after the Association Respond packet. This happens in both "WPA2/PSK" and "None" encryption.

Everything on or before the Association Respond can be decoded properly including Probe Request, Probe Response, Association Request.

However, the same wireless traffic can be decoded properly when it is captured by the Wireshark through the wireless adaptor on an Ubuntu machine.

Thanks,
EW

Thanks for the info. Packet capture on AP can something be a hit-and-miss depending on AP model, WiFi version, adn Wireshark version. You may have better luck with WiFi adapter like you mentioned or a tool like Ekahau.