


The top panel lists frames individually with key data on a single line. Wireshark will typically display information in three panels. This information can be useful for evaluating security events and troubleshooting network security device issues. Packet capture can provide a network administrator with information about individual packets such as transmit time, source, destination, protocol type and header data. Wireshark, formerly known as Ethereal, can be used to examine the details of traffic at a variety of levels ranging from connection-level information to the bits that make up a single packet. Such a tool is often referred to as a network analyzer, network protocol analyzer or sniffer. If you are going to change the AP to an AM you should do that before you start the pcap.Wireshark is an open source tool for profiling network traffic and analyzing packets. Note: If you reboot the AP these settings are lost and you have to start the pcap again. Run the Aruba version of Wireshark on the PC, on the capture interface, select ARUBA udp-port=5555

Use "pcap stop to stop the capture Example:Ħ. Use "show pcap" to check the active pcap session Packet Capture Sessions This is good to use when placing the IAP into AM mode so you can capture on one channel instead of scanning. Optionally you can add the channel at the end. Use 0 pcap for Wireshark and 1 peek for Omnipeek WLAN Interfaceīssid scan monitor probe-type phy-type task channel pkts Use "show ap monitor status" to identify the base BSSID. By default Telnet or terminal access is disable.Ģ.

This command is not expose on the Web UI and have to run from the CLI.ġ. Aruba Instant version 6.1.2.3-2.0.0.3 and above have the pcap command to do the wireless packet capture on the IAP.
