Administration
Packet Capture
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 53
3
A Microsoft Windows computer running the Wireshark tool allows you to display,
log, and analyze captured traffic. The remote packet capture facility is a standard
feature of the Wireshark tool for Windows. Linux version does not work with the
WAP d evi ce .
When remote capture mode is in use, the WAP device does not store any captured
data locally in its file system.
If a firewall is installed between the Wireshark computer and the WAP device, the
traffic for these ports must be allowed to pass through the firewall. The firewall
must also be configured to allow the Wireshark computer to initiate a TCP
connection to the WAP device.
To initiate a remote capture on a WAP device:
STEP 1 Click Administration > Packet Capture.
STEP 2 Enable Promiscuous Capture.
STEP 3 For the Packet Capture Method, select Remote.
STEP 4 For the Remote Capture Port, use the default port (2002), or if you are using a
port other than the default, enter the desired port number used for connecting
Wireshark to the WAP device. The port range is from 1025 to 65530.
STEP 5 If you want to save the settings for use at another time, click Save. (The selection
of Remote as the Packet Capture Method is not saved, however.)
STEP 6 Click Start Capture.
To initiate the Wireshark network analyzer tool for Microsoft Windows:
STEP 1 On the same computer, initiate the Wireshark tool.
STEP 2 In the menu, select Capture > Options. A popup window appears.
STEP 3 At Interface, select Remote. A popup window appears.
STEP 4 At Host, enter the IP address of the WAP device.
STEP 5 At Port, enter the port number of the WAP. For example, enter 2002 if you used the
default, or enter the port number if you used a port other than the default.
STEP 6 Click OK.