![]() The following image shows an example of a CAPWAP packet capture, where you can see: the Layer 2 header the sniffed traffic encapsulated into Internet Protocol for transport CAPWAP encapsulated into UDP for sniffer purpose and encapsulated into IP CAPWAP control traffic on UDP port 5246 and CAPWAP payload. l Decode the traffic as IP to check inner CAPWAP traffic. Run Wireshark on the host/server to capture CAPWAP traffic from the controller.In the above syntax, the ‘2’ captures the control and data message-’1′ would capture only the control message, and ‘0’ would disable it. ![]() WTP 0-FortiAP2223X11000107 Sniff: intf port2 enabled (control and data message)
0 Comments
Leave a Reply. |