<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCPDUMP/Remote sniffer in cmd of AP in Aerohive Migrated Content</title>
    <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90184#M12566</link>
    <description>&lt;P&gt;You can initiate a remote sniffer packet capture on the CLI of the AP with the command: exec&amp;nbsp;capt&amp;nbsp;remote-s host-a [IP address of device running wireshark]. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is that what you were looking for?&lt;/P&gt;</description>
    <pubDate>Wed, 11 Dec 2019 22:52:01 GMT</pubDate>
    <dc:creator>samantha_lynn</dc:creator>
    <dc:date>2019-12-11T22:52:01Z</dc:date>
    <item>
      <title>TCPDUMP/Remote sniffer in cmd of AP</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90183#M12565</link>
      <description>&lt;P&gt;I need to capture some traffic over separate from our corp link therefore AP won't be able to talk to HM. What is the process of running remote sniffer from CMD on AP130?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 22:35:09 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90183#M12565</guid>
      <dc:creator>patkszen</dc:creator>
      <dc:date>2019-12-11T22:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP/Remote sniffer in cmd of AP</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90184#M12566</link>
      <description>&lt;P&gt;You can initiate a remote sniffer packet capture on the CLI of the AP with the command: exec&amp;nbsp;capt&amp;nbsp;remote-s host-a [IP address of device running wireshark]. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is that what you were looking for?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 22:52:01 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90184#M12566</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-12-11T22:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP/Remote sniffer in cmd of AP</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90185#M12567</link>
      <description>&lt;P&gt;Yes this is it, I'll give it a go tomorrow​. Thank you&lt;/P&gt;&lt;P&gt;​&lt;/P&gt;&lt;P&gt;Just out of curiosity, are there any other means of capturing traffic so that file is saved locally on the ap?​&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 00:20:07 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90185#M12567</guid>
      <dc:creator>patkszen</dc:creator>
      <dc:date>2019-12-12T00:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP/Remote sniffer in cmd of AP</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90186#M12568</link>
      <description>&lt;P&gt;Yes, the commands should be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;capture save interface wifix &amp;lt;file name or remote location where the packet capture will be saved&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This first command sets where the pcap file is saved. For example, if we wanted to run one for wifi0, and we're saving to a tftp server, the command would looks something like this; &lt;/P&gt;&lt;P&gt;capture save interface wifi0 &amp;nbsp;tftp://server:/path/filename&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The next command is:&lt;/P&gt;&lt;P&gt;capture interface wifix&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will start the capture on the interface you choose, wifi0 or wifi1. &lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 02:07:51 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90186#M12568</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-12-12T02:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP/Remote sniffer in cmd of AP</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90187#M12569</link>
      <description>&lt;P&gt;Thanks, saved my day&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 16:38:04 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/tcpdump-remote-sniffer-in-cmd-of-ap/m-p/90187#M12569</guid>
      <dc:creator>patkszen</dc:creator>
      <dc:date>2019-12-12T16:38:04Z</dc:date>
    </item>
  </channel>
</rss>

