This is a feature on the controller. You are starting the trace on the ap, and then you can stream this data to wireshark over the network.
This is a link to a youtube video that shows the real capture feature being used:
https://www.youtube.com/watch?v=XAfdvQGWnuo
This is some text describing the use of the feature:
Click Start to start real capture server on the AP. This feature can be enabled for each AP individually. Default capture server timeout is set to 300 seconds and the maximum configurable timeout is 1 hour. While the capture session is active the AP interface operates in promiscuous mode.
From Wireshark GUI set the capture interface to the selected AP's IP address and select null authentication. Once Wireshark connects to the AP, the AP's interfaces will be listed as available to capture traffic. eth0 is the wired interface, wlan0 is the 5Ghz interface and wlan1 is the 2.4Ghz interface.
The user can selected to capture bidirectional traffic on eth0, wifi0 and wifi1. The capture on wifi0 and wifi1 will not include internally generated hardware packets by the capturing AP. The capturing AP will not report its own Beacons, Retransmission, Ack and 11n Block Ack. If this information is needed, then the real capture should be done from a close by 2nd AP. Change that 2nd AP's wireless channel to match the AP that is being troubleshot. Let it broadcast an ssid so the radios switch on, but don't broadcast the same SSID you are troubleshooting, so that the clients do not connect to your 2nd capturing AP.