Just take a wiff of that air!

OK, Seems I’m on a roll here with the HP 830 Wired-WLAN controller. Just looking things over and I see I can turn one of the radios on the MSM Access Point into a sniffer.

If you’re fighting wireless connectivity issues this could be a life saver.

In full disclosure: I will tell you that the HP 830 has a web interface but I’m from a planet far, far away and a long time ago. I’m old school so I opt for the command line. after all….question mark is my friend and yours too.

To use one of the radios as a sniffer, you will need to take it out of service. Let’s break it down:

1. If you have “Auto Ap” enabled, it will need to be temporarily disabled, use the undo wlan auto-ap enable command.

2. Change the view to the AP you want to use:
wlan ap ap01_0002 model 425-AM id 5 in this example ap01_0002 is the name of my access point.

3. Enter the radio view: radio 2

4. Disable the radio to change its settings: raido disable

5. Set the channel statically: channel 11 in this example 11 is the channel I statically assigned the radio.

6. Enable the radio: radio enable

7. Use the wlan capture start ap ap01_0002 radio 2 to get the sniffer started.

 

To verify the operation use the display wlan capture to see if it is running
WLAN Capture
——————————————————————————–
AP Name        : ap01_0002
Radio          : 2
Radio Mode     : 802.11n(2.4GHz)
Channel        : 11
Capture Limit  : 10000
File Name      : CaptureRecord.dmp
Status         : Capturing
——————————————————————————–.

8. To stop the capture: wlan capture stop

From the pointed prompt enter the dir command. Talk about a throwback command…you should see a list of filenames. Look for the “.dmp” file.

<AC>dir
Directory of cfa0:/

0     -rw-       298  Dec 06 2013 20:25:38   system.xml
1     -rw-       624  Apr 26 2013 19:23:42   wlan_ca_certificate.cer
2     -rw-      1800  Apr 26 2013 19:23:42   wlan_local_certificate.pfx
3     -rw-      3855  Dec 05 2013 20:49:08   startup.cfg
4     -rw-      2493  Sep 09 2013 22:24:30   basewc.cfg
5     -rw-      5449  Jul 09 2013 18:12:18   830-1-cfg.cfg
6     -rw-      1437  Jul 09 2013 18:15:58   default.cfg
7     -rw-      4610  Dec 06 2013 20:25:40   startup.cfg.old
8     -rw-       149  Jul 09 2013 20:23:12   apcfg.txt
9     -rw-      3075  Dec 05 2013 20:49:06   _startup_bak.cfg
10    -rw-   1199826  Dec 17 2013 20:49:36   capturerecord.dmp
11    -rw-  89019392  Sep 18 2013 08:36:46   hp830-cmw520-r3308p29.bin

1020068 KB total (865328 KB free)

File system type of cfa0: FAT32

Hook up a quick tftp server…something like 3cdaemon…and get it ready to receive a file.

9. Enter the tftp 10.132.0.10 put capturedrecord.dmp command.This will copy the file to your PC.

Rename the filetype to “.cap” and open it with Wireshark.

enable_server

Leave a Reply