User's Manual
Table Of Contents
- Table of Contents
- List of Figures
- List of Tables
- Section 1: About This Document
- Section 2: Getting Started
- Administrator’s Computer Requirements
- Wireless Client Requirements
- Dynamic and Static IP Addressing on the AP
- Installing the UAP
- Basic Settings
- Using the CLI to View the IP Address
- Configuring the Ethernet Settings
- Configuring IEEE 802.1X Authentication
- Verifying the Installation
- Configuring Security on the Wireless Access Point
- Section 3: Viewing Access Point Status
- Viewing Interface Status
- Viewing Events
- Viewing Transmit and Receive Statistics
- Viewing Associated Wireless Client Information
- Viewing TSPEC Client Associations
- Viewing Rogue AP Detection
- Viewing Managed AP DHCP Information
- Viewing TSPEC Status and Statistics Information
- Viewing TSPEC AP Statistics Information
- Viewing Radio Statistics Information
- Viewing Email Alert Operational Status
- Section 4: Managing the Access Point
- Ethernet Settings
- Wireless Settings
- Modifying Radio Settings
- Configuring Radio and VAP Scheduler
- Scheduler Association Settings
- Virtual Access Point Settings
- Configuring the Wireless Distribution System (WDS)
- Controlling Access by MAC Authentication
- Configuring Load Balancing
- Managed Access Point Overview
- Configuring 802.1X Authentication
- Creating a Management Access Control List
- Section 5: Configuring Access Point Services
- Section 6: Configuring SNMPv3
- Section 7: Maintaining the Access Point
- Section 8: Configuring Client Quality of Service
- Section 9: Clustering Multiple APs
- Appendix A: Default AP Settings
- Appendix B: Configuration Examples

PacketCaptureConfigurationandSettings
D-Link UnifiedAccessPointAdministrator’sGuide
November2011 Page126
UnifiedAccessPointAdministrator’sGuide
ToconfigureWiresharktousetheAPasthesourceforcapturedpack ets,youmustspecifytheremoteinterface
inthe"CaptureOptions"menu.Forexampletocapturepack etsonanAPwithIPaddress192.168.1.10onradio
1usingthedefaultIPport,specifythefollowinginterface:
rpcap://192.168.1.10/radio1
Tocapture
packetsontheEthernetinterfaceoftheAPandVAP0onradio1usingIPport58000,starttwo
Wiresharksessionsandspecifythefollowinginterfaces:
rpcap://192.168.1.10:58000/eth0
rpcap://192.168.1.10:58000/wlan0
Whenyouarecapturingtrafficontheradiointerface,youcandisablebeaconcapture,butother802.11control
framesarestillsenttoWireshark.You
cansetupadisplayfiltertoshowonly:
•Dataframesinthetrace
•TrafficonspecificBSSIDs
•Trafficbetweentwoclients
Someexamplesofusefuldisplayfiltersare:
• ExcludebeaconsandACK/RTS/CTSframes:
!(wlan.fc.type_subtype==8||wlan.fc.type==1)
•Dataframesonly:
wlan.fc.type==2
•TrafficonaspecificBSSID:
wlan.bssid==00:02:bc:00:17:d0
•Alltraffictoandfromaspecificclient:
wlan.addr==00:00:e8:4e:5f:8e
Inremotecapturemode,trafficissenttothePCrunningWiresharkviaoneofthenetworkinterfaces.
DependingonwheretheWiresharktoolislocatedthetrafficcanbesentonanEthernetinterfaceoroneofthe
radios.In
ordertoavoidatrafficfloodcausedbytracingthetracepackets,theAPautomaticallyinstallsa
capturefiltertofilteroutallpacketsdestinedtotheWiresharkapplication.ForexampleiftheWiresharkIPport
isconfiguredtobe58000thenthefollowingcapturefilterisautomaticallyinstalledon
theAP:
notportrange58000‐58004.
EnablingthepacketcapturefeatureimpactsperformanceoftheAPandcancreateasecurityissue
(unauthorizedclientsmaybeabletoconnecttotheAP andtraceuserdata).TheAPperformanceisnegatively
impactedevenifthereisnoactiveWiresharksessionwith
theAP.Theperformanceisnegativelyimpactedto
agreaterextentwhenpacketcaptureisinprogress.
Duetoperformanceandsecurityissues,thepacketcapturemodeisnotsavedinNVRAMontheAP;iftheAP
resets,thecapturemodeisdisabledandtheyoumustre‐enableit
inordertoresumecapturingtraffic.Packet
captureparameters(otherthanmode)aresavedinNVRAM.