Cisco AP Sniffer Mode & Wireshark :
Overview: Cisco Access Point (sniffer Mode) can be configured to send wireless 802.11 packet captures to Wireshark running on Windows 7.
Kit: Windows 7 Laptop
Wireless Card: Intel(R) Dual Band Wireless-AC 7265
Wireshark Version 2.4.6
Cisco 2702i Access Point (Autonomous mode)
Wireless Card: Intel(R) Dual Band Wireless-AC 7265
Wireshark Version 2.4.6
Cisco 2702i Access Point (Autonomous mode)
Lab Tolology:

Steps:
Connect to Autonomous Access Point using Putty

Configure Radio (2.4GHz) to sniffer mode. Access Point requires a reboot after assigning the radio interface to sniffer mode
• Interface Dot11Radio0 = 2.4GHz Radio Band
• Interface Dot11Radio1 = 5GHz Radio Band
• Interface Dot11Radio0 = 2.4GHz Radio Band
• Interface Dot11Radio1 = 5GHz Radio Band
Interface Dot11Radio0
Station-role sniffer
Station-role sniffer

Send on all sniffer traffic to Windows 7 (192.168.255.100) via port UDP:5555
Sniffer ip-address 192.168.255.100 port 5555
Sniffer ip-address 192.168.255.100 port 5555

Launch Wireshark and capture traffic on Local Area Connectioninterface.

Select capture with Protocol UDP and destination port 5555
Right click and Decode AS and select PEEKMOTE
Right click and Decode AS and select PEEKMOTE

Wireless 802.11 packet are now available for Analyses 
