On Apr 27, 2009, at 8:57 AM, Steven Pfister wrote:
I'm trying to learn a little about wireless troubleshooting. In  
reading about the sniffer mode of Cisco APs, a lot of the Cisco  
pages I've read say it requires Airopeek. But a Cisco Press book I'm  
reading says "operates with an Omnipeek, Airmagnet, or Wireshark  
server."  Is there such a thing as a Wireshark server?
Perhaps there is, but nobody appears to have bothered to tell the  
Wireshark core team about it. :-)
Googling for
	omnipeek wireshark airmagnet cisco access point
found
	http://www.cisco.com/en/US/docs/wireless/controller/5.0/configuration/guide/c5err.html
which says
	Prerequisites for Wireless Sniffing
	  To perform wireless sniffing, you need the following hardware and  
software:
	  o A dedicated access point—An access point configured as a sniffer  
cannot simultaneously provide wireless access service on the network.  
To avoid disrupting coverage, use an access point that is not part of  
your existing wireless network.
	  o A remote monitoring device—A computer capable of running the  
analyzer software.
	  o Windows XP or Linux operating system—The controller supports  
sniffing on both Windows XP and Linux machines.
	  o Software and supporting files, plug-ins, or adapters—Your  
analyzer software may require specialized files before you can  
successfully enable sniffing:
	    –Omnipeek or Airopeek—Go to http://www.wildpackets.com and follow  
the instructions to purchase, install, and configure the software.
	    –AirMagnet—Go to http://www.airmagnet.com/products/ea_cisco/#top  
and follow the instructions to purchase, install, and configure the  
software.
	    –Wireshark—Go to http://tools.cisco.com/support/downloads and  
follow the instructions to download Wireshark and the correct  
installation wizard for your operating system.
and then proceeds to talk about how to configure the access point -  
but *not* how to configure the sniffer.
Perhaps they've modified Wireshark - or libpcap/WinPcap - to support  
remote capture.  Or perhaps, given that they mention setting the IP  
address of the sniffing machine, they have a server process to which  
the AP sends packets, and you have Wireshark capture from a named pipe  
that provides access to that server.