Cisco Catalyst Center Rogue Management and aWIPS Application Quick Start Guide, Release 3.1.x

PDF

Download aWIPS profile forensic capture from the Threat 360° view

Want to summarize with AI?

Log in

Overview

test

This procedure explains how to download the forensic capture of various DoS attacks from the Threat 360° view.

Note

Catalyst Center enables or disables forensic capture only on the default AP profile. You must enable or disable forensic capture in existing deployments where you have created custom AP join profiles.

Before you begin

Verify the network connectivity between the APs and Catalyst Center.

Procedure

1.

From the main menu, choose Assurance > Rogue and aWIPS > Threats.

2.

In the Threat MAC address column, click the aWIPS attack link.

The Threat 360 window opens.

3.

Click the Forensic Capture tab to view information such as Detecting AP, Alarm ID, CaptureFilename, and Last Updated.

4.

In the Capture Filename column, click the pcap file to download the aWIPS profile forensic capture.

5.

Click Download All to download all the pcap files.

6.

Click the Filter icon to narrow down the search results based on Detecting AP.

7.

Click the Export icon to save the CSV file to your workspace.

Note

Catalyst Center shows a maximum of 50 forensic captures at a time.