This document describes how to use the RPCap interface integrated in LCOS together with the packet analysis tool Wireshark to generate packet captures from any interface on a LANCOM router.
The advantage over the capture with LCOSCap is that the packets can be examined 'live' during the recording and capture filters can also be defined.
| Please note that a running Wireshark instance consumes significantly more resources on the PC than an LCOSCap instance. For long-term data capture, we therefore recommended the use of LCOSCap. |

From LCOS 10.50, following a re-configuration of the router or a factory reset, the main device password is stored as a hash value only and not as cleartext (Setup/Config/Passwords/Keep-Cleartext No). Existing configurations are not affected. The tool LCOSCap currently does not work without a cleartext password. In this case, a workaround is to delete the LCOSCap algorithm Simple. Enter the following command into the CLI: set Setup/Packet-Capture/LCOSCap-Algorithms 12
|
2.1 Start the Windows version of the packet-analysis tool Wireshark.
| Currently, the RPCap interface only works properly in combination with the Windows version of Wireshark. This is because PRCap is only supported by the WinPcap driver available for Windows and included with Wireshark. |
2.2 From the Capture menu, select Options.

2.3 In the window that follows, select Manage interfaces.

2.4 In the next window, select the tab Remote Interfaces and add the router.


2.5 Now the router's interfaces that can be captured are displayed.
Do not use the interfaces LL-VDSL-CTRL or LL-XDSL-x-CTRL, as they record the management packets of the DSL modem only. |
2.6 Choose the required interface and click OK.

2.7 After clicking Start, the packets passing through the selected interface are captured as if the interface were located locally on the PC.


|