
The number of the interface may vary depending on the network setup. The names depend on the interface card type used. Guard Interval is not consistent between Radiotap & wlanradio. editcap does not adjust time for frames with absolute timestamp 0 < t < 1 secs. MP2T Dissector does parse RTP properly in 2.0.1. Wrong interpretation of Instance ID value in OSPFv3 packet. The external interface can be found by selecting the corresponding virtual host in the menu "Application Firewall" - "Reverse Proxy". Typical names used for interfaces are eth0, eth1, vmnet1, etc. Failed to parse M3AP IE (TNL information). There is a management interface, a back-end interface and one or more external interfaces. The management and back-end interface can be found in the menu "System Setup" - "Nodes" in the Airlock Configuration Center. The most important thing to know when recording network traffic are the names of the used network interfaces. Alternatively, you can use TShark, the command line version of Wireshark, directly. Traces recorded with tcpdump are compatible with other monitoring tools and analyzers like Wireshark. To record such traffic on Airlock Gateway the common Linux tool tcpdump can be used.

This may be to analyze whether packets sent from external systems are reaching the Gateway, to check network connectivity, routing or firewall settings.

It is often useful to record network traffic on one of the interfaces attached to Airlock Gateway.
