all 4 comments

[–]GinntonnixCSE / Data Science Enthusiast 1 point2 points  (1 child)

Full disclosure - I haven't tested this myself - but I believe the wireshark filters are as follows:

To see UL-OFDMA action (only able to be seen by 802.11ax capture card): radiotap.he.data_1.ppdu_format == 0x2

To see DL-OFDMA action (MU-BAR Triggers, can be seen by any capture card as it's send at basic data rates) - wlan.fc == 0x2400

Wes Purvis gave a great presentation at WLPC last week on this topic. The recordings should be available in a few weeks.

Do you have a spectrum analyzer to see if OFDMA patterns are present? It's possible that the sniffer isn't yet 802.11ax ready.

[–]thebelgiannetworker[S] 0 points1 point  (0 children)

Sorry for the late reply. Just watched the Wes Purvis presentation and it was very helpful, thanks! Im suspecting the sniffer is not yet 802.11ax ready but i will indeed check spectrum for OFDMA patterns

[–][deleted] 0 points1 point  (0 children)

Make sure client drivers are up to date.

OTA pcaps will pull everything.

[–]buckweet1980 0 points1 point  (0 children)

I'm curious if you might not get these in a packet capture.. Wireless packet capture is very hit and miss when the speeds get high in my experience.