<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trace traffic On 515 firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trace-traffic-on-515-firewall/m-p/687712#M1024315</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What kind of traffic are you trying trace..What is the problem that you are facing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP packet trace can be enabled by issuing a debug icmp trace command, to stop it enter no debug icmp trace.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Hoogen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Mar 2007 16:11:23 GMT</pubDate>
    <dc:creator>hoogen_82</dc:creator>
    <dc:date>2007-03-02T16:11:23Z</dc:date>
    <item>
      <title>Trace traffic On 515 firewall</title>
      <link>https://community.cisco.com/t5/network-security/trace-traffic-on-515-firewall/m-p/687711#M1024314</link>
      <description>&lt;P&gt;I would need help on how i can trace and capture traffic on the above firewall.&lt;/P&gt;&lt;P&gt;i need to prove to my IS guys that the firewall has no problems.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:40:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trace-traffic-on-515-firewall/m-p/687711#M1024314</guid>
      <dc:creator>tundeomogbai</dc:creator>
      <dc:date>2019-03-11T09:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Trace traffic On 515 firewall</title>
      <link>https://community.cisco.com/t5/network-security/trace-traffic-on-515-firewall/m-p/687712#M1024315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What kind of traffic are you trying trace..What is the problem that you are facing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP packet trace can be enabled by issuing a debug icmp trace command, to stop it enter no debug icmp trace.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Hoogen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 16:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trace-traffic-on-515-firewall/m-p/687712#M1024315</guid>
      <dc:creator>hoogen_82</dc:creator>
      <dc:date>2007-03-02T16:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: Trace traffic On 515 firewall</title>
      <link>https://community.cisco.com/t5/network-security/trace-traffic-on-515-firewall/m-p/687713#M1024316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Following is the method to take captures on PIX:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Issue with communication between a client on inside interface and a server on outside interface.&lt;/P&gt;&lt;P&gt;Replace IP addresses appropriately-&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list cpo permit ip host &lt;XSRC_IP&gt; host &lt;DST_IP&gt;&lt;/DST_IP&gt;&lt;/XSRC_IP&gt;&lt;/P&gt;&lt;P&gt;access-list cpo permit ip host &lt;DST_IP&gt; host &lt;XSRC_IP&gt;&lt;/XSRC_IP&gt;&lt;/DST_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capo access-list cpo buffer 2000000 packet-length 1518 interface outside&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list cpi permit ip host &lt;SRC_IP&gt; host &lt;DST_IP&gt;&lt;/DST_IP&gt;&lt;/SRC_IP&gt;&lt;/P&gt;&lt;P&gt;access-list cpi permit ip host &lt;DST_IP&gt; host &lt;SRC_IP&gt; &lt;/SRC_IP&gt;&lt;/DST_IP&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;capture capi access-list cpi buffer 2000000 packet-length 1518 interface inside&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;SRC_IP : This is the original IP address of client from where request is being&lt;/P&gt;&lt;P&gt;         generated&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;XSRC_IP : This is the translated IP address of the inside client. IP address to&lt;/P&gt;&lt;P&gt;          which inside client is translated when going outbound.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;DST_IP : This is the Destination IP address.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Alternatively, captures on both interfaces can be taken in a single capture file.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list cap permit ip host &lt;XSRC_IP&gt; host &lt;DST_IP&gt;&lt;/DST_IP&gt;&lt;/XSRC_IP&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip host &lt;DST_IP&gt; host &lt;XSRC_IP&gt; &lt;/XSRC_IP&gt;&lt;/DST_IP&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip host &lt;SRC_IP&gt; host &lt;DST_IP&gt;&lt;/DST_IP&gt;&lt;/SRC_IP&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip host &lt;DST_IP&gt; host &lt;SRC_IP&gt;&lt;/SRC_IP&gt;&lt;/DST_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capio access-list cap buffer 2000000 packet-length 1518 interface outside interface inside&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;To download the captures:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;using a maching with PDM access-&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://interface_IP/capture/capo/pcap" target="_blank"&gt;https://interface_IP/capture/capo/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;--&amp;gt; save file as outside.cap&lt;/P&gt;&lt;P&gt;(Captures on outside interface)&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://interface_IP/capture/capi/pcap" target="_blank"&gt;https://interface_IP/capture/capi/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;--&amp;gt; save file as inside.cap&lt;/P&gt;&lt;P&gt;(Captures on inside interface)&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://interface_IP/capture/capio/pcap" target="_blank"&gt;https://interface_IP/capture/capio/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;--&amp;gt; save file as inout.cap&lt;/P&gt;&lt;P&gt;(Captures on inside and outside interface)&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;If PDM is not available, captures can be sent to a TFTP server using following commands-&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;copy capture:capo t&lt;A class="jive-link-custom" href="ftp://x.x.x.x/outside.cap" target="_blank"&gt;ftp://x.x.x.x/outside.cap&lt;/A&gt; pcap&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;(Captures on outside interface of PIX, capture file will be saved as "outside.cap")&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;copy capture:capi t&lt;A class="jive-link-custom" href="ftp://x.x.x.x/inside.cap" target="_blank"&gt;ftp://x.x.x.x/inside.cap&lt;/A&gt; pcap&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;(Captures on outside interface of PIX, capture file will be saved as "inside.cap")&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;copy capture:capio t&lt;A class="jive-link-custom" href="ftp://x.x.x.x/inout.cap" target="_blank"&gt;ftp://x.x.x.x/inout.cap&lt;/A&gt; pcap&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;(Captures on inside and outside interface of PIX, capture file will be saved as "inout.cap")&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;x.x.x.x : IP address of TFTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------&lt;/P&gt;&lt;P&gt;do not forget to rate this. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 18:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trace-traffic-on-515-firewall/m-p/687713#M1024316</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2007-03-02T18:59:05Z</dc:date>
    </item>
  </channel>
</rss>

