<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Debug command in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/debug-command/m-p/633735#M1025314</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Debug command was the old way of capturing the packets. This command has been deprecated in 7.x versions. There is a better way available to capture the packets. For that we can use the "capture" command. Here is an example-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;suppose there is a host a.a.a.a on the inside interface of PIX/ASA and I need to capture all the outbound packets from this host. For this, I can apply captures using folloaing commands-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; access-list capi permit ip host a.a.a.a any&lt;/P&gt;&lt;P&gt;-&amp;gt; capture cpi access-list capi buffer 1000000 packet-length 1518 interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using access-list gives me more strength and granularity to capture only the packets I need. Later I use that access-list in the capture command. To download the capture files, I need to point my browser to-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://interface_ip/capture/cpi/pcap" target="_blank"&gt;https://interface_ip/capture/cpi/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(assuming PDM/ASDM is installed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use "copy" command to transfer the capture file to a tftp server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link for capture command-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1950270" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1950270&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link for copy command-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1970556" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1970556&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this is helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Feb 2007 11:45:50 GMT</pubDate>
    <dc:creator>vitripat</dc:creator>
    <dc:date>2007-02-22T11:45:50Z</dc:date>
    <item>
      <title>Debug command</title>
      <link>https://community.cisco.com/t5/network-security/debug-command/m-p/633734#M1025313</link>
      <description>&lt;P&gt;Any manual of  how to use debug command specific to a packet or IP address. Since it take lot of memory if I run that randomly.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/debug-command/m-p/633734#M1025313</guid>
      <dc:creator>sivakumar.ks</dc:creator>
      <dc:date>2019-03-11T09:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Debug command</title>
      <link>https://community.cisco.com/t5/network-security/debug-command/m-p/633735#M1025314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Debug command was the old way of capturing the packets. This command has been deprecated in 7.x versions. There is a better way available to capture the packets. For that we can use the "capture" command. Here is an example-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;suppose there is a host a.a.a.a on the inside interface of PIX/ASA and I need to capture all the outbound packets from this host. For this, I can apply captures using folloaing commands-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; access-list capi permit ip host a.a.a.a any&lt;/P&gt;&lt;P&gt;-&amp;gt; capture cpi access-list capi buffer 1000000 packet-length 1518 interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using access-list gives me more strength and granularity to capture only the packets I need. Later I use that access-list in the capture command. To download the capture files, I need to point my browser to-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://interface_ip/capture/cpi/pcap" target="_blank"&gt;https://interface_ip/capture/cpi/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(assuming PDM/ASDM is installed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use "copy" command to transfer the capture file to a tftp server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link for capture command-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1950270" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1950270&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link for copy command-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1970556" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1970556&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this is helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Feb 2007 11:45:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/debug-command/m-p/633735#M1025314</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-22T11:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Debug command</title>
      <link>https://community.cisco.com/t5/network-security/debug-command/m-p/633736#M1025315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response. Do we need to apply accesslist exclusively to an interface. Do the above access-list capi is independent of exisiting access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;siva&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Feb 2007 03:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/debug-command/m-p/633736#M1025315</guid>
      <dc:creator>sivakumar.ks</dc:creator>
      <dc:date>2007-02-23T03:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: Debug command</title>
      <link>https://community.cisco.com/t5/network-security/debug-command/m-p/633737#M1025317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We dont need to apply this access-list on any interface. It is completely independent of existing access-lists on device. The sole pupose of these ACLs is to match the traffic we need to capture by using them in the capture command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Feb 2007 04:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/debug-command/m-p/633737#M1025317</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-23T04:02:49Z</dc:date>
    </item>
  </channel>
</rss>

