<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Create ACL on ASA that matches on SYN flag for capture statement in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/create-acl-on-asa-that-matches-on-syn-flag-for-capture-statement/m-p/3365907#M1025420</link>
    <description>&lt;P&gt;why not&amp;nbsp; get the whole capture and filter the capture using wireshark available filters?&lt;/P&gt;</description>
    <pubDate>Sat, 14 Apr 2018 03:57:28 GMT</pubDate>
    <dc:creator>Dennis Mink</dc:creator>
    <dc:date>2018-04-14T03:57:28Z</dc:date>
    <item>
      <title>Create ACL on ASA that matches on SYN flag for capture statement</title>
      <link>https://community.cisco.com/t5/network-security/create-acl-on-asa-that-matches-on-syn-flag-for-capture-statement/m-p/3365806#M1025419</link>
      <description>&lt;P&gt;I'm helping out a customer who is trying to make some firewall changes based on the results of a PCI audit. They have several "permit ip network1 network2" statements, and they need to restrict these to ports. I've been doing packet captures, but there is too much data through the interfaces. I'd like to match on SYN packets to decrease the amount of information I see. I've not been able to find any information on various forums that can help me out. Is this possible? Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/create-acl-on-asa-that-matches-on-syn-flag-for-capture-statement/m-p/3365806#M1025419</guid>
      <dc:creator>baskervi</dc:creator>
      <dc:date>2020-02-21T15:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: Create ACL on ASA that matches on SYN flag for capture statement</title>
      <link>https://community.cisco.com/t5/network-security/create-acl-on-asa-that-matches-on-syn-flag-for-capture-statement/m-p/3365907#M1025420</link>
      <description>&lt;P&gt;why not&amp;nbsp; get the whole capture and filter the capture using wireshark available filters?&lt;/P&gt;</description>
      <pubDate>Sat, 14 Apr 2018 03:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/create-acl-on-asa-that-matches-on-syn-flag-for-capture-statement/m-p/3365907#M1025420</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-04-14T03:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: Create ACL on ASA that matches on SYN flag for capture statement</title>
      <link>https://community.cisco.com/t5/network-security/create-acl-on-asa-that-matches-on-syn-flag-for-capture-statement/m-p/3373819#M1025422</link>
      <description>&lt;P&gt;Thanks for the response, Dennis. I'm getting about 5 hits on the access list over a 48 hour period, so very low level traffic. I'm remote, but they'll be able to spin up a machine to capture and filter the information on.&amp;nbsp; Take care.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 14:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/create-acl-on-asa-that-matches-on-syn-flag-for-capture-statement/m-p/3373819#M1025422</guid>
      <dc:creator>baskervi</dc:creator>
      <dc:date>2018-04-26T14:41:27Z</dc:date>
    </item>
  </channel>
</rss>

