<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I cannot capture Radius traffic! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4045590#M1067761</link>
    <description>&lt;P&gt;OK, so after a lot of struggle now Im told by Cisco engineer that tunneled traffic cannot be captured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is probably very basic but I'm surprised that it took this long to be spotted&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all for your kind help&lt;/P&gt;</description>
    <pubDate>Fri, 13 Mar 2020 15:20:04 GMT</pubDate>
    <dc:creator>sawesa</dc:creator>
    <dc:date>2020-03-13T15:20:04Z</dc:date>
    <item>
      <title>I cannot capture Radius traffic!</title>
      <link>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4041646#M1067461</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I hope someone can help me with this capture.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I have an ASA configured to authenticate towards an AAA server, with the following config:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa-server RAS-Server protocol radius&lt;BR /&gt;aaa-server RAS-Server (if-inside) host 10.10.6.5&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And Im running a capture as&lt;/P&gt;&lt;PRE&gt;capture capradius interface if-inside match UDP host 10.50.3.1 host 10.10.6.5 eq 1812&lt;/PRE&gt;&lt;P&gt;Then I access with my AAA user to the ASA but nothing is captured!&lt;/P&gt;&lt;P&gt;What am I missing here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see the traces in the syslog thought, coming from the 10.50.3.1 to the auth server in10.10.6.5&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 12:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4041646#M1067461</guid>
      <dc:creator>sawesa</dc:creator>
      <dc:date>2020-03-06T12:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: I cannot capture Radius traffic!</title>
      <link>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4041733#M1067467</link>
      <description>&lt;P&gt;if i understand you correctly, you want tocapture traffic from cisco asa?&lt;/P&gt;&lt;P&gt;if yes, try to capture another type of traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 14:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4041733#M1067467</guid>
      <dc:creator>kapydan88</dc:creator>
      <dc:date>2020-03-06T14:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: I cannot capture Radius traffic!</title>
      <link>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4041756#M1067468</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Can you try the following captures:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;capture first interface if-inside match ip host 10.50.3.1 host 10.10.6.5 &lt;/PRE&gt;&lt;PRE&gt;capture second interface if-inside match ip any host 10.10.6.5 &lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 14:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4041756#M1067468</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-06T14:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: I cannot capture Radius traffic!</title>
      <link>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4041794#M1067471</link>
      <description>&lt;P&gt;access-list capi extended permit ip host 10.50.3.1 host 10.10.6.5&lt;BR /&gt;access-list capi extended permit ip host 10.10.6.5 host 10.50.3.1&lt;BR /&gt;!&lt;BR /&gt;capture capture interface if-inside access-list capi&lt;BR /&gt;!&lt;BR /&gt;copy /pcap capture: flash:capi&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 15:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4041794#M1067471</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-06T15:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: I cannot capture Radius traffic!</title>
      <link>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4042752#M1067544</link>
      <description>&lt;P&gt;Thanks for your suggestions, but none of them worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I spent one hour in webex session with Cisco tech engineer, but no luck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;show capture
capture capin type raw-data interface if-inside [Capturing - 0 bytes]
  match udp any host 10.10.6.5
capture cap2 type raw-data interface if-inside [Capturing - 0 bytes]
  match ip host 10.50.3.1 any
capture capout type raw-data interface outside [Capturing - 0 bytes]
  match ip host 10.10.6.5 any
capture rascapture type raw-data access-list capi interface if-inside [Capturing     - 0 bytes]&lt;/PRE&gt;&lt;P&gt;This is all what I got running in the server, and Im logging in and out constantly.&lt;/P&gt;&lt;P&gt;I can see in the logging how the connections are being sent to the auth server:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;6|Mar 09 2020 14:05:26|302015: Built outbound UDP connection 1051051 for outside:10.10.6.5/1812 (10.10.6.5/1812) to identity:10.50.3.1/49766 (10.50.3.1/49766)
6|Mar 09 2020 14:05:26|113004: AAA user authentication Successful : server =  10.10.6.5 : user = ***
6|Mar 09 2020 14:05:26|113008: AAA transaction status ACCEPT : user = ***
6|Mar 09 2020 14:05:26|611101: User authentication succeeded: IP address: **.**.**.**, Uname: ***
6|Mar 09 2020 14:05:26|611101: User authentication succeeded: IP address: **.**.**.**, Uname: ***
6|Mar 09 2020 14:05:26|605005: Login permitted from **.**.**.**/15180 to outside:**.**.**.**/ssh for user "***"&lt;/PRE&gt;&lt;P&gt;Does anyone understand why the Radius traffic is not being caught?&lt;/P&gt;&lt;P&gt;Im not sure this matters, but the connection to the AAA server is done through VPN&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 13:10:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4042752#M1067544</guid>
      <dc:creator>sawesa</dc:creator>
      <dc:date>2020-03-09T13:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: I cannot capture Radius traffic!</title>
      <link>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4045590#M1067761</link>
      <description>&lt;P&gt;OK, so after a lot of struggle now Im told by Cisco engineer that tunneled traffic cannot be captured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is probably very basic but I'm surprised that it took this long to be spotted&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all for your kind help&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 15:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4045590#M1067761</guid>
      <dc:creator>sawesa</dc:creator>
      <dc:date>2020-03-13T15:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: I cannot capture Radius traffic!</title>
      <link>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4045613#M1067762</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Traffic source/destined to the ASA (like RADIUS), when sent through a tunnel, it cannot be captured, because packet-capture is the first things it happens when a packet is received (as you want to capture the packet before ASA does any changes), and the last thing it happens when a packet is sent (as you want to capture the packet after the ASA has done all changes). So for your case, both ingress/egress packets were encrypted, thus the configured ACL for capture did not match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 15:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-cannot-capture-radius-traffic/m-p/4045613#M1067762</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-13T15:53:51Z</dc:date>
    </item>
  </channel>
</rss>

