<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vFTD v6.6.0 Browser access to CLI capture in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4102275#M1070985</link>
    <description>&lt;P&gt;Chakshu's URL indicates that Post-FMC v6.2 includes a new capture wizard; however, there is no mention of deprecating TCP:443 extraction of captures.&amp;nbsp; Agreed alternative workarounds to remote repository works OK; but my customer needs adhoc browser access from specific locations.&amp;nbsp; The following FTD CLI output is distinctly lacking in http content:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# sh run http&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;http server enable&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;http 198.18.0.0 255.254.0.0 in10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# sh logging&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Syslog logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Facility: 20&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Timestamp logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Hide Username logging: enabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Standby logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Debug-trace logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Console logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Monitor logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Buffer logging: level debugging, 4 messages logged&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Trap logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Permit-hostdown logging: enabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;History logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Device ID: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Mail logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ASDM logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;FMC logging: list MANAGER_VPN_EVENT_LIST, 0 messages logged&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;%FTD-5-111008: User 'enable_1' executed the 'write memory' command.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;%FTD-5-111010: User 'enable_1', running 'N/A' from IP 0.0.0.0, executed 'write memory'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;%FTD-5-111008: User 'enable_15' executed the 'debug icmp trace' command.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;%FTD-5-111008: User 'enable_15' executed the 'debug icmp trace' command.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# sh debug&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;debug http enabled at level 255&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;debug http enabled at level 255 (persistent)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;debug icmp trace enabled at level 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;debug icmp trace enabled at level 1 (persistent)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Debug fxos_parser off&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;Conditional debug filters:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;Conditional debug features:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# ICMP echo request from 198.19.10.50 to 198.19.10.1 ID=1 seq=22307 len=32&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ICMP echo reply from 198.19.10.1 to 198.19.10.50 ID=1 seq=22307 len=32&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# ! ICMP from host with Firefox browser targetting&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# ! &lt;A href="https://198.19.10.1/admin/capture/icmpcap" target="_blank"&gt;https://198.19.10.1/admin/capture/icmpcap&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1#&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# ! Browser reports "Connection Timed out"; but no http logs!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks as though a TAC case beckons!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jun 2020 14:45:33 GMT</pubDate>
    <dc:creator>michael.taylor</dc:creator>
    <dc:date>2020-06-12T14:45:33Z</dc:date>
    <item>
      <title>vFTD v6.6.0 Browser access to CLI capture</title>
      <link>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4101369#M1070949</link>
      <description>&lt;P&gt;Hello Fellow Networks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am encountering problems TCP:443 extracting a vFTD v 6.6.0 capture generated whilst in diagnostic-cli privileged EXEC Mode.&amp;nbsp; vFTD &amp;nbsp;http services have been stated allowing access from the appropriate subnet:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;ngfw1# sho running-config http&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;http server enable&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;http 198.18.0.0 255.254.0.0 in10&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The access control control policy also hosts a trust rule from my browser’s IP address that is accruing hits.; however, the browser reponds with an HTTP-404.&amp;nbsp; Wiresharking the browser session show that &amp;nbsp;interface in10 &amp;nbsp;responds to every inbound syn with a RST ACK frame!&amp;nbsp; Is this an un-documented feature or have I missed a default platform constraint or access control policy advanced switch?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Methology taken from latest Cisco Firepower Threat Defense Command Reference page 27.&amp;nbsp; The browser URL is: &lt;A href="https://198.19.10.1/admin/capture/%3ccapture" target="_blank" rel="noopener"&gt;https://198.19.10.1/admin/capture/&amp;lt;capture&lt;/A&gt; name&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Help and advice would be very gratefully received.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in anticipation&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 08:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4101369#M1070949</guid>
      <dc:creator>michael.taylor</dc:creator>
      <dc:date>2020-06-11T08:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: vFTD v6.6.0 Browser access to CLI capture</title>
      <link>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4101572#M1070958</link>
      <description>&lt;P&gt;It appears you have it setup correctly.&lt;/P&gt;
&lt;P&gt;Have you tried browsing the parent directory in the URL to see if you even get an empty listing?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 14:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4101572#M1070958</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-06-11T14:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: vFTD v6.6.0 Browser access to CLI capture</title>
      <link>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4101636#M1070962</link>
      <description>Hello Marvin,&lt;BR /&gt;&lt;BR /&gt;Thank you for getting involved.&lt;BR /&gt;&lt;BR /&gt;Browsing parent folders attracts the same connection reset packet from interface in10!</description>
      <pubDate>Thu, 11 Jun 2020 15:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4101636#M1070962</guid>
      <dc:creator>michael.taylor</dc:creator>
      <dc:date>2020-06-11T15:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: vFTD v6.6.0 Browser access to CLI capture</title>
      <link>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4102014#M1070977</link>
      <description>&lt;P&gt;I'd suggest opening a TAC case. It appears you're doing everything correctly.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 06:30:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4102014#M1070977</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-06-12T06:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: vFTD v6.6.0 Browser access to CLI capture</title>
      <link>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4102029#M1070978</link>
      <description>&lt;P&gt;You can check this document on now to take captures from lina (ASA):&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-working-with-firepower-threat-defense-f.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-working-with-firepower-threat-defense-f.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A debug might give more insight:&lt;/P&gt;
&lt;P&gt;debug http 255&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might want to use the following to extract captures.&lt;/P&gt;
&lt;PRE&gt;firepower# &lt;STRONG&gt;copy /pcap capture:CAPI ftp://ftp_username:ftp_password@192.168.78.73/CAPI.pcap&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH,&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Please rate helpful posts.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 07:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4102029#M1070978</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2020-06-12T07:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: vFTD v6.6.0 Browser access to CLI capture</title>
      <link>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4102275#M1070985</link>
      <description>&lt;P&gt;Chakshu's URL indicates that Post-FMC v6.2 includes a new capture wizard; however, there is no mention of deprecating TCP:443 extraction of captures.&amp;nbsp; Agreed alternative workarounds to remote repository works OK; but my customer needs adhoc browser access from specific locations.&amp;nbsp; The following FTD CLI output is distinctly lacking in http content:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# sh run http&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;http server enable&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;http 198.18.0.0 255.254.0.0 in10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# sh logging&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Syslog logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Facility: 20&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Timestamp logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Hide Username logging: enabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Standby logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Debug-trace logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Console logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Monitor logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Buffer logging: level debugging, 4 messages logged&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Trap logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Permit-hostdown logging: enabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;History logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Device ID: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Mail logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ASDM logging: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;FMC logging: list MANAGER_VPN_EVENT_LIST, 0 messages logged&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;%FTD-5-111008: User 'enable_1' executed the 'write memory' command.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;%FTD-5-111010: User 'enable_1', running 'N/A' from IP 0.0.0.0, executed 'write memory'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;%FTD-5-111008: User 'enable_15' executed the 'debug icmp trace' command.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;%FTD-5-111008: User 'enable_15' executed the 'debug icmp trace' command.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# sh debug&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;debug http enabled at level 255&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;debug http enabled at level 255 (persistent)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;debug icmp trace enabled at level 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;debug icmp trace enabled at level 1 (persistent)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Debug fxos_parser off&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;Conditional debug filters:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;Conditional debug features:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# ICMP echo request from 198.19.10.50 to 198.19.10.1 ID=1 seq=22307 len=32&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ICMP echo reply from 198.19.10.1 to 198.19.10.50 ID=1 seq=22307 len=32&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# ! ICMP from host with Firefox browser targetting&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# ! &lt;A href="https://198.19.10.1/admin/capture/icmpcap" target="_blank"&gt;https://198.19.10.1/admin/capture/icmpcap&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1#&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;ngfw1# ! Browser reports "Connection Timed out"; but no http logs!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks as though a TAC case beckons!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 14:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vftd-v6-6-0-browser-access-to-cli-capture/m-p/4102275#M1070985</guid>
      <dc:creator>michael.taylor</dc:creator>
      <dc:date>2020-06-12T14:45:33Z</dc:date>
    </item>
  </channel>
</rss>

