<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Traffic Capture on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160538#M1074355</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can capture ssl traffic and look at the handshake (basically client&lt;BR /&gt;hello and server hello are the handshake messages). A failure in handshake&lt;BR /&gt;will generate a reset by the other party. These hellos can be seen without&lt;BR /&gt;decrypt.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
    <pubDate>Fri, 02 Oct 2020 07:14:25 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2020-10-02T07:14:25Z</dc:date>
    <item>
      <title>SSL Traffic Capture on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160375#M1074350</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have internal client talking to outside but I cant see ant traffic on FTD and Looks its communication is not reaching at that level and breaks at SSL handshake. Server guy confirmed me that ssl handshake is not completing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I capture ssl handshake traffic on ftd to see If ssl is the problem for this communication.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 22:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160375#M1074350</guid>
      <dc:creator>Fantas</dc:creator>
      <dc:date>2020-10-01T22:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Traffic Capture on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160535#M1074354</link>
      <description>&lt;P&gt;Hope you are not looking Decrypt the SSL, but as per the post, you looking simple end-to-end TCP handshake to prove the packet coming in FTD and leaving to destination.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;below troubleshoot prove and explain when you enable capture. Hope you do not have any other uplink side device which does NAT or any other sort ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-working-with-firepower-threat-defense-f.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-working-with-firepower-threat-defense-f.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2020 07:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160535#M1074354</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-10-02T07:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Traffic Capture on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160538#M1074355</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can capture ssl traffic and look at the handshake (basically client&lt;BR /&gt;hello and server hello are the handshake messages). A failure in handshake&lt;BR /&gt;will generate a reset by the other party. These hellos can be seen without&lt;BR /&gt;decrypt.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Oct 2020 07:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160538#M1074355</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-10-02T07:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Traffic Capture on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160607#M1074357</link>
      <description>&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I want to look at the handshake level only without decrypting ssl traffic.&lt;/P&gt;&lt;P&gt;what CLI should I use to get this Info on FTD CLI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2020 09:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160607#M1074357</guid>
      <dc:creator>Fantas</dc:creator>
      <dc:date>2020-10-02T09:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Traffic Capture on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160637#M1074360</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can go to system support diag command and capture #name# #if-name# ....&lt;BR /&gt;etc to capture the traffic on outside interface. Then export it as pcpa&lt;BR /&gt;file. Or you can generate the capture from fmc or fdm. Just lookup the&lt;BR /&gt;steps online.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Oct 2020 10:22:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-traffic-capture-on-ftd/m-p/4160637#M1074360</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-10-02T10:22:25Z</dc:date>
    </item>
  </channel>
</rss>

