<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Next CLI command to determine what ACL is dropping traffic? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/next-cli-command-to-determine-what-acl-is-dropping-traffic/m-p/4266759#M1077008</link>
    <description>&lt;P&gt;Create a packet capture that only collects dropped packets due to an ACL:&lt;/P&gt;&lt;PRE&gt;ASA5508# capture mycapture type asp-drop acl-drop&lt;/PRE&gt;&lt;P&gt;Next view the packet capture to see what traffic is getting dropped which might lead you to the ACL that needs tweaking:&lt;/P&gt;&lt;PRE&gt;ASA5508# show capture mycapture
5 packets captured
   1: 18:25:42.987879       1.1.1.1.43605 &amp;gt; 2.2.2.2.34577: S 431469340:431469340(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
  &lt;/PRE&gt;</description>
    <pubDate>Tue, 05 Jan 2021 00:29:49 GMT</pubDate>
    <dc:creator>TJ-20933766</dc:creator>
    <dc:date>2021-01-05T00:29:49Z</dc:date>
    <item>
      <title>Next CLI command to determine what ACL is dropping traffic?</title>
      <link>https://community.cisco.com/t5/network-security/next-cli-command-to-determine-what-acl-is-dropping-traffic/m-p/4266733#M1077003</link>
      <description>&lt;P&gt;Hey, pros, I've determined that an Implicit ACL is causing my Mobile32 traffic to drop in Phase 3, BUT it's not so kind as to give me which rule is dropping the traffic. If you're me, what's your next command? What command would you enter to see what ACL is dropping traffic for Mobile32?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-01-04 at 5.18.50 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/100862i1393B7DD8FE25C46/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-01-04 at 5.18.50 PM.png" alt="Screen Shot 2021-01-04 at 5.18.50 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 22:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/next-cli-command-to-determine-what-acl-is-dropping-traffic/m-p/4266733#M1077003</guid>
      <dc:creator>Alan Inman</dc:creator>
      <dc:date>2021-01-04T22:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: Next CLI command to determine what ACL is dropping traffic?</title>
      <link>https://community.cisco.com/t5/network-security/next-cli-command-to-determine-what-acl-is-dropping-traffic/m-p/4266759#M1077008</link>
      <description>&lt;P&gt;Create a packet capture that only collects dropped packets due to an ACL:&lt;/P&gt;&lt;PRE&gt;ASA5508# capture mycapture type asp-drop acl-drop&lt;/PRE&gt;&lt;P&gt;Next view the packet capture to see what traffic is getting dropped which might lead you to the ACL that needs tweaking:&lt;/P&gt;&lt;PRE&gt;ASA5508# show capture mycapture
5 packets captured
   1: 18:25:42.987879       1.1.1.1.43605 &amp;gt; 2.2.2.2.34577: S 431469340:431469340(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
  &lt;/PRE&gt;</description>
      <pubDate>Tue, 05 Jan 2021 00:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/next-cli-command-to-determine-what-acl-is-dropping-traffic/m-p/4266759#M1077008</guid>
      <dc:creator>TJ-20933766</dc:creator>
      <dc:date>2021-01-05T00:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Next CLI command to determine what ACL is dropping traffic?</title>
      <link>https://community.cisco.com/t5/network-security/next-cli-command-to-determine-what-acl-is-dropping-traffic/m-p/4267243#M1077043</link>
      <description>&lt;P&gt;You can use the command&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;system support trace&amp;nbsp;&lt;/P&gt;&lt;P&gt;the result tells you which policy generates the block.&lt;/P&gt;&lt;P&gt;example.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ftd-trace.jpg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/100929i66E240476E8D092F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ftd-trace.jpg" alt="ftd-trace.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;more information&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212321-clarify-the-firepower-threat-defense-acc.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212321-clarify-the-firepower-threat-defense-acc.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 17:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/next-cli-command-to-determine-what-acl-is-dropping-traffic/m-p/4267243#M1077043</guid>
      <dc:creator>setian_london</dc:creator>
      <dc:date>2021-01-05T17:55:09Z</dc:date>
    </item>
  </channel>
</rss>

