<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alternative of packet capture match access-list on Cisco FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068471#M1111213</link>
    <description>&lt;P&gt;NO need that I check in my lab&amp;nbsp;&lt;BR /&gt;FTD not like ASA support ACL in match there is no option to add ACL&amp;nbsp;&lt;BR /&gt;so as I mention before divide the subnet to parts and match these parts in capture command&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (317).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215683iA5560BA0B20D93E9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (317).png" alt="Screenshot (317).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I use two match statement in same capture and it work as I want&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Sun, 14 Apr 2024 07:39:11 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-04-14T07:39:11Z</dc:date>
    <item>
      <title>Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5066659#M1111050</link>
      <description>&lt;P&gt;What would be the best way to capture traffic on a subnet (192.168.1.0/24) and excluding the capture for one of the IPs withing this subnet (192.168.1.1)&lt;/P&gt;
&lt;P&gt;Reason is I want to run the capture for a couple of days and 192.168.1.1 will fill up the buffer immediately.&lt;/P&gt;
&lt;P&gt;Since matching an ACL is no longer supported on Cisco FTD, I'm looking for an alternative way to do the following on FTD:&lt;/P&gt;
&lt;P&gt;access-list TEST deny ip host 192.168.1.1 any&lt;/P&gt;
&lt;P&gt;access-list TEST permit ip any any&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;capture cap match access-list TEST&lt;/P&gt;
&lt;P&gt;capture cap interface outside&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 18:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5066659#M1111050</guid>
      <dc:creator>ojebbe</dc:creator>
      <dc:date>2024-04-11T18:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5066663#M1111052</link>
      <description>&lt;P&gt;Capture Cap match IP host x.x.x.x&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This what you can use&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 18:08:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5066663#M1111052</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-11T18:08:29Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5066665#M1111054</link>
      <description>&lt;P&gt;What I'm looking for is to match the whole range (192.168.1.0/24) except for the IP address 192.168.1.1&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 18:10:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5066665#M1111054</guid>
      <dc:creator>ojebbe</dc:creator>
      <dc:date>2024-04-11T18:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5066680#M1111060</link>
      <description>&lt;P&gt;Increase buffer or divide the subnet into parts and used each parts in capture I know it alot of work but it workaround at least.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 18:19:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5066680#M1111060</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-11T18:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5067043#M1111079</link>
      <description>&lt;P&gt;Can check again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;capture CAP interface XX ?&lt;/P&gt;
&lt;P&gt;See what option you get&amp;nbsp;&lt;/P&gt;
&lt;P&gt;capture CAP interface xx match ?&lt;/P&gt;
&lt;P&gt;See what option you get&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5067043#M1111079</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-12T08:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068416#M1111206</link>
      <description>&lt;P&gt;Unfortunately packet capture on the FTD does not allow for a range or ACL match, so omitting the 192.168.1.1 IP is not possible using this.&amp;nbsp; The options you have are to set up SPAN / RSPAN on the uplink switch or (I have never tried this) do a tcpdump on the FTD in expert mode and filter on the required IP range.&amp;nbsp; Not sure if the last would work as I have personally never tried it.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2024 22:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068416#M1111206</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-13T22:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068471#M1111213</link>
      <description>&lt;P&gt;NO need that I check in my lab&amp;nbsp;&lt;BR /&gt;FTD not like ASA support ACL in match there is no option to add ACL&amp;nbsp;&lt;BR /&gt;so as I mention before divide the subnet to parts and match these parts in capture command&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (317).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215683iA5560BA0B20D93E9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (317).png" alt="Screenshot (317).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I use two match statement in same capture and it work as I want&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2024 07:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068471#M1111213</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-14T07:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068549#M1111222</link>
      <description>&lt;P&gt;The poster wants to capture all traffic other than 192.168.1.1. Mean you would need to exclude that specific IP which is not possible.&amp;nbsp; Creating specific statements for all hosts, i would assume, is not an option as it would take too much time depending on how many IPs are in the subnet.&amp;nbsp; Subnetting the 192.168.1.0/24 subnet could be an option, but you would need to get very creative with that and spending time doing that might not be worth it.&amp;nbsp; the best option and least time-consuming would be to set up SPAN / RSPAN on the switch port connecting to the FTD and then filter using an access list.&lt;/P&gt;
&lt;P&gt;If you are already logging to a Syslog server then filtering on the traffic you want to inspect there might be an option if you are just looking for the connection events.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2024 12:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068549#M1111222</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-14T12:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068551#M1111224</link>
      <description>&lt;P&gt;Friend my idea is following&amp;nbsp;&lt;/P&gt;
&lt;P&gt;10.0.0.0/24&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Divide it to small subnet like&amp;nbsp;&lt;/P&gt;
&lt;P&gt;10.0.0.0/25'&lt;/P&gt;
&lt;P&gt;And match subnet that not include IP he need to exclude.&lt;/P&gt;
&lt;P&gt;I Know it need lot work but it workaround to limitations of ftd capture.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2024 12:39:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068551#M1111224</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-14T12:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative of packet capture match access-list on Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068556#M1111226</link>
      <description>&lt;P&gt;I understand what you were suggesting, but the problem there is you will still include 192.168.1.1 in the capture with a /25 network.&amp;nbsp; If you start subnetting at /30 you will exclude 1 -3 and you will also have an issue as you would need to do some very creative subnetting to match the remaining IPs in the /24 subnet.&amp;nbsp; This is time consuming to do an possibly not worth it.&amp;nbsp; Which is why a better solution is to do SPAN / RSPAN on the uplink switch.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2024 12:52:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alternative-of-packet-capture-match-access-list-on-cisco-ftd/m-p/5068556#M1111226</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-14T12:52:19Z</dc:date>
    </item>
  </channel>
</rss>

