<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Capture - Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5119363#M1113081</link>
    <description>&lt;P&gt;that how TCP handshake look like&amp;nbsp;&lt;BR /&gt;first you see "S" meaning this packet is SYN&amp;nbsp;&lt;BR /&gt;then you see "S" and also "ACK" this meaning SYN+ACK&lt;BR /&gt;lastly you see only "ACK" which is end of TCP handshake&amp;nbsp;&lt;/P&gt;
&lt;P&gt;after that any capture with "P" is meaning PACKET and not relate to TCP handshake&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (502).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219503i58A502B7E8570FFD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (502).png" alt="Screenshot (502).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 29 May 2024 11:26:06 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-05-29T11:26:06Z</dc:date>
    <item>
      <title>Packet Capture - Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5117789#M1113035</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;&lt;P&gt;I have captured some TCP traffic in Cisco ASA. But from that capture, I'm unable to examine the TCP handshake flow.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Looks like, TCP flags are placed in random order.&amp;nbsp; Is ASA capturing the traffic in sequence order?&lt;/LI&gt;&lt;LI&gt;What is the flag for SYNC ACK in ASA? I'm unable to fix SYNC ACK in capture.&lt;/LI&gt;&lt;LI&gt;Also, what is P ACK? It's used to Push data? or Just ACK for data received?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Logs:-&lt;/P&gt;&lt;P&gt;35: 06:20:52.259340 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: S 3384631045:3384631045(0) win 29200 &amp;lt;mss 1460,nop,nop,sackOK,nop,wscale 7&amp;gt;&lt;BR /&gt;38: 06:20:52.289108 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: . ack 1259971722 win 229&lt;BR /&gt;39: 06:20:52.299834 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: P 3384631046:3384631563(517) ack 1259971722 win 229&lt;/P&gt;&lt;P&gt;44: 06:20:52.329343 802.1Q vlan#AAA P0 Y.Y.Y.Y.9443 &amp;gt; X.X.X.X.35908: . ack 3384631563 win 237&lt;BR /&gt;46: 06:20:52.344220 802.1Q vlan#AAA P0 Y.Y.Y.Y.9443 &amp;gt; X.X.X.X.35908: . 1259971722:1259973094(1372) ack 3384631563 win 237&lt;BR /&gt;47: 06:20:52.344250 802.1Q vlan#AAA P0 Y.Y.Y.Y.9443 &amp;gt; X.X.X.X.35908: P 1259973094:1259973157(63) ack 3384631563 win 237&lt;BR /&gt;48: 06:20:52.344449 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: . ack 1259973157 win 251&lt;BR /&gt;50: 06:20:52.346112 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: P 3384631563:3384631729(166) ack 1259973157 win 251&lt;/P&gt;&lt;P&gt;58: 06:20:52.380031 802.1Q vlan#AAA P0 Y.Y.Y.Y.9443 &amp;gt; X.X.X.X.35908: P 1259973157:1259973163(6) ack 3384631729 win 245&lt;BR /&gt;59: 06:20:52.380031 802.1Q vlan#AAA P0 Y.Y.Y.Y.9443 &amp;gt; X.X.X.X.35908: P 1259973163:1259973248(85) ack 3384631729 win 245&lt;BR /&gt;60: 06:20:52.380229 802.1Q vlan#AAA P0 X.X.X.X.35910 &amp;gt; Y.Y.Y.Y.9443: . ack 652854020 win 229&lt;BR /&gt;61: 06:20:52.380580 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: . ack 1259973248 win 251&lt;BR /&gt;62: 06:20:52.381251 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: P 3384631729:3384632070(341) ack 1259973248 win 251&lt;BR /&gt;64: 06:20:52.408090 802.1Q vlan#AAA P0 Y.Y.Y.Y.9443 &amp;gt; X.X.X.X.35908: P 1259973248:1259973397(149) ack 3384632070 win 254&lt;BR /&gt;65: 06:20:52.408807 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: P 3384632070:3384632139(69) ack 1259973397 win 272&lt;BR /&gt;66: 06:20:52.410531 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: F 3384632139:3384632139(0) ack 1259973397 win 272&lt;BR /&gt;68: 06:20:52.441215 802.1Q vlan#AAA P0 Y.Y.Y.Y.9443 &amp;gt; X.X.X.X.35908: P 1259973397:1259973466(69) ack 3384632140 win 254&lt;BR /&gt;69: 06:20:52.441261 802.1Q vlan#AAA P0 Y.Y.Y.Y.9443 &amp;gt; X.X.X.X.35908: F 1259973466:1259973466(0) ack 3384632140 win 254&lt;BR /&gt;70: 06:20:52.441505 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: R 3384632140:3384632140(0) win 0&lt;BR /&gt;71: 06:20:52.441551 802.1Q vlan#AAA P0 X.X.X.X.35908 &amp;gt; Y.Y.Y.Y.9443: R 3384632140:3384632140(0) win 0&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2024 16:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5117789#M1113035</guid>
      <dc:creator>Magesh Kumar</dc:creator>
      <dc:date>2024-05-27T16:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture - Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5117793#M1113036</link>
      <description>&lt;P&gt;I would suggest understand the ASA Flags :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113602-ptn-113602.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113602-ptn-113602.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;better you can export PCAP to Wireshark you get better view (if you are not familiar with cli)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2024 16:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5117793#M1113036</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-05-27T16:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture - Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5117801#M1113037</link>
      <description>&lt;P&gt;did you use any match in your capture to filter the src/dest IP and scr/dest l4 port ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2024 16:51:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5117801#M1113037</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-27T16:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture - Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5117808#M1113038</link>
      <description>&lt;P&gt;Yes. I've created capture with source and destination IP's.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Magesh Kumar G&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2024 17:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5117808#M1113038</guid>
      <dc:creator>Magesh Kumar</dc:creator>
      <dc:date>2024-05-27T17:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture - Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5119363#M1113081</link>
      <description>&lt;P&gt;that how TCP handshake look like&amp;nbsp;&lt;BR /&gt;first you see "S" meaning this packet is SYN&amp;nbsp;&lt;BR /&gt;then you see "S" and also "ACK" this meaning SYN+ACK&lt;BR /&gt;lastly you see only "ACK" which is end of TCP handshake&amp;nbsp;&lt;/P&gt;
&lt;P&gt;after that any capture with "P" is meaning PACKET and not relate to TCP handshake&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (502).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219503i58A502B7E8570FFD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (502).png" alt="Screenshot (502).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 11:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5119363#M1113081</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-29T11:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture - Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5122420#M1113213</link>
      <description>&lt;P&gt;Looks like problem with Destination server. After restarted the services in destination server, ASA capture showing TCP handshake sequentially.&lt;/P&gt;&lt;P&gt;Thanks all.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 09:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5122420#M1113213</guid>
      <dc:creator>Magesh Kumar</dc:creator>
      <dc:date>2024-06-01T09:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture - Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5122432#M1113216</link>
      <description>&lt;P&gt;By the way you need to run packet capture'&lt;/P&gt;
&lt;P&gt;Then clear conn this force the server and clinet to start new tcp session&lt;/P&gt;
&lt;P&gt;If yoh capture then session already done the you will capture only "P" not the tcp handshake then P&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 09:39:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-cisco-asa/m-p/5122432#M1113216</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-01T09:39:27Z</dc:date>
    </item>
  </channel>
</rss>

