<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Packet capture analysis in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3831988#M11528</link>
    <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please provide more insight on to below packet capture. What exactly happening between, 10.20.59.52 and 204.110.219.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, suggest good docs/online links, which will help understand the TCPIP handshake and packet analysis.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;9: 00:55:54.818484 802.1Q vlan#193 P0 10.20.59.52.43979 &amp;gt; 204.110.219.102.443: P 4224286519:4224286805(286) ack 1471341325 win 1444 &amp;lt;nop,nop,timestamp 62224971 1804188686&amp;gt;&lt;BR /&gt;10: 00:55:54.818545 802.1Q vlan#193 P0 10.20.59.52.43979 &amp;gt; 204.110.219.102.443: P 4224286805:4224287518(713) ack 1471341325 win 1444 &amp;lt;nop,nop,timestamp 62224971 1804188686&amp;gt;&lt;BR /&gt;11: 00:55:54.819400 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.43979: . ack 4224286805 win 501 &amp;lt;nop,nop,timestamp 1804242427 62224971&amp;gt;&lt;BR /&gt;12: 00:55:54.819400 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.43979: . ack 4224287518 win 496 &amp;lt;nop,nop,timestamp 1804242427 62224971&amp;gt;&lt;BR /&gt;17: 00:55:54.824572 802.1Q vlan#193 P0 10.20.59.52.44526 &amp;gt; 204.110.219.102.443: S 2148927462:2148927462(0) win 29200 &amp;lt;mss 1460,sackOK,timestamp 62224977 0,nop,wscale 7&amp;gt;&lt;BR /&gt;18: 00:55:54.824603 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.44526: R 0:0(0) ack 2148927463 win 29200&lt;BR /&gt;19: 00:55:54.949230 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.43979: P 1471341325:1471341552(227) ack 4224287518 win 501 &amp;lt;nop,nop,timestamp 1804242460 62224971&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Sreeraj Murali&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:00:47 GMT</pubDate>
    <dc:creator>sreeraj.murali</dc:creator>
    <dc:date>2020-02-21T17:00:47Z</dc:date>
    <item>
      <title>Packet capture analysis</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3831988#M11528</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please provide more insight on to below packet capture. What exactly happening between, 10.20.59.52 and 204.110.219.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, suggest good docs/online links, which will help understand the TCPIP handshake and packet analysis.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;9: 00:55:54.818484 802.1Q vlan#193 P0 10.20.59.52.43979 &amp;gt; 204.110.219.102.443: P 4224286519:4224286805(286) ack 1471341325 win 1444 &amp;lt;nop,nop,timestamp 62224971 1804188686&amp;gt;&lt;BR /&gt;10: 00:55:54.818545 802.1Q vlan#193 P0 10.20.59.52.43979 &amp;gt; 204.110.219.102.443: P 4224286805:4224287518(713) ack 1471341325 win 1444 &amp;lt;nop,nop,timestamp 62224971 1804188686&amp;gt;&lt;BR /&gt;11: 00:55:54.819400 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.43979: . ack 4224286805 win 501 &amp;lt;nop,nop,timestamp 1804242427 62224971&amp;gt;&lt;BR /&gt;12: 00:55:54.819400 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.43979: . ack 4224287518 win 496 &amp;lt;nop,nop,timestamp 1804242427 62224971&amp;gt;&lt;BR /&gt;17: 00:55:54.824572 802.1Q vlan#193 P0 10.20.59.52.44526 &amp;gt; 204.110.219.102.443: S 2148927462:2148927462(0) win 29200 &amp;lt;mss 1460,sackOK,timestamp 62224977 0,nop,wscale 7&amp;gt;&lt;BR /&gt;18: 00:55:54.824603 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.44526: R 0:0(0) ack 2148927463 win 29200&lt;BR /&gt;19: 00:55:54.949230 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.43979: P 1471341325:1471341552(227) ack 4224287518 win 501 &amp;lt;nop,nop,timestamp 1804242460 62224971&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Sreeraj Murali&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3831988#M11528</guid>
      <dc:creator>sreeraj.murali</dc:creator>
      <dc:date>2020-02-21T17:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture analysis</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3832014#M11529</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;It seems that there is a server&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;204.110.219.102 and service is running on Port TCP 443 and you are transferring some data:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;9: 00:55:54.818484 802.1Q vlan#193 P0 10.20.59.52.43979 &amp;gt; 204.110.219.102.443: P 4224286519:4224286805(286) ack 1471341325 win 1444 &amp;lt;nop,nop,timestamp 62224971 1804188686&amp;gt;
10: 00:55:54.818545 802.1Q vlan#193 P0 10.20.59.52.43979 &amp;gt; 204.110.219.102.443: P 4224286805:4224287518(713) ack 1471341325 win 1444 &amp;lt;nop,nop,timestamp 62224971 1804188686&amp;gt;
11: 00:55:54.819400 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.43979: . ack 4224286805 win 501 &amp;lt;nop,nop,timestamp 1804242427 62224971&amp;gt;
12: 00:55:54.819400 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.43979: . ack 4224287518 win 496 &amp;lt;nop,nop,timestamp 1804242427 62224971&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;in the above packet's Server and client are sending Acknowledge packets (means Yes, I received that much data and please send more).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;17: 00:55:54.824572 802.1Q vlan#193 P0 10.20.59.52.44526 &amp;gt; 204.110.219.102.443: S 2148927462:2148927462(0) win 29200 &amp;lt;mss 1460,sackOK,timestamp 62224977 0,nop,wscale 7&amp;gt;
18: 00:55:54.824603 802.1Q vlan#193 P0 204.110.219.102.443 &amp;gt; 10.20.59.52.44526: R 0:0(0) ack 2148927463 win 29200&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;Here, Client has transferred some data and Server has replied as ACK and asked for new data. The Server and CLient have adjected the&amp;nbsp;window size&amp;nbsp;29200 and data transferring on MSS 1460.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 08:04:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3832014#M11529</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-04-04T08:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture analysis</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3832049#M11530</link>
      <description>&lt;P&gt;Thanks. Attaching the complete capture to 204. server. So, do u say, that there is active connection getting established between the two? Because, i have denied the direct outgoing internet access, and the traffic from source has to communicate to a proxy host, which is in the LAN. Please comment.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 08:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3832049#M11530</guid>
      <dc:creator>sreeraj.murali</dc:creator>
      <dc:date>2019-04-04T08:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture analysis</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3832083#M11531</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What is&amp;nbsp;10.20.58.21.389:?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I didn't find that TCP handshake logs in the log file but a connection has been made each other and after that, the data transfer has started.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 09:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture-analysis/m-p/3832083#M11531</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-04-04T09:32:29Z</dc:date>
    </item>
  </channel>
</rss>

