<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASP drop capture - filtering out a specific interface? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/2849646#M167462</link>
    <description>&lt;P&gt;I'm trying to troubleshoot acl-drop's in my ASP drop capture.&lt;/P&gt;
&lt;P&gt;Unfortunately, a large number of these drops are from my outside interface, folks trying to come in to particular resources.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there a way to capture this while filtering out that Interface?&amp;nbsp; I know that I can capture on a match of specific hosts, but didn't know if I can limit my capture to a particular interface, or, preferably, exclude an interface from capture.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:29:06 GMT</pubDate>
    <dc:creator>brian.emil.harris</dc:creator>
    <dc:date>2019-03-12T07:29:06Z</dc:date>
    <item>
      <title>ASP drop capture - filtering out a specific interface?</title>
      <link>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/2849646#M167462</link>
      <description>&lt;P&gt;I'm trying to troubleshoot acl-drop's in my ASP drop capture.&lt;/P&gt;
&lt;P&gt;Unfortunately, a large number of these drops are from my outside interface, folks trying to come in to particular resources.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there a way to capture this while filtering out that Interface?&amp;nbsp; I know that I can capture on a match of specific hosts, but didn't know if I can limit my capture to a particular interface, or, preferably, exclude an interface from capture.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/2849646#M167462</guid>
      <dc:creator>brian.emil.harris</dc:creator>
      <dc:date>2019-03-12T07:29:06Z</dc:date>
    </item>
    <item>
      <title>Hello Brian,</title>
      <link>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/2849647#M167463</link>
      <description>&lt;P&gt;Hello Brian,&lt;/P&gt;
&lt;P&gt;If you are aware of the specifc source and destination that you are tracking then you can perhaps use the following :&lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;cap asp type asp-drop acl-drop match match ip &amp;lt;source subnet&amp;gt; &amp;lt;destination subnet&amp;gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Other then this, I don't think you will be able to filter the outside interface packets on ASP captures.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 16:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/2849647#M167463</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-14T16:50:05Z</dc:date>
    </item>
    <item>
      <title>Running 8.4(7), telling me</title>
      <link>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/2849648#M167464</link>
      <description>&lt;P&gt;Running 8.4(7), telling me that "match match" is invalid.&lt;/P&gt;
&lt;P&gt;So, when trying to capture:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cap 209 type asp-drop acl-drop match ip any 10.200.9.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;displays a bunch of stuff that is neither source or destination of 10.200.9.0/24&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cap 209 type asp-drop acl-drop match ip 10.0.0.0 255.0.0.0 10.200.9.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;displays the same behavior, that of traffic not matching the specified source/destination showing up in the capture.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 20:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/2849648#M167464</guid>
      <dc:creator>brian.emil.harris</dc:creator>
      <dc:date>2016-03-17T20:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: Running 8.4(7), telling me</title>
      <link>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/3352393#M167466</link>
      <description>Probably this was due to some old_SW_version bug.&lt;BR /&gt;I tried today on 9.6.x and it works as expected. I am still left with one question?&lt;BR /&gt;&lt;BR /&gt;How can I find out what is the name of the enabled ACL that drops this? Maybe even better to find out ACE number? Is this at least scheduled by Cisco to "make it happen"?&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Wed, 21 Mar 2018 13:59:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asp-drop-capture-filtering-out-a-specific-interface/m-p/3352393#M167466</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-03-21T13:59:45Z</dc:date>
    </item>
  </channel>
</rss>

