<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can you share details about in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738877#M178112</link>
    <description>&lt;P&gt;Can you share details about the packet tracer you are running.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2015 15:54:36 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2015-10-08T15:54:36Z</dc:date>
    <item>
      <title>ASA packet tracer cisco</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738874#M178109</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;When you ping from asa packet tracer&amp;nbsp; it does say the connection fails but it doesn't if you do it actually , why ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for isntance I can ping 8.8.8.8 from outside interface ip but when i do the packet tracer command it says it will fail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;does the packet tracer actually generate a traffic which can be captured?&lt;/P&gt;&lt;P&gt;many thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738874#M178109</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2019-03-12T06:43:05Z</dc:date>
    </item>
    <item>
      <title>You can use packet tracer to</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738875#M178110</link>
      <description>&lt;P&gt;You can use packet tracer to test configuration for transit traffic and not for from the box traffic. From the box traffic is not evaluated accross your configuration ( acl and NAT).&lt;/P&gt;&lt;P&gt;As far as capture for packet tracer output, I think it should be seen incaptures.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 15:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738875#M178110</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-08T15:16:33Z</dc:date>
    </item>
    <item>
      <title>thanks for this but asa</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738876#M178111</link>
      <description>&lt;P&gt;thanks for this but asa reports it will be blocked as implicit deny. if not evaluted against it why say it will be denied.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 15:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738876#M178111</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2015-10-08T15:43:31Z</dc:date>
    </item>
    <item>
      <title>Can you share details about</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738877#M178112</link>
      <description>&lt;P&gt;Can you share details about the packet tracer you are running.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 15:54:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738877#M178112</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-08T15:54:36Z</dc:date>
    </item>
    <item>
      <title>packet-tracer input outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738878#M178113</link>
      <description>&lt;P&gt;packet-tracer input outside icmp 100.0.0.1 8 0 8.8.8.8&lt;/P&gt;&lt;P&gt;I enter the above command on the asa and replace the 100.0.0.1 with my real outside interface ip address.&lt;/P&gt;&lt;P&gt;This says the packet will be dropped&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then issue ping outside 8.8.8.8 and it works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using the packet tracer functionality of asa not a packet tracer software ( the simulator)&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 15:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738878#M178113</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2015-10-08T15:59:00Z</dc:date>
    </item>
    <item>
      <title>So what you are try will be</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738879#M178114</link>
      <description>&lt;P&gt;So what you are try will be interpreted by ASA as a packet trying to enter ASA with source ip 100.1.1.1 and destination 8.8.8.8.&lt;/P&gt;&lt;P&gt;ASA will consider this as a scenario where traffic has to be routed back via same interface. This is blocked by default. Hence you see a implicit deny.&lt;/P&gt;&lt;P&gt;I would say this is not the right way to check traffic initiated by ASA using packet-tracer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it answers your query.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 16:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738879#M178114</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-08T16:06:43Z</dc:date>
    </item>
    <item>
      <title>sure , how would you then</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738880#M178115</link>
      <description>&lt;P&gt;sure , how would you then check what policy is applied to the traffic generated by the asa ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if the outside address of the interface is 100.1.1.1 and I am trying to ping 8.8.8.8 my feeling is below is what I need to use&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input outside icmp 100.1.1.1 8 0 8.8.8.8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this returns a result showing packet will get denied but it doesn't if you do "ping outside 8.8.8.8"&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 15:00:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738880#M178115</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2015-10-13T15:00:41Z</dc:date>
    </item>
    <item>
      <title>The acl and NAT that you</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738881#M178116</link>
      <description>&lt;P&gt;The acl and NAT that you configure do not apply to traffic initiated from ASA. ASA uses the configured route to send the traffic.&lt;/P&gt;&lt;P&gt;Packet- tracer utility is used to evaluate through the box traffic (traffic initiated from devices behind ASA) accross your configuration, to check how traffic would be evaluated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it answers your question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 15:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738881#M178116</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-13T15:42:08Z</dc:date>
    </item>
    <item>
      <title>Cool so do you know of any</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738882#M178117</link>
      <description>&lt;P&gt;Cool so do you know of any ways asa traffic generated by asa can be checked? Or there is nothing&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 16:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738882#M178117</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2015-10-13T16:11:28Z</dc:date>
    </item>
    <item>
      <title>You can show conn all output</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738883#M178118</link>
      <description>&lt;P&gt;You can show conn all output to see traffic initiated from ASA.&lt;/P&gt;&lt;P&gt;Also you can try capture on ASA to see traffic generated by ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!!!&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;&lt;P&gt;Mark answer as correct if it helps in answering your query. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 16:27:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738883#M178118</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-13T16:27:59Z</dc:date>
    </item>
    <item>
      <title>Many thanks !!!!! :D</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738884#M178119</link>
      <description>&lt;P&gt;Many thanks !!!!!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 16:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-cisco/m-p/2738884#M178119</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2015-10-13T16:42:07Z</dc:date>
    </item>
  </channel>
</rss>

