<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic debugging a link local issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/debugging-a-link-local-issue/m-p/2368006#M306535</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sweet, didnt know i could do a pcap capture on the asa! thanks.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Dec 2013 13:56:02 GMT</pubDate>
    <dc:creator>Mark Graham</dc:creator>
    <dc:date>2013-12-30T13:56:02Z</dc:date>
    <item>
      <title>debugging a link local issue</title>
      <link>https://community.cisco.com/t5/network-security/debugging-a-link-local-issue/m-p/2368004#M306533</link>
      <description>&lt;P&gt;i'm getting a ton of link local reverse path errors on my inside interface on my ASA &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Dec 30 2013&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;08:01:33&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;169.254.223.30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;169.254.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Deny UDP reverse path check from 169.254.223.30 to 169.254.255.255 on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where should i start to hunt down this address?&amp;nbsp; i know its facticious local address, however, is there a way i can track it down?&amp;nbsp; can i snag the MAC address where its coming from somewhere if i do more debugging?&amp;nbsp;&amp;nbsp; perhaps running a wireshark is where i should start? &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:23:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/debugging-a-link-local-issue/m-p/2368004#M306533</guid>
      <dc:creator>Mark Graham</dc:creator>
      <dc:date>2019-03-12T03:23:24Z</dc:date>
    </item>
    <item>
      <title>debugging a link local issue</title>
      <link>https://community.cisco.com/t5/network-security/debugging-a-link-local-issue/m-p/2368005#M306534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could configure a capture on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAPTURE permit ip 169.254.0.0 255.255.0.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture CAPTURE type raw-data access-list CAPTURE interface inside buffer 10000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change the buffer size if you need to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then view if the capture has captured any traffic with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can view the actual capture contents with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture CAPTURE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But you should probably copy the capture to some host with TFTP and view it with Wireshark. You should be able to check the MAC address of the hosts from the capture file. Seems to me like you have hosts that are unable to get an IP address with DHCP if they are using the above type of IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can copy the capture contents with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:CAPTURE t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/CAPTURE.pcap"&gt;ftp://x.x.x.x/CAPTURE.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can remove the capture (and its data) with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture CAPTURE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to remove the ACL separately&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Dec 2013 13:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/debugging-a-link-local-issue/m-p/2368005#M306534</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-30T13:35:56Z</dc:date>
    </item>
    <item>
      <title>debugging a link local issue</title>
      <link>https://community.cisco.com/t5/network-security/debugging-a-link-local-issue/m-p/2368006#M306535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sweet, didnt know i could do a pcap capture on the asa! thanks.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Dec 2013 13:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/debugging-a-link-local-issue/m-p/2368006#M306535</guid>
      <dc:creator>Mark Graham</dc:creator>
      <dc:date>2013-12-30T13:56:02Z</dc:date>
    </item>
  </channel>
</rss>

