<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Reading Show capture output in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233485#M349917</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, in that case ASA should deny the very first packet sent by client to server i.e. SYN.&lt;/P&gt;&lt;P&gt;Can you post 'show run access-group' and make sure that access-group is indeed applied on inside in outbound directions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, please post output of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.52.5 discard 195.157.47.7 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 May 2013 18:21:50 GMT</pubDate>
    <dc:creator>sokakkar</dc:creator>
    <dc:date>2013-05-16T18:21:50Z</dc:date>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233475#M349907</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I config packet capture on my ASA&amp;nbsp; for learning purpose only.&lt;/P&gt;&lt;P&gt;Here is the output &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh capture CAP&amp;nbsp; detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;14 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 19:00:38.503071 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 70: 802.1Q vlan#1 P0 192.168.52.5.3367 &amp;gt; 195.157.47.7.80: S [tcp sum ok] 3114444719:3114444719(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt; (DF) (ttl 128, id 6299)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 19:00:38.670024 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3367 &amp;gt; 195.157.47.7.80: . [tcp sum ok] 3114444720:3114444720(0) ack 3866590340 win 16560 (DF) (ttl 128, id 6300)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 19:00:38.670421 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 344: 802.1Q vlan#1 P0 192.168.52.5.3367 &amp;gt; 195.157.47.7.80: P [tcp sum ok] 3114444720:3114445006(286) ack 3866590340 win 16560 (DF) (ttl 128, id 6301)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 19:00:38.836825 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3367 &amp;gt; 195.157.47.7.80: . [tcp sum ok] 3114445006:3114445006(0) ack 3866590786 win 16448 (DF) (ttl 128, id 6302)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 19:00:38.837099 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3367 &amp;gt; 195.157.47.7.80: F [tcp sum ok] 3114445006:3114445006(0) ack 3866590786 win 16448 (DF) (ttl 128, id 6303)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 19:00:38.894591 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 70: 802.1Q vlan#1 P0 192.168.52.5.3368 &amp;gt; 195.157.47.7.80: S [tcp sum ok] 2730530586:2730530586(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt; (DF) (ttl 128, id 6304)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 19:00:38.900206 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 70: 802.1Q vlan#1 P0 192.168.52.5.3369 &amp;gt; 195.157.47.7.80: S [tcp sum ok] 248443417:248443417(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt; (DF) (ttl 128, id 6305)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 19:00:39.058834 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3368 &amp;gt; 195.157.47.7.80: . [tcp sum ok] 2730530587:2730530587(0) ack 1839683549 win 16560 (DF) (ttl 128, id 6306)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 19:00:39.059216 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 355: 802.1Q vlan#1 P0 192.168.52.5.3368 &amp;gt; 195.157.47.7.80: P [tcp sum ok] 2730530587:2730530884(297) ack 1839683549 win 16560 (DF) (ttl 128, id 6307)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 19:00:39.064846 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3369 &amp;gt; 195.157.47.7.80: . [tcp sum ok] 248443418:248443418(0) ack 3562924249 win 16560 (DF) (ttl 128, id 6308)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 19:00:39.227832 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3368 &amp;gt; 195.157.47.7.80: . [tcp sum ok] 2730530884:2730530884(0) ack 1839684017 win 16443 (DF) (ttl 128, id 6309)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 19:00:39.228305 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3368 &amp;gt; 195.157.47.7.80: F [tcp sum ok] 2730530884:2730530884(0) ack 1839684017 win 16443 (DF) (ttl 128, id 6310)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 19:00:44.672130 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3369 &amp;gt; 195.157.47.7.80: F [tcp sum ok] 248443418:248443418(0) ack 3562924249 win 16560 (DF) (ttl 128, id 6314)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 19:00:44.835283 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0 192.168.52.5.3369 &amp;gt; 195.157.47.7.80: . [tcp sum ok] 248443419:248443419(0) ack 3562924250 win 16560 (DF) (ttl 128, id 6319)&lt;/P&gt;&lt;P&gt;14 packets shown&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to know which lines show &lt;/P&gt;&lt;P&gt;syn sent to remote site&lt;/P&gt;&lt;P&gt;syn,ack coming to host&lt;/P&gt;&lt;P&gt;ack going to remote site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233475#M349907</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:43:25Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233476#M349908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe the flag letters in front of the "[tcp sum ok]" translate as S=SYN, F=FIN, P=PUSH.&amp;nbsp; The firewall tends to erase URGENT in its default configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 14:15:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233476#M349908</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2013-05-15T14:15:40Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233477#M349909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Captures you pasted are unidirectional i.e. flow captured is only for 192.168.52.5 &amp;gt; 195.157.47.7:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following shows syn and then ack (no syn,ack)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1: 19:00:38.503071 f0bf.97de.4f48 001d.a24d.ed0e 0x8100 70: 802.1Q&amp;nbsp; vlan#1 P0 192.168.52.5.3367 &amp;gt; 195.157.47.7.80: S [tcp sum ok]&amp;nbsp; 3114444719:3114444719(0) win 8192 &lt;MSS 1460=""&gt; (DF) (ttl 128, id 6299)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 19:00:38.670024&amp;nbsp; f0bf.97de.4f48 001d.a24d.ed0e 0x8100 58: 802.1Q vlan#1 P0&amp;nbsp; 192.168.52.5.3367 &amp;gt; 195.157.47.7.80: . [tcp sum ok]&amp;nbsp; 3114444720:3114444720(0) ack 3866590340 win 16560 (DF) (ttl 128, id&amp;nbsp; 6300)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you paste the commands you added to take captures?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 16:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233477#M349909</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-15T16:25:24Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233478#M349910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Sourav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i config&amp;nbsp; only 1 command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CAP permit tcp&amp;nbsp; host 192.168.52.6 host 195.157.47.7 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 19:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233478#M349910</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-15T19:33:16Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233479#M349911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add another acl for reverse flow as well:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CAP permit tcp host 195.157.47.7 eq 80 host 192.168.52.6 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear the capture data using 'clear capture cap_name'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access the server and check captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 20:09:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233479#M349911</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-15T20:09:44Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233480#M349912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sourav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is output of sh capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp; sh capture CAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;26 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 17:04:58.488698 802.1Q vlan#1 P0 192.168.52.5.1353 &amp;gt; 195.157.47.7.80: S 3950215981:3950215981(0) win 8192 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 17:04:58.654369 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1353: S 588135039:588135039(0) ack 3950215982 win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 17:04:58.654766 802.1Q vlan#1 P0 192.168.52.5.1353 &amp;gt; 195.157.47.7.80: . ack 588135040 win 16560&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 17:04:58.655056 802.1Q vlan#1 P0 192.168.52.5.1353 &amp;gt; 195.157.47.7.80: P 3950215982:3950216268(286) ack 588135040 win 16560&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 17:04:58.820926 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1353: . ack 3950216268 win 54&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 17:04:58.821780 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1353: P 588135040:588135485(445) ack 3950216268 win 54&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 17:04:58.821826 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1353: F 588135485:588135485(0) ack 3950216268 win 54&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 17:04:58.823199 802.1Q vlan#1 P0 192.168.52.5.1353 &amp;gt; 195.157.47.7.80: . ack 588135486 win 16448&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 17:04:58.823840 802.1Q vlan#1 P0 192.168.52.5.1353 &amp;gt; 195.157.47.7.80: F 3950216268:3950216268(0) ack 588135486 win 16448&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 17:04:58.883667 802.1Q vlan#1 P0 192.168.52.5.1354 &amp;gt; 195.157.47.7.80: S 3383221129:3383221129(0) win 8192 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 17:04:58.884063 802.1Q vlan#1 P0 192.168.52.5.1355 &amp;gt; 195.157.47.7.80: S 2736013711:2736013711(0) win 8192 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 17:04:58.989618 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1353: . ack 3950216269 win 54&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 17:04:59.046826 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1354: S 762110939:762110939(0) ack 3383221130 win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 17:04:59.047208 802.1Q vlan#1 P0 192.168.52.5.1354 &amp;gt; 195.157.47.7.80: . ack 762110940 win 16560&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 17:04:59.047467 802.1Q vlan#1 P0 192.168.52.5.1354 &amp;gt; 195.157.47.7.80: P 3383221130:3383221427(297) ack 762110940 win 16560&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 17:04:59.050320 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1355: S 443725471:443725471(0) ack 2736013712 win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 17: 17:04:59.050671 802.1Q vlan#1 P0 192.168.52.5.1355 &amp;gt; 195.157.47.7.80: . ack 443725472 win 16560&lt;/P&gt;&lt;P&gt;&amp;nbsp; 18: 17:04:59.212772 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1354: . ack 3383221427 win 54&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 17:04:59.213673 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1354: P 762110940:762111407(467) ack 3383221427 win 54&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20: 17:04:59.213703 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1354: F 762111407:762111407(0) ack 3383221427 win 54&lt;/P&gt;&lt;P&gt;&amp;nbsp; 21: 17:04:59.214130 802.1Q vlan#1 P0 192.168.52.5.1354 &amp;gt; 195.157.47.7.80: . ack 762111408 win 16443&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22: 17:04:59.214634 802.1Q vlan#1 P0 192.168.52.5.1354 &amp;gt; 195.157.47.7.80: F 3383221427:3383221427(0) ack 762111408 win 16443&lt;/P&gt;&lt;P&gt;&amp;nbsp; 23: 17:04:59.379252 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1354: . ack 3383221428 win 54&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24: 17:05:04.660366 802.1Q vlan#1 P0 192.168.52.5.1355 &amp;gt; 195.157.47.7.80: F 2736013712:2736013712(0) ack 443725472 win 16560&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 17:05:04.825061 802.1Q vlan#1 P0 195.157.47.7.80 &amp;gt; 192.168.52.5.1355: F 443725472:443725472(0) ack 2736013713 win 46&lt;/P&gt;&lt;P&gt;&amp;nbsp; 26: 17:05:04.825473 802.1Q vlan#1 P0 192.168.52.5.1355 &amp;gt; 195.157.47.7.80: . ack 443725473 win 16560&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So which is syn,ack coming from remote website to host?&lt;/P&gt;&lt;P&gt;Also i am blocking single website is there any reason that 26 lines output is generated for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 23:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233480#M349912</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-15T23:09:33Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233481#M349913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the syn, syn-ack, ack for this connection:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1: 17:04:58.488698 802.1Q vlan#1 P0 192.168.52.5.1353 &amp;gt;&amp;nbsp; 195.157.47.7.80: &lt;STRONG&gt;S &lt;/STRONG&gt;3950215981:3950215981(0) win 8192 &lt;MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;2: 17:04:58.654369 802.1Q&amp;nbsp; vlan#1 P0 &lt;STRONG&gt;195.157.47.7.80 &amp;gt; 192.168.52.5.1353&lt;/STRONG&gt;:&lt;STRONG&gt; S&lt;/STRONG&gt; 588135039:588135039(0) &lt;STRONG&gt;ack&lt;/STRONG&gt; 3950215982 win 5840 &lt;MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;3: 17:04:58.654766 802.1Q vlan#1 P0 192.168.52.5.1353 &amp;gt; 195.157.47.7.80: .&lt;STRONG&gt; ack&lt;/STRONG&gt; 588135040 win 16560&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;S&lt;/STRONG&gt; stands for Syn. Frame 2 above is the syn-ack packet coming from server to host. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean when you say 'i am blocking single website'? How exactly are you trying to block the single website on ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 12:00:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233481#M349913</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-16T12:00:31Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233482#M349914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Sourav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was blocking the website by ACL on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 14:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233482#M349914</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-16T14:23:21Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233483#M349915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Using IP or FQDN?&lt;/P&gt;&lt;P&gt;Can you post the access-list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 14:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233483#M349915</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-16T14:25:06Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233484#M349916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Sourav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am blocking it by IP say&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list&amp;nbsp; extended&amp;nbsp; inside&amp;nbsp; deny tcp host 192.168.52.5 host 195.157.47.7 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 18:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233484#M349916</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-16T18:08:03Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233485#M349917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, in that case ASA should deny the very first packet sent by client to server i.e. SYN.&lt;/P&gt;&lt;P&gt;Can you post 'show run access-group' and make sure that access-group is indeed applied on inside in outbound directions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, please post output of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.52.5 discard 195.157.47.7 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 18:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233485#M349917</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-16T18:21:50Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233486#M349918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Sourav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently access group is applied&amp;nbsp; on inside&amp;nbsp; interface&amp;nbsp; --&amp;nbsp; direction is in.&lt;/P&gt;&lt;P&gt;Do i need to config ACL in out direction on inside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will post the&amp;nbsp; output shortly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 21:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233486#M349918</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-16T21:41:43Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233487#M349919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sourav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is current config &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list CAP extended permit tcp host 192.168.52.5 host 195.157.47.7 eq www log&lt;/P&gt;&lt;P&gt;access-list CAP extended permit tcp host 195.157.47.7 eq www host 192.168.52.5 log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input inside tcp 192.168.52.5 discard 195.157.47.7 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.52.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny tcp host 192.168.52.5 host 195.157.47.7 eq www log&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 23:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233487#M349919</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-16T23:12:11Z</dc:date>
    </item>
    <item>
      <title>Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233488#M349920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule looks fine. You shouldn't see any traffic going out of ASA in captures. Just clear the captures, clear any existing connections for client machine and try again and see if there are any packets seen on outside interface of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear capture &lt;CAP_NAME&gt;&lt;/CAP_NAME&gt;&lt;/P&gt;&lt;P&gt;clear connection address 192.168.52.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 May 2013 12:28:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/2233488#M349920</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-17T12:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: Reading Show capture output</title>
      <link>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/3929110#M349921</link>
      <description>&lt;P&gt;What does P=Push mean?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 05:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reading-show-capture-output/m-p/3929110#M349921</guid>
      <dc:creator>absuizo14</dc:creator>
      <dc:date>2019-09-24T05:52:46Z</dc:date>
    </item>
  </channel>
</rss>

