<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What goes where ??? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194848#M361382</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well i've used wireshark earlier and it's ok, but not sure how to capture what i need &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say i have and external 30.30.30.x ip net, and of thoose ip's i want to know traffic going to 30.30.30.10 on the outside and the gateway for the inside net i want to "inspect" is 192.10.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what do i then do to check where the traffic hitting 30.30.30.10 ends up in 192.10.0.X nett&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i need to know is if it ends up at 192.10.0.123 or 192.10.0.19&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Feb 2013 14:34:02 GMT</pubDate>
    <dc:creator>Thomas_Madsen</dc:creator>
    <dc:date>2013-02-26T14:34:02Z</dc:date>
    <item>
      <title>What goes where ???</title>
      <link>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194844#M361378</link>
      <description>&lt;P&gt;I've used cisco for some time now, and are realy happe with it, but there is one thing i need to get a hang of..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from one vlan going out to internet, and traffic comming back...&lt;/P&gt;&lt;P&gt;All i see is traffic comming from 1 ip out on internett going to my external ip on any given port.&lt;/P&gt;&lt;P&gt;Is there a way i can wee what inside ip address it's going against and what inside ip it's comming from ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a asa5510 with aprox 8 vlan's on the inside and it would be nice to see what user is causing the internet traffic and why there are so many hit's on the firewall&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnks for any help&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pst not to good on command, mainly used gui &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194844#M361378</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2019-03-12T01:05:44Z</dc:date>
    </item>
    <item>
      <title>What goes where ???</title>
      <link>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194845#M361379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wasnt quite sure what this post was about until I checked the actual post &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could check the ASDM (GUI) to possibly view some top user information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try if you can find the information with the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Login to ASDM&lt;/LI&gt;&lt;LI&gt;Go to "Home" (unless already by default there)&lt;/LI&gt;&lt;LI&gt;Look for the "Firewall Dashboard" Tab above the section which tells your ASA software and other information&lt;/LI&gt;&lt;LI&gt;On the "Firewall Dashboard" section you might need to enable some settings (unless they already are)&lt;UL&gt;&lt;LI&gt;The section should enable you to gather information on "Top Usage" etc.&lt;/LI&gt;&lt;LI&gt;To my understanding enabling this might increase the load on the ASA unit so take that possibility into account&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other than that I usually use the CLI and Syslogs to find who is causing alot of traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 14:05:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194845#M361379</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-26T14:05:55Z</dc:date>
    </item>
    <item>
      <title>What goes where ???</title>
      <link>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194846#M361380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; that one is on ofcourse &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What about traffic that's beeing stopped, is it possible to see where it was trying to go ??&lt;/P&gt;&lt;P&gt;like if one user starts up some torrent program, can i see where the traffice is trying to go so i can stop the download ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i just now all out of the blue have a massive traffic on my firewall, can i somehow check where the traffic is going ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 14:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194846#M361380</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2013-02-26T14:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: What goes where ???</title>
      <link>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194847#M361381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think there is probably no clean and easy way to do that on the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would probably either have to just go through Syslogs on all the formed connections or track down hosts that have several active connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also parse the log messages on a Syslog server for all the "Deny" messages etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I usually do this through CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easiest way to find the basic torrent user is to monitor for a host with several high port UDP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can naturally take a packet capture from the ASA itself and see if there is Bittorrent traffic from the source hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;None of these are really a easy way to monitor traffic. I guess you would need something additional if you wanted to make the monitoring of traffic easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 14:21:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194847#M361381</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-26T14:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: What goes where ???</title>
      <link>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194848#M361382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well i've used wireshark earlier and it's ok, but not sure how to capture what i need &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say i have and external 30.30.30.x ip net, and of thoose ip's i want to know traffic going to 30.30.30.10 on the outside and the gateway for the inside net i want to "inspect" is 192.10.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what do i then do to check where the traffic hitting 30.30.30.10 ends up in 192.10.0.X nett&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i need to know is if it ends up at 192.10.0.123 or 192.10.0.19&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 14:34:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194848#M361382</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2013-02-26T14:34:02Z</dc:date>
    </item>
    <item>
      <title>Re: What goes where ???</title>
      <link>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194849#M361384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A basic packet capture configuration for ASA could look something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TRAFFIC-CAPTURE permit ip 10.10.10.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TRAFFIC-CAPTURE permit ip any 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture TRAFFIC-CAPTURE type raw-data access-list TRAFFIC-CAPTURE interface inside buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;TRAFFIC-CAPTURE = Is the ACL that defines the traffic to be captured. The above ACL captures both directions of the traffic when the source is 10.10.10.0/24 and destination is "any" (and vice versa naturally)&lt;/LI&gt;&lt;LI&gt;10.10.10.0/24 = Is an example LAN network located behind "inside" interface (or is the interface network)&lt;/LI&gt;&lt;LI&gt;inside = Is the interface from which the capture is taken from&lt;/LI&gt;&lt;LI&gt;33500000 = Is pretty close to the max buffer memory you can have on any ASA firewall for a single capture &lt;UL&gt;&lt;LI&gt;You can make separate capture for each direction and later attach the capture files using wireshark&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;circular-buffer = Is the setting that will permit the ASA to overwrite the old captured data when the buffer is full. Capture will keep on working but old data will be overwritten as new data is being captured.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the above ACL is VERY broad. You can change the capture to only capture one "host" traffic. Or only capture TCP or UDP traffic only. You can limit to some certain destination IP addresses. Just control as you like with the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To show if traffic is hitting the capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To show a specific capture and its contents&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show capture &lt;CAPTURE name=""&gt;&lt;/CAPTURE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To copy a capture to external TFTP server&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; To be later opened with Wireshark for example&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;copy /pcap capture:&lt;CAPTURE name=""&gt; t&lt;/CAPTURE&gt;&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/" rel="nofollow"&gt;ftp://x.x.x.x/&lt;/A&gt;&lt;SPAN&gt;&lt;FILENAME&gt;.pcap&lt;/FILENAME&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To remove a capture from ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Also removes the collected data&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no capture &lt;CAPTURE name=""&gt;&lt;/CAPTURE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully the above information has been helpfull. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Please do rate if it has been and naturally ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 14:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-goes-where/m-p/2194849#M361384</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-26T14:47:15Z</dc:date>
    </item>
  </channel>
</rss>

