<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA SMTP capture in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-smtp-capture/m-p/1159299#M418252</link>
    <description>&lt;P&gt;Urgent help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our ISP have black listed us due to them recieveing lots of SMTP traffice from us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to find out the source of the issue from the inside sending SMTP traffice to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is their a way to capture smtp traffice on the ASA. and also who is sending it.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 11:20:09 GMT</pubDate>
    <dc:creator>nishit.patel</dc:creator>
    <dc:date>2020-02-21T11:20:09Z</dc:date>
    <item>
      <title>ASA SMTP capture</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-capture/m-p/1159299#M418252</link>
      <description>&lt;P&gt;Urgent help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our ISP have black listed us due to them recieveing lots of SMTP traffice from us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to find out the source of the issue from the inside sending SMTP traffice to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is their a way to capture smtp traffice on the ASA. and also who is sending it.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:20:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-capture/m-p/1159299#M418252</guid>
      <dc:creator>nishit.patel</dc:creator>
      <dc:date>2020-02-21T11:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SMTP capture</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-capture/m-p/1159300#M418254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's a quick fix you should do first. In your ACL permit your internal mail server to send SMTP and block everyone else. This should go at the top of your ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_acl permit tcp host mymailserver any eq smtp&lt;/P&gt;&lt;P&gt;access-list inside_acl deny tcp any any eq smtp log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will prevent the email from getting out sourcing from anything other than your approved mail server. Next you can take a look at your logs and see who is getting denied. The logs are generated from the &lt;I&gt;log&lt;/I&gt; keyword at the end of the ACL line #2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2009 15:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-capture/m-p/1159300#M418254</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-03-06T15:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SMTP capture</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-capture/m-p/1159301#M418255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can run a capture on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Create an ACL to identify the traffic you want to capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list TEST permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Create the capture statement:&lt;/P&gt;&lt;P&gt;capture MY-CAP access-list TEST interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see the entire packet you would need to add the "packet-length 1522"&lt;/P&gt;&lt;P&gt;capture MY-CAP access-list TEST packet-length 1522 interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then do a "show capture MYCAP" to see the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to download the capture to a sniffer, you have to do that while the capture is running you do that from a browser with the URL &lt;A class="jive-link-custom" href="https://" target="_blank"&gt;https://&lt;/A&gt;&lt;FIREWALL ip=""&gt;/capture/&lt;NAME of="" capture=""&gt;/pcap&lt;/NAME&gt;&lt;/FIREWALL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE:  This assumes that the interface on your ASA is named "inside"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2009 16:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-capture/m-p/1159301#M418255</guid>
      <dc:creator>michael_dean</dc:creator>
      <dc:date>2009-03-06T16:09:51Z</dc:date>
    </item>
  </channel>
</rss>

