<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Traffic Analysis - ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005679#M434481</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's no easy way to tell if you didn't already have instrumentation turned on. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is capable of exporting netflow data to an external collector. It is there that you would be able to retrospectively analyze top flows by source and destination address and port. Additionally in near real time you can monitor the top 10 hosts in the ASDM dashboard (or CLI equivalent).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 10 Jun 2012 13:27:26 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2012-06-10T13:27:26Z</dc:date>
    <item>
      <title>Traffic Analysis - ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005678#M434479</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I noticed a lot of (incoming&amp;amp;outcoming) traffic in outside interface of ASA. Is there any way to know where is this traffic coming or going to (IP address)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if that traffic happened earlier (for example 1 day ago), can I still know the origin or destination IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in Advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Omer &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005678#M434479</guid>
      <dc:creator>omer_babiker</dc:creator>
      <dc:date>2019-03-11T23:17:30Z</dc:date>
    </item>
    <item>
      <title>Traffic Analysis - ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005679#M434481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's no easy way to tell if you didn't already have instrumentation turned on. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is capable of exporting netflow data to an external collector. It is there that you would be able to retrospectively analyze top flows by source and destination address and port. Additionally in near real time you can monitor the top 10 hosts in the ASDM dashboard (or CLI equivalent).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2012 13:27:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005679#M434481</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-06-10T13:27:26Z</dc:date>
    </item>
    <item>
      <title>Traffic Analysis - ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005680#M434483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Marvin for your reply.&lt;/P&gt;&lt;P&gt;Actually I asked this question because I've seen spiky load in my outside interface which looked suspicious. I was curious to know where it came from.&lt;/P&gt;&lt;P&gt;I used &lt;STRONG&gt;show conn &lt;/STRONG&gt;command, but it was only showing the connections in use.&lt;/P&gt;&lt;P&gt;I'm using opennms as monitioring tool, but not sure if it will help in this case.&lt;/P&gt;&lt;P&gt;Any recommendation??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Omer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2012 05:16:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005680#M434483</guid>
      <dc:creator>omer_babiker</dc:creator>
      <dc:date>2012-06-11T05:16:26Z</dc:date>
    </item>
    <item>
      <title>Traffic Analysis - ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005681#M434484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The open source tool for capturing and analyzing netflow exports is ntop. Please see more information at &lt;A href="http://www.ntop.org/products/ntop/"&gt;http://www.ntop.org/products/ntop/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2012 14:23:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005681#M434484</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-06-11T14:23:26Z</dc:date>
    </item>
    <item>
      <title>Traffic Analysis - ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005682#M434486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the valuable information&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 05:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-analysis-asa/m-p/2005682#M434486</guid>
      <dc:creator>omer_babiker</dc:creator>
      <dc:date>2012-06-12T05:04:56Z</dc:date>
    </item>
  </channel>
</rss>

