<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall traffic dump in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-traffic-dump/m-p/1696201#M558168</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming your PIX has a suitable version of IOS see below a reference for performing a packet capture. This can be used to capture traffic coming from and destined to the server in question.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This packet capture can then be analyzed by Wireshark.&lt;/P&gt;&lt;P&gt;Please remember to rate all posts that are helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 10 Apr 2011 09:44:30 GMT</pubDate>
    <dc:creator>sean_evershed</dc:creator>
    <dc:date>2011-04-10T09:44:30Z</dc:date>
    <item>
      <title>Firewall traffic dump</title>
      <link>https://community.cisco.com/t5/network-security/firewall-traffic-dump/m-p/1696200#M558161</link>
      <description>&lt;P&gt;Guys we have a internet based firewall ....one of our client vpn through the firewall and connects to the different servers which we have internally (some internal, som ein DMZ) now i have configured some access-list few days back for 10 new servers for the client (to allow access) 9 are working but one server is not working we have a old pix and i want to see the traffic dump.....just want to see where the traffic drops.....we have a VPN concentartor as well before Pix and all NAT has been checked many times...the cutomer has checkpoint and they have sent us there traffic dump (as its easy in that all GUI based) i want to make sure that there is nothing wrong at our end.....can some-one plz tell me how to do that.....step by step.....i have googled some cisco one but didnt get my head around thanks guys&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-traffic-dump/m-p/1696200#M558161</guid>
      <dc:creator>The_guroo_2</dc:creator>
      <dc:date>2019-03-11T20:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall traffic dump</title>
      <link>https://community.cisco.com/t5/network-security/firewall-traffic-dump/m-p/1696201#M558168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming your PIX has a suitable version of IOS see below a reference for performing a packet capture. This can be used to capture traffic coming from and destined to the server in question.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This packet capture can then be analyzed by Wireshark.&lt;/P&gt;&lt;P&gt;Please remember to rate all posts that are helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Apr 2011 09:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-traffic-dump/m-p/1696201#M558168</guid>
      <dc:creator>sean_evershed</dc:creator>
      <dc:date>2011-04-10T09:44:30Z</dc:date>
    </item>
  </channel>
</rss>

