<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Commands to monitor particular connection in pix 515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170166#M615609</link>
    <description>&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have got pix 515 with IOS  ver 6.2(1). We have created an access-list &amp;amp; NAT  for one of customer requirement to access a server behind the firewall. Sadly , customer can't able to connect to server inside . Is there any command like debug to monitor on the firewall for troubleshooting of this particular connection only (FYI , syslog is not enabled in fireawll ) . I tried with "show logging " comamnd which gives minimum information.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Raju&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:52:01 GMT</pubDate>
    <dc:creator>raju</dc:creator>
    <dc:date>2020-02-21T06:52:01Z</dc:date>
    <item>
      <title>Commands to monitor particular connection in pix 515</title>
      <link>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170166#M615609</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have got pix 515 with IOS  ver 6.2(1). We have created an access-list &amp;amp; NAT  for one of customer requirement to access a server behind the firewall. Sadly , customer can't able to connect to server inside . Is there any command like debug to monitor on the firewall for troubleshooting of this particular connection only (FYI , syslog is not enabled in fireawll ) . I tried with "show logging " comamnd which gives minimum information.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Raju&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170166#M615609</guid>
      <dc:creator>raju</dc:creator>
      <dc:date>2020-02-21T06:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: Commands to monitor particular connection in pix 515</title>
      <link>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170167#M615611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raju,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try cmd: debug packet &lt;INTERFACE name=""&gt; &lt;SOURCE ip=""&gt;&lt;/SOURCE&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To stop debug use cmd: no debug all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will show you how/were the source IP (in this case your customer IP) is traversing over the PIX. Pls. be aware the debug cmd can generate HIGH cpu usage, so not recommended on production PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you also post the result and PIX config if your still having problems - Pls. remember to exclude 'real' IP's and passwords etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2003 06:35:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170167#M615611</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2003-07-21T06:35:59Z</dc:date>
    </item>
    <item>
      <title>Re: Commands to monitor particular connection in pix 515</title>
      <link>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170168#M615614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the server the customer is trying to access in a DMZ, or on you actual internat network? Do you have a stattric command setup for the internal server to external address?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2003 18:06:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170168#M615614</guid>
      <dc:creator>pcrgm1119</dc:creator>
      <dc:date>2003-07-22T18:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: Commands to monitor particular connection in pix 515</title>
      <link>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170169#M615616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply . The server is located inside our Network (secured Network ). I do have a static command with external address for the server . We have similar entries for some other customers with different IP addresses and it's all working fine in secured way other than this new customer . I want to to know some commands like trace or something like that to findout  what does firewall do when it receives packet or request from this new customer . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2003 18:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/commands-to-monitor-particular-connection-in-pix-515/m-p/170169#M615616</guid>
      <dc:creator>raju</dc:creator>
      <dc:date>2003-07-22T18:32:13Z</dc:date>
    </item>
  </channel>
</rss>

