<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Capturing 'interesting' traffic on a ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415238#M857443</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you refer the link that I enclosed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can use the "match" key word then you hit the jackpot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see bi-directional traffic with just two capture lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin int inside match ip host 192.168.1.11 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout int outside match ip any host 212.58.224.138&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you cannot use the match keyword then you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 acls for inside capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 acls for the outside capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l test-in permi ip host 192.168.1.11 any&lt;/P&gt;&lt;P&gt;access-l test-in permit ip any host 192.168.1.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin access-l test-in int inside packet-l 1518&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l test-out permit ip host 212.58.224.138 any&lt;/P&gt;&lt;P&gt;access-l test-out permit ip any host 212.58.224.138&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout access-l test-out int outside packet-len 1518&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Jan 2010 16:31:38 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-01-08T16:31:38Z</dc:date>
    <item>
      <title>Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415231#M857413</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;A while back a Cisco engineer configured a capture on our Cisco ASA via the CLI and I can't remember how he did this.&amp;nbsp; I have a source and destination address I'm interested in and in both directions, he managed to create some sort of access- list and then display the logging in the CLI only for that capture filtering out the rest of the CLI logging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example I want to capture traffic between 192.168.1.11 (inside interface) and 212.58.224.138 (outside interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea what this config might look like for me to add?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415231#M857413</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2019-03-11T16:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415232#M857415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the command capture with the configured ACLs, but keep in your mind that only incoming traffic can be captured. If you want to capture the traffic that comes from inside and outside, you will need to create to capture as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 11:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415232#M857415</guid>
      <dc:creator>resoares</dc:creator>
      <dc:date>2010-01-08T11:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415233#M857420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I mean, two captures &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 11:50:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415233#M857420</guid>
      <dc:creator>resoares</dc:creator>
      <dc:date>2010-01-08T11:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415234#M857427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;7.2.4 or above you can do captures with just one line with the match keyword.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin int inside match ip host 192.168.1.11 host 212.58.224.138&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh cap capin - to display packets&lt;/P&gt;&lt;P&gt;clear cap capin - to collect fresh packets&lt;/P&gt;&lt;P&gt;no cap capin - to remove&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will collect bi-directional traffic between the two hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you don't run a code where the "match" word is present then, you can follow this document&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 13:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415234#M857427</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-08T13:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415235#M857431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am on 8.0.4.48&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So would something like this work (looking as the CLI ? command)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list mycap extended permit ip host 192.168.1.11 host 212.58.224.138&lt;BR /&gt;access-list mycap extended permit ip host 212.58.224.138 host 192.168.1.11&lt;BR /&gt;capture mycap type raw-data access-list mycap interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh cap mycap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 14:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415235#M857431</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2010-01-08T14:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415236#M857436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this one:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list mycap extended permit ip host 192.168.1.11 host 212.58.224.138&lt;/P&gt;&lt;P&gt;access-list mycap1 extended permit ip host 212.58.224.138 host 192.168.1.11&lt;/P&gt;&lt;P&gt;capture mycap type raw-data access-list mycap interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture mycap1 type raw-data access-list mycap1 interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 15:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415236#M857436</guid>
      <dc:creator>resoares</dc:creator>
      <dc:date>2010-01-08T15:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415237#M857439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so will this only capture from 212.58.224.138 to host 192.168.1.11 (mycap1)?&amp;nbsp; Then do I swap to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture mycap type raw-data access-list mycap interface outside to see traffice from the other direction?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 15:55:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415237#M857439</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2010-01-08T15:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415238#M857443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you refer the link that I enclosed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can use the "match" key word then you hit the jackpot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see bi-directional traffic with just two capture lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin int inside match ip host 192.168.1.11 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout int outside match ip any host 212.58.224.138&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you cannot use the match keyword then you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 acls for inside capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 acls for the outside capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l test-in permi ip host 192.168.1.11 any&lt;/P&gt;&lt;P&gt;access-l test-in permit ip any host 192.168.1.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin access-l test-in int inside packet-l 1518&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l test-out permit ip host 212.58.224.138 any&lt;/P&gt;&lt;P&gt;access-l test-out permit ip any host 212.58.224.138&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout access-l test-out int outside packet-len 1518&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 16:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415238#M857443</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-08T16:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Capturing 'interesting' traffic on a ASA</title>
      <link>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415239#M857448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This might be an interest:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.network-blog.com/ittech/post/2011/11/11/Capture-and-view-traffic-on-the-Cisco-routers-and-firewalls.aspx"&gt;http://www.network-blog.com/ittech/post/2011/11/11/Capture-and-view-traffic-on-the-Cisco-routers-and-firewalls.aspx&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Nov 2011 09:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/capturing-interesting-traffic-on-a-asa/m-p/1415239#M857448</guid>
      <dc:creator>rassoul.ghaznavi</dc:creator>
      <dc:date>2011-11-19T09:42:08Z</dc:date>
    </item>
  </channel>
</rss>

