<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Tracer command in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746344#M8960</link>
    <description>You can't use any as source port. You have to specify a number but its not&lt;BR /&gt;relevant as the source port is usually random &amp;gt; 1023.&lt;BR /&gt;</description>
    <pubDate>Wed, 14 Nov 2018 08:43:04 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2018-11-14T08:43:04Z</dc:date>
    <item>
      <title>Packet Tracer command</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746318#M8958</link>
      <description>&lt;P&gt;How can I put the source port (src-port) as &lt;STRONG&gt;any&lt;/STRONG&gt; in the below ASA command instead of specific port?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input ifc_name protocol src-ip src-port dst-ip dst-port&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp 192.168.10.10 3389 172.16.10.10 3389&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa# sh conn&lt;BR /&gt;6 in use, 12 most used&lt;BR /&gt;TCP DMZ 192.168.10.10:3389 Inside 172.16.10.10:49165, idle 0:00:27, bytes 127770, flags UIO&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746318#M8958</guid>
      <dc:creator>Manu Shankar</dc:creator>
      <dc:date>2020-02-21T16:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer command</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746344#M8960</link>
      <description>You can't use any as source port. You have to specify a number but its not&lt;BR /&gt;relevant as the source port is usually random &amp;gt; 1023.&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Nov 2018 08:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746344#M8960</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-11-14T08:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer command</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746353#M8962</link>
      <description>&lt;P&gt;That means the packet tracer command doesn't check the source port. It only meant to check the SIP, DIP and dst-port.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 08:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746353#M8962</guid>
      <dc:creator>Manu Shankar</dc:creator>
      <dc:date>2018-11-14T08:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer command</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746404#M9043</link>
      <description>&lt;P&gt;It can and does check the source port. However, due to the nature of how tcp and udp generally works, source ports are ephemeral (semi-random port number &amp;gt;1023 as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292493"&gt;@Mohammed al Baqari&lt;/a&gt;&amp;nbsp;mentioned) so we very seldom have an ACL or other rule that restricts source port numbers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generally when using packet-tracer I just use 1234 as my source port unless I have a specific reason to use a specific port (very very rarely in real life).&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 10:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746404#M9043</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-11-14T10:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer command</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746440#M9044</link>
      <description>&lt;P&gt;Thank you Mohammed and Marvin.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 11:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-command/m-p/3746440#M9044</guid>
      <dc:creator>Manu Shankar</dc:creator>
      <dc:date>2018-11-14T11:14:16Z</dc:date>
    </item>
  </channel>
</rss>

