<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: packet capture in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-capture/m-p/3548018#M979727</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333px;"&gt;Hello Zafer,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;how are you doing? I will try to answer your question, but not sure if I understand all details that are required from your side, so feel free to ask additional questions.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;In case that you want to capture on sensor's CLI only traffic that matches specific IP address, you can apply following filter to the capturing tool:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;gt; &lt;STRONG&gt;system support capture-traffic&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please choose domain to capture traffic from:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp; 0 - eth0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp; 1 - in&amp;nbsp; (Interfaces s1p1, s1p2)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Selection?&lt;STRONG&gt; 1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;NOTE: These changes will be lost the next time detection is reconfigured!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please specify tcpdump options desired.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;(or enter '?' for a list of supported options)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Options: &lt;STRONG&gt;src host 10.10.10.102&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;listening on nfe0.1.22:nfe1.1.22:nfe2.1.22:nfe3.1.22, link-type EN10MB (Ethernet), capture size 96 bytes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;18:02:00.868597 IP 10.10.10.102 &amp;gt; 10.10.10.1: ICMP echo request, id 62476, seq 101, length 64&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;18:02:01.869797 IP 10.10.10.102 &amp;gt; 10.10.10.1: ICMP echo request, id 62476, seq 102, length 64&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;

&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P style="font-size: 13.3333px;"&gt;--note this filter will match only against the traffic that is initiated from the source IP address 10.10.10.102, if you don't care where the host IP address is seen SRC or DST packet header field, then you can simply use filter "host 10.10.10.102" and that would match traffic bi-directionally.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;You can also write the matching filter output to the packet capture (.pcap) file. Here are some good examples of the packet capturing tool on Firepower devices:&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/sourcefire-firepower-8000-series-appliances/117778-technote-sourcefire-00.html" title="http://www.cisco.com/c/en/us/support/docs/security/sourcefire-firepower-8000-series-appliances/117778-technote-sourcefire-00.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/sourcefire-firepower-8000-series-appliances/117778-technote-sourcefire-00.html&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;But basically you can do much more, just look through the tcpdump BPF syntax and you can apply the same to the system support capture-traffic as on the background the tcpdump would be running.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;If you want to see connection information, you can login to the FireSIGHT Management Center and review Analysis -&amp;gt; Connection Events table where you can edit search and filter logs by Initiator IP address.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;If I misunderstood your question anyhow please provide more details.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Best regards,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Veronika Klauzova&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Dec 2016 18:26:36 GMT</pubDate>
    <dc:creator>Veronika Klauzova</dc:creator>
    <dc:date>2016-12-12T18:26:36Z</dc:date>
    <item>
      <title>packet capture</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture/m-p/3548017#M979708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firepower 8000 series sensor deployed inline mode and i want capture spesific ip address from sensor, i got answer from support they say it is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example ip address: 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src: 1.1.1.1 dst any and connection logging enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;traffic match the ip adress and sensor bypass this ip address on hardware level. it is ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my question is how can i see connection information or packet capture about this ip address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version is 5.4.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zafer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Nov 2016 14:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture/m-p/3548017#M979708</guid>
      <dc:creator>zaferberber</dc:creator>
      <dc:date>2016-11-07T14:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: packet capture</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture/m-p/3548018#M979727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333px;"&gt;Hello Zafer,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;how are you doing? I will try to answer your question, but not sure if I understand all details that are required from your side, so feel free to ask additional questions.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;In case that you want to capture on sensor's CLI only traffic that matches specific IP address, you can apply following filter to the capturing tool:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;gt; &lt;STRONG&gt;system support capture-traffic&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please choose domain to capture traffic from:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp; 0 - eth0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp; 1 - in&amp;nbsp; (Interfaces s1p1, s1p2)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Selection?&lt;STRONG&gt; 1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;NOTE: These changes will be lost the next time detection is reconfigured!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please specify tcpdump options desired.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;(or enter '?' for a list of supported options)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Options: &lt;STRONG&gt;src host 10.10.10.102&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;listening on nfe0.1.22:nfe1.1.22:nfe2.1.22:nfe3.1.22, link-type EN10MB (Ethernet), capture size 96 bytes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;18:02:00.868597 IP 10.10.10.102 &amp;gt; 10.10.10.1: ICMP echo request, id 62476, seq 101, length 64&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;18:02:01.869797 IP 10.10.10.102 &amp;gt; 10.10.10.1: ICMP echo request, id 62476, seq 102, length 64&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;

&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P style="font-size: 13.3333px;"&gt;--note this filter will match only against the traffic that is initiated from the source IP address 10.10.10.102, if you don't care where the host IP address is seen SRC or DST packet header field, then you can simply use filter "host 10.10.10.102" and that would match traffic bi-directionally.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;You can also write the matching filter output to the packet capture (.pcap) file. Here are some good examples of the packet capturing tool on Firepower devices:&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/sourcefire-firepower-8000-series-appliances/117778-technote-sourcefire-00.html" title="http://www.cisco.com/c/en/us/support/docs/security/sourcefire-firepower-8000-series-appliances/117778-technote-sourcefire-00.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/sourcefire-firepower-8000-series-appliances/117778-technote-sourcefire-00.html&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;But basically you can do much more, just look through the tcpdump BPF syntax and you can apply the same to the system support capture-traffic as on the background the tcpdump would be running.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;If you want to see connection information, you can login to the FireSIGHT Management Center and review Analysis -&amp;gt; Connection Events table where you can edit search and filter logs by Initiator IP address.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;If I misunderstood your question anyhow please provide more details.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Best regards,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Veronika Klauzova&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Dec 2016 18:26:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture/m-p/3548018#M979727</guid>
      <dc:creator>Veronika Klauzova</dc:creator>
      <dc:date>2016-12-12T18:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: packet capture</title>
      <link>https://community.cisco.com/t5/network-security/packet-capture/m-p/3548019#M979736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Veronika,&lt;/P&gt;&lt;P&gt;my problem is the trust rule.&lt;/P&gt;&lt;P&gt;support said it is not possible logging connection or&amp;nbsp; take packet capture trusted traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zafer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2017 19:12:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-capture/m-p/3548019#M979736</guid>
      <dc:creator>zaferberber</dc:creator>
      <dc:date>2017-01-10T19:12:38Z</dc:date>
    </item>
  </channel>
</rss>

