ASP drop capture - filtering out a specific interface?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-14-2016 08:47 AM - edited 03-12-2019 12:29 AM
I'm trying to troubleshoot acl-drop's in my ASP drop capture.
Unfortunately, a large number of these drops are from my outside interface, folks trying to come in to particular resources.
Is there a way to capture this while filtering out that Interface? I know that I can capture on a match of specific hosts, but didn't know if I can limit my capture to a particular interface, or, preferably, exclude an interface from capture.
Thank you!
- Labels:
-
NGFW Firewalls

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-14-2016 09:50 AM
Hello Brian,
If you are aware of the specifc source and destination that you are tracking then you can perhaps use the following :
cap asp type asp-drop acl-drop match match ip <source subnet> <destination subnet>
Other then this, I don't think you will be able to filter the outside interface packets on ASP captures.
Regards,
Dinesh Moudgil
P.S. Please rate helpful posts.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-17-2016 01:49 PM
Running 8.4(7), telling me that "match match" is invalid.
So, when trying to capture:
cap 209 type asp-drop acl-drop match ip any 10.200.9.0 255.255.255.0
displays a bunch of stuff that is neither source or destination of 10.200.9.0/24
cap 209 type asp-drop acl-drop match ip 10.0.0.0 255.0.0.0 10.200.9.0 255.255.255.0
displays the same behavior, that of traffic not matching the specified source/destination showing up in the capture.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2018 06:59 AM
I tried today on 9.6.x and it works as expected. I am still left with one question?
How can I find out what is the name of the enabled ACL that drops this? Maybe even better to find out ACE number? Is this at least scheduled by Cisco to "make it happen"?
Thanks!
