Showing results for 
Search instead for 
Did you mean: 

Monitor Capture on Cisoc IOS-XE



I applied the monitor capture as listed below - c4500. However, I am only able to see one-way communication, meaning only traffic leaving the source IP defined in ACL, but no incoming traffic is seen on the capture.


ip access-list extended MonCapTest
permit ip host host

Instead of using the Vlan111 interface, I applied monitor capture on the interface hosting device with IP resulting in the same output.

Status Information for Capture test
Target Type:
Interface: Vlan111, Direction: both
Status : Active
Filter Details:
Access-list: MonCapTest
File Details:
File not associated
Buffer Details:
Buffer Type: CIRCULAR
Buffer Size (in MB): 10
Limit Details:
limit not set


Extract of capture - is pinging, which is member of VLAN 111:

==>ping requests are missing on packet capture; I was expecting that RX and TX are captured.

1025.835000 -> ICMP Echo (ping) reply (id=0x0001, seq(be/le)=56729/39389, ttl=128)
1026.836007 -> ICMP Echo (ping) reply (id=0x0001, seq(be/le)=56730/39645, ttl=128)
1027.838006 -> ICMP Echo (ping) reply (id=0x0001, seq(be/le)=56731/39901, ttl=128)
1028.841012 -> ICMP Echo (ping) reply (id=0x0001, seq(be/le)=56732/40157, ttl=128)


Any information is much appreciated.





Oleksandr Y.

Hi, I was looking for another issue and stumbled upon this one ... probably already resolved but I have a feeling the Access List is the bottle neck ... you have chosen specific SRC and DST IP Addresses which means that only packets with SRC and DST will be recorded ... but not SRC / DST on the way back. The Monitor Capture for BOTH ways is fine, just edit the Access List to also capture the SRC & DST of the Packet on it's way back

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: