Use the "capture" command (this is also in 6.3, debug packet has been deprecated for a while now".
This is a much more powerful command, allowing you to capture on both input and output interfaces simultaneously, then even save the packet capture off in pcap format so you can look at it with Sniffer/Ethereal. Very cool command.
User on the Inside with an IP of 192.168.1.8 is having a problem accessing
Cisco.com (126.96.36.199). The user is getting NATed to 188.8.131.52
Step 1: Create ACL for both Inside and Outside Interface specifying the pre-NAT'd source and destination traffic in both directions
Access-list out permit tcp host 184.108.40.206 host 220.127.116.11 eq 80
Access-list out permit tcp host 18.104.22.168 eq 80 host 22.214.171.124
Access-list in permit tcp host 192.168.1.8 host 126.96.36.199 eq 80
Access-list in permit tcp host 188.8.131.52 eq 80 host 192.168.1.8
Step 2: Create captures on both Inside and Outside Interface
capture out-web access-list out buffer 700000 interface outside packet-length 1518
capture in-web access-list in buffer 700000 interface inside packet-length 1518
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :