03-01-2007 04:41 PM
I need to setup packet sniffs on the inside and outside interfaces of the ASA for both inside and outside interface monitoring. What is the syntax for the monitoring, and how do I save/copy the .pcap file off the asa? Also, how do you specify the random source port (gt1023)?
Here's my stab at an inside example:
packet-tracer input inside udp 10.1.0.1 xxx 207.1.1.1 sip detailed
Also, can I run an inside and outside trace simultaneously?
Thanks,
-Scott
Solved! Go to Solution.
03-01-2007 08:29 PM
Scott,
After setting the capture
browse to
http://ipadd of pix/capture/pcap/sip-trace
Make sure you have http enabled on that interface you are trying to access.
Rate it, if this helps!!
gilbert
03-01-2007 04:44 PM
I think I got the trace right (correct me if I'm wrong), but need to figure out how to get it off the box:
capture sip-test trace access-list sip-trace interface inside
access-list sip-trace permit udp 10.1.1.1 gt 1023 207.1.1.1 eq 5060
Thanks,
-Scott
03-01-2007 08:29 PM
Scott,
After setting the capture
browse to
http://ipadd of pix/capture/pcap/sip-trace
Make sure you have http enabled on that interface you are trying to access.
Rate it, if this helps!!
gilbert
03-01-2007 09:19 PM
Thanks Gilbert,
I found that I didn't need the trace command in the capture settings, and I used https://ipaddy/cap/capname and that did the trick.
Thanks again!
-Scott
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide