ASA


Packet Tracer

packet-tracer input [src_int] protocol src_addr src_port dest_addr dest_port

packet-tracer input inside TCP x.x.x.x 1234 y.y.y.y http


Capture ping depuis *all vers IP_Distante

capture <nom_capture> circular-buffer interface <nom_interface> match icmp any host <IP_distante>


Capture du flux sur un port spécifique

capture <nom_capture> circular-buffer interface <nom_interface> match <type_port> host <IP_source> host <IP_distante> eq <num_port>

capture tbr circular-buffer interface inside match tcp host 10.200.202.19 host 10.200.156.43 eq 3389


Clear a Capture

clear capture <capture-name>


Stop a Capture

no capture <capture-name>


Voir la liste des captures

show capture


Voir une capture spécifique

show capture <nom_capture>

8 packets captured

   1: 10:39:10.667415       802.1Q vlan#137 P0 10.0.0.39 > 10.200.132.54 icmp: echo request
   2: 10:39:10.667903       802.1Q vlan#137 P0 10.200.8.68 > 10.0.0.39 icmp: echo reply
   3: 10:39:15.443977       802.1Q vlan#137 P0 10.0.0.39 > 10.200.132.54 icmp: echo request
   4: 10:39:15.444465       802.1Q vlan#137 P0 10.200.8.68 > 10.0.0.39 icmp: echo reply
   5: 10:39:20.444129       802.1Q vlan#137 P0 10.0.0.39 > 10.200.132.54 icmp: echo request
   6: 10:39:20.444541       802.1Q vlan#137 P0 10.200.8.68 > 10.0.0.39 icmp: echo reply
   7: 10:39:25.444709       802.1Q vlan#137 P0 10.0.0.39 > 10.200.132.54 icmp: echo request
   8: 10:39:25.445167       802.1Q vlan#137 P0 10.200.8.68 > 10.0.0.39 icmp: echo reply