![]() They are RFC 1918 addresses that are used in a lab environment. Note: The IP addressing schemes that are used in this configuration are not legally routable on the Internet. Note: Use the Command Lookup Tool ( registered customers only) in order to obtain more information on the commands used in this section. This section provides information that you can use in order to configure the packet capture features that are described in this document. In addition, you can create multiple captures in order to analyze different types of traffic on multiple interfaces. The packet capture process is useful when you troubleshoot connectivity problems or monitor suspicious activity. This configuration can also be used with these Cisco products: If your network is live, make sure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. ![]() The information in this document was created from the devices in a specific lab environment. ![]() This document is not restricted to specific hardware or software versions. This document assumes that the ASA is fully operational and is configured in order to allow the Cisco ASDM or the CLI to make configuration changes. This document describes how to configure the Cisco Adaptive Security Appliance (ASA) Next-Generation Firewall in order to capture the desired packets with either the Cisco Adaptive Security Device Manager (ASDM) or the CLI.
0 Comments
Leave a Reply. |