|
|
Question : Packet sniffing, 2851, ASA 5520
|
|
I am trying to capture some traffic from my router and firewall. I plugged both my outside interface of the firewall and the associated interface for the router into a switch along with a workstation that has wireshark installed on it. The IP set up for my network is below. When I start a capture with wireshark all I see is the traffic from 192.168.1.0. Most of my traffic should be coming from the 192.168.11.0 network. I set my pc IP to a 216.146.x.x address, is this right? What do I have to do to capture all the traffic from all VLAN's and VPN tunnels?
Interface for ASA = 216.146.x.x Interface for Router = 216.146.x.x
192.168.1.0/24 VLAN 2 192.168.3.0/24 VLAN 3 192.168.7.0/24 VLAN 7 192.168.9.0/24 VLAN 9 192.168.10.0/24 VLAN 10 192.168.11.0/24 VLAN 11
|
Answer : Packet sniffing, 2851, ASA 5520
|
|
I think the config you posted earlier was correct. I assume you have internet traffic going into the ASA from another interface and then the ASA internal interface is connected to the router via a switch? Or is the router providing the internet connectivity and you have the ASA sitting behind it?
Either way what you did should work but bear in mind there is spamming-tree in operation so after connecting both cables it will take 30 seconds or so before it starts working.
|
|
|
|
|