
9-31
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 9 Accessing and Monitoring PIX Firewall
Saving Crash Information to Flash Memory
10:46:28.923368 arp who-has 209.165.200.226 (ff:ff:ff:ff:ff:ff
tell 209.165.200.235
10:46:29.255998 arp who-has 209.165.202.129
tell 209.165.202.130 (0:2:b9:45:bf:7b)
10:46:29.256136 arp reply 209.165.202.129 is-at 0:a0:c9:86:8e:9c
Example 9-9 illustrates a packet capture of PPPoE discovery packets:
Example 9-9 Capturing PPPoE Discovery
pixfirewall# capture pppoed ethernet-type pppoed interface outside
pixfirewall(config)# show capture pppoed
3 packets captured, 3 packets to be shown
02:13:21.844408 ffff.ffff.2ac5 ffff.ffff.ffff 0x8863 32:
1109 0000 000c 0101 0000 0103 0004 386c
f280
02:13:25.841738 ffff.ffff.3cc0 ffff.ffff.ffff 0x8863 32:
1109 0000 000c 0101 0000 0103 0004 386c
f280
02:13:33.841875 ffff.ffff.76c0 ffff.ffff.ffff 0x8863 32:
1109 0000 000c 0101 0000 0103 0004 386c
f280
Example 9-10 illustrates a packet capture on multiple interfaces. The example captures an FTP session
to an FTP server at host 209.165.202.129.
Example 9-10 Capturing On Multiple Interfaces
pixfirewall(config)# access-list ftp tcp any host 209.165.202.129 eq ftp
pixfirewall(config)# access-list ftp tcp host 209.165.202.129 eq ftp any
pixfirewall# capture ftp access-list ftp
pixfirewall# capture ftp interface inside interface outside
pixfirewall# show capture
pixfirewall# capture ftp access-list ftp interface outside interface inside
pixfirewall# show capture ftp
5 packets captured, 5 packets to be shown
11:21:17.705041 10.1.1.15.2158 > 10.1.1.15.2158:
S 3027585165:3027585165(0) win 512 <mss 1460>
11:21:17.705133 209.165.202.130.2158 > 209.165.202.130.2158:
S 4192390209:4192390209(0) win 512 <mss 1380>
11:21:17.705651 10.1.1.15.2158 > 10.1.1.15.2158:
. ack 3463843411 win 32120
11:21:17.705667 209.165.202.130.2158 > 209.165.202.130.2158:
. ack 3463843411 win 32120
11:21:20.784337 10.1.1.15.2158 > 10.1.1.15.2158:
. ack 3463843521 win 32120
Saving Crash Information to Flash Memory
PIX Firewall Version 6.3 and higher, by default, saves information that is generated during a
PIX
Firewall system crash to Flash memory. With earlier versions, crash information was only displayed
on the console.
To erase the current contents of the crash flash file, enter the following command:
clear crashinfo
To disable saving crash information to Flash memory, enter the following command:
crashinfo save disable
Comentarios a estos manuales