<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN traffic capture in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-traffic-capture/m-p/558391#M113266</link>
    <description>&lt;P&gt;Hello, &lt;BR /&gt;I need to capture what passes through a VPN site-to-site tunnel. I'd like to see the tunnel and not the ESP.&lt;BR /&gt;With tcpdump you can use the command "tcpdump -i enc0" which decrypts the ESP.&lt;BR /&gt;On Palo Alto, what is the equivalent command? Because with view-pcap follow yes filter-pcap &amp;lt;filename&amp;gt; I can only see the ESP.&lt;BR /&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 18 Sep 2023 15:28:08 GMT</pubDate>
    <dc:creator>GuillaumeV</dc:creator>
    <dc:date>2023-09-18T15:28:08Z</dc:date>
    <item>
      <title>VPN traffic capture</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-traffic-capture/m-p/558391#M113266</link>
      <description>&lt;P&gt;Hello, &lt;BR /&gt;I need to capture what passes through a VPN site-to-site tunnel. I'd like to see the tunnel and not the ESP.&lt;BR /&gt;With tcpdump you can use the command "tcpdump -i enc0" which decrypts the ESP.&lt;BR /&gt;On Palo Alto, what is the equivalent command? Because with view-pcap follow yes filter-pcap &amp;lt;filename&amp;gt; I can only see the ESP.&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 15:28:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-traffic-capture/m-p/558391#M113266</guid>
      <dc:creator>GuillaumeV</dc:creator>
      <dc:date>2023-09-18T15:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN traffic capture</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-traffic-capture/m-p/558418#M113274</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/316692"&gt;@GuillaumeV&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;With view-pcap command you can review the captures&amp;nbsp; that are done&amp;nbsp; when debugging/troubleshooting VPN negotiation. &lt;/P&gt;
&lt;P&gt;To capture traffic passing through the firewall you need to use the Packet capture feature - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Above link goes into details how to define packet capture filter. If you filter based on the private IP address you will capture unencrypted. If you add filter for remote IPsec peer IP, you will capture the encrypted ESP traffic as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 18:26:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-traffic-capture/m-p/558418#M113274</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-09-18T18:26:32Z</dc:date>
    </item>
  </channel>
</rss>

