<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port analyse by TCPDUMP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185243#M56699</link>
    <description>&lt;P&gt;Ok this is not possible, you could mirror the port on the switch or install a hub between the PA and your switch.&lt;/P&gt;</description>
    <pubDate>Thu, 02 Nov 2017 20:58:25 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2017-11-02T20:58:25Z</dc:date>
    <item>
      <title>Port analyse by TCPDUMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185203#M56687</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to capture packet by tcpdump on other interface than management interface.&lt;/P&gt;&lt;P&gt;How can do it ? (please explain more detailled as possible).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;GB.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 17:38:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185203#M56687</guid>
      <dc:creator>BLAISEMONT</dc:creator>
      <dc:date>2017-11-02T17:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Port analyse by TCPDUMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185214#M56688</link>
      <description>&lt;P&gt;i dont think you can so I just use /monitor/packet capture&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 17:55:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185214#M56688</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-02T17:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: Port analyse by TCPDUMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185216#M56689</link>
      <description>&lt;P&gt;or from CLI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/How-to-Run-a-Packet-Capture/ta-p/62390" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Learning-Articles/How-to-Run-a-Packet-Capture/ta-p/62390&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 18:03:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185216#M56689</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-02T18:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: Port analyse by TCPDUMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185233#M56696</link>
      <description>&lt;P&gt;Yes, thanks. But i precise that i would like to see the trafic&amp;nbsp; streaming in real time like tcpdump under Linux, because i manipulate the rules in production, and i don't cut for more than a few second. I don't have a sandbox to test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 19:37:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185233#M56696</guid>
      <dc:creator>BLAISEMONT</dc:creator>
      <dc:date>2017-11-02T19:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: Port analyse by TCPDUMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185243#M56699</link>
      <description>&lt;P&gt;Ok this is not possible, you could mirror the port on the switch or install a hub between the PA and your switch.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 20:58:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185243#M56699</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-02T20:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Port analyse by TCPDUMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185245#M56700</link>
      <description>&lt;P&gt;&lt;EM&gt;Technically&lt;/EM&gt; it can be done using the "follow yes" option in CLI:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&amp;gt; view-pcap follow yes verbose++ filter-pcap tx-test &lt;/PRE&gt;&lt;P&gt;It will not help&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/67968"&gt;@BLAISEMONT&lt;/a&gt;&amp;nbsp;much though, because once you change rules you have to commit the changes and then all the traffic is affected. It's also a burdon to the management plane if the capture filter is not narrow enough. The mirror/span port option is by far the best, as long as the switch can handle it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In case that's missed,&amp;nbsp;&lt;STRONG&gt;you should avoid doing this in production just in case.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Generally without a lab/sandbox though, I'd recommend creating a test rule change that would only apply to the test user above the rule being changed. That allows you to test things out without affecting production.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 21:38:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-analyse-by-tcpdump/m-p/185245#M56700</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2017-11-02T21:38:27Z</dc:date>
    </item>
  </channel>
</rss>

