<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Capture Filters via CLI using debug commands in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257323#M73001</link>
    <description>&lt;P&gt;thanks.&amp;nbsp; that didnt work.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Apr 2019 19:15:20 GMT</pubDate>
    <dc:creator>MarioMarquez</dc:creator>
    <dc:date>2019-04-11T19:15:20Z</dc:date>
    <item>
      <title>Packet Capture Filters via CLI using debug commands</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257309#M72999</link>
      <description>&lt;P&gt;I am trying to capture traffic between a specific source on the internal network to any destination on any zone.&amp;nbsp; I totally understand how to enable captures and turn it on &amp;amp; off but my capture seems to be colleting data but not anything that I can recognize.&amp;nbsp; I have double checked my filter &amp;amp; the traffic pattern, addresses &amp;amp; interfaces being crossed seem straight forward to me but whe I look at the output it looks like data has been captured that is not matching the filter I've created.&amp;nbsp; I'm trying to make sense of it &amp;amp; am not able to.&amp;nbsp; Can someone with experience please review my filter &amp;amp; tell me why I am seeing internal addresses in the capture that dont match the source im using in my filter?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Filter I'm using...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;debug dataplane packet-diag set filter match source 192.168.180.210 source-netmask 32 ingress-interface ethernet1/3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Show Setting Output...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;paloalto&amp;gt; debug dataplane packet-diag show setting&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Packet diagnosis setting:&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Packet filter&lt;BR /&gt;Enabled: yes&lt;BR /&gt;Match pre-parsed packet: no&lt;BR /&gt;Index 1: 192.168.180.210/32[0]-&amp;gt;0.0.0.0/0[0], proto 0&lt;BR /&gt;ingress-interface ethernet1/20, egress-interface any, exclude non-IP&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Logging&lt;BR /&gt;Enabled: no&lt;BR /&gt;Log-throttle: no&lt;BR /&gt;Sync-log-by-ticks: yes&lt;BR /&gt;Features:&lt;BR /&gt;Counters:&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Packet capture&lt;BR /&gt;Enabled: no&lt;BR /&gt;Snaplen: 0&lt;BR /&gt;Username:&lt;BR /&gt;Stage receive : file cap&lt;BR /&gt;&lt;STRONG&gt;Captured: packets - 3 bytes - 162&lt;/STRONG&gt;&lt;BR /&gt;Maximum: packets - 0 bytes - 0&lt;BR /&gt;Stage transmit : file cap&lt;BR /&gt;&lt;STRONG&gt;Captured: packets - 2 bytes - 108&lt;/STRONG&gt;&lt;BR /&gt;Maximum: packets - 0 bytes - 0&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2019 18:40:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257309#M72999</guid>
      <dc:creator>MarioMarquez</dc:creator>
      <dc:date>2019-04-11T18:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture Filters via CLI using debug commands</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257316#M73000</link>
      <description>&lt;P&gt;debug dataplane packet-diag clear filter-marked-session all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A title="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgDCAS" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgDCAS" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgDCAS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2019 18:44:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257316#M73000</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-11T18:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture Filters via CLI using debug commands</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257323#M73001</link>
      <description>&lt;P&gt;thanks.&amp;nbsp; that didnt work.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2019 19:15:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257323#M73001</guid>
      <dc:creator>MarioMarquez</dc:creator>
      <dc:date>2019-04-11T19:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Capture Filters via CLI using debug commands</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257508#M73044</link>
      <description>&lt;P&gt;If the sessions have already started when you set your capture filter, it will not output anything. In addition to the 'clear filter-marked-sessions' command you tried, you may also want to clear the active sessions (assuming an interruption to those is ok):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&amp;gt; clear session all filter source 192.168.180.210&lt;/PRE&gt;&lt;P&gt;You can also check to see if your filters are matching before you actually attempt to capture by running a delta against the counters using that filter:&lt;/P&gt;&lt;PRE&gt;&amp;gt; show counter global filter packet-filter yes delta yes&lt;/PRE&gt;&lt;P&gt;The first time you run the command you'll probably get a big output, but each subsequent time you run it the output will just be a delta between the last time you ran it. If you're seeing packet numbers increment, you can start the capture and should see the same number of packets there.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2019 21:29:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-filters-via-cli-using-debug-commands/m-p/257508#M73044</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-04-12T21:29:29Z</dc:date>
    </item>
  </channel>
</rss>

