Use the Packet Tracer
To use a packet tracer on Secure Firewall Threat Defense devices, you must be an Admin or Maintenance user.
Procedure
Step 1 | In Firewall Management Center, choose . | ||
Step 2 | From the Select Device drop-down list, choose the device on which you want to run the trace. | ||
Step 3 | Choose Use Protocol to perform the configuration manually, or Upload or Edit a PCAP file to upload a packet capture (PCAP) file. | ||
Step 4 | If you choose to upload a PCAP file, do the following: | ||
Step 5 | If you choose to perform a manual configuration, do the following: | ||
Step 6 | From the Ingress Interface drop-down, choose the ingress interface for the packet trace.
| ||
Step 7 | To use a PCAP replay in the packet tracer, do the following: | ||
Step 8 | To define the trace parameters, from the Protocol drop-down list, select the packet type for the trace, and specify the protocol characteristics:
| ||
Step 9 | Select the Source Type for the packet trace, and enter the source IP address. Source and destination types include IPv4, IPv6, and fully-qualified domain names (FQDN). You can specify IPv4 or IPv6 addresses and FQDN, if you use Cisco TrustSec. | ||
Step 10 | Select the Source Port for the packet trace. | ||
Step 11 | Select the Destination type for the packet trace, and enter the destination IP address. Destination type options vary depending on the source type that you select. | ||
Step 12 | Select the Destination Port for the packet trace. | ||
Step 13 | Optionally, if you want to trace a packet where the Security Group Tag (SGT) value is embedded in the Layer 2 CMD header (TrustSec), enter a valid SGT number. | ||
Step 14 | If you want packet tracer to enter a parent interface, which is later redirected to a sub-interface, enter a VLAN ID. This value is optional for non-sub-interfaces only, since all the interface types can be configured on a sub-interface. | ||
Step 15 | Specify a Destination MAC Address for the packet trace. If the Secure Firewall Threat Defense device is running in transparent firewall mode, and the ingress interface is VTEP, Destination MAC Address is required if you enter a value in VLAN ID. Whereas if the interface is a bridge group member, Destination MAC Address is optional if you enter a VLAN ID value, but required if you do not enter a VLAN ID value. If the Secure Firewall Threat Defense is running in routed firewall mode, VLAN ID and Destination MAC Address are optional if the input interface is a bridge group member. | ||
Step 16 | (Optional) If you want the packet-tracer to ignore the security checks on the simulated packet, click Bypass all security checks for simulated packet. This enables packet-tracer to continue with tracing of packet through the system which, otherwise would have been dropped. | ||
Step 17 | (Optional) To allow the packet to be sent out through the egress interface from the device, click Allow simulated packet to transmit from device. | ||
Step 18 | (Optional) If you want the packet-tracer to consider the injected packet as an IPsec/SSL VPN decrypted packet, click Treat simulated packet as IPsec/SSL VPN decrypt. | ||
Step 19 | Click Trace. | ||
Step 20 | (Optional) If you want to modify any values, ensure you click Save PCAP and save the values before proceeding with the trace. | ||
Step 21 | (Optional) If you do not save the modified values of the PCAP file and click Trace, the Unsaved PCAP changes dialog box is displayed, which prompts you to save the file.
| ||
Step 22 | You can track the status of trace in the Events & Logs > Analysis > Audit Logs window. The following tasks can be tracked:
|
The Trace Result displays the results for each phase that the PCAP packets have traveled through the system. Click an individual packet to view the traces results for the packet. You can do the following:
-
Copy (Copy
) the trace results to the clipboard. -
Expand or collapse (Expand or collapse
) the displayed results. -
Maximize (Maximize
) the trace result window.
The time elapsed information, useful to gauge the processing efforts, is displayed for each phase. The results section also displays the total time taken for packets flowing from an ingress to an egress interface.
The Trace History pane displays the stored trace details for each PCAP trace. It can store up to 100 packet traces. You can select a saved trace and run the packet trace activity again. You can do the following:
-
Search for a trace using any of the trace parameters.
-
Disable saving of the trace to history using the Slider
button. -
Delete specific trace results.
-
Clear all the traces.