Solved

Debug packet INT SRC MASK output confusion

Posted on 2004-09-09
1
185 Views
Last Modified: 2012-06-21
By using the debug command how can I tell if traffic was passed or rejected from a specific IP or range.  For instance here is the output I recieved in my test.  I know that it was blocked but what in the output will confirm that for me?

--------- PACKET ---------

-- IP --
Source ==>     Dest

        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x30
        id = 0x6321     flags = 0x40    frag off=0x0
        ttl = 0x7e      proto=0x6       chksum = 0xb494

        -- TCP --
                source port = 0x7b0     dest port = 0x17syn

                seq = 0x166cf6da
                ack = 0x0
                hlen = 0x7              window = 0xffff
                checksum = 0x88ff       urg = 0x0
tcp options:
                        0x2     0x4     0x5     0xb4    0x1     0x1     0x4
0x2
--------- END OF PACKET ---------

--------- PACKET ---------

-- IP --
Source ==>     Dest

        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x30
        id = 0x6322     flags = 0x40    frag off=0x0
        ttl = 0x7e      proto=0x6       chksum = 0xb493

        -- TCP --
                source port = 0x7b0     dest port = 0x17syn

                seq = 0x166cf6da
                ack = 0x0
                hlen = 0x7              window = 0xffff
                checksum = 0x88ff       urg = 0x0
tcp options:
                        0x2     0x4     0x5     0xb4    0x1     0x1     0x4
0x2
--------- END OF PACKET ---------

--------- PACKET ---------

-- IP --
Source ==>     Dest

        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x30
        id = 0x6323     flags = 0x40    frag off=0x0
        ttl = 0x7e      proto=0x6       chksum = 0xb492

        -- TCP --
                source port = 0x7b0     dest port = 0x17syn

                seq = 0x166cf6da
                ack = 0x0
                hlen = 0x7              window = 0xffff
                checksum = 0x88ff       urg = 0x0
tcp options:
                        0x2     0x4     0x5     0xb4    0x1     0x1     0x4
0x2
--------- END OF PACKET ---------


Thanks,

Sunny
0
Comment
Question by:sunnyd24
1 Comment
 
LVL 23

Accepted Solution

by:
Tim Holman earned 500 total points
ID: 12027900
It doesn't.  This is only a packet capture.  You could compare this to what you see blocked in the fw logs ?
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sonicwall NSA failover & LB 4 58
Fortinet FWs backdoor vulnerability 3 92
Iptables Centos 6 - Sort Numerically 5 59
Windows Firewall Dropping Allowed Packets 7 300
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question