Table of Contents. Cisco WebVPN Capture Tool on the Cisco ASA 5500 Series Adaptive Security Appliance

Similar documents
PIX/ASA 7.x to 7.x Upgrade a Software Image using ASDM or CLI Configuration Example

ICM Logger Database Configuration Synchronization

Use NAT to Hide the Real IP Address of CTC to Establish a Session with ONS 15454

CDR Database Copy or Migration to Another Server

PIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example

Creating Core Dumps. Contents. Prerequisites. Document ID: Requirements. Components Used

ASA Clientless SSL VPN (WebVPN) Troubleshooting Tech Note

Table of Contents. Cisco CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example

Wired Dot1x Version 1.05 Configuration Guide

ASA 8.0: How to Change the WebVPN Logo

Cisco Firepower Troubleshoot File Generation Procedures

Transferring Files Using HTTP or HTTPS

This document provides a sample configuration for X25 Over TCP.

CRS Historical Reports Schedule and Session Establishment

Permitting PPTP Connections Through the PIX/ASA

Basic Router Configuration using SDM

Clientless SSL VPN End User Set-up

Configuration Replace and Configuration Rollback

Upgrading the Cisco IOS XE Software

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

This document describes Firepower module s system/ traffic events and various method of sending these events to an external logging server.

Using Cisco Unity Express Software

Contents. Introduction. Prerequisites. Requirements. Components Used

Using NAT in Overlapping Networks

Clientless SSL VPN Remote Users

Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers

Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM

Troubleshooting Web Authentication on a Wireless LAN Controller (WLC)

Table of Contents. Cisco Troubleshooting Authentication Proxy

Accessing the WAN Chapter 4 - PART II Modified by Tony Chen 07/20/2008

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Password Recovery Procedure for the PIX

Data Center Network Manager (DCNM) with SFTP Switch Configuration Backup

PIX/ASA: PPPoE Client Configuration Example

Configuring Cisco CallManager IP Phones to Work With IP Phone Agent

HTTP 1.1 Web Server and Client

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Policy Based Routing with the Multiple Tracking Options Feature Configuration Example

Command Reference for Firepower Threat Defense 1

CDR Database Copy or Migration to Another Server

Recovering Catalyst Fixed Configuration Switches from a Corrupted or Missing Image

Configuring Management Access

Web Authentication Proxy Configuration Example

NAT Support for Multiple Pools Using Route Maps

Identity Services Engine Guest Portal Local Web Authentication Configuration Example

Working with the Flash File System

Configuration Replace and Configuration Rollback

User and System Administration

Table of Contents. Cisco IPSec Tunnel through a PIX Firewall (Version 7.0) with NAT Configuration Example

This study aid describes the purpose of security contexts and explains how to enable, configure, and manage multiple contexts.

Managing the ACE Software

Logging to Local Nonvolatile Storage (ATA Disk)

RADIUS Route Download

Working with the Flash File System

Working with the Flash File System

ACS Shell Command Authorization Sets on IOS and ASA/PIX/FWSM Configuration Example

Lab 7 Configuring Basic Router Settings with IOS CLI

Configuring the Cisco VPN 3000 Concentrator 4.7.x to Get a Digital Certificate and a SSL Certificate

Configuring the VPN Client 3.x to Get a Digital Certificate

Lab Manage AP Configuration and Image Files

Auto Register Cisco IP Communicator 8.6 with CUCM 8.x

ASA 8.X and later: Add or Modify an Access List through the ASDM GUI Configuration Example

Multiple Context Mode

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Troubleshooting. Understanding POST Results CHAPTER

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Lab Manage AP Configuration and Image Files

Replace Supervisor Module in Cisco Catalyst 6500 Virtual Switching System 1440

Lock and Key: Dynamic Access Lists

ASA Remote Access VPN IKE/SSL Password Expiry and Change for RADIUS, TACACS, and LDAP Configuration Example

Available Commands CHAPTER

Configuring Call Home for the Cisco CSR 1000v

Firewall Stateful Inspection of ICMP

Table of Contents. Cisco Password Recovery Procedure for the Cisco Aironet Equipment

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

NBAR2 HTTP-Based Visibility Dashboard

Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0. Global Knowledge European Remote Labs Instructor Guide

TACACS+ on an Aironet Access Point for Login Authentication Configuration Example

Role Configuration Mode Commands

Working with the Flash File System

Firepower extensible Operating System (FXOS) 2.2: Chassis Authentication and Authorization for remote management with ACS using RADIUS

About This Guide. Document Objectives. Audience

Nested Class Map Support for Zone-Based Policy Firewall

Getting Started. Getting Started with Your Platform Model. Factory Default Configurations CHAPTER

Configuring IP SLAs TCP Connect Operations

Configuring a Core Dump on a GSR Line Card

Virtual Services Container

Cisco Cloud Web Security Troubleshooting Guide

Sharing a Cisco Unity Voice Mail Box between Two or More IP Phones

ISE TACACS+ Configuration Guide for Cisco ASA. Secure Access How-to User Series

This feature was introduced.

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN

GSS Administration and Troubleshooting

Document ID: Contents. Introduction. Prerequisites. Requirements. Introduction. Prerequisites Requirements

Troubleshooting TFTP Problems on Resource Manager Essentials

Restrictions for Secure Copy Performance Improvement

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Using vemlog to debug Nexus 1000v problems

Password Strength and Management for Common Criteria

The Integrated File System Configuration Guide, Cisco IOS Release 15M&T

Transcription:

Table of Contents WebVPN Capture Tool on the Cisco ASA 5500 Series Adaptive Security Appliance...1 Document ID: 65096...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...2 Configure...2 WebVPN Capture Tool Output Files...2 Activating the WebVPN Capture Tool...2 Locating and Uploading the WebVPN Capture Tool Output Files...3 Verify...4 Troubleshoot...4 NetPro Discussion Forums Featured Conversations...4 Related Information...4 i

WebVPN Capture Tool on the Cisco ASA 5500 Series Adaptive Security Appliance Document ID: 65096 Introduction Prerequisites Requirements Components Used Conventions Configure WebVPN Capture Tool Output Files Activating the WebVPN Capture Tool Locating and Uploading the WebVPN Capture Tool Output Files Verify Troubleshoot NetPro Discussion Forums Featured Conversations Related Information Introduction The Cisco ASA 5500 Series Adaptive Security Appliance includes a WebVPN capture tool that lets you log information about Web sites that do not display properly over a WebVPN connection. You can enable the capture tool from the Command Line Interface (CLI) of the security appliance. The data this tool records can help your Cisco customer support representative troubleshoot problems. Note: Enabling the WebVPN capture tool has an impact on the performance of the security appliance. Be sure to disable the capture tool after you have generated the output files. Prerequisites Requirements Before attempting this configuration, ensure that you meet these requirements: using the Command Line Interface (CLI) to configure the Cisco ASA 5500 Series Adaptive Security Appliance. Components Used The information in this document is based on these software and hardware versions: Cisco ASA 5500 Series Adaptive Security Appliance running version 7.0 The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Conventions For more information on document conventions, refer to the Cisco Technical Tips Conventions. Configure In this section, you are presented with the information to configure the features described in this document. Note: To find additional information on the commands used in this document, use the Command Lookup Tool ( registered customers only). WebVPN Capture Tool Output Files When the WebVPN capture tool is enabled, the capture tool stores the data from the first URL visited in the following files: original.000contains the data exchanged between the security appliance and the Web Server. mangled.000contains the data exchanged between the security appliance and the Browser. For each subsequent capture, the capture tool generates additional matching original.<nnn> and mangled.<nnn> files and increments the file extensions. In this example, the output of the dir command displays three sets of files from three URL captures: dir Directory of disk0:/ 2952 rw 10931 10:38:32 Jan 19 2005 config 6 rw 5124096 19:43:32 Jan 01 2003 cdisk.bin 3397 rw 5157 08:30:56 Feb 14 2005 ORIGINAL.000 3398 rw 6396 08:30:56 Feb 14 2005 MANGLED.000 3399 rw 4928 08:32:51 Feb 14 2005 ORIGINAL.001 3400 rw 6167 08:32:51 Feb 14 2005 MANGLED.001 3401 rw 5264 08:35:23 Feb 14 2005 ORIGINAL.002 3402 rw 6503 08:35:23 Feb 14 2005 MANGLED.002 Activating the WebVPN Capture Tool Note: The Flash File System has limitations when multiple files are opened for writing. The WebVPN capture tool can possibly cause file system corruption when multiple capture files are being updated concurrently. If this failure should occur with the capture tool, contact the Cisco Technical Assistance Center (TAC). To activate the WebVPN capture tool, use the debug menu webvpn 67 command from privileged EXEC mode: Where: debug menu webvpn 67 <cmd> <user> <url> cmd is 0 or 1. 0 disables capture. 1 enables capture. user is the username to match for data capture. url is the URL prefix to match for data capture. Use one of these URL formats: Use /http to capture all data.

Use /http/0/<server/path> to capture HTTP traffic to the server identified by <server/path>. Use /https/0/<server/path> to capture HTTPS traffic to the server identified by <server/path>. To disable capture, use the debug menu webvpn 67 0 command. In this example, the WebVPN capture tool is enabled to capture HTTP traffic for user2 visiting Web site wwwin.abcd.com/hr/people: debug menu webvpn 67 1 user2 /http/0/wwwin.abcd.com/hr/people Mangle Logging: ON Name: "user2" URL: "/http/0/wwwin.abcd.com/hr/people" In this example, the WebVPN capture tool is disabled: debug menu webvpn 67 0 Mangle Logging: OFF Name: "user2" URL: "/http/0/wwwin.abcd.com/hr/people" Locating and Uploading the WebVPN Capture Tool Output Files To locate the WebVPN capture tool output files, use the dir command. This example shows the output of the dir command, including the ORIGINAL.000 and MANGLED.000 files that were generated: dir Directory of disk0:/ 2952 rw 10931 10:38:32 Jan 19 2005 config 6 rw 5124096 19:43:32 Jan 01 2003 cdisk.bin 3397 rw 5157 08:30:56 Feb 14 2005 ORIGINAL.000 3398 rw 6396 08:30:56 Feb 14 2005 MANGLED.000 You can upload the WebVPN capture tool output files to another computer using the copy flash command. In this example, the ORIGINAL.000 and MANGLED.000 files are uploaded: copy flash:/original.000 tftp://10/86.194.191/original.000 Source filename [original.000]? Address or name of remote host [10.86.194.191]? Destination filename [original.000]?!!!!!! 21601 bytes copied in 0.370 secs copy flash:/mangled.000 tftp://10/86.194.191/mangled.000 Source filename [mangled.000]? Address or name of remote host [10.86.194.191]? Destination filename [mangled.000]?!!!!!! 23526 bytes copied in 0.380 secs Note: To avoid possibly corrupting the file system, do not allow the original.<nnn> and mangled.<nnn> files from previous captures to be overwritten. When you disable the capture tool, delete the old files to prevent corrupting the file system.

Verify There is currently no verification procedure available for this configuration. Troubleshoot There is currently no specific troubleshooting information available for this configuration. NetPro Discussion Forums Featured Conversations Networking Professionals Connection is a forum for networking professionals to share questions, suggestions, and information about networking solutions, products, and technologies. The featured links are some of the most recent conversations available in this technology. NetPro Discussion Forums Featured Conversations for Security Security: Intrusion Detection [Systems] Security: AAA Security: General Security: Firewalling Related Information Cisco ASA 5500 Series Adaptive Security Appliance Configuration Guides Technical Support & Documentation Cisco Systems All contents are Copyright 1992 2005 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Updated: Jun 21, 2005 Document ID: 65096