Chapter 10Capturing Traffic for Advanced Analysis

After deploying an FTD device, if your network exhibits any connectivity issues, one of the first steps is to verify the configurations. If, however, you cannot find any configuration errors, you might want to capture live traffic and analyze it. This chapter discusses the processes of capturing traffic using the built-in FTD tools.

Traffic Capture Essentials

As you have learned, Cisco introduces a unified image on the FTD software. It converges the features of a traditional Cisco ASA firewall and next-generation Firepower services, including various advanced security technologies, such as security intelligence, network discovery, application control, file control, and a Snort-based intrusion ...

Get Cisco Firepower Threat Defense (FTD) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.