O'Reilly logo

Cisco Firepower Threat Defense (FTD) by Nazmul Rajib

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10Capturing Traffic for Advanced Analysis

After deploying an FTD device, if your network exhibits any connectivity issues, one of the first steps is to verify the configurations. If, however, you cannot find any configuration errors, you might want to capture live traffic and analyze it. This chapter discusses the processes of capturing traffic using the built-in FTD tools.

Traffic Capture Essentials

As you have learned, Cisco introduces a unified image on the FTD software. It converges the features of a traditional Cisco ASA firewall and next-generation Firepower services, including various advanced security technologies, such as security intelligence, network discovery, application control, file control, and a Snort-based intrusion ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required