Erasing The Packet File - Cisco 4215 - Intrusion Detection Sys Sensor Configuration Manual

Configuration guide
Hide thumbs Also See for 4215 - Intrusion Detection Sys Sensor:
Table of Contents

Advertisement

Chapter 9
Displaying and Capturing Live Traffic on an Interface
To copy packets files to an FTP or SCP server, follow these steps:
Step 1
Log in to the CLI using an account with administrator privileges.
Copy the packet-file to an FTP or SCP server:
Step 2
sensor# copy packet-file scp://jbrown@64.101.182.20/work/
Password: *********
packet-file
sensor#
View the packet file with Wireshark or TCP Dump.
Step 3

Erasing the Packet File

Use the erase packet-file command to erase the packet file.
There is only one packet file. It is 16 MB and is over-written each time you use the packet capture
command.
To erase the packet file, follow these steps:
Display information about the current captured packet file:
Step 1
sensor# packet display file-info
Captured by: cisco:1514, Cmd: packet capture GigabitEthernet0/1
Start: 2005/02/15 03:55:00 CST, End: 2005/02/15 03:55:05 CST
sensor#
Erase the packet file:
Step 2
sensor# erase packet-file
sensor#
Verify that you have erased the packet file:
Step 3
sensor# packet display file-info
No packet-file available.
sensor#
78-16527-01
ftp:[//[username@]location]//absoluteDirectory]/filename
scp:—Destination URL for the SCP network server. The syntax for this prefix is:
scp:[//[username@] location]/relativeDirectory]/filename
scp:[//[username@] location]//absoluteDirectory]/filename
When you use FTP or SCP protocol, you are prompted for a password.
Note
100% 1670
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
0.0KB/s
00:00
Erasing the Packet File
9-7

Advertisement

Table of Contents
loading

Table of Contents