Ahriakin wrote: » Do a capture on the ASA itself for type asp-drop (you may be able to refine it with a specific type with a little digging but you can always use 'all', sorry long day so you'll need to do any refining on your own ). You can then download and import the output into wireshark. ASP-DROP allows you to capture anything the ASA is dropping, whereas an ACL capture will only show you what is passing through.
interface FastEthernet0/0/0 description Outside ip address 3.3.3.1 255.255.255.252 ip access-group BOGON_IN in ip access-group BOGON_OUT out duplex full speed 100 no cdp enable ip access-list extended BOGON_IN deny ip host 2.2.2.2 any log-input BAD_GUY deny ip 1.1.1.0 0.0.0.255 1.1.1.0 0.0.0.255 log-input LAND_ATTACK deny ip 0.0.0.0 0.255.255.255 any log deny ip 1.0.0.0 0.255.255.255 any log deny ip 0.0.0.0 1.255.255.255 any log deny ip 2.0.0.0 0.255.255.255 any log deny ip 5.0.0.0 0.255.255.255 any log deny ip 10.0.0.0 0.255.255.255 any log deny ip 14.0.0.0 0.255.255.255 any log deny ip 23.0.0.0 0.255.255.255 any log deny ip 27.0.0.0 0.255.255.255 any log deny ip 31.0.0.0 0.255.255.255 any log deny ip 36.0.0.0 1.255.255.255 any log deny ip 39.0.0.0 0.255.255.255 any log deny ip 42.0.0.0 0.255.255.255 any log deny ip 46.0.0.0 0.255.255.255 any log deny ip 49.0.0.0 0.255.255.255 any log deny ip 50.0.0.0 0.255.255.255 any log deny ip 100.0.0.0 3.255.255.255 any log deny ip 104.0.0.0 3.255.255.255 any log deny ip 109.0.0.0 0.255.255.255 any log deny ip 127.0.0.0 0.255.255.255 any log deny ip 169.254.0.0 0.0.255.255 any log deny ip 172.16.0.0 0.15.255.255 any log deny ip 175.0.0.0 0.255.255.255 any log deny ip 176.0.0.0 7.255.255.255 any log deny ip 185.0.0.0 0.255.255.255 any log deny ip 192.0.2.0 0.0.0.255 any log deny ip 192.168.0.0 0.0.255.255 any log deny ip 198.18.0.0 0.1.255.255 any log deny ip 223.0.0.0 0.255.255.255 any log deny ip 224.0.0.0 31.255.255.255 any log permit ip any any
vlan access-map MONITOR_LAND_ATTACK 10 match ip address LAND_ATTACK action forward capture vlan access-map MONITOR_LAND_ATTACK 20 match ip address ALL_TRAFFIC action forward vlan filter MONITOR_LAND_ATTACK vlan-list 1-999 ip access-list extended ALL_TRAFFIC permit ip any any ip access-list extended LAND_ATTACK permit ip 1.1.1.0 0.0.0.255 1.1.1.0 0.0.0.255 log-input permit udp 1.1.1.0 0.0.0.255 1.1.1.0 0.0.0.255 log-input permit tcp 1.1.1.0 0.0.0.255 1.1.1.0 0.0.0.255 log-input