![]() ![]() ![]() This device working as a VPN GW so 99% of the connections going through an L2L VPN. It should not be a problem as far as I know ASA does not support this feature, but it just makes disfiguring on the graphs. The only difference was that the configuraion example below suggest to set Active Timout to zero but I couldn't manage it, so I have used one (1). I tried wireshark and I can see the UDP packets on the target machine, then I tried Netflow tester ( ) and seems data has been arrived to the application layer as well. It works well with sensors configured using SNMP (SNMP Cisco ASA VPN users etc.) but I have configured ASA to export Netflow and it looks like something is wrong.ĪSA only support Netflow V9 so, I used this sensor template. I am using a Cisco ASA 5510 and PRTG to monitor it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |