How to do tcpdump packet capture on the management interface and upload it using tac upload service?
6086
Created On 03/07/23 00:14 AM - Last Modified 04/09/25 20:42 PM
Objective
To capture the packets on management interface using tcpdump and upload it using the tac upload service.
Environment
- Palo Alto Firewalls
- Supported PAN-OS
- Tcpdump
Procedure
- The tcpdump command by default is utilizes the management interface and there is no need to specify the interface. Here is the example.:
admin@PA-VM-Primary(active)> tcpdump filter "host updates.paloaltonetworks.com and not port 22"
Press Ctrl-C to stop capturing
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
Example2:
admin@PA-VM-Primary(active)> tcpdump snaplen 0
Press Ctrl-C to stop capturing
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
^C102 packets captured
102 packets received by filter
0 packets dropped by kernel
- To export the log to any server, one can use scp
scp export log-file management-plane to username@host:path
- scp can also be used to upload the file to TAC upload server.
scp export mgmt-pcap from mgmt.pcap to case number@tacupload.paloaltonetworks.com:./
- Your username is your case number.
- Your password is the email address associated with your case.
- To view the PCAP on the CLI run the view-pcap command.
admin@PA-VM-Primary(active)> view-pcap mgmt-pcap mgmt.pcap