Select this option if you want to capture
identified packets. Select single-packet to
capture one packet when a threat is detected, or select the extended-capture option
to capture from 1 to 50 packets (default is 5 packets). Extended-capture
provides more context to the threat when analyzing the threat logs.
To view the packet capture, select and
locate the log entry you are interested in and then click the green down
arrow in the second column. To define the number of packets that
should be captured, select and
then edit the Content-ID Settings. If the action for a given
threat is allow, the firewall does not trigger a Threat log and
does not capture packets. If the action is alert, you can set the
packet capture to single-packet or extended-capture. All blocking
actions (drop, block, and reset actions) capture a single packet.
The content package on the device determines the default action.
Enable extended-capture for critical, high,
and medium severity events and single-packet capture for low severity
events. Use the default extended-capture value of 5 packets, which
provides enough information to analyze the threat in most cases. (Too
much packet capture traffic may result in dropping packet captures.)
Don’t enable packet capture for informational events because it’s
not very useful compared to capturing information about higher severity
events and creates a relatively high volume of low-value traffic. Apply
extended packet capture using the same logic you use to decide what
traffic to log—take extended captures of the traffic you log, including
traffic you block.
|