Guest

Preview Tool

Cisco Bug: CSCvs56304 - RADIUS Authentication packets cause Segmentation Fault in Ethanalyzer when capturing on mgmt int

Last Modified

Jun 10, 2020

Products (1)

  • Cisco Firepower 9300 Series

Known Affected Releases

2.6(1.169)

Description (partial)

Symptom:
# ethanalyzer local interface mgmt capture-filter 'host 10.122.149.95'

Capturing on 'eth0'
/tmp/abc-script.VLL65g: line 2: 27992 Segmentation fault      (core dumped) /isan/bin/tshark -t ad -l -i eth0 -o tcp.check_checksum:false -f 'host 10.122.149.95' -w /tmp/etherfilter -P -c 10
Program exited with status 0.

Conditions:
RADIUS & TACACS Authentication configured on FCM.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.