{"version":"1.0","provider_name":"Netexpertise","provider_url":"http:\/\/www.netexpertise.eu\/fr","author_name":"dave","author_url":"http:\/\/www.netexpertise.eu\/fr\/author\/dave","title":"Netexpertise - Analyser et monitorer le trafic sur PIX\/ASA","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qmL5gto7ld\"><a href=\"http:\/\/www.netexpertise.eu\/fr\/reseau\/cisco\/analyse-trafic-pix-asa.html\">Analyser et monitorer le trafic sur PIX\/ASA<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/www.netexpertise.eu\/fr\/reseau\/cisco\/analyse-trafic-pix-asa.html\/embed#?secret=qmL5gto7ld\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Analyser et monitorer le trafic sur PIX\/ASA\u00a0\u00bb &#8212; Netexpertise\" data-secret=\"qmL5gto7ld\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";var e=!1,o=!1;if(l.querySelector)if(d.addEventListener)e=!0;if(d.wp=d.wp||{},!d.wp.receiveEmbedMessage)if(d.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var r,a,i,s=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),c=0;c<n.length;c++)n[c].style.display=\"none\";for(c=0;c<s.length;c++)if(r=s[c],e.source===r.contentWindow){if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(i=parseInt(t.value,10)))i=1e3;else if(~~i<200)i=200;r.height=i}if(\"link\"===t.message)if(a=l.createElement(\"a\"),i=l.createElement(\"a\"),a.href=r.getAttribute(\"src\"),i.href=t.value,o.test(i.protocol))if(i.host===a.host)if(l.activeElement===r)d.top.location.href=t.value}}},e)d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",t,!1),d.addEventListener(\"load\",t,!1);function t(){if(!o){o=!0;for(var e,t,r,a=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),i=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),s=l.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<s.length;n++){if(!(r=(t=s[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(a||i)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"Comment analyser le trafic traversant votre firewall Cisco PIX ou ASA lorsque les temps de r\u00e9ponse deviennent extr\u00eamement lents, la bande passante est satur\u00e9e ou anormalement \u00e9lev\u00e9e, ou que les d\u00e9bits de t\u00e9l\u00e9chargement sont proches de 0?\u00a0 Statistiques des access lists Vous avez probablement mis en place des access lists pour restreindre le trafic sortant [&hellip;]"}