DevilWAH wrote: » ahh never mind I sundly though if I updated the in comming acess list to include a permit statment for ICMP with a LOG command. Now I get a log of the incomming packets and I can see they are recived by the router? now all i need to do is work out where they are going, and why it dose not see them on the control plane? fire wall has the default of allow self to any, and I know this use to work? wonder if there is another access list some where in the fire wall blocking it
000874: Sep 13 12:40:43.451 UTC: pak 64A7D804 consumed in enqueue feature , packet consumed, CCE Firewall(2), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE.
Planet-Router#ping 172.16.12.6 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.16.12.6, timeout is 2 seconds: 000784: Sep 13 12:40:35.448 UTC: IP: s=172.16.12.254 (local), d=172.16.12.6 (FastEthernet0/0.922), len 100, sending 000785: Sep 13 12:40:35.448 UTC: IP: s=172.16.12.254 (local), d=172.16.12.6 (FastEthernet0/0.922), len 100, output feature, NAT Inside(7), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000786: Sep 13 12:40:35.448 UTC: IP: s=172.16.12.254 (local), d=172.16.12.6 (FastEthernet0/0.922), len 100, output feature, Stateful Inspection(20), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000787: Sep 13 12:40:35.448 UTC: IP: s=172.16.12.254 (local), d=172.16.12.6 (FastEthernet0/0.922), len 100, output feature, CCE Post NAT Classification(30), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000788: Sep 13 12:40:35.448 UTC: IP: s=172.16.12.254 (local), d=172.16.12.6 (FastEthernet0/0.922), len 100, output feature, Firewall (firewall component)(31), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000789: Sep 13 12:40:35.448 UTC: IP: s=172.16.12.254 (local), d=172.16.12.6 (FastEthernet0/0.922), len 100, sending full packet 000790: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254, len 100, input feature, Stateful Inspection(4), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000791: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254, len 100, input feature, Virtual Fragment Reassembly(21), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000792: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254, len 100, input feature, Access List(26), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000793: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254, len 100, input feature, Virtual Fragment Reassembly After IPSec Decryption(32), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000794: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254, len 100, input feature, MCI Check(64), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000795: Sep 13 12:40:35.452 UTC: IP: tableid=0, s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254 (FastEthernet0/0.922), routed via RIB 000796: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254 (FastEthernet0/0.922), len 100, output feature, NAT Inside(7), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000797: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254 (FastEthernet0/0.922), len 100, output feature, Stateful Inspection(20), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000798: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254 (FastEthernet0/0.922), len 100, rcvd 3 000799: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254, len 100, stop process pak for forus packet 000800: Sep 13 12:40:35.452 UTC: IP: s=172.16.12.6 (FastEthernet0/0.922), d=172.16.12.254, len 100, enqueue feature, CCE post NAT(1), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE 000801: Sep 13 12:40:35.452 UTC: pak 64A7D05C consumed in enqueue feature , packet consumed, CCE Firewall(2), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE. Success rate is 0 percent (0/5)
Although the router offers a default-allow policy between all zones and the self zone, if a policy is configured from any zone to the self zone, and no policy is configured from self to the router’s user-configurable interface-connected zones, all router-originated traffic encounters the connected-zone to self-zone policy on its return the router and is blocked. Thus, router-originated traffic must be inspected to allow its return to the self zone.
Permit any any protocol easy-vpn