<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New interface not passing traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3714469#M12064</link>
    <description>&lt;P&gt;I have a set of 5545's Running multi context. I have added the interface to the correct context. I have created the inside interface and have an IP on it which is able to ping systems on the inside. I have created access-list for the new interface and have tied it to the interface though the access-group command. For some reason the packet is still getting dropped. I am trying to pass icmp to 10.41.10.10 (docker) from 10.6.1.56 (campus). The Packet tracer says denied but I am not sure&amp;nbsp;what I am missing. Can any one see in the below trace output why it is being dropped other than the "configured rule". Question What configured rule?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;# packet-tracer input docker icmp 10.41.10.10 1 1 1 10.6.1.56 detial&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 via 10.41.0.17, campus&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7ffefee30e60, priority=500, domain=permit, deny=true&lt;BR /&gt; hits=1523, user_data=0x8, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt; input_ifc=docker, output_ifc=any&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: docker&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: campus&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;##########&lt;/P&gt;
&lt;P&gt;I found this in the log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;6|Sep 27 2018 15:04:48|302020: Built inbound ICMP connection for faddr 10.6.1.56/1 gaddr 10.41.10.10/0 laddr 10.41.10.10/0&lt;BR /&gt;3|Sep 27 2018 15:04:48|201008: Disallowing new connections.&lt;BR /&gt;6|Sep 27 2018 15:04:50|302021: Teardown ICMP connection for faddr 10.6.1.56/1 gaddr 10.41.10.10/0 laddr 10.41.10.10/0&lt;BR /&gt;6|Sep 27 2018 15:04:53|302020: Built inbound ICMP connection for faddr 10.6.1.56/1 gaddr 10.41.10.10/0 laddr 10.41.10.10/0&lt;BR /&gt;3|Sep 27 2018 15:04:53|201008: Disallowing new connections.&lt;BR /&gt;6|Sep 27 2018 15:04:55|302021: Teardown ICMP connection for faddr 10.6.1.56/1 gaddr 10.41.10.10/0 laddr 10.41.10.10/0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:17:27 GMT</pubDate>
    <dc:creator>Brian.bsi</dc:creator>
    <dc:date>2020-02-21T16:17:27Z</dc:date>
    <item>
      <title>New interface not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3714469#M12064</link>
      <description>&lt;P&gt;I have a set of 5545's Running multi context. I have added the interface to the correct context. I have created the inside interface and have an IP on it which is able to ping systems on the inside. I have created access-list for the new interface and have tied it to the interface though the access-group command. For some reason the packet is still getting dropped. I am trying to pass icmp to 10.41.10.10 (docker) from 10.6.1.56 (campus). The Packet tracer says denied but I am not sure&amp;nbsp;what I am missing. Can any one see in the below trace output why it is being dropped other than the "configured rule". Question What configured rule?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;# packet-tracer input docker icmp 10.41.10.10 1 1 1 10.6.1.56 detial&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 via 10.41.0.17, campus&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7ffefee30e60, priority=500, domain=permit, deny=true&lt;BR /&gt; hits=1523, user_data=0x8, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt; input_ifc=docker, output_ifc=any&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: docker&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: campus&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;##########&lt;/P&gt;
&lt;P&gt;I found this in the log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;6|Sep 27 2018 15:04:48|302020: Built inbound ICMP connection for faddr 10.6.1.56/1 gaddr 10.41.10.10/0 laddr 10.41.10.10/0&lt;BR /&gt;3|Sep 27 2018 15:04:48|201008: Disallowing new connections.&lt;BR /&gt;6|Sep 27 2018 15:04:50|302021: Teardown ICMP connection for faddr 10.6.1.56/1 gaddr 10.41.10.10/0 laddr 10.41.10.10/0&lt;BR /&gt;6|Sep 27 2018 15:04:53|302020: Built inbound ICMP connection for faddr 10.6.1.56/1 gaddr 10.41.10.10/0 laddr 10.41.10.10/0&lt;BR /&gt;3|Sep 27 2018 15:04:53|201008: Disallowing new connections.&lt;BR /&gt;6|Sep 27 2018 15:04:55|302021: Teardown ICMP connection for faddr 10.6.1.56/1 gaddr 10.41.10.10/0 laddr 10.41.10.10/0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3714469#M12064</guid>
      <dc:creator>Brian.bsi</dc:creator>
      <dc:date>2020-02-21T16:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: New interface not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3714619#M12065</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;the traffic is being implicit dropped meaning it hitting the default deny any any of an access list&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check your acl config&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 21:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3714619#M12065</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2018-09-27T21:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: New interface not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3715310#M12066</link>
      <description>&lt;P&gt;You would need to post your running configuration as the output of the capture doesn't really tell us what is dropping it.&amp;nbsp; The implicit rule drop can be an incorrect ACL configuration, or it could be a missing configuration such as same-security-traffic command, or something else for that matter.&lt;/P&gt;
&lt;P&gt;Please post you full running config, remove any usernames, passwords and public IPs.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 21:02:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3715310#M12066</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-09-28T21:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: New interface not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3715371#M12067</link>
      <description>&lt;P&gt;hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;You would need to post your running configuration as the output of the capture doesn't really tell us what is dropping it.&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Can you elaborate on why you say the packet capture isn’t reporting anything ? - &amp;nbsp;looking at the OP post of that capture in my view it does show traffic is being dropped due the default implicit rule of an&amp;nbsp;aacl&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 23:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3715371#M12067</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2018-09-28T23:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: New interface not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3715439#M12068</link>
      <description>&lt;P&gt;I am not saying that it is not the actual ACL which is dropping the traffic, what I am saying is that it doesn't have to be an incorrect ACL.&amp;nbsp; So long it is a rule that is for transit traffic that is dropping due to a misconfigured og missing rule the traffic it will be identified as an acl-drop.&amp;nbsp; For example,&amp;nbsp; Lets say you have two interfaces with security-level 100 but you do NOT have same-security-traffic permit inter-interface configured.&amp;nbsp; The output of the packet tracer would be the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Ethernet0&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.11.11.10 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.1.20.10 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA# show run same-security-traffic &lt;BR /&gt;ASA#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA# packet-tracer input inside icmp 10.11.11.1 8 0 192.1.20.2 &lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Sat, 29 Sep 2018 07:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3715439#M12068</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-09-29T07:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: New interface not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3741437#M12069</link>
      <description>&lt;P&gt;I figured this out with Tac. It was a tcp syslog issue/bug. It was not allowing new connections with the tcp syslog server not answering all the time. I had to remove all syslog settings from the whole firewall and reboot to fix the issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 16:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-interface-not-passing-traffic/m-p/3741437#M12069</guid>
      <dc:creator>Brian.bsi</dc:creator>
      <dc:date>2018-11-07T16:55:08Z</dc:date>
    </item>
  </channel>
</rss>

