<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, I'm seeing packet drops in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887150#M156529</link>
    <description>&lt;P&gt;Hi, I'm seeing packet drops such as this:&lt;/P&gt;
&lt;P&gt;*Jul&amp;nbsp; 4 21:49:42.780: %FMANFP-6-IPACCESSLOGP: SIP0: fman_fp_image:&amp;nbsp; list 101 denied tcp 82.165.172.29(80) -&amp;gt; 87.127.7.33(4099), 4 packets&lt;/P&gt;
&lt;P&gt;in response to a request to a website www.peartreecleaning.co.uk.&lt;/P&gt;
&lt;P&gt;the access list looks like this:&lt;/P&gt;
&lt;P&gt;access-list 101 remark Auto generated by SDM for NTP (123)&lt;BR /&gt;access-list 101 permit udp any eq ntp any eq ntp&lt;BR /&gt;access-list 101 remark PPTP VPN&lt;BR /&gt;access-list 101 permit gre any any&lt;BR /&gt;access-list 101 permit tcp any any eq 1723&lt;BR /&gt;access-list 101 permit udp host 208.67.220.220 eq domain any&lt;BR /&gt;access-list 101 permit udp host 208.67.222.222 eq domain any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.30.0 0.0.0.255 any&lt;BR /&gt;access-list 101 permit icmp any any&lt;BR /&gt;access-list 101 permit icmp any any echo&lt;BR /&gt;access-list 101 permit icmp any any echo-reply&lt;BR /&gt;access-list 101 permit icmp any any time-exceeded&lt;BR /&gt;access-list 101 permit icmp any any unreachable&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gary&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jul 2016 17:09:39 GMT</pubDate>
    <dc:creator>Gary Turner</dc:creator>
    <dc:date>2016-07-05T17:09:39Z</dc:date>
    <item>
      <title>IOS XE - Returning packets are dropped</title>
      <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887148#M156527</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm struggling with a router config where I can see in the log that the response to an outbound request is being block by the ACL on the outside&amp;nbsp; interface. The router is an ISR4321 running IOS XE 16.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The implementation is common enough:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Internal Network --&amp;gt; VLAN1/GigEthernet1 &amp;lt;-- R1 --&amp;gt; Dialer0/GigEthernet0 --&amp;gt; ADSL Modem --&amp;gt; Provider&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have NAT enabled and access-list 100 on the outside of VLAN1 and access-list 101 on the outside of the Dialer0 interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If I drop access-list 101 I can browser the web, if I add it back in only ping and DNS lookups seem to work and I can seen the response packets from a website I'm accessing being drop by the access list rule so it looks like the established sessions are not be respected.&lt;/P&gt;
&lt;P&gt;I'm sure I'm missing a single command from my config but can't find it for looking!&lt;/P&gt;
&lt;P&gt;Thanks in advance Gary&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887148#M156527</guid>
      <dc:creator>Gary Turner</dc:creator>
      <dc:date>2019-03-12T07:59:11Z</dc:date>
    </item>
    <item>
      <title>Hi Gary,</title>
      <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887149#M156528</link>
      <description>&lt;P&gt;Hi Gary,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please paste the output of access-list 101 you have applied on the out Dialer0 interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jagrati&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2016 08:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887149#M156528</guid>
      <dc:creator>jagraaga</dc:creator>
      <dc:date>2016-07-05T08:45:48Z</dc:date>
    </item>
    <item>
      <title>Hi, I'm seeing packet drops</title>
      <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887150#M156529</link>
      <description>&lt;P&gt;Hi, I'm seeing packet drops such as this:&lt;/P&gt;
&lt;P&gt;*Jul&amp;nbsp; 4 21:49:42.780: %FMANFP-6-IPACCESSLOGP: SIP0: fman_fp_image:&amp;nbsp; list 101 denied tcp 82.165.172.29(80) -&amp;gt; 87.127.7.33(4099), 4 packets&lt;/P&gt;
&lt;P&gt;in response to a request to a website www.peartreecleaning.co.uk.&lt;/P&gt;
&lt;P&gt;the access list looks like this:&lt;/P&gt;
&lt;P&gt;access-list 101 remark Auto generated by SDM for NTP (123)&lt;BR /&gt;access-list 101 permit udp any eq ntp any eq ntp&lt;BR /&gt;access-list 101 remark PPTP VPN&lt;BR /&gt;access-list 101 permit gre any any&lt;BR /&gt;access-list 101 permit tcp any any eq 1723&lt;BR /&gt;access-list 101 permit udp host 208.67.220.220 eq domain any&lt;BR /&gt;access-list 101 permit udp host 208.67.222.222 eq domain any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.30.0 0.0.0.255 any&lt;BR /&gt;access-list 101 permit icmp any any&lt;BR /&gt;access-list 101 permit icmp any any echo&lt;BR /&gt;access-list 101 permit icmp any any echo-reply&lt;BR /&gt;access-list 101 permit icmp any any time-exceeded&lt;BR /&gt;access-list 101 permit icmp any any unreachable&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gary&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2016 17:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887150#M156529</guid>
      <dc:creator>Gary Turner</dc:creator>
      <dc:date>2016-07-05T17:09:39Z</dc:date>
    </item>
    <item>
      <title>Hi Gary,</title>
      <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887151#M156530</link>
      <description>&lt;P&gt;Hi Gary,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You are using an access-list on the outside interface and you are not allowing this traffic.&lt;/P&gt;
&lt;P&gt;You need to configure and ACL on 101 to allow this traffic. Please add a term like this.&lt;/P&gt;
&lt;P&gt;#access-list 101 line 1 extended permit ip &amp;lt;source-address&amp;gt; &amp;lt;source-subnet&amp;gt; &amp;lt;destination-address&amp;gt; &amp;lt;destination-subnet&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For destination you will have to use any since you want to allow web browsing.&lt;/P&gt;
&lt;P&gt;For source use the subnet you want to allow traffic from.(use the original source subnet)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if this helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jagrati&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 10:27:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887151#M156530</guid>
      <dc:creator>jagraaga</dc:creator>
      <dc:date>2016-07-06T10:27:59Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887152#M156531</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your help but I'm not sure I follow you.&lt;/P&gt;
&lt;P&gt;This is a general internet access FW which aplies PAT/NAT to the system originating the request to an unknown destinaton I cannot define inbound rules for every connection initiated.&lt;/P&gt;
&lt;P&gt;We do not has such rules on any of the other IOS based routers we have so I'm thinking there is a different on the IOS XE config that I'm missing.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Gary&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 20:40:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887152#M156531</guid>
      <dc:creator>Gary Turner</dc:creator>
      <dc:date>2016-07-06T20:40:01Z</dc:date>
    </item>
    <item>
      <title>Hi Gary,</title>
      <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887153#M156532</link>
      <description>&lt;P&gt;Hi Gary,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The access-list 101 is applied in which direction on the interface(out or in)?&lt;/P&gt;
&lt;P&gt;It seems that the access-list is applied in 'in' direction on interface&amp;nbsp;&lt;SPAN&gt;Dialer0. There is no access-list to allow this traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To confirm the same, please configure an access-list to allow ip traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;##access-list 101 line 1 extended permit ip&amp;nbsp;any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Try this on test basis to confirm the issue.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Jagrati&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2016 09:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887153#M156532</guid>
      <dc:creator>jagraaga</dc:creator>
      <dc:date>2016-07-07T09:04:46Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887154#M156533</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;See below the Interface definition:&lt;/P&gt;
&lt;P&gt;interface Dialer0&lt;BR /&gt;&amp;nbsp;description $FW_OUTSIDE$&lt;BR /&gt;&amp;nbsp;ip address negotiated&lt;BR /&gt;&amp;nbsp;ip mtu 1452&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip access-group 101 in&lt;BR /&gt;&amp;nbsp;encapsulation ppp&lt;BR /&gt;&amp;nbsp;dialer pool 1&lt;BR /&gt;&amp;nbsp;dialer-group 1&lt;BR /&gt;&amp;nbsp;ppp authentication chap callin&lt;BR /&gt;&amp;nbsp;ppp chap hostname xxxxxx@broadband.net.uk&lt;BR /&gt;&amp;nbsp;ppp chap password 0 xxxxxxx&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;So the access-list is applied to the inbound route.&lt;/P&gt;
&lt;P&gt;I will try the rule you suggest, I expect it will work as it is allowing anything in and as such removes the FW in the same way issue no access-list 101 gets things working but having no firewall blocking random requests isn't going to work.&lt;/P&gt;
&lt;P&gt;We have other sites that do not require a global permit rule, indeed they have a a global deny, these sites work so the firwall must be keeping track of the conenctions fromt he inside and allowing a response on the the same.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Gary&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2016 12:44:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887154#M156533</guid>
      <dc:creator>Gary Turner</dc:creator>
      <dc:date>2016-07-07T12:44:38Z</dc:date>
    </item>
    <item>
      <title>Hi Gary,</title>
      <link>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887155#M156534</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Hi Gary,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;I understand you need to allow only web browsing traffic initiated from internal network to outside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Please use the below command to allow this traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;#access-list 101 permit tcp any any gt 1023 established&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;This will allow only packets for which the session has already been established and destination ports greater then 1023.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Please refer to section '&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt;"&gt;Allow Only Internal Networks to Initiate a TCP Session' for more details.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;http://www.cisco.com/c/en/us/support/docs/ip/access-lists/26448-ACLsamples.html#anc9&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;This will help you to block traffic which is initiated from outside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Jagrati&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2016 07:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-xe-returning-packets-are-dropped/m-p/2887155#M156534</guid>
      <dc:creator>jagraaga</dc:creator>
      <dc:date>2016-07-08T07:46:37Z</dc:date>
    </item>
  </channel>
</rss>

