10-08-2015 08:09 AM - edited 03-11-2019 11:43 PM
Hi ,
When you ping from asa packet tracer it does say the connection fails but it doesn't if you do it actually , why ?
for isntance I can ping 8.8.8.8 from outside interface ip but when i do the packet tracer command it says it will fail.
does the packet tracer actually generate a traffic which can be captured?
many thanks
Solved! Go to Solution.
10-13-2015 08:42 AM
The acl and NAT that you configure do not apply to traffic initiated from ASA. ASA uses the configured route to send the traffic.
Packet- tracer utility is used to evaluate through the box traffic (traffic initiated from devices behind ASA) accross your configuration, to check how traffic would be evaluated.
Hope it answers your question.
Thanks,
R.Seth
10-08-2015 08:16 AM
You can use packet tracer to test configuration for transit traffic and not for from the box traffic. From the box traffic is not evaluated accross your configuration ( acl and NAT).
As far as capture for packet tracer output, I think it should be seen incaptures.
Thanks,
R.Seth
10-08-2015 08:43 AM
thanks for this but asa reports it will be blocked as implicit deny. if not evaluted against it why say it will be denied.
10-08-2015 08:54 AM
Can you share details about the packet tracer you are running.
Thanks,
R.Seth
10-08-2015 08:59 AM
packet-tracer input outside icmp 100.0.0.1 8 0 8.8.8.8
I enter the above command on the asa and replace the 100.0.0.1 with my real outside interface ip address.
This says the packet will be dropped
I then issue ping outside 8.8.8.8 and it works.
I am using the packet tracer functionality of asa not a packet tracer software ( the simulator)
10-08-2015 09:06 AM
So what you are try will be interpreted by ASA as a packet trying to enter ASA with source ip 100.1.1.1 and destination 8.8.8.8.
ASA will consider this as a scenario where traffic has to be routed back via same interface. This is blocked by default. Hence you see a implicit deny.
I would say this is not the right way to check traffic initiated by ASA using packet-tracer.
Hope it answers your query.
Thanks,
R.Seth
10-13-2015 08:00 AM
sure , how would you then check what policy is applied to the traffic generated by the asa ?
if the outside address of the interface is 100.1.1.1 and I am trying to ping 8.8.8.8 my feeling is below is what I need to use
packet-tracer input outside icmp 100.1.1.1 8 0 8.8.8.8
this returns a result showing packet will get denied but it doesn't if you do "ping outside 8.8.8.8"
10-13-2015 08:42 AM
The acl and NAT that you configure do not apply to traffic initiated from ASA. ASA uses the configured route to send the traffic.
Packet- tracer utility is used to evaluate through the box traffic (traffic initiated from devices behind ASA) accross your configuration, to check how traffic would be evaluated.
Hope it answers your question.
Thanks,
R.Seth
10-13-2015 09:11 AM
Cool so do you know of any ways asa traffic generated by asa can be checked? Or there is nothing
10-13-2015 09:27 AM
You can show conn all output to see traffic initiated from ASA.
Also you can try capture on ASA to see traffic generated by ASA.
Hope it helps!!!
Thanks,
R.Seth
Mark answer as correct if it helps in answering your query. :)
10-13-2015 09:42 AM
Many thanks !!!!!
:D
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide