11-06-2013 09:47 AM - edited 03-11-2019 08:01 PM
hi all,
i've enabled traceroute on my ASA 5505 and behind is another router.
the problem is the two device's traceroute aren't the same. i want a similar output on the ASA.
is this normal or was there something i've missed?
1841#trace www.google.com
Translating "www.google.com"...domain server (8.8.8.8) [OK]
Type escape sequence to abort.
Tracing the route to www.google.com (173.194.117.50)
1 172.16.1.1 4 msec * 0 msec <<< ASA GW
2 www.google.com (173.194.117.50) 0 msec 0 msec 4 msec
3 www.google.com (173.194.117.50) 8 msec 8 msec 12 msec
4 www.google.com (173.194.117.50) 16 msec 12 msec 12 msec
5 www.google.com (173.194.117.50) 16 msec 16 msec 16 msec
6 www.google.com (173.194.117.50) 12 msec 12 msec 20 msec
7 www.google.com (173.194.117.50) 16 msec 12 msec 52 msec
8 www.google.com (173.194.117.50) [MPLS: Label 16040 Exp 0] 12 msec 12 msec 12 msec
9 www.google.com (173.194.117.50) 12 msec 12 msec 12 msec
10 www.google.com (173.194.117.50) 12 msec 12 msec 12 msec
11 www.google.com (173.194.117.50) 12 msec 12 msec 12 msec
12 www.google.com (173.194.117.50) 16 msec 12 msec 12 msec
13 www.google.com (173.194.117.50) 16 msec 12 msec 8 msec
ASA5505# trace www.google.com
Type escape sequence to abort.
Tracing the route to 173.194.117.49
1 192.168.1.1 0 msec 0 msec 0 msec <<< ANOTHER ROUTER CONNECTED TO CABLE MODEM
2 cm1.delta104.maxonline.com.sg (59.x.x.1) 10 msec 10 msec 20 msec
3 172.20.43.1 10 msec 10 msec 10 msec
4 172.26.43.1 10 msec 30 msec 20 msec
5 172.20.7.106 20 msec 10 msec 10 msec
6 203.117.36.89 10 msec 10 msec 10 msec
7 203.117.36.25 30 msec 10 msec 10 msec
8 203.117.36.18 20 msec 10 msec 10 msec
9 72.14.196.189 20 msec 10 msec 10 msec
10 66.249.95.122 10 msec 10 msec 20 msec
11 209.85.244.115 10 msec 10 msec 10 msec
12 www.google.com (173.194.117.49) 20 msec 10 msec 20 msec
ASA5505# sh run policy-map
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
class class-default
set connection decrement-ttl
!
ASA5505# sh run access-list
access-list OUTSIDE-IN extended permit icmp any 172.16.0.0 255.255.0.0 echo
access-list OUTSIDE-IN extended permit tcp any 172.16.0.0 255.255.0.0 eq ssh
access-list OUTSIDE-IN extended permit icmp any any time-exceeded
access-list OUTSIDE-IN extended permit icmp any any unreachable
Solved! Go to Solution.
11-06-2013 09:54 AM
Hi,
Could you start by trying to add the following and see if it helps
policy-map global_policy
class inspection_default
inspect icmp error
This to my understanding is meant for the ICMP related messages that the devices in between your actual trace/icmp target send.
- Jouni
11-06-2013 09:54 AM
Hi,
Could you start by trying to add the following and see if it helps
policy-map global_policy
class inspection_default
inspect icmp error
This to my understanding is meant for the ICMP related messages that the devices in between your actual trace/icmp target send.
- Jouni
11-06-2013 09:59 AM
jouni,
you're a genius! thanks a lot!
1841#trace www.google.com
Translating "www.google.com"...domain server (8.8.8.8) [OK]
Type escape sequence to abort.
Tracing the route to www.google.com (173.194.117.51)
1 172.16.1.1 4 msec * 0 msec
2 192.168.1.1 0 msec 0 msec 0 msec
3 cm1.delta104.maxonline.com.sg (59.x.x.1) 12 msec 56 msec 12 msec
4 172.20.43.1 8 msec 12 msec 12 msec
5 172.26.43.1 16 msec 16 msec 16 msec
6 172.20.7.114 16 msec 12 msec 12 msec
7 203.117.36.89 12 msec 12 msec 16 msec
8 203.117.36.21 [MPLS: Label 16183 Exp 0] 12 msec 12 msec 12 msec
9 203.117.37.22 12 msec 12 msec 12 msec
10 72.14.220.142 28 msec 20 msec 16 msec
11 209.85.243.156 16 msec 16 msec 16 msec
12 209.85.244.115 16 msec 16 msec 16 msec
13 www.google.com (173.194.117.51) 16 msec 16 msec 16 msec
11-06-2013 10:05 AM
Hi,
Glad to hear its working now.
I see that you originally used the configuration that decrements the TTL which essentially enabled the ASA to show in the traceroute.
If you want to check a better explanation of the "inspect icmp error" configuration then you can check here in the Command Reference. The information is contained in the "Usage Guidelines" section there.
http://www.cisco.com/en/US/docs/security/asa/command-reference/i2.html#wp1760544
Also this is an old document that handles this subject
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml
There is section for both getting the firewall to show up in the traceroute and also make the traceroute work through the firewall
- Jouni
11-06-2013 10:42 AM
Yes, I was trying out that command but it gave me a different output as I described earlier.
Thanks for the links! Will go over these. I had too much ASA for the day but it was a fun learning experience!
So is it safe to say I could remove these:
class class-default
set connection decrement-ttl
!
access-list OUTSIDE-IN extended permit icmp any any time-exceeded
access-list OUTSIDE-IN extended permit icmp any any unreachable
Or they're needed for making traceroute work?
Sent from Cisco Technical Support iPhone App
11-06-2013 10:50 AM
Hi,
I think you need those still.
To my understanding the "inspect icmp error" helps with the traceroute that is done from a host that uses Dynamic PAT translation towards the Internet.
You should still need those ACL rules.
- Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide