09-21-2021 10:47 AM
When I setup control plane policing to restric access to router I cannot ping local interfaces
Configuration below
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq 443 access-list 100 permit icmp 192.168.1.0 0.0.0.255 host 192.168.1.1 echo access-list 100 permit icmp 192.168.1.0 0.0.0.255 host 192.168.1.1 echo-reply access-list 100 permit icmp 192.168.1.0 0.0.0.255 host 192.168.1.1 port-unreachable access-list 100 permit icmp 192.168.1.0 0.0.0.255 host 192.168.1.1 unreachable access-list 101 permit tcp any any access-list 101 permit udp any any access-list 101 permit icmp any any access-list 101 permit ip any any class-map match-all local-cmap match access-group 100 exit class-map match-all catch-all-ip-cmap match access-group 101 exit policy-map copp-pmap class local-cmap police 100000 20000 20000 conform-action transmit exceed-action drop exit exit class catch-all-ip-cmap police 8000 1500 1500 conform-action drop exceed-action drop exit exit class class-default police 8000 1500 1500 conform-action transmit exceed-action transmit exit exit exit control-plane service-policy input copp-pmap exit
I notice that if I add following entry to access list
access-list 100 permit icmp host 192.168.1.1 192.168.1.0 0.0.0.255 echo
then ping works
I used Datapath Packet Trace feature to debug and I found out where packet is dropped but I do not know how to fix it
I have C1111-4P with software version 16.12.03
I would be glad for any help
Packet Trace result
sh platform packet-trace summary
Pkt   Input                     Output                    State  Reason
0     Gi0/1/0                   Vl1                       CONS   Packet Consumed
1     Vl1                       internal0/0/recycle:0     DROP   20  (QosPolicing)
2     Gi0/1/0                   Vl1                       CONS   Packet Consumed
3     Vl1                       internal0/0/recycle:0     DROP   20  (QosPolicing)
4     Gi0/1/0                   Vl1                       CONS   Packet Consumed
5     Vl1                       internal0/0/recycle:0     DROP   20  (QosPolicing)
6     Gi0/1/0                   Vl1                       CONS   Packet Consumed
7     Vl1                       internal0/0/recycle:0     DROP   20  (QosPolicing)
sh platform packet-trace packet 0
Packet: 0           CBUG ID: 0
Summary
  Input     : GigabitEthernet0/1/0
  Output    : Vlan1
  State     : CONS Packet Consumed
  Timestamp
    Start   : 321963541880 ns (09/19/2021 17:01:08.805101 UTC)
    Stop    : 321963621360 ns (09/19/2021 17:01:08.805181 UTC)
Path Trace
  Feature: IPV4(Input)
    Input       : GigabitEthernet0/1/0
    Output      : <unknown>
    Source      : 192.168.1.2
    Destination : 192.168.1.1
    Protocol    : 1 (ICMP)
  Feature: DEBUG_COND_INPUT_PKT
    Entry       : Input - 0x10e707b8
    Input       : GigabitEthernet0/1/0
    Output      : <unknown>
    Lapsed time : 213 ns
  Feature: L2_ES_INPUT_CONTROL_CHECK
    Entry       : Input - 0x10e8b904
    Input       : GigabitEthernet0/1/0
    Output      : <unknown>
    Lapsed time : 280 ns
  Feature: L2_INPUT_SVI_LOOKUP
    Entry       : Input - 0x10e8b90c
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 1240 ns
  Feature: IPV4_INPUT_DST_LOOKUP_ISSUE
    Entry       : Input - 0x10e8aa54
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 293 ns
  Feature: IPV4_INPUT_ARL_SANITY
    Entry       : Input - 0x10e72188
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 626 ns
  Feature: CBUG_INPUT_FIA
    Entry       : Input - 0x10e707a0
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 53 ns
  Feature: DEBUG_COND_INPUT_PKT
    Entry       : Input - 0x10e707b8
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 93 ns
  Feature: IPV4_INPUT_DST_LOOKUP_CONSUME
    Entry       : Input - 0x10e8aa50
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 280 ns
  Feature: IPV4_INPUT_FOR_US_MARTIAN
    Entry       : Input - 0x10e8aa5c
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 4573 ns
  Feature: DEBUG_COND_APPLICATION_IN
    Entry       : Input - 0x10e707ac
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 133 ns
  Feature: DEBUG_COND_APPLICATION_IN_CLR_TXT
    Entry       : Input - 0x10e707a8
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 80 ns
  Feature: ICMPV4(Input)
    Input       : Vlan1
    Output      : <unknown>
    Type        : 8 (Echo)
    Code        : 0 (No Code)
  Feature: STILE_LEGACY_DROP
    Entry       : Input - 0x10fde82c
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 480 ns
  Feature: INGRESS_MMA_LOOKUP_DROP
    Entry       : Input - 0x10fda0e4
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 480 ns
  Feature: INPUT_DROP_FNF_AOR
    Entry       : Input - 0x10e888dc
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 426 ns
  Feature: INPUT_FNF_DROP
    Entry       : Input - 0x10e74e68
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 680 ns
  Feature: INPUT_DROP_FNF_AOR_RELEASE
    Entry       : Input - 0x10e888d8
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 440 ns
  Feature: INPUT_DROP
    Entry       : Input - 0x10e6e62c
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 93 ns
  Feature: IPV4_INPUT_LOOKUP_PROCESS
    Entry       : Input - 0x10e8aa68
    Input       : Vlan1
    Output      : <unknown>
    Lapsed time : 11653 ns
sh platform packet-trace packet 1
Packet: 1           CBUG ID: 1
Summary
  Input     : Vlan1
  Output    : internal0/0/recycle:0
  State     : DROP 20  (QosPolicing)
  Timestamp
    Start   : 321963765720 ns (09/19/2021 17:01:08.805325 UTC)
    Stop    : 321963805360 ns (09/19/2021 17:01:08.805365 UTC)
Path Trace
  Feature: IPV4(Output)
    Input       : Vlan1
    Output      : internal0/0/recycle:0
    Source      : 192.168.1.1
    Destination : 192.168.1.2
    Protocol    : 1 (ICMP)
  Feature: DEBUG_COND_MAC_EGRESS_EXT
    Entry       : Output - 0x10e707c0
    Input       : Vlan1
    Output      : internal0/0/recycle:0
    Lapsed time : 306 ns
  Feature: DEBUG_COND_APPLICATION_OUT_CLR_TXT_EXT
    Entry       : Output - 0x10e707b0
    Input       : Vlan1
    Output      : internal0/0/recycle:0
    Lapsed time : 13 ns
  Feature: DEBUG_COND_APPLICATION_OUT_EXT
    Entry       : Output - 0x10e707b4
    Input       : Vlan1
    Output      : internal0/0/recycle:0
    Lapsed time : 80 ns
  Feature: IPV4_INTERNAL_ARL_SANITY_EXT
    Entry       : Output - 0x10e72190
    Input       : Vlan1
    Output      : internal0/0/recycle:0
    Lapsed time : 413 ns
  Feature: IPV4_VFR_REFRAG_EXT
    Entry       : Output - 0x10e8b000
    Input       : Vlan1
    Output      : internal0/0/recycle:0
    Lapsed time : 200 ns
  Feature: QOS
    Direction        : Egress
    Action           : DROP PKT
    Drop Cause       : POLICE DROP
    Policy name      : copp-pmap
    Class name       : catch-all-ip-cmap
  Feature: IPV4_OUTPUT_QOS_EXT
    Entry       : Output - 0x10e8cb0c
    Input       : Vlan1
    Output      : internal0/0/recycle:0
    Lapsed time : 10840 ns#e6e62c
					
				
			
			
				
			
			
				
			
			
			
			
			
			
		09-21-2021 02:40 PM
Hello,
are you asking a question, or is this an observation (as you have provided the solution yourself) ?
--> access-list 100 permit icmp host 192.168.1.1 192.168.1.0 0.0.0.255 echo
This line is necessary for the ping to work...
09-22-2021 03:43 AM
Hi Georg
I'm also curious why this isn't working.
I suppose 192.168.1.1 is the local router, and 192.168.1.2 is something outside that is generating the ping. Maybe burkot can verify that this is the case.
The service-policy is applied in input direction on control-plane, so I can't see the need for that extra access-list entry. An explanation may be needed for us to understand that.
/Mikael
09-22-2021 11:53 AM
Router has 192.168.1.1 address
I have second router with policy on control plane without this extra line and ping works
I do not know why I need to add this extra line. Maybe my router is broken
Why is it not enough
access-list 100 permit icmp 192.168.1.0 0.0.0.255 host 192.168.1.1 echo
access-list 100 permit icmp 192.168.1.0 0.0.0.255 host 192.168.1.1 echo-reply
09-22-2021 01:18 PM
Hello,
--> access-list 100 permit icmp 192.168.1.0 0.0.0.255 host 192.168.1.1 echo
With this line, you would only be able to ping 192.168.1.1, does this work then ?
--> access-list 100 permit icmp host 192.168.1.1 192.168.1.0 0.0.0.255 echo
With this line, you would be able to ping any interface in the 192.168.1.0/24 range...
09-23-2021 04:33 AM - edited 09-23-2021 04:36 AM
--> access-list 100 permit icmp 192.168.1.0 0.0.0.255 host 192.168.1.1 echo
With this line, you would only be able to ping 192.168.1.1, does this work then ?
I cannot ping 192.168.1.1
When I change it to
--> access-list 100 permit icmp host 192.168.1.1 192.168.1.0 0.0.0.255 echo
then it does
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide