02-23-2023
07:33 AM
- last edited on
04-27-2023
09:39 PM
by
Translator
ISR4451
PPPoE Connection vi VI2.1 10.130.1.67
ping to 10.130.1.67
doesn't work
I don't quite understand what I traced here, but it seems to be a trace of source
10.0.0.250 to 10.130.1.67 icmp
All packets to
10.130.1.67
seem to get dropped.
Why is that?
#show platform packet-trace sum
Pkt Input Output State Reason
0 Gi0/0/1 EV14 DROP 109 (EssUnsupPktType)
1 Gi0/0/1 EV14 DROP 109 (EssUnsupPktType)
...
#show platform packet-trace packet 2
Packet: 2 CBUG ID: 90
Summary
Input : GigabitEthernet0/0/1
Output : EVSI14
State : DROP 109 (EssUnsupPktType)
Timestamp
Start : 3890590644379626 ns (02/23/2023 15:20:28.325542 UTC)
Stop : 3890590644395506 ns (02/23/2023 15:20:28.325558 UTC)
Path Trace
Feature: IPV4(Input)
Input : GigabitEthernet0/0/1
Output : <unknown>
Source : 10.0.0.250
Destination : 10.130.1.67
Protocol : 1 (ICMP)
Feature: DEBUG_COND_INPUT_PKT
Entry : Input - 0x11460100
Input : GigabitEthernet0/0/1
Output : <unknown>
Lapsed time : 2040 ns
Feature: IPV4_INPUT_DST_LOOKUP_CONSUME
Entry : Input - 0x1145fe74
Input : GigabitEthernet0/0/1
Output : <unknown>
Lapsed time : 3220 ns
Feature: IPV4_INPUT_FOR_US_MARTIAN
Entry : Input - 0x1145fe20
Input : GigabitEthernet0/0/1
Output : <unknown>
Lapsed time : 2200 ns
Feature: IPV4_INPUT_VFR
Entry : Input - 0x1145fd3c
Input : GigabitEthernet0/0/1
Output : <unknown>
Lapsed time : 4260 ns
Feature: IPV4_INPUT_LOOKUP_PROCESS
Entry : Input - 0x1145fdd8
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 14860 ns
Feature: IPV4_INPUT_IPOPTIONS_PROCESS
Entry : Input - 0x1145fe04
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 1800 ns
Feature: IPV4_INPUT_GOTO_OUTPUT_FEATURE
Entry : Input - 0x1145fe14
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 10620 ns
Feature: CBUG_OUTPUT_FIA
Entry : Output - 0x11460284
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 1840 ns
Feature: MC_OUTPUT_GEN_RECYCLE
Entry : Output - 0x1146029c
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 2620 ns
Feature: IPV4_OUTPUT_THREAT_DEFENSE
Entry : Output - 0x1145fb00
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 3740 ns
Feature: IPV4_VFR_REFRAG
Entry : Output - 0x11460290
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 1200 ns
Feature: IPV4_OUTPUT_L2_REWRITE
Entry : Output - 0x1145fb64
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 13740 ns
Feature: IPV4_OUTPUT_LTERM_PREPARE_ESS
Entry : Output - 0x1145fb58
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 7440 ns
Feature: ESS_APPLY_ENCAP
Entry : Output - 0x1145ffec
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 4100 ns
Feature: ESF_DOWNSTREAM_IDLE_TIMEOUT
Entry : Output - 0x11460088
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 9940 ns
Feature: IPV4_OUTPUT_FRAG
Entry : Output - 0x1145fb9c
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 1020 ns
Feature: IPV4_TUNNEL_OUTPUT_FNF_FINAL
Entry : Output - 0x1145fab8
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 2480 ns
Feature: OUTPUT_DROP
Entry : Output - 0x1145f484
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 1480 ns
Feature: ESS_EXIT_SWITCHING
Entry : Output - 0x11460240
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 113380 ns
Solved! Go to Solution.
04-17-2023
06:30 AM
- last edited on
04-27-2023
09:51 PM
by
Translator
Just to wrap up:
It was
appxk9 license
missing.
Solved in other topic.
02-23-2023
03:28 PM
- last edited on
04-27-2023
09:41 PM
by
Translator
Perhaps you would post the config of the router (disguising any sensitive information such as Public IP). It would also be helpful to see the output of these commands
show ip interface brief
show ip route
show arp
02-23-2023
11:34 PM
- last edited on
04-27-2023
09:41 PM
by
Translator
#show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0/0 x.x.x.x YES NVRAM up up
GigabitEthernet0/0/1 10.0.137.5 YES NVRAM up up
GigabitEthernet0/0/2 192.168.2.5 YES NVRAM up up
GigabitEthernet0/0/3 192.168.3.5 YES NVRAM up up
GigabitEthernet0 10.0.0.11 YES NVRAM down down
Loopback1 10.130.0.3 YES NVRAM up up
Loopback2 x.x.x.x YES manual up up
Virtual-Access1 unassigned YES unset down down
Virtual-Access2 unassigned YES unset up up
Virtual-Access2.1 10.130.0.3 YES unset up up
Virtual-Access3 unassigned YES unset down down
Virtual-Template1 10.130.0.3 YES unset down down
!GE0/0/1 is the destination of the ping and the source of the ping reply
!VI2.1 is where the ping is coming from and where the reply should be going
!Virtual-Template1 is the template vor VI2.1
!There is an L2TP Tunnel over which vi2.1 is dialling in on GE0/0/0
#show ip route connected
Gateway of last resort is x.x.x.x to network 0.0.0.0
10.0.0.0/8 is variably subnetted, 2845 subnets, 6 masks
C 10.0.137.0/24 is directly connected, GigabitEthernet0/0/1
L 10.0.137.5/32 is directly connected, GigabitEthernet0/0/1
C 10.130.0.3/32 is directly connected, Loopback1
C 10.130.1.67/32 is directly connected, Virtual-Access2.1
x.0.0.0/8 is variably subnetted, 4 subnets, 2 masks
C x.x.x.x/30 is directly connected, GigabitEthernet0/0/0
L x.x.x.x/32 is directly connected, GigabitEthernet0/0/0
C x.x.x.x/30 is directly connected, Loopback2
L x.x.x.x/32 is directly connected, Loopback2
192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.2.4/30 is directly connected, GigabitEthernet0/0/2
L 192.168.2.5/32 is directly connected, GigabitEthernet0/0/2
192.168.3.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.3.4/30 is directly connected, GigabitEthernet0/0/3
L 192.168.3.5/32 is directly connected, GigabitEthernet0/0/3
!Interface vi2.1 address is assigne via Radius and the routing displayed is correct
#show ip route static
Gateway of last resort is x.x.x.x to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via x.x.x.x
10.0.0.0/8 is variably subnetted, 2845 subnets, 6 masks
S 10.0.0.0/9 [1/0] via 10.0.137.1
S 172.16.0.0/15 [1/0] via 10.0.137.1
S 172.28.0.0/14 [1/0] via 10.0.137.1
#show arp
Protocol Address Age (min) Hardware Addr Type Interface
Internet 10.0.137.1 0 000d.b95a.5c79 ARPA GigabitEthernet0/0/1
Internet 10.0.137.2 0 000d.b95a.5ef1 ARPA GigabitEthernet0/0/1
Internet 10.0.137.5 - 5c71.0d6d.3221 ARPA GigabitEthernet0/0/1
Internet 10.0.137.8 1 244b.feb8.d970 ARPA GigabitEthernet0/0/1
Internet 10.0.137.55 29 0090.e89b.cfdd ARPA GigabitEthernet0/0/1
Internet 10.0.137.56 23 0090.e89b.cfde ARPA GigabitEthernet0/0/1
Internet x.x.x.x 117 08ec.f560.966b ARPA GigabitEthernet0/0/0
Internet x.x.x.x - 5c71.0d6d.3220 ARPA GigabitEthernet0/0/0
Internet 192.168.2.5 - 5c71.0d6d.3222 ARPA GigabitEthernet0/0/2
Internet 192.168.2.6 102 244b.feb8.d96f ARPA GigabitEthernet0/0/2
Internet 192.168.3.5 - 5c71.0d6d.3223 ARPA GigabitEthernet0/0/3
# show ip interface vi2.1
Virtual-Access2.1 is up, line protocol is up
Interface is unnumbered. Using address of Loopback1 (10.130.0.3)
Broadcast address is 255.255.255.255
Peer address is 10.130.1.67
MTU is 1300 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing Common access list is not set
Outgoing access list is 130
Inbound Common access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP Flow switching is disabled
IP CEF switching is enabled
IP CEF switching turbo vector
IP Null turbo vector
Associated unicast routing topologies:
Topology "base", operation state is UP
IP multicast fast switching is enabled
IP multicast distributed fast switching is disabled
IP route-cache flags are Fast, CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Probe proxy name replies are disabled
Policy routing is disabled
Network address translation is disabled
BGP Policy Mapping is disabled
Input features: Virtual Fragment Reassembly, iEdge, MCI Check
Output features: iEdge
IPv4 WCCP Redirect outbound is disabled
IPv4 WCCP Redirect inbound is disabled
IPv4 WCCP Redirect exclude is disabled
!even though this is using Access-list 130 outgoing that doesn't get any hits, not even if I use a catchall
!I snipped away irrelevant bigs of the config
#show run
Building configuration...
!snip
version 16.9
service timestamps debug datetime localtime year
service timestamps log datetime localtime year
service password-encryption
service call-home
platform qfp utilization monitor load 80
no platform punt-keepalive disable-kernel-core
!
hostname sxxxx
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-intf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
logging count
logging buffered 32768
no logging console
enable secret 5 xxxxxxxxxxxxxxxxxxx
!
aaa new-model
!
!
aaa group server radius VPDN
server name xxx
server name xxx
server name xxx
!
aaa authentication login default local
aaa authentication ppp default group radius
aaa authorization exec default local none
aaa authorization commands 15 default if-authenticated
aaa authorization network VPDN group radius
aaa accounting send stop-record authentication failure
aaa accounting delay-start
aaa accounting update periodic 5
aaa accounting network default start-stop group radius
!
!
!
!
!
!
aaa session-id common
clock timezone UTC 1 0
clock summer-time CETS recurring last Sun Mar 2:00 last Sun Oct 2:00
call-home
!snip
!
no ip domain lookup
ip domain name alec.de
!
!
!
login on-success log
!
!
!
!
!
!
!
subscriber templating
multilink bundle-name authenticated
vpdn enable
vpdn multihop
vpdn logging
vpdn logging user
vpdn logging tunnel-drop
no vpdn history failure cause normal
vpdn history failure table-size 50
!
vpdn-group 1
accept-dialin
protocol l2tp
virtual-template 1
terminate-from hostname xxxxxx
dsl-line-info-forwarding
source-ip x.x.x.x
lcp renegotiation always
l2tp tunnel password 7 xxxxxxxxxxxx
!
!
!
!
crypto pki trustpoint TP-self-signed-xxxxxxx
!snip
!
license udi pid ISR4451-X/K9 sn xxxxxxxxxxxx
license boot level securityk9 disable
no license smart enable
diagnostic bootup level minimal
!
spanning-tree extend system-id
archive
!snip
!
!
!
!
redundancy
mode none
!
!
!
no cdp run
!
!
!
!
!
interface Loopback1
ip address 10.130.0.3 255.255.255.255
ip nat outside
!
interface Loopback2
ip address x.x.x.x 255.255.255.252
!
interface GigabitEthernet0/0/0
ip address x.x.x.x 255.255.255.252
negotiation auto
!
interface GigabitEthernet0/0/1
ip address 10.0.137.5 255.255.255.0
ip nat inside
negotiation auto
!
interface GigabitEthernet0/0/2
ip address 192.168.2.5 255.255.255.252
ip nat outside
negotiation auto
!
interface GigabitEthernet0/0/3
ip address 192.168.3.5 255.255.255.252
negotiation auto
!
interface GigabitEthernet0
vrf forwarding Mgmt-intf
ip address 10.0.0.11 255.255.255.0
negotiation auto
!
interface Virtual-Template1
mtu 1300
ip unnumbered Loopback1
no logging event link-status
peer match aaa-pools
no peer default ip address
ppp mtu adaptive
ppp authentication pap callin
ppp authorization VPDN
ip virtual-reassembly
!
router bgp 65145
!snip
!
no ip forward-protocol nd
no ip http server
ip http authentication local
no ip http secure-server
ip tftp source-interface GigabitEthernet0/0/1
ip nat inside source list NAT interface Loopback1 overload
ip nat inside source list RADIUSLOKAL interface GigabitEthernet0/0/2 overload
ip route 0.0.0.0 0.0.0.0 x.x.x.x
ip route 10.0.0.0 255.128.0.0 10.0.137.1
ip route 172.16.0.0 255.254.0.0 10.0.137.1
ip route 172.28.0.0 255.252.0.0 10.0.137.1
!
ip ssh version 2
ip scp server enable
!
!
ip access-list extended xxx
!snip
logging history size 500
logging trap errors
logging host 10.0.0.155
!snip
ip access-list extended 129
!snip
ip access-list extended 130
!snip
ip access-list extended 131
!snip
ip access-list extended 132
!snip
ip access-list extended 133
!snip
ip access-list extended 199
!snip
!
!
radius-server retry method reorder
!snip
!
!
control-plane
!
!
line con 0
exec-timeout 5 0
logging synchronous
transport input none
stopbits 1
line aux 0
stopbits 1
line vty 0 4
location Dortmund
access-class 1 in
exec-timeout 30 0
password 7 xxxxxxxxxxxxx
logging synchronous
history size 256
transport input ssh
escape-character 3
!
!
monitor session 1 type erspan-source
!snip
!
!
ntp server 192.53.103.104
ntp server 192.53.103.108
!
!
!
!
!
end
02-24-2023
08:30 AM
- last edited on
04-27-2023
09:42 PM
by
Translator
I have suggestion and I think it is solution here
only add
encapsulation ppp under virtual-template
02-26-2023
11:29 PM
- last edited on
04-27-2023
09:46 PM
by
Translator
Thanks, but it doesn't work.
I can enter
encapsuation ppp in the Virtual-Template 1
But it doesn't show up, not in running conf nor in run conf all.
I've disconnected vi2.1 and reconnected- no difference.
#show run | s Virt
interface Virtual-Template1
mtu 1300
ip unnumbered Loopback1
no logging event link-status
peer match aaa-pools
no peer default ip address
ppp mtu adaptive
ppp authentication pap callin
ppp authorization VPDN
ip virtual-reassembly
02-27-2023 05:23 PM
CSCvm51483 : Bug Search Tool (cisco.com)
can you make AAA push encapsulation type ppp
02-27-2023
11:26 PM
- last edited on
04-27-2023
09:47 PM
by
Translator
I'll be trying that, but somehow I believe it might not be the fault of vi2.1.
When I look at the debug list in the first post, I see this:
Feature: IPV4_INPUT_VFR
Entry : Input - 0x1145fd3c
Input : GigabitEthernet0/0/1
Output : <unknown>
Lapsed time : 4260 ns
Feature: IPV4_INPUT_LOOKUP_PROCESS
Entry : Input - 0x1145fdd8
Input : GigabitEthernet0/0/1
Output : EVSI14
Lapsed time : 14860 ns
So the packet arrives from ge0/0/1 and decies at one point output should be EVSI14.
I don't even know what EVSI14 means, but I thought it out to be VI2.1.
02-28-2023
12:35 AM
- last edited on
04-27-2023
09:49 PM
by
Translator
Added PPP - didn't work.
Probably because vi2.1 doesn't get used as output.
What is EVSI14 to where the output goes?
Feb 28 2023 09:30:54: RADIUS: Acct-Session-Id [44] 10 "0000109C"
Feb 28 2023 09:30:54: RADIUS: Tunnel-Type [64] 6 00:L2TP [3]
Feb 28 2023 09:30:54: RADIUS: Tunnel-Medium-Type [65] 6 00:IPv4 [1]
Feb 28 2023 09:30:54: RADIUS: Tunnel-Server-Endpoi[67] 15 "x.x.x.x"
Feb 28 2023 09:30:54: RADIUS: Tunnel-Client-Endpoi[66] 15 "x.x.x.x"
Feb 28 2023 09:30:54: RADIUS: Tunnel-Assignment-Id[82] 3 "1"
Feb 28 2023 09:30:54: RADIUS: Tunnel-Client-Auth-I[90] 17 "xxxxxxxx"
Feb 28 2023 09:30:54: RADIUS: Tunnel-Server-Auth-I[91] 17 "xxxxxxxx"
Feb 28 2023 09:30:54: RADIUS: Acct-Tunnel-Connecti[68] 8 "103218"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 41
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 35 "actual-data-rate-upstream=5824000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 44
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 38 "actual-data-rate-downstream=29176000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 41
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 35 "minimum-data-rate-upstream=768000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 44
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 38 "minimum-data-rate-downstream=1152000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 46
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 40 "attainable-data-rate-upstream=17017000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 48
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 42 "attainable-data-rate-downstream=41271000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 42
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 36 "maximum-data-rate-upstream=5824000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 45
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 39 "maximum-data-rate-downstream=29184000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 50
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 44 "minimum-data-rate-upstream-low-power=32000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 52
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 46 "minimum-data-rate-downstream-low-power=32000"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 46
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 40 "maximum-interleaving-delay-upstream=12"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 48
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 42 "maximum-interleaving-delay-downstream=12"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 18
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 12 "dsl-type=5"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 37
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 31 "access-loop-encapsulation=120"
Feb 28 2023 09:30:54: RADIUS: Framed-Protocol [7] 6 PPP [1]
Feb 28 2023 09:30:54: RADIUS: Framed-IP-Address [8] 6 10.130.1.67
Feb 28 2023 09:30:54: RADIUS: User-Name [1] 22 "xxx@yyyy"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 35
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 29 "connect-progress=LAN Ses Up"
Feb 28 2023 09:30:54: RADIUS: Acct-Authentic [45] 6 RADIUS [1]
Feb 28 2023 09:30:54: RADIUS: Acct-Status-Type [40] 6 Start [1]
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 52
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 46 "circuit-id-tag=x.x.x.x/0.0.0.0 eth 1/21"
Feb 28 2023 09:30:54: RADIUS: Vendor, Cisco [26] 36
Feb 28 2023 09:30:54: RADIUS: Cisco AVpair [1] 30 "remote-id-tag=xxxx.xx.xxxx"
Feb 28 2023 09:30:54: RADIUS: Connect-Info [77] 18 "28301000/5649000"
Feb 28 2023 09:30:54: RADIUS: NAS-Port-Type [61] 6 ISDN [2]
Feb 28 2023 09:30:54: RADIUS: NAS-Port [5] 6 20046
Feb 28 2023 09:30:54: RADIUS: NAS-Port-Id [87] 16 "Uniq-Sess-ID46"
Feb 28 2023 09:30:54: RADIUS: Service-Type [6] 6 Framed [2]
Feb 28 2023 09:30:54: RADIUS: NAS-IP-Address [4] 6 10.0.137.5
Feb 28 2023 09:30:54: RADIUS: Acct-Delay-Time [41] 6
04-17-2023
06:30 AM
- last edited on
04-27-2023
09:51 PM
by
Translator
Just to wrap up:
It was
appxk9 license
missing.
Solved in other topic.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide