cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
869
Views
0
Helpful
5
Replies

trace route

alirogers_
Level 1
Level 1

I have an issue with a cisco 861, I'm unable to trace route to any host beyond the router, even the next hop.

I've done a trace from a client on the network and the route itself. both timeout

1 Accepted Solution

Accepted Solutions

Thank you for the additional information. It does show why you are not able to traceroute to anything beyond the router. The operation of traceroute depends on receiving the ICMP message for TTL exceeded. But the access list that you have applied on the outside interface does not permit this message.

 

HTH

 

Rick

HTH

Rick

View solution in original post

5 Replies 5

Richard Burts
Hall of Fame
Hall of Fame

You have not given us much to work with here. Can you post the configuration of the router as a starting point. Also please post the output of show ip interface brief and the output of show arp.

 

HTH

 

Rick

HTH

Rick

alirogers_
Level 1
Level 1

 Hope this helps, the network set up is such that we are connected to an larger building network with other companies. this router is our gateway to the internet.

I have censored alot of addresses and information to protect our network.

Configuration:


access-list 1 permit 192.168.1.0 0.0.0.255
access-list 100 permit ip ### ###
access-list 100 permit ip  ### ###
access-list 100 permit ip  ### ###
access-list 100 permit ip  ### ###
access-list 100 permit ip  ### ###
access-list 100 permit ip  ### ###
access-list 100 permit ip  ### ###
access-list 100 permit ip  ### ###
access-list 100 permit gre host ### host ###
access-list 150 permit udp any any eq isakmp
access-list 150 permit ahp any any
access-list 150 permit esp any any
access-list 150 permit icmp any any echo-reply
access-list 150 permit tcp any host <Public IP> eq smtp
access-list 150 permit tcp any host <Public IP> eq domain
access-list 150 permit udp any host <Public IP> eq domain
access-list 150 permit tcp any host <Public IP> eq 443
access-list 150 permit udp any host <Public IP> eq 443
access-list 150 permit tcp any host <Public IP> eq 993
access-list 150 deny   tcp any any
access-list 150 deny   udp any any
access-list 150 deny   ip any any

 

  show ip interface

FastEthernet0 is up, line protocol is up
  Internet protocol processing disabled
FastEthernet1 is down, line protocol is down
  Internet protocol processing disabled
FastEthernet2 is up, line protocol is up
  Internet protocol processing disabled
FastEthernet3 is up, line protocol is up
  Internet protocol processing disabled
FastEthernet4 is up, line protocol is up
  Internet address is <Public IP>/26
  Broadcast address is 255.255.255.255
  Address determined by non-volatile memory
  MTU is 1500 bytes
  Helper address is not set
  Directed broadcast forwarding is disabled
  Outgoing access list is not set
  Inbound  access list is 150
  Proxy ARP is enabled
  Local Proxy ARP is disabled
  Security level is default
  Split horizon is enabled
  ICMP redirects are always sent
  ICMP unreachables are always sent
  ICMP mask replies are never sent
  IP fast switching is enabled
  IP fast switching on the same interface is disabled
  IP Flow switching is disabled
  IP CEF switching is enabled
  IP CEF switching turbo vector
  IP multicast fast switching is enabled
  IP multicast distributed fast switching is disabled
  IP route-cache flags are Fast, CEF
  Router Discovery is disabled
  IP output packet accounting is disabled
  IP access violation accounting is disabled
  TCP/IP header compression is disabled
  RTP/IP header compression is disabled
  Policy routing is disabled
  Network address translation is enabled, interface in domain outside
  BGP Policy Mapping is disabled
  Input features: Common Flow Table, Stateful Inspection, Virtual Fragment Reassembly, Access List, IPSec input classification, Virtual Fragment Reassembly After IPSec Decryption, NAT Outside, MCI Check
  Output features: Post-routing NAT Outside, Common Flow Table, Stateful Inspection, IPSec output classification, Firewall (NAT), Firewall (inspect), NAT ALG proxy, IPSec: to crypto engine, Post-encryption output features
  Outgoing inspection rule is fire-rules
Loopback0 is up, line protocol is up
  Internet address is ####/32
  Broadcast address is 255.255.255.255
  Address determined by non-volatile memory
  MTU is 1514 bytes
  Helper address is not set
  Directed broadcast forwarding is disabled
  Outgoing access list is not set
  Inbound  access list is not set
  Proxy ARP is enabled
  Local Proxy ARP is disabled
  Security level is default
  Split horizon is enabled
  ICMP redirects are always sent
  ICMP unreachables are always sent
  ICMP mask replies are never sent
  IP fast switching is enabled
  IP fast switching on the same interface is disabled
  IP Flow switching is disabled
  IP CEF switching is enabled
  IP CEF switching turbo vector
  IP Null turbo vector
  IP multicast fast switching is enabled
  IP multicast distributed fast switching is disabled
  IP route-cache flags are Fast, CEF
  Router Discovery is disabled
  IP output packet accounting is disabled
  IP access violation accounting is disabled
  TCP/IP header compression is disabled
  RTP/IP header compression is disabled
  Policy routing is disabled
  Network address translation is disabled
  BGP Policy Mapping is disabled
  Input features: MCI Check
  Output features: Firewall (NAT), Firewall (inspect)
NVI0 is up, line protocol is up
  Interface is unnumbered. Using address of FastEthernet4 (<Public IP>)
  Broadcast address is 255.255.255.255
  MTU is 1514 bytes
  Helper address is not set
  Directed broadcast forwarding is disabled
  Outgoing access list is not set
  Inbound  access list is not set
  Proxy ARP is enabled
  Local Proxy ARP is disabled
  Security level is default
  Split horizon is enabled
  ICMP redirects are always sent
  ICMP unreachables are always sent
  ICMP mask replies are never sent
  IP fast switching is disabled
  IP fast switching on the same interface is disabled
  IP Flow switching is disabled
  IP CEF switching is disabled
  IP Null turbo vector
  IP Null turbo vector
  IP multicast fast switching is enabled
  IP multicast distributed fast switching is disabled
  IP route-cache flags are Fast, CEF
  Router Discovery is disabled
  IP output packet accounting is disabled
  IP access violation accounting is disabled
  TCP/IP header compression is disabled
  RTP/IP header compression is disabled
  Policy routing is disabled
  Network address translation is disabled
  BGP Policy Mapping is disabled
  Input features: MCI Check
  Output features: Post-routing NAT NVI Output, Firewall (NAT), Firewall (inspect)
Tunnel0 is up, line protocol is up
  Internet address is ###/30
  Broadcast address is 255.255.255.255
  Address determined by non-volatile memory
  MTU is 1476 bytes
  Helper address is not set
  Directed broadcast forwarding is disabled
  Outgoing access list is not set
  Inbound  access list is not set
  Proxy ARP is enabled
  Local Proxy ARP is disabled
  Security level is default
  Split horizon is enabled
  ICMP redirects are always sent
  ICMP unreachables are always sent
  ICMP mask replies are never sent
  IP fast switching is enabled
  IP fast switching on the same interface is disabled
  IP Flow switching is disabled
  IP CEF switching is enabled
  IP CEF switching turbo vector
  IP Null turbo vector
  IP multicast fast switching is enabled
  IP multicast distributed fast switching is disabled
  IP route-cache flags are Fast, CEF
  Router Discovery is disabled
  IP output packet accounting is disabled
  IP access violation accounting is disabled
  TCP/IP header compression is disabled
  RTP/IP header compression is disabled
  Policy routing is disabled
  Network address translation is disabled
  BGP Policy Mapping is disabled
  Input features: MCI Check
  Output features: Firewall (NAT), Firewall (inspect)
Vlan1 is up, line protocol is up
  Internet address is 192.168.1.254/24
  Broadcast address is 255.255.255.255
  Address determined by non-volatile memory
  MTU is 1500 bytes
  Helper address is not set
  Directed broadcast forwarding is disabled
  Outgoing access list is not set
  Inbound  access list is not set
  Proxy ARP is enabled
  Local Proxy ARP is disabled
  Security level is default
  Split horizon is enabled
  ICMP redirects are always sent
  ICMP unreachables are always sent
  ICMP mask replies are never sent
  IP fast switching is enabled
  IP fast switching on the same interface is disabled
  IP Flow switching is disabled
  IP CEF switching is enabled
  IP CEF switching turbo vector
  IP Null turbo vector
  IP multicast fast switching is enabled
  IP multicast distributed fast switching is disabled
  IP route-cache flags are Fast, CEF
  Router Discovery is disabled
  IP output packet accounting is disabled
  IP access violation accounting is disabled
  TCP/IP header compression is disabled
  RTP/IP header compression is disabled
  Policy routing is disabled
  Network address translation is enabled, interface in domain inside
  BGP Policy Mapping is disabled
  Input features: Common Flow Table, Stateful Inspection, Virtual Fragment Reassembly, Virtual Fragment Reassembly After IPSec Decryption, MCI Check, TCP Adjust MSS
  Output features: NAT Inside, Common Flow Table, Stateful Inspection, Firewall (NAT), Firewall (inspect), TCP Adjust MSS, NAT ALG proxy
Vlan2 is down, line protocol is down
  Internet address is ###/24
  Broadcast address is 255.255.255.255
  Address determined by non-volatile memory
  MTU is 1500 bytes
  Helper address is not set
  Directed broadcast forwarding is disabled
  Outgoing access list is not set
  Inbound  access list is not set
  Proxy ARP is enabled
  Local Proxy ARP is disabled
  Security level is default
  Split horizon is enabled
  ICMP redirects are always sent
  ICMP unreachables are always sent
  ICMP mask replies are never sent
  IP fast switching is enabled
  IP fast switching on the same interface is disabled
  IP Flow switching is disabled
  IP CEF switching is enabled
  IP CEF switching turbo vector
  IP Null turbo vector
  IP multicast fast switching is enabled
  IP multicast distributed fast switching is disabled
  IP route-cache flags are Fast, CEF
  Router Discovery is disabled
  IP output packet accounting is disabled
  IP access violation accounting is disabled
  TCP/IP header compression is disabled
  RTP/IP header compression is disabled
  Policy routing is disabled
  Network address translation is enabled, interface in domain inside
  BGP Policy Mapping is disabled
  Input features: Common Flow Table, Stateful Inspection, Virtual Fragment Reassembly, Virtual Fragment Reassembly After IPSec Decryption, MCI Check
  Output features: NAT Inside, Common Flow Table, Stateful Inspection, Firewall (NAT), Firewall (inspect), NAT ALG proxy

 

show arp

Protocol  Address          Age (min)  Hardware Addr   Type   Interface
Internet  10.0.35.254             0   0030.18a8.2848  ARPA   FastEthernet4
...
Internet  192.168.1.30            0   3085.a93f.3900  ARPA   Vlan1
...
Internet  192.168.1.254           -   2c54.2ded.53c4  ARPA   Vlan1
Internet  <Next Hop IP>           196   0030.18a8.2848  ARPA   FastEthernet4
Internet  <Public IP>             -   2c54.2ded.53c8  ARPA   FastEthernet4
Internet  ####          8   0030.18a8.2848  ARPA   FastEthernet4

 

Thank you for the additional information. It does show why you are not able to traceroute to anything beyond the router. The operation of traceroute depends on receiving the ICMP message for TTL exceeded. But the access list that you have applied on the outside interface does not permit this message.

 

HTH

 

Rick

HTH

Rick

Thank you Richard, that solved it. I added:

access-list 150 permit icmp any any net-unreachable
access-list 150 permit icmp any any host-unreachable
access-list 150 permit icmp any any port-unreachable
access-list 150 permit icmp any any packet-too-big
access-list 150 permit icmp any any administratively-prohibited
access-list 150 permit icmp any any source-quench
access-list 150 permit icmp any any ttl-exceeded
access-list 150 permit icmp any any echo-reply
...
access-list 150 deny icmp any any

 

I am glad that my suggestion did lead you to a solution for the problem. Thank you for posting back to let us know that the problem is solved and what you added to the configuration. Thank you for using the rating system to mark this question as answered. This will help other readers to know that there is useful information in this thread.

 

HTH

 

Rick

HTH

Rick
Review Cisco Networking products for a $25 gift card