Should I expect ICMP transit traffic to show up when using debug ip packet with a mask on a Cisco IOS router?
- by David Bullock
So I am trying to trace an ICMP conversation between 192.168.100.230/32 an EZVPN interface (Virtual-Access 3) and 192.168.100.20 on BVI4.
# sh ip access-lists 199
10 permit icmp 192.168.100.0 0.0.0.255 host 192.168.100.20
20 permit icmp host 192.168.100.20 192.168.100.0 0.0.0.255
# sh debug
Generic IP:
IP packet debugging is on for access list 199
# sh ip route | incl 192.168.100
192.168.100.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.100.0/24 is directly connected, BVI4
S 192.168.100.230/32 [1/0] via x.x.x.x, Virtual-Access3
# sh log | inc Buff
Buffer logging: level debugging, 2145 messages logged, xml disabled,
Log Buffer (16384 bytes):
OK, so from my EZVPN client with IP address 192.168.100.230, I ping 192.168.100.20. I know the packet reaches the router across the VPN tunnel, because:
policy exists on zp vpn-to-in
Zone-pair: vpn-to-in
Service-policy inspect : acl-based-policy
Class-map: desired-traffic (match-all)
Match: access-group name my-acl
Inspect
Number of Half-open Sessions = 1
Half-open Sessions
Session 84DB9D60 (192.168.100.230:8)=>(192.168.100.20:0) icmp SIS_OPENING
Created 00:00:05, Last heard 00:00:00
ECHO request
Bytes sent (initiator:responder) [64:0]
Class-map: class-default (match-any)
Match: any
Drop
176 packets, 12961 bytes
But I get no debug log, and the debugging ACL hasn't matched:
# sh log | inc IP:
#
# sh ip access-lists 198
Extended IP access list 198
10 permit icmp 192.168.100.0 0.0.0.255 host 192.168.100.20
20 permit icmp host 192.168.100.20 192.168.100.0 0.0.0.255
Am I going crazy, or should I not expect to see this debug log?
Thanks!