• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 105
  • Last Modified:

Cisco Firewall Tracert not working

When i try and tracert from my network, I am only getting a result on the first and last hop.
tracertI have enabled ICMP and ICMP error on the Cisco ASA 5520 firewall but this has not fixed the issue.
asdm screen
How can i enable this to see all hops ?
0
jamiegf
Asked:
jamiegf
  • 3
  • 2
  • 2
1 Solution
 
Harper McDonaldCommented:
ASA Config

//create an ACL that permits the incoming ICMP

access-list outside_access_in remark ICMP type 11 for Windows Traceroute
access-list outside_access_in extended permit icmp any any time-exceeded
access-list outside_access_in remark ICMP type 3 for Cisco and Linux
access-list outside_access_in extended permit icmp any any unreachable

//bind the ACL to the outside interface

access-group outside_access_in in interface outside
0
 
Harper McDonaldCommented:
0
 
jamiegfAuthor Commented:
I only need to tracert out.
Do you know how to do this in the asdm at all?
0
Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

 
Pete LongTechnical ConsultantCommented:
you need to add decrement ttl to the default inspection map

Cisco ASA 5500 Allowing Tracert
0
 
jamiegfAuthor Commented:
I do not seem to have the following command availalble:

 set connection decrement-ttl
Capture.JPG
0
 
Pete LongTechnical ConsultantCommented:
do you have a default service policy and class?

i.e. on the bottom of your running config do you have something like this...............

policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  inspect icmp
  inspect ipsec-pass-thru
  inspect ip-options
  inspect pptp
 class class-default
  set connection decrement-ttl
!
service-policy global_policy global

Open in new window

0
 
jamiegfAuthor Commented:
Thanks.
This fixed issue.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

  • 3
  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now