
32-7
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 32 Monitoring and Troubleshooting
Troubleshooting the Security Appliance
Figure 32-2 Ping Failure at Security Appliance Interface
If the ping reaches the security appliance, and the security appliance responds, you see debug messages
like the following:
ICMP echo reply (len 32 id 1 seq 256) 209.165.201.1 > 209.165.201.2
ICMP echo request (len 32 id 1 seq 512) 209.165.201.2 > 209.165.201.1
If the ping reply does not return to the router, then you might have a switch loop or redundant IP
addresses (see Figure 32-3).
Figure 32-3 Ping Failure Because of IP Addressing Problems
Step 3
Ping each security appliance interface from a remote host. For transparent mode, ping the management
IP address.
This test checks that the directly connected router can route the packet between the host and the security
appliance, and that the security appliance can correctly route the packet back to the host.
A ping might fail if the security appliance does not have a route back to the host through the intermediate
router (see Figure 32-4). In this case, the debug messages show that the ping was successful, but you see
system message 110001 indicating a routing failure.
Figure 32-4 Ping Failure Because the Security Appliance has no Route
Pinging Through the Security Appliance
After you successfully ping the security appliance interfaces, you should make sure traffic can pass
successfully through the security appliance. For routed mode, this test shows that NAT is working
correctly, if configured. For transparent mode, which does not use NAT, this test confirms that the
security appliance is operating correctly; if the ping fails in transparent mode, contact Cisco TAC.
To ping between hosts on different interfaces, perform the following steps:
Ping
Security
Appliance
Router
126695
192.168.1.1192.168.1.2
192.168.1.2
Ping
Router
Security
Appliance
Host
126696
Ping
Router
Host
?
Security
Appliance
126693
Komentarze do niniejszej Instrukcji