m (1 revision)
Revision as of 05:40, 7 June 2011
Indication: Traffic/communication issue on a specific port.
Problem: Firewall could be blocking port.
First step is to verify the port information is shown (using CLI or GUI) and that its status is correct. Information about IPTables (firewall) could be obtained through following ways:-
Cisco Unified OS Administration Show->IP Preferences
show network ipprefs show network ipprefs all show network ipprefs enabled show network ipprefs public
Next, verify the port is shown in the firewall rules. Use the CLI command “utils firewall list”. Note, if the port is not shown in the list it is being blocked. You can verify ports are being blocked by the firewall by turning on the debug mode in the firewall. Use the CLI command “utils firewall debug”. This will cause iptables to log every packet it blocks.
There are logs that detail when changes to the firewall or changes to the port information occur:
syslog/messages – iptables log
syslog/secure – will show changes to port information (such as when a port is enabled/disabled).
Note, the syslog logs are available via RTMT. Same can also be obtained via CLI, following are the commands:-
file get activelog syslog/messages file get activelog syslog/secure
Note, we throttle the log messages going into the log. So, if there are lots of packets getting blocked, we might not log all instances. Example from syslog messages log:
Aug 4 10:32:23 bldr-ccm23 kern 4 kernel: dropped packet IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:0f:20:6c:a0:c5:08:00 SRC=10.94.150.77 DST=255.255.255.255 LEN=328 TOS=0x10 PREC=0x00 TTL=16 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 Aug 4 10:32:25 bldr-ccm23 kern 4 kernel: dropped packet IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:0e:7f:b4:3f:52:08:00 SRC=10.94.150.72 DST=10.94.150.255 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=57931 PROTO=UDP SPT=137 DPT=137 LEN=58
As a last resort you can temporarily disable the firewall by using the CLI command “utils firewall disable”. Note, both the disable and debug mode of the firewall will automatically revert back after a default of 5 minutes. This time can be extended to a maximum of 24 hours.