Permitting ICMP on a virtual interface across an IPSec tunnel on the remote network
Hey everyone,
I have an IPSec tunnel established between an NSa 4700 and a TZ670 security appliance. The TZ670 was recently upgraded from a Gen 6 NSA appliance.
I'm encountering an issue where I can't ping a virtual interface on the LAN zone of the remote TZ670. All other functions and features, including management, are working as expected.
I've created a rule to permit ICMP traffic from SRC Zone: VPN to DST Zone: V:199 on all interface IPs, but the hit counter never increases. Below is the drop code ingress on X1*(i):
ICMP Packet Header ICMP Type = 8(ECHO_REQUEST), ICMP Code = 0, ICMP Checksum = 19779 Value:[1] DROPPED, Drop Code: 742(Packet dropped - Policy drop), Module Id: 27(policy), (Ref.Id: _2793_qpmjdzDifdl) 2:2
Has anyone else run into this?
Thanks for your time!
Best Answer
-
TKWITS Community Legend ✭✭✭✭✭
Did you enable 'enable management traffic' on the rule? or the same in the VPN tunnel config?
0
Answers
I was almost 100% certain I did but apparently I clicked on the "Allow Fragmented Packets" check box. That was it! Thanks a million!