Hi All,
what would set the D flag (deny) in show datapath session table?
Let me explain a bit more.
I have 2 devices connected to switches using User Based Tunneling. Both tunnels terminate on the same Aruba Controller. Both devices are in the same network/vlan.
#show user-table | include 10.10.110.10.1.15 00:e0:4c:68:00:27 00e04c680027 DRW_AOSW_DUR_VoIP_Phones-3124-10 00:01:24 Tunneled-User-MAC 10.0.99.11 Tunneled tunnel 282/10:4f:58:de:68:4b/1/48 default-tunneled-user tunnel TUNNELED USER10.10.1.14 80:5e:c0:8c:4b:fe 805ec08c4bfe DRW_AOSW_DUR_VoIP_Phones-3124-10 00:01:24 Tunneled-User-MAC 10.0.99.10 Tunneled tunnel 98/10:4f:58:de:59:4a/1/48 default-tunneled-user tunnel TUNNELED USERBoth devices have the same role. The role does not block intravlan traffic.
netservice svc-dhcp udp list 67,68 ALG dhcp!netservice svc-icmp 1!ip access-list session DRW-VOIP-QOSuser any any permit tos 46!ip access-list session DRW-DHCPuser any svc-icmp permit logany any svc-dhcp permit log!ip access-list session DRW-VoIP-Isolationuser network 10.10.1.0 255.255.255.0 any deny log!ip access-list session DRW-AllowAlluser any any permit log!user-role cppmrolevlan DRW-VoIPPhonesreauthentication-interval 1440access-list session DRW-VOIP-QOSaccess-list session DRW-DHCPaccess-list session DRW-AllowAllI copied the Clearpass Downloadable User Role for readability but I checked the show rights output for the role which is the same.
I removed the client isolation in the role, added log to all the acl's
Pimg from 10.10.1.15 (Windows Client) to 10.10.1.14 (VoIP Phone) is not getting through. Ping to Gateway is working, so is ping to a IP address of the controller in the same vlan.
Ping from the controller to both 10.10.1.14 and 10.10.1.15 is not working. I can make a call from the VoIP Phone to another which is not in the same network and I can make a call from a phone in another network to this phone.
Source IP or MAC Destination IP Prot SPort DPort Cntr Prio ToS Age Destination TAge Packets Bytes Flags CPU ID----------------- --------------- ---- ----- ----- -------- ---- --- --- ----------- ---- ---------- ---------- --------------- -------192.168.10.3 10.10.1.15 17 53 53762 0/0 0 46 1 tunnel 282 6 0 0 FYTIA 1410.10.1.1 10.10.1.15 1 2209 0 0/0 0 46 0 tunnel 282 0 1 60 FTI 1410.10.1.15 10.10.1.1 1 2194 2048 0/0 0 46 1 tunnel 282 d 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2200 2048 0/0 0 46 1 tunnel 282 7 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2195 2048 0/0 0 46 1 tunnel 282 c 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2201 2048 0/0 0 46 1 tunnel 282 7 1 60 FTCI 14192.168.10.55 10.10.1.15 1 1043 2048 0/0 0 0 0 pc0 0 0 0 FDYCA 1110.10.1.15 10.10.1.1 1 2192 2048 0/0 0 46 1 tunnel 282 10 1 60 FTCI 1410.10.1.15 192.168.10.30 17 53762 53 0/0 0 46 1 tunnel 282 6 6 414 FTCIA 1410.10.1.15 10.10.1.1 1 2203 2048 0/0 0 46 1 tunnel 282 6 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2193 2048 0/0 0 46 1 tunnel 282 f 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2190 2048 0/0 0 46 1 tunnel 282 11 1 60 FTCI 1410.10.1.1 10.10.1.15 1 2210 0 0/0 0 46 0 tunnel 282 0 1 60 FTI 1410.10.1.15 10.10.1.1 1 2199 2048 0/0 0 46 1 tunnel 282 a 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2205 2048 0/0 0 46 1 tunnel 282 4 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2198 2048 0/0 0 46 1 tunnel 282 b 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2204 2048 0/0 0 46 1 tunnel 282 5 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2207 2048 0/0 0 46 1 tunnel 282 3 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2206 2048 0/0 0 46 1 tunnel 282 4 1 60 FTCI 1410.10.1.15 10.10.1.1 1 2196 2048 0/0 0 46 1 tunnel 282 d 1 60 FTCI 1410.10.1.1 10.10.1.15 1 2207 0 0/0 0 46 1 tunnel 282 3 1 60 FTI 1410.10.1.1 10.10.1.15 1 2206 0 0/0 0 46 1 tunnel 282 4 1 60 FTI 1410.10.1.1 10.10.1.15 1 2196 0 0/0 0 46 1 tunnel 282 d 1 60 FTI 1410.10.1.1 10.10.1.15 1 2199 0 0/0 0 46 1 tunnel 282 b 1 60 FTI 1410.10.1.1 10.10.1.15 1 2205 0 0/0 0 46 1 tunnel 282 5 1 60 FTI 1410.10.1.1 10.10.1.15 1 2198 0 0/0 0 46 1 tunnel 282 c 1 60 FTI 1410.10.1.1 10.10.1.15 1 2204 0 0/0 0 46 1 tunnel 282 6 1 60 FTI 1410.10.1.1 10.10.1.15 1 2192 0 0/0 0 46 1 tunnel 282 11 1 60 FTI 1410.10.1.15 10.10.1.1 1 2211 2048 0/0 0 46 0 tunnel 282 0 1 60 FTCI 1410.10.1.1 10.10.1.15 1 2203 0 0/0 0 46 1 tunnel 282 8 1 60 FTI 1410.10.1.15 10.10.1.1 1 2210 2048 0/0 0 46 1 tunnel 282 2 1 60 FTCI 1410.10.1.1 10.10.1.15 1 2193 0 0/0 0 46 1 tunnel 282 11 1 60 FTI 1410.10.1.1 10.10.1.15 1 2194 0 0/0 0 46 1 tunnel 282 10 1 60 FTI 1410.10.1.15 10.10.1.1 1 2209 2048 0/0 0 46 1 tunnel 282 3 1 60 FTCI 1410.10.1.1 10.10.1.15 1 2200 0 0/0 0 46 1 tunnel 282 a 1 60 FTI 1410.10.1.1 10.10.1.15 1 2195 0 0/0 0 46 1 tunnel 282 f 1 60 FTI 1410.10.1.1 10.10.1.15 1 2201 0 0/0 0 46 1 tunnel 282 9 1 60 FTI 14192.168.10.30 10.10.1.15 17 53 53762 0/0 0 46 0 tunnel 282 8 0 0 FYTI 1410.10.1.15 192.168.10.3 17 53762 53 0/0 0 46 0 tunnel 282 9 6 414 FTCIA 1410.10.1.15 10.10.1.14 1 2208 2048 0/0 0 46 0 tunnel 282 3 0 0 FDYTCA 1410.10.1.15 10.10.1.14 1 2202 2048 0/0 0 46 0 tunnel 282 8 0 0 FDYTCA 14Notice the D flag in the last 2 lines. What would set this deny? Firewall Deny Inter user traffic is unchecked.
All of this is for troubleshooting because all tests show that I can't send traffic from a device outside the controller to any device tunneled to the controller.
thanks,
------------------------------
Erik Eckhardt
------------------------------