Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Don't Fragmented packet over 1372 byte

I have tunnel ipsec in 2 site but don't passet packet over 1372 byte someone can help me to solve the problem

Thaks

for example with a 1400 byte ping from this error

C:\Users\Administrator>ping 192.168.0.249 -l 1400

Pinging 192.168.0.249 with 1400 bytes of data:
Reply from 10.1.128.36: Packet needs to be fragmented but DF set.
Reply from 10.1.128.36: Packet needs to be fragmented but DF set.
Reply from 10.1.128.36: Packet needs to be fragmented but DF set.
Reply from 10.1.128.36: Packet needs to be fragmented but DF set.

Ping statistics for 192.168.0.249:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

C:\Users\Administrator>



This thread was automatically locked due to age.
Parents
  • I have tunnel ipsec in 2 site but don't passet packet over 1372

    Since when have you started observing this issue? it was working earlier and stopped working ? Please share the current firmware version running on Sophos XG firewall.

    Site-to-site IPSec VPN is between two Sophos XG?

    Please login to SSH of Sophos XG go to option 4  and run tcpdump along with ping share output 

    console>tcpdump 'host 192.168.0.249 and proto ICMP

    console>dr 'host 192.168.0.249 and proto ICMP

    Regards

    "Sophos Partner: Infrassist Technologies Pvt Ltd".

    If a post solves your question please use the 'Verify Answer' button.

  • I have 2 sophos xg firewall version  SFOS 18.5.4 MR-4-Build418  

    I have vpn over tunnel interface 

    Wen I ping 192.168.60.2 (pc) with package 3000 byte don't work in original pc responde Reply from 10.1.128.36: Packet needs to be fragmented but DF set.

    ---

    console>
    console> tcpdump '192.168.60.2 and proto ICMP
    tcpdump: can't parse filter expression: syntax error
    console> tcpdump 'host 192.168.60.2 and proto ICMP
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 byt es
    13:07:26.874391 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44964, length 1368
    13:07:26.874401 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:26.874405 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:26.874405 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44964, length 3008
    13:07:26.874648 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44964, length 1376
    13:07:26.874674 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:26.874680 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:27.882455 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44965, length 1368
    13:07:27.882462 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:27.882465 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:27.882465 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44965, length 3008
    13:07:27.882595 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44965, length 1376
    13:07:27.882622 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:27.882627 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:28.898127 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44966, length 1368
    13:07:28.898138 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:28.898141 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:28.898141 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44966, length 3008
    13:07:28.898257 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44966, length 1376
    13:07:28.898283 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:28.898289 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:29.913756 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44967, length 1368
    13:07:29.913769 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:29.913773 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:29.913773 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44967, length 3008
    13:07:29.913845 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44967, length 1376
    13:07:29.913878 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:29.913883 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:30.929482 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44968, length 1368
    13:07:30.929492 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:30.929495 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:30.929495 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44968, length 3008
    13:07:30.929626 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44968, length 1376
    13:07:30.929651 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:30.929657 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:31.945760 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44969, length 1368
    13:07:31.945770 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:31.945773 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:31.945773 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44969, length 3008
    13:07:31.945884 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44969, length 1376
    13:07:31.945912 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:31.945917 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:32.961409 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44970, length 1368
    13:07:32.961418 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:32.961421 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:32.961421 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44970, length 3008
    13:07:32.961529 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44970, length 1376
    13:07:32.961555 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:32.961558 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:33.976982 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44971, length 1368
    13:07:33.976992 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:33.979944 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:33.979944 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44971, length 3008
    13:07:33.980025 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44971, length 1376
    13:07:33.980052 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:33.980057 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:34.992654 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44972, length 1368
    13:07:34.992666 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:34.992669 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:34.992669 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44972, length 3008
    13:07:34.992785 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44972, length 1376
    13:07:34.992820 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:34.992824 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:36.008290 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44973, length 1368
    13:07:36.008299 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:36.008302 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:36.008302 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44973, length 3008
    13:07:36.008380 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44973, length 1376
    13:07:36.008405 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:36.008409 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:37.023935 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44979, length 1368
    13:07:37.023949 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:37.023952 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:37.023952 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44979, length 3008
    13:07:37.024023 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44979, length 1376
    13:07:37.024056 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:37.024060 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:38.039977 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44980, length 1368
    13:07:38.039986 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:38.039989 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:38.039989 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44980, length 3008
    13:07:38.040052 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44980, length 1376
    13:07:38.040079 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:38.040083 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:39.055676 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44981, length 1368
    13:07:39.055686 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:39.055688 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:39.055688 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44981, length 3008
    13:07:39.055812 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44981, length 1376
    13:07:39.055841 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:39.055845 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    ^C
    91 packets captured
    131 packets received by filter
    4 packets dropped by kernel
    console>----

     Wen I ping 192.168.60.2 (pc)   with package 1372 byte work all  

    ----


    console>
    console>
    console>
    console>
    console>
    console>
    console>
    console> tcpdump 'host 192.168.60.2 and proto ICMP
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
    13:10:38.838060 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45057, length 1380
    13:10:38.838060 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45057, length 1380
    13:10:38.838244 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45057, length 1380
    13:10:38.866805 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45057, length 1380
    13:10:38.866880 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45057, length 1380
    13:10:38.866891 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45057, length 1380
    13:10:38.866893 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45057, length 1380
    13:10:39.855758 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45058, length 1380
    13:10:39.855758 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45058, length 1380
    13:10:39.855797 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45058, length 1380
    13:10:39.884166 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45058, length 1380
    13:10:39.884195 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45058, length 1380
    13:10:39.884199 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45058, length 1380
    13:10:39.884200 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45058, length 1380
    13:10:40.871416 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45059, length 1380
    13:10:40.871416 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45059, length 1380
    13:10:40.871471 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45059, length 1380
    13:10:40.901479 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45059, length 1380
    13:10:40.901528 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45059, length 1380
    13:10:40.901534 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45059, length 1380
    13:10:40.901536 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45059, length 1380
    13:10:41.888587 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45065, length 1380
    13:10:41.888587 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45065, length 1380
    13:10:41.888673 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45065, length 1380
    13:10:41.913959 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45065, length 1380
    13:10:41.913989 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45065, length 1380
    13:10:41.913993 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45065, length 1380
    13:10:41.913994 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45065, length 1380
    13:10:42.902744 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45066, length 1380
    13:10:42.902744 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45066, length 1380
    13:10:42.902789 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45066, length 1380
    13:10:42.931685 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45066, length 1380
    13:10:42.931723 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45066, length 1380
    13:10:42.931727 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45066, length 1380
    13:10:42.931728 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45066, length 1380
    13:10:43.918913 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45067, length 1380
    13:10:43.918913 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45067, length 1380
    13:10:43.918952 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45067, length 1380
    13:10:43.951906 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45067, length 1380
    13:10:43.951936 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45067, length 1380
    13:10:43.951939 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45067, length 1380
    13:10:43.951940 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45067, length 1380
    13:10:44.934438 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45068, length 1380
    13:10:44.934438 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45068, length 1380
    13:10:44.934508 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45068, length 1380
    13:10:44.961556 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45068, length 1380
    13:10:44.961588 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45068, length 1380
    13:10:44.961592 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45068, length 1380
    13:10:44.961593 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45068, length 1380
    13:10:45.950277 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45069, length 1380
    13:10:45.950277 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45069, length 1380
    13:10:45.950346 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45069, length 1380
    13:10:45.989410 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45069, length 1380
    13:10:45.989443 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45069, length 1380
    13:10:45.989450 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45069, length 1380
    13:10:45.989451 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45069, length 1380
    13:10:46.965772 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45070, length 1380
    13:10:46.965772 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45070, length 1380
    13:10:46.965837 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45070, length 1380
    13:10:46.991788 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45070, length 1380
    13:10:46.991827 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45070, length 1380
    13:10:46.991831 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45070, length 1380
    13:10:46.991833 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45070, length 1380
    13:10:47.981384 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45071, length 1380
    13:10:47.981384 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45071, length 1380
    13:10:47.981438 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45071, length 1380
    13:10:48.011580 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45071, length 1380
    13:10:48.011625 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45071, length 1380
    13:10:48.011630 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45071, length 1380
    13:10:48.011631 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45071, length 1380
    13:10:48.996938 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45072, length 1380
    13:10:48.996938 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45072, length 1380
    13:10:48.996983 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45072, length 1380
    13:10:49.021571 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45072, length 1380
    13:10:49.021616 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45072, length 1380
    13:10:49.021620 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45072, length 1380
    13:10:49.021621 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45072, length 1380
    13:10:50.012728 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45073, length 1380
    13:10:50.012728 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45073, length 1380
    13:10:50.012769 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45073, length 1380
    13:10:50.039148 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45073, length 1380
    13:10:50.039180 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45073, length 1380
    13:10:50.039184 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45073, length 1380
    13:10:50.039185 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45073, length 1380
    13:10:51.028315 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45074, length 1380
    13:10:51.028315 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45074, length 1380
    13:10:51.028355 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45074, length 1380
    13:10:51.054301 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45074, length 1380
    13:10:51.054333 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45074, length 1380
    13:10:51.054337 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45074, length 1380
    13:10:51.054338 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45074, length 1380
    13:10:52.044914 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45075, length 1380
    13:10:52.044914 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45075, length 1380
    13:10:52.044955 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45075, length 1380
    13:10:52.071863 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45075, length 1380
    13:10:52.071892 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45075, length 1380
    13:10:52.071896 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45075, length 1380
    13:10:52.071897 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45075, length 1380
    13:10:53.060560 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45076, length 1380
    13:10:53.060560 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45076, length 1380
    13:10:53.060603 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45076, length 1380
    13:10:53.092035 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45076, length 1380
    13:10:53.092068 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45076, length 1380
    13:10:53.092072 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45076, length 1380
    13:10:53.092074 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45076, length 1380
    13:10:54.076049 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45077, length 1380
    13:10:54.076049 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45077, length 1380
    13:10:54.076136 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45077, length 1380
    13:10:54.119721 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45077, length 1380
    13:10:54.119748 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45077, length 1380
    13:10:54.119752 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45077, length 1380
    13:10:54.119753 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45077, length 1380

    -----

Reply
  • I have 2 sophos xg firewall version  SFOS 18.5.4 MR-4-Build418  

    I have vpn over tunnel interface 

    Wen I ping 192.168.60.2 (pc) with package 3000 byte don't work in original pc responde Reply from 10.1.128.36: Packet needs to be fragmented but DF set.

    ---

    console>
    console> tcpdump '192.168.60.2 and proto ICMP
    tcpdump: can't parse filter expression: syntax error
    console> tcpdump 'host 192.168.60.2 and proto ICMP
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 byt es
    13:07:26.874391 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44964, length 1368
    13:07:26.874401 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:26.874405 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:26.874405 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44964, length 3008
    13:07:26.874648 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44964, length 1376
    13:07:26.874674 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:26.874680 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:27.882455 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44965, length 1368
    13:07:27.882462 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:27.882465 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:27.882465 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44965, length 3008
    13:07:27.882595 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44965, length 1376
    13:07:27.882622 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:27.882627 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:28.898127 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44966, length 1368
    13:07:28.898138 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:28.898141 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:28.898141 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44966, length 3008
    13:07:28.898257 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44966, length 1376
    13:07:28.898283 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:28.898289 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:29.913756 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44967, length 1368
    13:07:29.913769 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:29.913773 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:29.913773 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44967, length 3008
    13:07:29.913845 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44967, length 1376
    13:07:29.913878 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:29.913883 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:30.929482 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44968, length 1368
    13:07:30.929492 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:30.929495 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:30.929495 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44968, length 3008
    13:07:30.929626 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44968, length 1376
    13:07:30.929651 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:30.929657 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:31.945760 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44969, length 1368
    13:07:31.945770 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:31.945773 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:31.945773 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44969, length 3008
    13:07:31.945884 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44969, length 1376
    13:07:31.945912 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:31.945917 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:32.961409 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44970, length 1368
    13:07:32.961418 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:32.961421 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:32.961421 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44970, length 3008
    13:07:32.961529 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44970, length 1376
    13:07:32.961555 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:32.961558 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:33.976982 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44971, length 1368
    13:07:33.976992 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:33.979944 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:33.979944 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44971, length 3008
    13:07:33.980025 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44971, length 1376
    13:07:33.980052 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:33.980057 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:34.992654 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44972, length 1368
    13:07:34.992666 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:34.992669 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:34.992669 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44972, length 3008
    13:07:34.992785 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44972, length 1376
    13:07:34.992820 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:34.992824 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:36.008290 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44973, length 1368
    13:07:36.008299 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:36.008302 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:36.008302 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44973, length 3008
    13:07:36.008380 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44973, length 1376
    13:07:36.008405 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:36.008409 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:37.023935 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44979, length 1368
    13:07:37.023949 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:37.023952 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:37.023952 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44979, length 3008
    13:07:37.024023 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44979, length 1376
    13:07:37.024056 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:37.024060 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:38.039977 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44980, length 1368
    13:07:38.039986 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:38.039989 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:38.039989 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44980, length 3008
    13:07:38.040052 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44980, length 1376
    13:07:38.040079 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:38.040083 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:39.055676 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44981, length 1368
    13:07:39.055686 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:39.055688 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:39.055688 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44981, length 3008
    13:07:39.055812 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 44981, length 1376
    13:07:39.055841 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    13:07:39.055845 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ip-proto-1
    ^C
    91 packets captured
    131 packets received by filter
    4 packets dropped by kernel
    console>----

     Wen I ping 192.168.60.2 (pc)   with package 1372 byte work all  

    ----


    console>
    console>
    console>
    console>
    console>
    console>
    console>
    console> tcpdump 'host 192.168.60.2 and proto ICMP
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
    13:10:38.838060 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45057, length 1380
    13:10:38.838060 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45057, length 1380
    13:10:38.838244 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45057, length 1380
    13:10:38.866805 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45057, length 1380
    13:10:38.866880 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45057, length 1380
    13:10:38.866891 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45057, length 1380
    13:10:38.866893 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45057, length 1380
    13:10:39.855758 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45058, length 1380
    13:10:39.855758 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45058, length 1380
    13:10:39.855797 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45058, length 1380
    13:10:39.884166 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45058, length 1380
    13:10:39.884195 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45058, length 1380
    13:10:39.884199 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45058, length 1380
    13:10:39.884200 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45058, length 1380
    13:10:40.871416 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45059, length 1380
    13:10:40.871416 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45059, length 1380
    13:10:40.871471 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45059, length 1380
    13:10:40.901479 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45059, length 1380
    13:10:40.901528 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45059, length 1380
    13:10:40.901534 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45059, length 1380
    13:10:40.901536 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45059, length 1380
    13:10:41.888587 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45065, length 1380
    13:10:41.888587 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45065, length 1380
    13:10:41.888673 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45065, length 1380
    13:10:41.913959 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45065, length 1380
    13:10:41.913989 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45065, length 1380
    13:10:41.913993 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45065, length 1380
    13:10:41.913994 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45065, length 1380
    13:10:42.902744 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45066, length 1380
    13:10:42.902744 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45066, length 1380
    13:10:42.902789 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45066, length 1380
    13:10:42.931685 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45066, length 1380
    13:10:42.931723 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45066, length 1380
    13:10:42.931727 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45066, length 1380
    13:10:42.931728 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45066, length 1380
    13:10:43.918913 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45067, length 1380
    13:10:43.918913 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45067, length 1380
    13:10:43.918952 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45067, length 1380
    13:10:43.951906 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45067, length 1380
    13:10:43.951936 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45067, length 1380
    13:10:43.951939 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45067, length 1380
    13:10:43.951940 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45067, length 1380
    13:10:44.934438 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45068, length 1380
    13:10:44.934438 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45068, length 1380
    13:10:44.934508 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45068, length 1380
    13:10:44.961556 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45068, length 1380
    13:10:44.961588 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45068, length 1380
    13:10:44.961592 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45068, length 1380
    13:10:44.961593 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45068, length 1380
    13:10:45.950277 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45069, length 1380
    13:10:45.950277 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45069, length 1380
    13:10:45.950346 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45069, length 1380
    13:10:45.989410 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45069, length 1380
    13:10:45.989443 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45069, length 1380
    13:10:45.989450 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45069, length 1380
    13:10:45.989451 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45069, length 1380
    13:10:46.965772 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45070, length 1380
    13:10:46.965772 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45070, length 1380
    13:10:46.965837 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45070, length 1380
    13:10:46.991788 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45070, length 1380
    13:10:46.991827 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45070, length 1380
    13:10:46.991831 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45070, length 1380
    13:10:46.991833 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45070, length 1380
    13:10:47.981384 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45071, length 1380
    13:10:47.981384 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45071, length 1380
    13:10:47.981438 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45071, length 1380
    13:10:48.011580 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45071, length 1380
    13:10:48.011625 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45071, length 1380
    13:10:48.011630 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45071, length 1380
    13:10:48.011631 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45071, length 1380
    13:10:48.996938 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45072, length 1380
    13:10:48.996938 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45072, length 1380
    13:10:48.996983 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45072, length 1380
    13:10:49.021571 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45072, length 1380
    13:10:49.021616 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45072, length 1380
    13:10:49.021620 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45072, length 1380
    13:10:49.021621 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45072, length 1380
    13:10:50.012728 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45073, length 1380
    13:10:50.012728 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45073, length 1380
    13:10:50.012769 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45073, length 1380
    13:10:50.039148 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45073, length 1380
    13:10:50.039180 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45073, length 1380
    13:10:50.039184 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45073, length 1380
    13:10:50.039185 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45073, length 1380
    13:10:51.028315 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45074, length 1380
    13:10:51.028315 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45074, length 1380
    13:10:51.028355 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45074, length 1380
    13:10:51.054301 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45074, length 1380
    13:10:51.054333 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45074, length 1380
    13:10:51.054337 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45074, length 1380
    13:10:51.054338 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45074, length 1380
    13:10:52.044914 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45075, length 1380
    13:10:52.044914 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45075, length 1380
    13:10:52.044955 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45075, length 1380
    13:10:52.071863 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45075, length 1380
    13:10:52.071892 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45075, length 1380
    13:10:52.071896 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45075, length 1380
    13:10:52.071897 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45075, length 1380
    13:10:53.060560 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45076, length 1380
    13:10:53.060560 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45076, length 1380
    13:10:53.060603 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45076, length 1380
    13:10:53.092035 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45076, length 1380
    13:10:53.092068 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45076, length 1380
    13:10:53.092072 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45076, length 1380
    13:10:53.092074 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45076, length 1380
    13:10:54.076049 PortF1, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45077, length 1380
    13:10:54.076049 BridgeLAN, IN: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45077, length 1380
    13:10:54.076136 xfrm19, OUT: IP 10.1.90.34 > 192.168.60.2: ICMP echo request, id 8, seq 45077, length 1380
    13:10:54.119721 xfrm19, IN: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45077, length 1380
    13:10:54.119748 BridgeLAN, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45077, length 1380
    13:10:54.119752 PortF1, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45077, length 1380
    13:10:54.119753 oct0, OUT: IP 192.168.60.2 > 10.1.90.34: ICMP echo reply, id 8, seq 45077, length 1380

    -----

Children
No Data