<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring IP SLA Monitor in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788218#M1021065</link>
    <description>&lt;P&gt;I have my config very similar to yours but my sla&amp;nbsp;is being dropped. I'm sourcing my sla&amp;nbsp;from the inside interface on my FTD. I'm just wondering if you did anything else to get this sla&amp;nbsp;to work.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jan 2019 16:14:01 GMT</pubDate>
    <dc:creator>tmarshall2132</dc:creator>
    <dc:date>2019-01-25T16:14:01Z</dc:date>
    <item>
      <title>Configuring IP SLA Monitor</title>
      <link>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3733032#M1021023</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a Site to Site VPN, and I'm unable to get the IP SLA Monitor I setup to keep the tunnel up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm using Cisco FMC &lt;SPAN&gt;6.2.2&amp;nbsp;&lt;/SPAN&gt;with FTD HA Pair&amp;nbsp;&lt;SPAN&gt;Cisco Firepower 2120 Threat Defense (77) Version 6.2.2.2 (Build 109)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Vendor is using AWS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have an IP SLA Monitor configured&lt;/P&gt;
&lt;P&gt;FMC Gui config&lt;/P&gt;
&lt;P&gt;Name Vendor1&lt;/P&gt;
&lt;P&gt;Frequency 5&lt;/P&gt;
&lt;P&gt;SLA Mon ID 10&lt;/P&gt;
&lt;P&gt;Timeout 5000&lt;/P&gt;
&lt;P&gt;Data Size 28&lt;/P&gt;
&lt;P&gt;Number of Packets 3&lt;/P&gt;
&lt;P&gt;Monitor address 1.1.1.2&lt;/P&gt;
&lt;P&gt;Selected Zone Outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I then configured a static route&lt;/P&gt;
&lt;P&gt;FMC gui config&lt;/P&gt;
&lt;P&gt;Type IPV4&lt;/P&gt;
&lt;P&gt;Interface Outside&lt;/P&gt;
&lt;P&gt;Selected Network 1.1.1.2/32&lt;/P&gt;
&lt;P&gt;Gateway 24.100.205.169&lt;/P&gt;
&lt;P&gt;Metric 1&lt;/P&gt;
&lt;P&gt;Route Tracking Vendor1&lt;/P&gt;
&lt;P&gt;how it is in CLI&lt;/P&gt;
&lt;P&gt;route Outside&amp;nbsp;1.1.1.2&amp;nbsp;255.255.255.255 24.100.205.169 1 track 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This Vendor was previously peering with an old ASA 5525 we just moved it to the FMC firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the old ASA 5525 this was the SLA configuration for the same peer&lt;/P&gt;
&lt;P&gt;Entry number: 4&lt;/P&gt;
&lt;P&gt;Owner:&lt;/P&gt;
&lt;P&gt;Tag:&lt;/P&gt;
&lt;P&gt;Type of operation to perform: echo&lt;/P&gt;
&lt;P&gt;Target address:&amp;nbsp;1.1.1.2&lt;/P&gt;
&lt;P&gt;Interface: Outside&lt;/P&gt;
&lt;P&gt;Number of packets: 3&lt;/P&gt;
&lt;P&gt;Request size (ARR data portion): 28&lt;/P&gt;
&lt;P&gt;Operation timeout (milliseconds): 5000&lt;/P&gt;
&lt;P&gt;Type Of Service parameters: 0x0&lt;/P&gt;
&lt;P&gt;Verify data: No&lt;/P&gt;
&lt;P&gt;Operation frequency (seconds): 5&lt;/P&gt;
&lt;P&gt;Next Scheduled Start Time: Start Time already passed&lt;/P&gt;
&lt;P&gt;Group Scheduled : FALSE&lt;/P&gt;
&lt;P&gt;Life (seconds): Forever&lt;/P&gt;
&lt;P&gt;Entry Ageout (seconds): never&lt;/P&gt;
&lt;P&gt;Recurring (Starting Everyday): FALSE&lt;/P&gt;
&lt;P&gt;Status of entry (SNMP RowStatus): Active&lt;/P&gt;
&lt;P&gt;Enhanced History:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There was no issue keeping up this peer on the old ASA 5525 but on the FMC it won't keep the tunnel up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One thing to note, the vendor's host that we use to keep the peer up 1.1.1.2 doesn't reply, never has, even with the old ASA 5525, but that was never an issue keeping the tunnel up on the old ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if I were to do a manual ping&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ping 1.1.1.2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd get zero replies&lt;/P&gt;
&lt;P&gt;Trying to figure out how this can work successfully on the FMC/FTD config.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have captures running, and I cannot see any packets generated for the sla monitor, I can see packets generated if I do a packet-trace for icmp, and that will obviously bring the tunnel up, but the tunnel won't stay up, goes inactive after around 30+ minutes since the SLA monitor isn't working.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas would be appreciated, thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3733032#M1021023</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2019-03-12T14:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IP SLA Monitor</title>
      <link>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3735731#M1021045</link>
      <description>&lt;P&gt;Still trying to get this one to work, unable to keep the tunnel up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can manually bring tunnel up with a packet trace, but it won't stay up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm actually working with Cisco TAC on this, and their also having issues figuring this out.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 16:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3735731#M1021045</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2018-10-30T16:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IP SLA Monitor</title>
      <link>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3748204#M1021056</link>
      <description>&lt;P&gt;The issue with the sla monitor not working, was specifically the crypto map protected networks.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since the firewall would be kicking off the sla monitor, the source interface the fmc would use to initiate the sla monitor would need to be apart of the crypto map.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found that with the old configuration of the tunnel (this peer was being moved from one asa to another) the protected networks was an "any".&amp;nbsp; While I prefer not to use an any, that was the only way to get the sla monitor to work as designed. Per Cisco tac, they came to the same resolution.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I adjusted the site to site vpn config to have an "any", and ensured there was a static route tied to the sla monitor, and deployed the config&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After the deployment, the tunnel came up on its own, with the sla monitor, and has continued to stay up with no issues.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 16:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3748204#M1021056</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2018-11-16T16:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IP SLA Monitor</title>
      <link>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788218#M1021065</link>
      <description>&lt;P&gt;I have my config very similar to yours but my sla&amp;nbsp;is being dropped. I'm sourcing my sla&amp;nbsp;from the inside interface on my FTD. I'm just wondering if you did anything else to get this sla&amp;nbsp;to work.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 16:14:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788218#M1021065</guid>
      <dc:creator>tmarshall2132</dc:creator>
      <dc:date>2019-01-25T16:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IP SLA Monitor</title>
      <link>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788255#M1021075</link>
      <description>&lt;P&gt;Hi, yes, the crypto map for the peer that you're trying to keep up, the static route host ip must fall within that crypto map protected network otherwise the peer will not stay up as the static route has no ipsec acl tied to it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example this static route stays up with the IP sla monitor because the host IP is within the protected network configured on the peer, thus the peer will stay up&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route Outside 172.11.12.129 255.255.255.255 174.175.165.129 1 track 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt; show crypto ipsec sa peer 55.8.196.17&lt;BR /&gt;peer address: 55.8.196.17&lt;BR /&gt; Crypto map tag: CSM_Outside_map, seq num: 1, local addr: 174.175.165.129&lt;/P&gt;
&lt;P&gt;access-list CSM_IPSEC_ACL_2 extended permit ip any 172.11.0.0 255.255.0.0&amp;nbsp; &amp;nbsp;&amp;lt;---- see this range the static IP falls within the static route so the static route will apply successfully&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt; local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;BR /&gt; remote ident (addr/mask/prot/port): (172.11.0.0/255.255.0.0/0/0)&lt;BR /&gt; current_peer: 55.8.196.17&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my peer is constantly up, since my fw is the initiator&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IKE Peer: 55.8.196.17&lt;BR /&gt; Type : L2L Role : initiator &lt;BR /&gt; Rekey : no State : MM_ACTIVE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you're using the FMC Gui&amp;nbsp;see the attached files&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 17:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788255#M1021075</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2019-01-25T17:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IP SLA Monitor</title>
      <link>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788260#M1021090</link>
      <description>I think my issue is the static route gateway. What address are you using as the gateway for the static route? It appear that you set the gateway has the outside interface ip address. That is not allowed. Am I missing something?</description>
      <pubDate>Fri, 25 Jan 2019 17:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788260#M1021090</guid>
      <dc:creator>tmarshall2132</dc:creator>
      <dc:date>2019-01-25T17:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IP SLA Monitor</title>
      <link>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788261#M1021098</link>
      <description>&lt;P&gt;The gateway is my outside interface IP on my internet router.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 17:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-ip-sla-monitor/m-p/3788261#M1021098</guid>
      <dc:creator>rmorenobb</dc:creator>
      <dc:date>2019-01-25T17:54:38Z</dc:date>
    </item>
  </channel>
</rss>

