<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Nele, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946091#M1029764</link>
    <description>&lt;P&gt;Hi Nele,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think you might be hitting a bug.&lt;/P&gt;
&lt;P&gt;I understand that you have an allow rule for this traffic. But c&lt;SPAN&gt;an you please create a trust rule from the ASA IP address to the internal services that should be accessible in your Access Control Policy.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now, check if the traffic still gets dropped.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Pujita&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rate if it helps.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Aug 2016 18:18:14 GMT</pubDate>
    <dc:creator>Pujita Patni</dc:creator>
    <dc:date>2016-08-05T18:18:14Z</dc:date>
    <item>
      <title>webvpn client SFR module drops http packets</title>
      <link>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946090#M1029763</link>
      <description>&lt;P&gt;Hi, I have configured WEBVPN access to ASA 5512 with SFR module long time ago and internal http links were worked just fine.&lt;/P&gt;
&lt;P&gt;After upgrade ASA to 9.5 (2), FirePower module to 6.0.0-1005 and DefenseCentar to 6.0.0 (build 1005) I am unable to open internal http links (also CIFS is working fine at same time).&lt;/P&gt;
&lt;P&gt;After I connect to WEBVPN, try to open "&lt;A href="http://192.168.4.3" target="_blank"&gt;http://192.168.4.3&lt;/A&gt;" and then go to ASA monitoring, I can see these logs:&lt;/P&gt;
&lt;P&gt;6&amp;nbsp;&amp;nbsp; &amp;nbsp;Aug 05 2016&amp;nbsp;&amp;nbsp; &amp;nbsp;19:11:32&amp;nbsp;&amp;nbsp; &amp;nbsp;302014&amp;nbsp;&amp;nbsp; &amp;nbsp;192.168.4.3&amp;nbsp;&amp;nbsp; &amp;nbsp;80&amp;nbsp;&amp;nbsp; &amp;nbsp;172.16.1.2&amp;nbsp;&amp;nbsp; &amp;nbsp;13215&amp;nbsp;&amp;nbsp; &amp;nbsp;Teardown TCP connection 5709589 for Internal:192.168.4.3/80 to identity:172.16.1.2/13215 duration 0:00:21 bytes 0 TCP Reset-O&lt;BR /&gt;4&amp;nbsp;&amp;nbsp; &amp;nbsp;Aug 05 2016&amp;nbsp;&amp;nbsp; &amp;nbsp;19:11:19&amp;nbsp;&amp;nbsp; &amp;nbsp;434002&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFR requested to drop TCP packet from identity:172.16.1.2/13215 to Internal:192.168.4.3/80&lt;BR /&gt;4&amp;nbsp;&amp;nbsp; &amp;nbsp;Aug 05 2016&amp;nbsp;&amp;nbsp; &amp;nbsp;19:11:19&amp;nbsp;&amp;nbsp; &amp;nbsp;434002&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFR requested to drop TCP packet from identity:172.16.1.2/13215 to Internal:192.168.4.3/80&lt;BR /&gt;4&amp;nbsp;&amp;nbsp; &amp;nbsp;Aug 05 2016&amp;nbsp;&amp;nbsp; &amp;nbsp;19:11:13&amp;nbsp;&amp;nbsp; &amp;nbsp;434002&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFR requested to drop TCP packet from identity:172.16.1.2/13215 to Internal:192.168.4.3/80&lt;BR /&gt;4&amp;nbsp;&amp;nbsp; &amp;nbsp;Aug 05 2016&amp;nbsp;&amp;nbsp; &amp;nbsp;19:11:13&amp;nbsp;&amp;nbsp; &amp;nbsp;434002&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFR requested to drop TCP packet from identity:172.16.1.2/13215 to Internal:192.168.4.3/80&lt;BR /&gt;4&amp;nbsp;&amp;nbsp; &amp;nbsp;Aug 05 2016&amp;nbsp;&amp;nbsp; &amp;nbsp;19:11:10&amp;nbsp;&amp;nbsp; &amp;nbsp;434002&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFR requested to drop TCP packet from identity:172.16.1.2/13215 to Internal:192.168.4.3/80&lt;BR /&gt;4&amp;nbsp;&amp;nbsp; &amp;nbsp;Aug 05 2016&amp;nbsp;&amp;nbsp; &amp;nbsp;19:11:10&amp;nbsp;&amp;nbsp; &amp;nbsp;434002&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFR requested to drop TCP packet from identity:172.16.1.2/13215 to Internal:192.168.4.3/80&lt;BR /&gt;6&amp;nbsp;&amp;nbsp; &amp;nbsp;Aug 05 2016&amp;nbsp;&amp;nbsp; &amp;nbsp;19:11:10&amp;nbsp;&amp;nbsp; &amp;nbsp;302013&amp;nbsp;&amp;nbsp; &amp;nbsp;172.16.1.2&amp;nbsp;&amp;nbsp; &amp;nbsp;13215&amp;nbsp;&amp;nbsp; &amp;nbsp;192.168.4.3&amp;nbsp;&amp;nbsp; &amp;nbsp;80&amp;nbsp;&amp;nbsp; &amp;nbsp;Built outbound TCP connection 5709589 for Internal:192.168.4.3/80 (192.168.4.3/80) to identity:172.16.1.2/13215 (172.16.1.2/13215)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;172.16.1.2 is ASA's internal IP and&amp;nbsp;192.168.4.3 is internal web server.&lt;/P&gt;
&lt;P&gt;If I stop with traffic redirection to SFR module everything work fine. I have checked Access Policy on DefenseCenter, traffic is allowed&amp;nbsp; as I can see in Connection Events.&lt;/P&gt;
&lt;P&gt;Does any one have any idea what could be a problem here?&lt;/P&gt;
&lt;P&gt;Is there a option to debug more detailed why SFR drops these packets?&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946090#M1029763</guid>
      <dc:creator>Nele Valjak</dc:creator>
      <dc:date>2019-03-12T13:05:47Z</dc:date>
    </item>
    <item>
      <title>Hi Nele,</title>
      <link>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946091#M1029764</link>
      <description>&lt;P&gt;Hi Nele,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think you might be hitting a bug.&lt;/P&gt;
&lt;P&gt;I understand that you have an allow rule for this traffic. But c&lt;SPAN&gt;an you please create a trust rule from the ASA IP address to the internal services that should be accessible in your Access Control Policy.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now, check if the traffic still gets dropped.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Pujita&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rate if it helps.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 18:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946091#M1029764</guid>
      <dc:creator>Pujita Patni</dc:creator>
      <dc:date>2016-08-05T18:18:14Z</dc:date>
    </item>
    <item>
      <title>Hi, it works now! :)</title>
      <link>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946092#M1029767</link>
      <description>&lt;P&gt;Hi, it works now! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Probably some IPS issue or rule...&lt;/P&gt;
&lt;P&gt;Do you know how can I track or debug IPS or SFR rules which match and block this connection?&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 18:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946092#M1029767</guid>
      <dc:creator>Nele Valjak</dc:creator>
      <dc:date>2016-08-05T18:45:30Z</dc:date>
    </item>
    <item>
      <title>Hi Nele,</title>
      <link>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946093#M1029770</link>
      <description>&lt;P&gt;Hi Nele,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It was the below bug that you were hitting:&lt;/P&gt;
&lt;P&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuw38561/?reffering_site=dumpcr&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Make sure you have logging enabled on this rule. You should then be able to see the traffic being matched in the Connection events. You can use this rule as a filter.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Pujita&lt;/P&gt;
&lt;P&gt;Rate if it helps !&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 19:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webvpn-client-sfr-module-drops-http-packets/m-p/2946093#M1029770</guid>
      <dc:creator>Pujita Patni</dc:creator>
      <dc:date>2016-08-05T19:08:25Z</dc:date>
    </item>
  </channel>
</rss>

