<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC managed FTD HA pairs running 7.0.1.1 TCP issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641214#M1091446</link>
    <description>&lt;P&gt;asymmetric path in HA&amp;nbsp;&lt;BR /&gt;OK, since this is active-standby so&amp;nbsp;&lt;BR /&gt;INSIDE of both ASA must share same subnet and Default GW in client connect to Inside must be point to Active Inside IP address&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Outside of both ASA must share same subnet and the L3 device connect to outside will point to active Outside IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here I think you config Outside with two different Subnet and L3 device use load share and hence asymmetric and hence TCP failed (or slow).&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jun 2022 22:00:51 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-06-29T22:00:51Z</dc:date>
    <item>
      <title>FMC managed FTD HA pairs running 7.0.1.1 TCP issues</title>
      <link>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641020#M1091437</link>
      <description>&lt;P&gt;I'm looking at an issue with some FMC managed FPR 4115's in HA pairs, all running 7.0.1.1.&amp;nbsp; The FMC is also managing other FPR 4115's &amp;amp; 4112s.&lt;/P&gt;
&lt;P&gt;The FPR 4115's currently have just an inside &amp;amp; an outside interface (port-channels).&amp;nbsp; The layer-3 interfaces are 802.1q sub-interfaces, but currently there is just one sub-interface per port-channel. Behind the inside interface is a link into an ACI environment with eBGP connections to the spine switches over the same VLAN. Outside is a connection to a C9500 switch, again with an eBGP peering configured.&amp;nbsp; There is more to the network as its a highly resilient design, however we've stripped it back to a single path in and out of ACI through this FTD.&lt;/P&gt;
&lt;P&gt;MTU's are configured as 9100 everywhere, however all the hosts are standard 1500-byte.&lt;/P&gt;
&lt;P&gt;There is a simple policy currently applied that permits various access to some servers deployed in ACI (only a handful at the moment).&amp;nbsp; There is no NAT configured.&amp;nbsp; We've hit an issue with TCP flows that looks like asymmetric routing, however we've stripped everything back now and we are still seeing the same issue.&amp;nbsp; As a workaround we have enabled TCP bypass for selected flows with an Extended ACL and a pre-filter policy to 'fastpath' the connections.&lt;/P&gt;
&lt;P&gt;This shouldn't be happening though - there is no asymmetry as we've stripped it back so its one (HA pair) firewall with an inside interface and an outside interface, eBGP to directly connected peers either side and a simple policy.&lt;/P&gt;
&lt;P&gt;The symptoms we see without TCP Bypass configured are a normal TCP 3-way handshake and then it all falls apart just after that.&amp;nbsp; I can SSH to a Linux host, successfully login and the welcome screen appears, however press the return key seven times or type a couple of characters and it locks up.&lt;/P&gt;
&lt;P&gt;I fear this is something incredibly obvious, however we've been looking at it for 2-days now.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 18:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641020#M1091437</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2022-06-29T18:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: FMC managed FTD HA pairs running 7.0.1.1 TCP issues</title>
      <link>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641181#M1091442</link>
      <description>&lt;P&gt;&lt;A href="https://www.thepacket.net/asaha/" target="_blank"&gt;https://www.thepacket.net/asaha/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;need stat-full TCP for HTTP.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 21:04:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641181#M1091442</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-29T21:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: FMC managed FTD HA pairs running 7.0.1.1 TCP issues</title>
      <link>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641187#M1091444</link>
      <description>&lt;P&gt;Its any TCP connections.&amp;nbsp; We don't have any HTTP/HTTPS traffic allowed.&amp;nbsp; Testing with RDP &amp;amp; SSH shows the same behaviour.&amp;nbsp; It looks like an asymmetric path issue, however there is only one path into and out of the ACI environment where the servers are.&amp;nbsp; Its the enabling TCP bypass that is doing me in - its there for asymmetric path issues and we don't have one.&amp;nbsp; I can't understand why that fixes it.&amp;nbsp; We have taken packet captures on the originating device (RDP client), on the C9500 and on the FTD.&amp;nbsp; When it doesn't work the FTD appears to show missing packets, however if we enable TCP bypass for the TCP flows it all kicks into life.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 21:16:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641187#M1091444</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2022-06-29T21:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: FMC managed FTD HA pairs running 7.0.1.1 TCP issues</title>
      <link>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641214#M1091446</link>
      <description>&lt;P&gt;asymmetric path in HA&amp;nbsp;&lt;BR /&gt;OK, since this is active-standby so&amp;nbsp;&lt;BR /&gt;INSIDE of both ASA must share same subnet and Default GW in client connect to Inside must be point to Active Inside IP address&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Outside of both ASA must share same subnet and the L3 device connect to outside will point to active Outside IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here I think you config Outside with two different Subnet and L3 device use load share and hence asymmetric and hence TCP failed (or slow).&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 22:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641214#M1091446</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-29T22:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: FMC managed FTD HA pairs running 7.0.1.1 TCP issues</title>
      <link>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641233#M1091448</link>
      <description>&lt;P&gt;HA is configured and working correctly - there is L2 adjacency between all interfaces and the HA/state interface is directly connected between the two devices.&lt;/P&gt;
&lt;P&gt;What you replied with is nonsense. HA wouldn't have established if any of the interfaces weren't L2 adjacent.&lt;/P&gt;
&lt;P&gt;Please only reply if you have valid suggestions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 23:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641233#M1091448</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2022-06-29T23:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: FMC managed FTD HA pairs running 7.0.1.1 TCP issues</title>
      <link>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641237#M1091450</link>
      <description>&lt;P&gt;from cisco doc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118050-config-bgp-00.html#anc7" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118050-config-bgp-00.html#anc7&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;""-Only the Active unit listens on TCP port 179 for BGP connections from peers.&lt;/P&gt;&lt;P&gt;-The Standby unit does not participate in BGP peering, and hence does not listen on TCP port 179 and does not maintain the BGP tables.""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if for any reason see the standby establish eBGP session with C9500 or ACI then your config is wrong and you get asymmetric routing.&lt;BR /&gt;&lt;BR /&gt;anyway good luck with your issue&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2022 00:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-managed-ftd-ha-pairs-running-7-0-1-1-tcp-issues/m-p/4641237#M1091450</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-30T00:12:53Z</dc:date>
    </item>
  </channel>
</rss>

