<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC peers (FP and ASA) send TCP RST to the endpoints in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-peers-fp-and-asa-send-tcp-rst-to-the-endpoints/m-p/4726715#M1095288</link>
    <description>&lt;P&gt;It looks like the TCP session is reset by the client not by the VPN peer. Is your tunnel rebuild after the reset ?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 23 Nov 2022 16:09:03 GMT</pubDate>
    <dc:creator>buffkata</dc:creator>
    <dc:date>2022-11-23T16:09:03Z</dc:date>
    <item>
      <title>IPSEC peers (FP and ASA) send TCP RST to the endpoints</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-peers-fp-and-asa-send-tcp-rst-to-the-endpoints/m-p/4726670#M1095287</link>
      <description>&lt;P&gt;Hi Everyone,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we have an IPSEC tunnel between FP2110 and ASA firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tunnel is stable and operational but every hour, at the same time, peers (firewalls) at both ends send TCP RST packet to the endpoints at their side that are having active session via IPSEC tunnel. That breaks the session..&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone experienced something similar?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SA Lifetime in IPSEC setup is set to 8 hours at both ends and flow is allowed on ACLs at both firewalls.&lt;/P&gt;
&lt;P&gt;Thanks in advance for looking at it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;STRONG&gt;TCP RST from FP sent to endpoints at his location:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Micccc4_0-1669215941525.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/168837i2BFE6EDF26CBAA64/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Micccc4_0-1669215941525.png" alt="Micccc4_0-1669215941525.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;STRONG&gt;TCP RST from ASA sent to endpoints at his location:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Micccc4_1-1669215969308.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/168838i9613793369816CBB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Micccc4_1-1669215969308.png" alt="Micccc4_1-1669215969308.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 15:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-peers-fp-and-asa-send-tcp-rst-to-the-endpoints/m-p/4726670#M1095287</guid>
      <dc:creator>Micccc4</dc:creator>
      <dc:date>2022-11-23T15:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC peers (FP and ASA) send TCP RST to the endpoints</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-peers-fp-and-asa-send-tcp-rst-to-the-endpoints/m-p/4726715#M1095288</link>
      <description>&lt;P&gt;It looks like the TCP session is reset by the client not by the VPN peer. Is your tunnel rebuild after the reset ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 16:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-peers-fp-and-asa-send-tcp-rst-to-the-endpoints/m-p/4726715#M1095288</guid>
      <dc:creator>buffkata</dc:creator>
      <dc:date>2022-11-23T16:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC peers (FP and ASA) send TCP RST to the endpoints</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-peers-fp-and-asa-send-tcp-rst-to-the-endpoints/m-p/4726864#M1095296</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/911938"&gt;@buffkata&lt;/a&gt;&amp;nbsp;- thanks for commenting. Well, this was my first thought as well - that is how it looks based on the SRC IP address. However, RST packet that is received by the end point at one side of the tunnel is not captured on the other, 'source' side. So, where is it coming from. and then I came across this video here:&lt;/P&gt;
&lt;P&gt;(and tunnel itself is stable when this reset takes place)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=t5OJephyw8I" target="_blank"&gt;https://www.youtube.com/watch?v=t5OJephyw8I&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 20:15:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-peers-fp-and-asa-send-tcp-rst-to-the-endpoints/m-p/4726864#M1095296</guid>
      <dc:creator>Micccc4</dc:creator>
      <dc:date>2022-11-23T20:15:09Z</dc:date>
    </item>
  </channel>
</rss>

