<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA Packet Drop with Drop Location frame 0x000055a24277fdb9 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-drop-with-drop-location-frame/m-p/4968229#M1106364</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Hi Arie,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;To pinpoint which access list is causing the packet drop on your Cisco ASA, you can check the configured access control lists (ACLs) on the device. Navigate to the ASA's configuration using the command-line interface and review the access lists applied to the 'inside' and 'outside' interfaces. Examine the rules within those ACLs to identify any that might deny the flow described in your packet tracer output. The "filter-aaa" subtype indicates that the drop is related to AAA (Authentication, Authorization, and Accounting), so ensure that your ACLs are correctly configured for the desired traffic. If needed, you can modify the ACL rules to permit the traffic or adjust the flow to comply with your security policies.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Nov 2023 13:26:14 GMT</pubDate>
    <dc:creator>Isabella54</dc:creator>
    <dc:date>2023-11-29T13:26:14Z</dc:date>
    <item>
      <title>Cisco ASA Packet Drop with Drop Location frame 0x000055a24277fdb9</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-drop-with-drop-location-frame/m-p/4967983#M1106348</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I'm on troubleshooting packet drop in Cisco ASA.&lt;/P&gt;
&lt;P&gt;When I ran the packet tracer, I find that the packet is drop:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: filter-aaa&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000055a24277fdb9 flow (NA)/NA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I locate which access list that drop the packet? Because there is no specific information about that.&lt;/P&gt;
&lt;P&gt;ASA version:&amp;nbsp;9.14(4)14&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Arie&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 08:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-drop-with-drop-location-frame/m-p/4967983#M1106348</guid>
      <dc:creator>Arie --</dc:creator>
      <dc:date>2023-11-29T08:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Packet Drop with Drop Location frame 0x000055a24277fdb9</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-drop-with-drop-location-frame/m-p/4968229#M1106364</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi Arie,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;To pinpoint which access list is causing the packet drop on your Cisco ASA, you can check the configured access control lists (ACLs) on the device. Navigate to the ASA's configuration using the command-line interface and review the access lists applied to the 'inside' and 'outside' interfaces. Examine the rules within those ACLs to identify any that might deny the flow described in your packet tracer output. The "filter-aaa" subtype indicates that the drop is related to AAA (Authentication, Authorization, and Accounting), so ensure that your ACLs are correctly configured for the desired traffic. If needed, you can modify the ACL rules to permit the traffic or adjust the flow to comply with your security policies.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 13:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-drop-with-drop-location-frame/m-p/4968229#M1106364</guid>
      <dc:creator>Isabella54</dc:creator>
      <dc:date>2023-11-29T13:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Packet Drop with Drop Location frame 0x000055a24277fdb9</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-drop-with-drop-location-frame/m-p/4968249#M1106367</link>
      <description>&lt;P&gt;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCvd97319" target="_blank"&gt;https://quickview.cloudapps.cisco.com/quickview/bug/CSCvd97319&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It bug&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Two workaround&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reboot asa&lt;/P&gt;
&lt;P&gt;Or&lt;/P&gt;
&lt;P&gt;Config vpn filter with permit any any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 14:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-drop-with-drop-location-frame/m-p/4968249#M1106367</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-29T14:15:50Z</dc:date>
    </item>
  </channel>
</rss>

