<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 1150 FPWR - Does not block bgp to device in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4987241#M1107396</link>
    <description>&lt;P&gt;can you add Log to your acl and check if traffic hit the ACL or not&lt;BR /&gt;MHM&lt;/P&gt;</description>
    <pubDate>Sat, 30 Dec 2023 09:25:43 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-12-30T09:25:43Z</dc:date>
    <item>
      <title>ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985930#M1107290</link>
      <description>&lt;P&gt;Hej&lt;BR /&gt;I am testing what traffic to allow and block directly with the block. I have the below configuration that should in theory block all traffic to device from a neighbor including BGP. But regardless the BGP session stays up .&lt;/P&gt;&lt;P&gt;I am wondering what I am missing&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;access-list DENY-ALL extended deny ip any any 
access-list DENY-ALL extended deny tcp any any 

access-group DENY-ALL in interface SD-WAN-1 control-plane
access-group DENY-ALL in interface SD-WAN-1

interface Ethernet1/10.6
 vlan 6
 nameif SD-WAN-1
 security-level 0
 zone-member SD-WAN-1
 ip address 172.16.6.1 255.255.255.0 standby 172.16.6.2 

router bgp 8989
 bgp log-neighbor-changes
 address-family ipv4 unicast
  neighbor 172.16.6.3 remote-as 666
  neighbor 172.16.6.3 activate
  no auto-summary
  no synchronization&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# show bgp summary 
BGP router identifier 172.16.66.1, local AS number 8989
Neighbor        V           AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd
172.16.6.3      4          666 236     195            3    0    0 03:33:36  0       
172.16.7.3      4          666 237     195            3    0    0 03:33:36  0   

################################################################
################################################################
# show bgp neighbors 172.16.6.3

BGP neighbor is 172.16.6.3,  context single_vf,  remote AS 666, external link
  BGP version 4, remote router ID 172.16.6.3
  BGP state = Established, up for 03:34:08
  Last read 00:00:10, last write 00:00:51, hold time is 180, keepalive interval is 60 seconds
  Neighbor sessions:
    1 active, is not multisession capable (disabled)
  Neighbor capabilities:
    Route refresh: advertised and received(new)
    Four-octets ASN Capability: advertised and received
    Address family IPv4 Unicast: advertised and received
    Multisession Capability: 
  Message statistics:
    InQ depth is 0
    OutQ depth is 0
    
                   Sent       Rcvd
    Opens:         1          1         
    Notifications: 0          0         
    Updates:       1          1         
    Keepalives:    193        235       
    Route Refresh: 0          0         
    Total:         195        237       
  Default minimum time between advertisement runs is 30 seconds

 For address family: IPv4 Unicast
  Session: 172.16.6.3
  BGP table version 3, neighbor version 3/0
  Output queue size : 0
  Index 3
  3 update-group member
                           Sent       Rcvd
  Prefix activity:         ----       ----
    Prefixes Current:      2          0         
    Prefixes Total:        4          0         
    Implicit Withdraw:     2          0         
    Explicit Withdraw:     0          0         
    Used as bestpath:      n/a        0         
    Used as multipath:     n/a        0         

                                Outbound    Inbound
  Local Policy Denied Prefixes: --------    -------
    Total:                       0          0         
  Number of NLRIs in the update sent: max 2, min 0

  Address tracking is enabled, the RIB does have a route to 172.16.6.3
  Connections established 5; dropped 4
  Last reset 03:34:09, due to User reset of session 1
  Transport(tcp) path-mtu-discovery is enabled
  Graceful-Restart is disabled&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 27 Dec 2023 13:59:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985930#M1107290</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T13:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985934#M1107291</link>
      <description>&lt;PRE&gt;firepower# &lt;STRONG&gt;show conn long&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;can you share this,&amp;nbsp;&lt;BR /&gt;the ACL will not work if there is already Conn in FPR&lt;BR /&gt;so if there is Conn then force the Peer to re-establish the BGP and check again&amp;nbsp;&lt;BR /&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 14:04:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985934#M1107291</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-27T14:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985939#M1107292</link>
      <description>&lt;P&gt;Like &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; said. You could also clear the conn for just the peer addresses listed.&lt;/P&gt;
&lt;P&gt;Also, the second Access-group command is for traffic THROUGH the firewall and thus not needed. You only need the control-plane ACL for traffic TO it.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 14:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985939#M1107292</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-12-27T14:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985943#M1107293</link>
      <description>&lt;P&gt;fw01-tgl-cph(config)# show conn all long&lt;BR /&gt;13 in use, 26 most used&lt;BR /&gt;&lt;BR /&gt;TCP SD-WAN-1: 172.16.6.3/179 (172.16.6.3/179) NP Identity Ifc: 172.16.6.1/10719 (172.16.6.1/10719), flags UO , idle 21s, uptime 1h44m, timeout 1h0m, bytes 1974&lt;BR /&gt;Initiator: 172.16.6.1, Responder: 172.16.6.3&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 15:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985943#M1107293</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T15:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985986#M1107297</link>
      <description>&lt;P&gt;Yeah I know, I just added it just in case it would work. ACL do work for transit traffic through the device but not to the device itself.&lt;BR /&gt;&lt;BR /&gt;I did try to clear bgp connection but it says 0 connections eventhough there are 2 established essions&lt;BR /&gt;&lt;BR /&gt;# clear conn protocol tcp port 179&lt;BR /&gt;0 connection(s) deleted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# show bgp summary&lt;/P&gt;&lt;P&gt;Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd&lt;BR /&gt;172.16.6.3 4 666 105 86 3 0 0 01:32:27 0&lt;BR /&gt;172.16.7.3 4 666 345 283 3 0 0 05:11:15 0&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 15:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4985986#M1107297</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T15:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986087#M1107299</link>
      <description>&lt;P&gt;I have cleared bgp sessions&lt;BR /&gt;&lt;BR /&gt;clear conn protocol tcp port 30-65535 all&lt;BR /&gt;&lt;BR /&gt;I saw state went to Idle, but then it established again.&lt;BR /&gt;&lt;BR /&gt;I have added the interface to access-group on "out" direction as well since the ASA itself seems to be the initiator for the BGP&lt;BR /&gt;&lt;BR /&gt;access-group DENY-ALL out interface SD-WAN-1&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;fw01-tgl-cph(config)# show conn all long protocol tcp address 172.16.6.3&lt;BR /&gt;13 in use, 26 most used&lt;/P&gt;&lt;P&gt;TCP SD-WAN-1: 172.16.6.3/179 (172.16.6.3/179) NP Identity Ifc: 172.16.6.1/30526 (172.16.6.1/30526), flags UO , idle 8s, uptime 5m29s, timeout 1h0m, bytes 283&lt;BR /&gt;Initiator: 172.16.6.1, Responder: 172.16.6.3&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 16:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986087#M1107299</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T16:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986105#M1107302</link>
      <description>&lt;P&gt;Yes if there is Conn' and in your case the ASA initiate the traffic so it builds conn so the Inbound ACL override by Conn and not work.&lt;/P&gt;
&lt;P&gt;Then you can use Outbound or disable bgp.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 16:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986105#M1107302</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-27T16:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986122#M1107309</link>
      <description>&lt;P&gt;I have configured ASA to be passive for bgp so other side is the initiator for BGP. And I can see it from the connection now.&lt;BR /&gt;&lt;BR /&gt;TCP SD-WAN-1: 172.16.6.3/14740 (172.16.6.3/14740) NP Identity Ifc: 172.16.6.1/179 (172.16.6.1/179), flags UOB , idle 8s, uptime 1h1m, timeout 1h0m, bytes 1233&lt;BR /&gt;Initiator: 172.16.6.3, Responder: 172.16.6.1&lt;BR /&gt;&lt;BR /&gt;But I still get BGP established even after clearing the conn. I can see BGP goes Idle and establishes later&lt;BR /&gt;&lt;BR /&gt;My purpose is not to stop bgp, but to understand the behaviour of ASA in general.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 17:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986122#M1107309</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T17:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986130#M1107310</link>
      <description>&lt;P&gt;How you config it as bgp passive' I see asa is initiator not responder.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 17:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986130#M1107310</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-27T17:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986140#M1107313</link>
      <description>&lt;P&gt;172.16.6.3 = Remote device&lt;BR /&gt;172.16.6.1 = ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;router bgp 8989&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor 172.16.6.3 remote-as 666&lt;BR /&gt;neighbor 172.16.6.3 transport connection-mode passive&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 18:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986140#M1107313</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T18:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986156#M1107314</link>
      <description>&lt;P&gt;&lt;SPAN&gt;neighbor &lt;STRONG&gt;172.16.6.3&lt;/STRONG&gt; transport connection-mode &lt;STRONG&gt;passive&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;All config is correct regarding bgp but still one thing' I check fastly and I dont get clear idea.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The zone with control plane' you config vlan6 with zone and security level 0.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The zone here in asa is different than zone in ftd.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Router have security zone&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Asa (or firepower with asa image) have secuirty and zone (zone meanly for traffic not for security)&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ftd (firepower with ftd image) use security zone&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So I remember you last post' I think you merge both zone and security in same interface and that explain this behavior.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can you remove zone from vlan and re connect the bgp and check the control plane secuirty acl.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 19:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986156#M1107314</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-27T19:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986160#M1107321</link>
      <description>&lt;P&gt;I have removed zone and still same result. So I am really confused right now.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;access-list DENY-ALL extended deny ip any any 
access-list DENY-ALL extended deny tcp any any 

access-group DENY-ALL in interface SD-WAN-1 control-plane
access-group DENY-ALL in interface SD-WAN-1
access-group DENY-ALL out interface SD-WAN-1

interface Ethernet1/10.6
vlan 6
nameif SD-WAN-1
security-level 0
ip address 172.16.6.1 255.255.255.0 standby 172.16.6.2 &lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;clear conn protocol tcp all address 172.16.6.3
1 connection(s) deleted.


fw01-tgl-cph(config)# show bgp summary 
Neighbor        V           AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd
172.16.6.3      4          666 0       0              1    0    0 00:00:09  Idle
172.16.7.3      4          666 163     136            3    0    0 02:26:00  0  

After roughly 3 min connection establishes again
# show bgp summary 
Neighbor        V           AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd
172.16.6.3      4          666 0       0              1    0    0 00:02:54  Idle
172.16.7.3      4          666 166     138            3    0    0 02:28:45  0    

fw01-tgl-cph(config)# show bgp summary 
Neighbor        V           AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd
172.16.6.3      4          666 4       3              3    0    0 00:00:22  0       
172.16.7.3      4          666 166     138            3    0    0 02:29:08  0  

fw01-tgl-cph(config)# show conn protocol tcp all address 172.16.6.3 long 
TCP SD-WAN-1: 172.16.6.3/55225 (172.16.6.3/55225) NP Identity Ifc: 172.16.6.1/179 (172.16.6.1/179), flags UOB , idle 18s, uptime 2m2s, timeout 1h0m, bytes 207
  Initiator: 172.16.6.3, Responder: 172.16.6.1&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 27 Dec 2023 19:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986160#M1107321</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T19:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986185#M1107325</link>
      <description>&lt;PRE class="p1"&gt;&lt;SPAN class="s1"&gt;ciscoasa# show access-list DENY-ALL&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Can you share this&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 20:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986185#M1107325</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-27T20:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986188#M1107326</link>
      <description>&lt;P&gt;# show access-list DENY-ALL&lt;BR /&gt;access-list DENY-ALL; 2 elements; name hash: 0xfa20fecd&lt;BR /&gt;access-list DENY-ALL line 1 extended deny ip any any (hitcnt=55) 0x42b7c013&lt;BR /&gt;access-list DENY-ALL line 2 extended deny tcp any any (hitcnt=0) 0xba274680&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 20:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986188#M1107326</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T20:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986208#M1107333</link>
      <description>&lt;P&gt;There is&amp;nbsp;&lt;SPAN&gt;(hitcnt=55) so the acl is work' clear bgp and check hitcnt.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And also do you receive any prefix via bgp ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 21:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986208#M1107333</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-27T21:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986220#M1107335</link>
      <description>&lt;P&gt;I have reset conn and cleared bgp. Session still establishes&lt;BR /&gt;&lt;BR /&gt;# show access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, &lt;STRONG&gt;denied 0&lt;/STRONG&gt; (deny-flow-max 4096)&lt;BR /&gt;access-list DENY-ALL; 2 elements; name hash: 0xfa20fecd&lt;BR /&gt;access-list DENY-ALL line 1 extended deny ip any any (hitcnt=55) 0x42b7c013&lt;BR /&gt;access-list DENY-ALL line 2 extended deny tcp any any (hitcnt=0) 0xba274680&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;yes I do receive route from Peer with Deny ACL&lt;/P&gt;&lt;P&gt;# show route bgp&lt;/P&gt;&lt;P&gt;B 192.168.0.0 255.255.255.0 [20/0] via &lt;STRONG&gt;172.16.6.3&lt;/STRONG&gt;, 00:00:31&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 21:56:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986220#M1107335</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-27T21:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986444#M1107348</link>
      <description>&lt;P&gt;From yesterday I think about this issue&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now let check if it bug or not'&lt;/P&gt;
&lt;P&gt;You deny all and there is no conn for icmp try ping from bgp peer and see if ping is success&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try telent and see if it success or not&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do that and each time monitor the acl hitcnt&lt;/P&gt;
&lt;P&gt;Also do you use asa 9.18 or later ver.?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 13:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986444#M1107348</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-28T13:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986475#M1107350</link>
      <description>&lt;P&gt;fw01-tgl-cph(config)# show version&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.16(2)3&lt;BR /&gt;SSP Operating System Version 2.10(1.172)&lt;BR /&gt;Device Manager Version 7.16(1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before trying ping&lt;BR /&gt;fw01-tgl-cph(config)# show access-list DENY-ALL&lt;BR /&gt;access-list DENY-ALL; 2 elements; name hash: 0xfa20fecd&lt;BR /&gt;access-list DENY-ALL line 1 extended deny ip any any (hitcnt=59) 0x42b7c013&lt;BR /&gt;access-list DENY-ALL line 2 extended deny tcp any any (hitcnt=0) 0xba274680&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I can ping from Remote device to ASA and it does not increase the hitcnt. I do not have icmp permit on that interface for the record as well.&lt;/P&gt;&lt;P&gt;If I try to telnet then telnet fails and I see incease in hitcnt&lt;/P&gt;&lt;P&gt;fw01-tgl-cph(config)# show access-list DENY-ALL&lt;BR /&gt;access-list DENY-ALL; 2 elements; name hash: 0xfa20fecd&lt;BR /&gt;access-list DENY-ALL line 1 extended deny ip any any (hitcnt=61) 0x42b7c013&lt;BR /&gt;access-list DENY-ALL line 2 extended deny tcp any any (hitcnt=0) 0xba274680&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 14:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4986475#M1107350</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-28T14:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4987241#M1107396</link>
      <description>&lt;P&gt;can you add Log to your acl and check if traffic hit the ACL or not&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 30 Dec 2023 09:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4987241#M1107396</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-30T09:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 1150 FPWR - Does not block bgp to device</title>
      <link>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4987351#M1107399</link>
      <description>&lt;P&gt;&lt;BR /&gt;It looks like It denies the TCP connection, but after 3 min the remote host uses a different port 35858 and connection establishes.&lt;/P&gt;&lt;P&gt;fw01-tgl-cph(config)# show logging&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt;Facility: 20&lt;BR /&gt;Timestamp logging: disabled&lt;BR /&gt;Hide Username logging: enabled&lt;BR /&gt;Standby logging: disabled&lt;BR /&gt;Debug-trace logging: disabled&lt;BR /&gt;Console logging: disabled&lt;BR /&gt;Monitor logging: disabled&lt;BR /&gt;Buffer logging: level debugging, 52 messages logged&lt;BR /&gt;Trap logging: disabled&lt;BR /&gt;Permit-hostdown logging: disabled&lt;BR /&gt;History logging: disabled&lt;BR /&gt;Device ID: disabled&lt;BR /&gt;Mail logging: disabled&lt;BR /&gt;ASDM logging: disabled&lt;BR /&gt;ng buffered 6'&lt;BR /&gt;%ASA-5-111008: User 'admin' executed the 'logging buffered 7' command.&lt;BR /&gt;%ASA-5-111010: User 'admin', running 'CLI' from IP 10.255.0.141, executed 'logging buffered 7'&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show running-config logging&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/33419 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/33419 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show logging&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 23574 for SD-WAN-1:172.16.6.3/58074 to identity:172.16.6.1/179 duration 0:01:39 bytes 323 Host is removed&lt;BR /&gt;%ASA-7-609002: Teardown local-host SD-WAN-1:172.16.6.3 duration 0:01:39&lt;BR /&gt;%ASA-5-111008: User 'admin' executed the 'clear conn all address 172.16.6.3' command.&lt;BR /&gt;%ASA-3-418018: neighbor 172.16.6.3 Down Peer closed the session&lt;BR /&gt;%ASA-3-418018: neighbor 172.16.6.3 IPv4 Unicast topology base removed from session Peer closed the session&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-7-609002: Teardown local-host identity:172.16.66.1 duration 0:02:01&lt;BR /&gt;%ASA-7-609002: Teardown local-host SERVICE-666:172.16.66.2 duration 0:02:01&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.6.3/58074 to 172.16.6.1/179 flags FIN PSH ACK on interface SD-WAN-1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 172.16.6.3/58074 to SD-WAN-1:172.16.6.1/179&lt;BR /&gt;%ASA-7-609001: Built local-host SD-WAN-1:172.16.6.3&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 23576 for SD-WAN-1:172.16.6.3/35858 (172.16.6.3/35858) to identity:172.16.6.1/179 (172.16.6.1/179)&lt;BR /&gt;%ASA-3-418018: neighbor 172.16.6.3 Up&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Eventhough it is logged, the ACL hitcnt doesn't increase&lt;BR /&gt;fw01-tgl-cph(config)# show access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;alert-interval 300&lt;BR /&gt;access-list DENY-ALL; 3 elements; name hash: 0xfa20fecd&lt;BR /&gt;access-list DENY-ALL line 1 extended deny ip any any log informational interval 300 (hitcnt=0) 0x42b7c013&lt;BR /&gt;access-list DENY-ALL line 2 extended deny tcp any any log informational interval 300 (hitcnt=0) 0xba274680&lt;BR /&gt;access-list DENY-ALL line 3 extended deny icmp any any log informational interval 300 (hitcnt=0) 0xe4e3a9ec&lt;/P&gt;</description>
      <pubDate>Sat, 30 Dec 2023 16:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-1150-fpwr-does-not-block-bgp-to-device/m-p/4987351#M1107399</guid>
      <dc:creator>oscardenizjensen</dc:creator>
      <dc:date>2023-12-30T16:31:06Z</dc:date>
    </item>
  </channel>
</rss>

