<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD2120 - asp drop - no-adjacency in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040716#M1109915</link>
    <description>&lt;P&gt;share&amp;nbsp;&lt;BR /&gt;show arp&amp;nbsp;&lt;BR /&gt;show arp stati&lt;/P&gt;
&lt;P&gt;capture of asp drop&amp;nbsp;&lt;BR /&gt;and packet-tracer you use&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
    <pubDate>Fri, 15 Mar 2024 11:15:07 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-03-15T11:15:07Z</dc:date>
    <item>
      <title>FTD2120 - asp drop - no-adjacency</title>
      <link>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040703#M1109914</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am seeking advice as I am seeing issue with traffic traversing over S2S VPN. I have attached topology of the remote site.&lt;/P&gt;&lt;P&gt;Remote site is running FTD2120 in Active/Standby version&amp;nbsp;7.3.1.1 and HQ running FTD2120 in Active/Standby version 7.0.6.&lt;/P&gt;&lt;P&gt;Site to Site VPN is up between sites and I see encaps and decaps of traffic traversing the VPN and I have implemented NAT and ACL's to allow the traffic between sites on specific zone etc.&lt;/P&gt;&lt;P&gt;However I am not able to ping from HQ to the Remote site device further down in SDA network and I see packets incrementing for asp drop for "No valid adjacency (no-adjacency)" I did packet capture for this asp drop reason and indeed I am able to see my ping messages there.&lt;/P&gt;&lt;P&gt;to give you an example, from HQ, I am pinging with source 10.70.0.101 to destination 10.90.65.199.&lt;/P&gt;&lt;P&gt;On Remote Site's FTD, I have security group XYZ_AV which has&amp;nbsp;10.90.2.33(34)/29 configured on firewall and has&amp;nbsp;10.90.2.35/29 on Fusion Switch 1 and&amp;nbsp;10.90.2.36/29 on Fusion Switch 2. There is static route on FTD in place with SLA for subnet 10.90.64.0/20 with next hop set&amp;nbsp;10.90.2.35:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;S 10.90.64.0 255.255.240.0 [1/0] via 10.90.2.35, xyz_av&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I check route from FTD for&amp;nbsp;10.90.65.199 is as followed:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; show route 10.90.65.199&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Routing entry for 10.90.64.0 255.255.240.0&lt;BR /&gt;Known via "static", distance 1, metric 0&lt;BR /&gt;Routing Descriptor Blocks:&lt;BR /&gt;* 10.90.2.35, via xyz_av&lt;BR /&gt;Route metric is 0, traffic share count is 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I was to check arp table, there is entry for&amp;nbsp;&lt;SPAN&gt;10.90.2.35, I am also able to Ping this&amp;nbsp;10.90.2.35 from firewall itself.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;I have also run "system support firewall-engine-debug" command and can see that there is match for allow rule for connection coming from HQ to this site and vice versa.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Any advise on how to fix this issue would be much appreciated.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 10:56:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040703#M1109914</guid>
      <dc:creator>AigarsK</dc:creator>
      <dc:date>2024-03-15T10:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD2120 - asp drop - no-adjacency</title>
      <link>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040716#M1109915</link>
      <description>&lt;P&gt;share&amp;nbsp;&lt;BR /&gt;show arp&amp;nbsp;&lt;BR /&gt;show arp stati&lt;/P&gt;
&lt;P&gt;capture of asp drop&amp;nbsp;&lt;BR /&gt;and packet-tracer you use&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 11:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040716#M1109915</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-15T11:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD2120 - asp drop - no-adjacency</title>
      <link>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040757#M1109917</link>
      <description>&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;&amp;gt; show arp&lt;BR /&gt;xyz_net_mgmt 10.90.2.3 242a.040d.48de 14028&lt;BR /&gt;xyz_net_mgmt 10.90.2.5 0000.0c07.ac01 14028&lt;BR /&gt;xyz_net_mgmt 10.90.2.4 748f.c28d.695e 14028&lt;BR /&gt;failover-link 172.21.255.2 cc79.d7c3.c5bc 526&lt;BR /&gt;xyz_prod 10.90.2.20 748f.c28d.6975 11356&lt;BR /&gt;xyz_prod 10.90.2.19 242a.040d.48f5 12107&lt;BR /&gt;xyz_iot 10.90.2.28 748f.c28d.6941 12467&lt;BR /&gt;xyz_iot 10.90.2.29 0000.0c07.ac04 14028&lt;BR /&gt;xyz_av 10.90.2.35 242a.040d.48f0 14028&lt;BR /&gt;xyz_av 10.90.2.36 748f.c28d.6970 14088&lt;BR /&gt;xyz_sec 10.90.2.11 242a.040d.48de 11897&lt;BR /&gt;xyz_sec 10.90.2.12 748f.c28d.695e 11927&lt;BR /&gt;dmz_mgmt 172.21.0.10 cc79.d7d0.1ef1 14028&lt;BR /&gt;dmz_mgmt 172.21.0.11 6c4e.f661.53f1 14028&lt;BR /&gt;xyz_guest_wifi 172.21.1.5 0000.0c07.ac06 12047&lt;BR /&gt;xyz_guest_wifi 172.21.1.4 748f.c28d.6941 12377&lt;BR /&gt;outside xxx.xxx.xx.xx 8c1e.804d.e700 7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show arp statistics&lt;BR /&gt;Number of ARP entries in ASA: 19&lt;/P&gt;&lt;P&gt;Dropped blocks in ARP: 158&lt;BR /&gt;Maximum Queued blocks: 16&lt;BR /&gt;Queued blocks: 0&lt;BR /&gt;Interface collision ARPs Received: 0&lt;BR /&gt;ARP-defense Gratuitous ARPS sent: 0&lt;BR /&gt;Total ARP retries: 138&lt;BR /&gt;Unresolved hosts: 0&lt;BR /&gt;Maximum Unresolved hosts: 8&lt;/P&gt;&lt;P&gt;capture asp type asp-drop&lt;/P&gt;&lt;P&gt;5: 11:19:39.074001 10.70.0.101 &amp;gt; 10.90.65.199 icmp: echo request Drop-reason: (no-adjacency) No valid adjacency, Drop-location: frame 0x000000aaad30c07c flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;system support firewall-engine-debug&lt;/P&gt;&lt;P&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 app event with client no change, service changed, payload no change, referred no change, misc no change, url no change, tls host no change, bits 0x5&lt;/P&gt;&lt;P&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 New firewall session&lt;BR /&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 using HW or preset rule order 3, 'SITE-to-SITE VPN Prod Traffic', action Trust and prefilter rule 0&lt;BR /&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 fastpath action&lt;BR /&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 Got end of flow event from hardware with flags 00002001&lt;BR /&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 Rule Match Data: rule_id 0, rule_action 0 rev_id 0, rule_flags 3&lt;BR /&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 Generating an EOF event with rule_id = 268435457 ruleAction = 3 ruleReason = 0&lt;BR /&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 Received EOF, deleting the snort session&lt;BR /&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 Deleting Firewall session flags=0x6e0040, logFlags=0x0&lt;BR /&gt;10.70.0.101 8 -&amp;gt; 10.90.65.199 0 1 AS=0 ID=1 GR=1-1 app event with client no change, service changed, payload no change, referred no change, misc no change, url no change, tls host no change, bits 0x5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From Remote site:&lt;/P&gt;&lt;P&gt;&amp;gt; packet-tracer input xyz_av icmp 10.90.65.199 1 2 10.70.0.101 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 36679 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb2a60760, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=4453179, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=xyz_av, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 23031 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (xyz_av,outside) source static VRF-xyz_av-10.90.64.0-20 VRF-xyz_av-10.90.64.0-20 destination static REMOTE-VPN-NET REMOTE-VPN-NET&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside(vrfid:0)&lt;BR /&gt;Untranslate 10.70.0.101/0 to 10.70.0.101/0&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 13008 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435457 ifc xyz_av object-group |acSrcNwg-268435457 ifc outside object-group |acDestNwg-268435457 rule-id 268435457 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L5 RULE: SITE-to-SITE VPN Prod Traffic&lt;BR /&gt;object-group service |acSvcg-268435457&lt;BR /&gt;service-object ip&lt;BR /&gt;object-group network |acSrcNwg-268435457&lt;BR /&gt;group-object LOCAL-VPN-NET&lt;BR /&gt;group-object REMOTE-VPN-NET&lt;BR /&gt;object-group network |acDestNwg-268435457&lt;BR /&gt;group-object LOCAL-VPN-NET&lt;BR /&gt;group-object REMOTE-VPN-NET&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xff9c3052f0, priority=12, domain=permit, deny=false&lt;BR /&gt;hits=20195, user_data=0xffe3846b80, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.90.0.0, mask=255.255.0.0, port=0, tag=any, ifc=xyz_av(vrfid:0)&lt;BR /&gt;dst ip/id=10.70.0.0, mask=255.255.0.0, port=0, tag=any, ifc=outside(vrfid:0), vlan=0,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 13008 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (xyz_av,outside) source static VRF-xyz_av-10.90.64.0-20 VRF-xyz_av-10.90.64.0-20 destination static REMOTE-VPN-NET REMOTE-VPN-NET&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.90.65.199/0 to 10.90.65.199/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffa03b1b30, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=20677, user_data=0xffb5a658a0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.90.64.0, mask=255.255.240.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.70.0.0, mask=255.255.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=xyz_av(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 13008 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb2023600, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=293889, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 13008 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb29a9830, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=84906, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=xyz_av(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 46915 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffc04c5440, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=4313, user_data=0xffc04c10e0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=xyz_av(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8530 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffc04d3400, priority=70, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=4313, user_data=0xffc04cf0a0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=xyz_av(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 17060 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xffc03ba9e0, priority=70, domain=encrypt, deny=false&lt;BR /&gt;hits=27535, user_data=0x28024e4, cs_id=0xffc0130100, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.90.0.0, mask=255.255.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.70.0.0, mask=255.255.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any(vrfid:65535), output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 5971 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (xyz_av,outside) source static VRF-xyz_av-10.90.64.0-20 VRF-xyz_av-10.90.64.0-20 destination static REMOTE-VPN-NET REMOTE-VPN-NET&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xffb59d4810, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=20674, user_data=0xffb446f920, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.90.64.0, mask=255.255.240.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.70.0.0, mask=255.255.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=xyz_av(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 107478 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 458182, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_encrypt&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14501 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 11272 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;service: ICMP(3501), client: (0), payload: (0), misc: ICMP(3501)&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 125196 ns&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 2, Rule ID 268435457&lt;BR /&gt;Additional Information:&lt;BR /&gt;Starting rule matching, zone 8 -&amp;gt; 2, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff&lt;BR /&gt;Matched rule ids 268435457 - Trust&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: xyz_av(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 448665 ns&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 12:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040757#M1109917</guid>
      <dc:creator>AigarsK</dc:creator>
      <dc:date>2024-03-15T12:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTD2120 - asp drop - no-adjacency</title>
      <link>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040762#M1109918</link>
      <description>&lt;P&gt;&lt;SPAN&gt;you use different IP in packet-tracer not 10.57.65.199 which show in ASP ARP drop ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 12:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040762#M1109918</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-15T12:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD2120 - asp drop - no-adjacency</title>
      <link>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040765#M1109919</link>
      <description>&lt;P&gt;My apologies, I did replace them for sharing purposes and that one skipped through my checks.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 12:18:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040765#M1109919</guid>
      <dc:creator>AigarsK</dc:creator>
      <dc:date>2024-03-15T12:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTD2120 - asp drop - no-adjacency</title>
      <link>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040767#M1109920</link>
      <description>&lt;P&gt;&amp;gt; packet-tracer input &lt;STRONG&gt;outside&lt;/STRONG&gt; icmp&amp;nbsp;&lt;STRONG&gt;10.70.0.101&lt;/STRONG&gt; 1 2 &lt;SPAN&gt;10.90.65.199&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;detailed &amp;lt;&amp;lt;- share this also,&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;10.90.65.x &amp;lt;&amp;lt;- this subnet is direct connect to FTD interface ? if not do you have route for this subnet ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 12:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040767#M1109920</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-15T12:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: FTD2120 - asp drop - no-adjacency</title>
      <link>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040793#M1109921</link>
      <description>&lt;P&gt;Thank you MHM,&lt;/P&gt;&lt;P&gt;I found an error in my configuration, I had run the command you asked, but I only paid attention to last entry stating "Drop-reason: (ipsec-spoof) IPSEC Spoof detected" completely omitting the fact that I had made error in NAT.&lt;/P&gt;&lt;P&gt;When this firewall was in its initial setup, I had one NAT entry for /16 which would have covered all IP addresses used in downstream in their according security zones.&lt;/P&gt;&lt;P&gt;What was happening here is as followed, traffic which was initiated from Remote Site would originate from correct security zone/interface which would created session state and NAT entry and be sent back across the VPN, as it it expects data in return it would use this session and NAT entry to return traffic from HQ to client. (confirmation bias as clients in downstream would get IP addresses from DHCP in HQ and DNS responses).&lt;/P&gt;&lt;P&gt;But any traffic generated by HQ, would traverse the S2S VPN and due to NAT, it got egressed on wrong interface and subsequently dropped.&lt;/P&gt;&lt;P&gt;Thanks for leading me onto this issue!&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 12:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd2120-asp-drop-no-adjacency/m-p/5040793#M1109921</guid>
      <dc:creator>AigarsK</dc:creator>
      <dc:date>2024-03-15T12:49:05Z</dc:date>
    </item>
  </channel>
</rss>

