<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ttl-exceeded- packet drop in Site to Site VPN tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139069#M1113937</link>
    <description>&lt;P&gt;what FW you use ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jul 2024 17:47:29 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-07-02T17:47:29Z</dc:date>
    <item>
      <title>ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139060#M1113932</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have a VPN site to site tunnel between USA and Asia.&lt;/P&gt;&lt;P&gt;The firewall in Asia can ping the Firewall in USA well, no packet loss.&lt;/P&gt;&lt;P&gt;However, a Asia Server&amp;nbsp; 10.89.100.5 ping a&amp;nbsp; USA server&amp;nbsp; (10.0.99.73 has packets loss.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet capture ASP drops show something as below. Does it relate to the issue? Please advise.&lt;/P&gt;&lt;P&gt;colo-fw1/pri/act# sh cap asp | i ttl&lt;BR /&gt;1: 12:18:02.529300 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request Drop-reason: (ttl-exceeded) ttl exceeded, Drop-location: frame 0x000000aab4d031a8 flow (NA)/NA&lt;BR /&gt;2: 12:18:07.518619 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request Drop-reason: (ttl-exceeded) ttl exceeded, Drop-location: frame 0x000000aab4d031a8 flow (NA)/NA&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Loc&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139060#M1113932</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T17:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139062#M1113934</link>
      <description>&lt;P&gt;it easy case you have loop in routing&amp;nbsp;&lt;BR /&gt;do packet tracer for traffic and I will help you to find issue&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139062#M1113934</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T17:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139066#M1113935</link>
      <description>&lt;P&gt;Thanks for quick respond. Here it is:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;[root@mdta-vip1 ~]# ping 10.89.100.5&lt;BR /&gt;PING 10.89.100.5 (10.89.100.5) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=1 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=2 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=3 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=4 ttl=126 time=249 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=5 ttl=126 time=251 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=6 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=7 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=8 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=9 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=10 ttl=126 time=247 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=11 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=13 ttl=126 time=247 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=14 ttl=126 time=267 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=15 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=16 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=17 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=18 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=19 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=20 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=21 ttl=126 time=248 ms&lt;BR /&gt;64 bytes from 10.89.100.5: icmp_seq=22 ttl=126 time=248 ms&lt;BR /&gt;^C&lt;BR /&gt;--- 10.89.100.5 ping statistics ---&lt;BR /&gt;22 packets transmitted, 21 received, 4% packet loss, time 21021ms&lt;BR /&gt;rtt min/avg/max/mdev = 247.818/249.255/267.203/4.125 ms&lt;BR /&gt;[root@mdta-vip1 ~]#&lt;BR /&gt;[root@mdta-vip1 ~]#&lt;BR /&gt;[root@mdta-vip1 ~]# traceroute 10.89.100.5&lt;BR /&gt;traceroute to 10.89.100.5 (10.89.100.5), 30 hops max, 60 byte packets&lt;BR /&gt;1&amp;nbsp; gateway (10.0.99.250)&amp;nbsp; 0.905 ms * *&lt;BR /&gt;2&amp;nbsp; 10.89.100.5 (10.89.100.5)&amp;nbsp; 249.933 ms&amp;nbsp; 250.169 ms&amp;nbsp; 249.527 ms&lt;BR /&gt;3&amp;nbsp; * * *&lt;BR /&gt;4&amp;nbsp; 10.89.100.5 (10.89.100.5)&amp;nbsp; 249.127 ms * *&lt;BR /&gt;[root@mdta-vip1 ~]#&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139066#M1113935</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T17:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139069#M1113937</link>
      <description>&lt;P&gt;what FW you use ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139069#M1113937</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T17:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139071#M1113938</link>
      <description>&lt;P&gt;My end is Cisco ASA. I don't know the other end yet.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139071#M1113938</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T17:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139077#M1113939</link>
      <description>&lt;P&gt;ciscoasa# show route &lt;SPAN&gt;10.0.99.73&lt;/SPAN&gt;&amp;nbsp;longer-prefixes &amp;lt;&amp;lt;- this must point to OUT (interface config with IKEv1 or IKEv2 IPsec S2S)&lt;/P&gt;
&lt;P&gt;if it point to IN interface or any nameif interface other than IPsec then ASA have two route&amp;nbsp;&lt;BR /&gt;one is 10.0.0.0/8 or 10.0.0.0/16 and other is 0.0.0.0&lt;/P&gt;
&lt;P&gt;the ASA is prefer the 10.0.0.0/8 or 10.0.0.0/16 and hence the packet is looping&amp;nbsp;&lt;BR /&gt;what you need is only tune your route in ASA that it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 18:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139077#M1113939</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T18:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139082#M1113941</link>
      <description>&lt;P&gt;- 10.0.99.73 is the server at my end.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- I did not see my firewall has routes to&amp;nbsp;10.89.100.x ;&lt;/P&gt;&lt;P&gt;- Which side do you think has network loop?&amp;nbsp;&lt;/P&gt;&lt;P&gt;colo-fw1/pri/act# show route 10.0.99.73&lt;/P&gt;&lt;P&gt;Routing entry for 10.0.99.0 255.255.255.0&lt;BR /&gt;Known via "connected", distance 0, metric 0 (connected, via interface)&lt;BR /&gt;Routing Descriptor Blocks:&lt;BR /&gt;* directly connected, via inside&lt;BR /&gt;Route metric is 0, traffic share count is 1&lt;/P&gt;&lt;P&gt;colo-fw1/pri/act# show route 10.89.100.5&lt;/P&gt;&lt;P&gt;% Subnet not in table&lt;/P&gt;&lt;P&gt;colo-fw1/pri/act# show route 10.89.100.0&lt;/P&gt;&lt;P&gt;% Subnet not in table&lt;/P&gt;&lt;P&gt;colo-fw1/pri/act# show route&lt;/P&gt;&lt;P&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloaded static route, + - replicated route&lt;BR /&gt;SI - Static InterVRF&lt;BR /&gt;Gateway of last resort is 216.x.x.33 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 216.x.x.33, outside&lt;BR /&gt;C 10.0.99.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;L 10.0.99.250 255.255.255.255 is directly connected, inside&lt;BR /&gt;V 10.10.15.20 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.10.15.35 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.10.115.20 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.10.115.35 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.62.9.48 255.255.255.240 connected by VPN (advertised), outside&lt;BR /&gt;V 10.62.105.48 255.255.255.240 connected by VPN (advertised), outside&lt;BR /&gt;V 10.88.70.0 255.255.255.0 connected by VPN (advertised), outside&lt;BR /&gt;V 10.102.1.0 255.255.255.0 connected by VPN (advertised), outside&lt;BR /&gt;V 10.103.1.25 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.103.1.35 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.254.252.0 255.255.255.0 connected by VPN (advertised), outside&lt;BR /&gt;C 10.254.254.0 255.255.255.0 is directly connected, netlab&lt;BR /&gt;L 10.254.254.1 255.255.255.255 is directly connected, netlab&lt;BR /&gt;V 172.16.0.0 255.255.252.0 connected by VPN (advertised), outside&lt;BR /&gt;V 172.17.0.0 255.255.252.0 connected by VPN (advertised), outside&lt;BR /&gt;V 172.17.15.0 255.255.255.0 connected by VPN (advertised), outside&lt;BR /&gt;C 172.31.255.0 255.255.255.252 is directly connected, lanfo&lt;BR /&gt;L 172.31.255.1 255.255.255.255 is directly connected, lanfo&lt;BR /&gt;C 172.31.255.4 255.255.255.252 is directly connected, statefo&lt;BR /&gt;L 172.31.255.5 255.255.255.255 is directly connected, statefo&lt;BR /&gt;C 216.x.x.32 255.255.255.240 is directly connected, outside&lt;BR /&gt;L 216.x.x.36 255.255.255.255 is directly connected, outside&lt;/P&gt;&lt;P&gt;colo-fw1/pri/act#&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 18:23:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139082#M1113941</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T18:23:10Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139088#M1113942</link>
      <description>&lt;P&gt;the FW that server 10.0.99.73 connect to&amp;nbsp;&lt;BR /&gt;I make simple draw about issue take look&amp;nbsp;&lt;BR /&gt;check point I mention&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asas loop issue.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/222137i99D95D2B386607CA/image-size/large?v=v2&amp;amp;px=999" role="button" title="asas loop issue.png" alt="asas loop issue.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 18:45:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139088#M1113942</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T18:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139108#M1113944</link>
      <description>&lt;P&gt;Default gateway of server is the firewall. I don't see there is a room for network loop at this side.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Packet capture inside interface on firewall :&lt;BR /&gt;colo-fw1/pri/act# show cap in | i 10.0.99.73&lt;BR /&gt;1: 12:13:40.132576 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request&lt;BR /&gt;2: 12:13:40.132714 10.0.99.73 &amp;gt; 10.89.100.5 icmp: echo reply&lt;BR /&gt;3: 12:13:40.441505 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request&lt;BR /&gt;4: 12:13:40.441658 10.0.99.73 &amp;gt; 10.89.100.5 icmp: echo reply&lt;BR /&gt;7: 12:13:41.143272 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request&lt;BR /&gt;8: 12:13:41.143455 10.0.99.73 &amp;gt; 10.89.100.5 icmp: echo reply&lt;/P&gt;&lt;P&gt;- Server&amp;nbsp;10.0.99.73 routing table:&lt;/P&gt;&lt;P&gt;[locngu@mdta-vip1 ~]$ route -n&lt;BR /&gt;Kernel IP routing table&lt;BR /&gt;Destination Gateway Genmask Flags Metric Ref Use Iface&lt;BR /&gt;0.0.0.0 10.0.99.250 0.0.0.0 UG 100 0 0 ens192&lt;BR /&gt;0.0.0.0 10.0.0.250 0.0.0.0 UG 101 0 0 ens224&lt;BR /&gt;10.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 ens224&lt;BR /&gt;10.0.0.0 0.0.0.0 255.255.255.0 U 100 0 0 ens224&lt;BR /&gt;10.0.99.0 0.0.0.0 255.255.255.0 U 0 0 0 ens192&lt;BR /&gt;10.0.99.0 0.0.0.0 255.255.255.0 U 100 0 0 ens192&lt;BR /&gt;192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0&lt;BR /&gt;[locngu@mdta-vip1 ~]$&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;.250 is firewall IP&lt;BR /&gt;colo-fw1/pri/act# show ip&lt;BR /&gt;System IP Addresses:&lt;BR /&gt;Interface Name IP address Subnet mask Method&lt;BR /&gt;Port-channel1 inside 10.0.99.250 255.255.255.0 CONFIG&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 20:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139108#M1113944</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T20:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139109#M1113945</link>
      <description>&lt;P&gt;Do you think the issue stays here?&lt;/P&gt;&lt;P&gt;[locngu@mdta-vip1 ~]$ route -n | grep 100&lt;BR /&gt;0.0.0.0 10.0.99.250 0.0.0.0 UG 100 0 0 ens192&lt;BR /&gt;10.0.0.0 0.0.0.0 255.255.255.0 U 100 0 0 ens224&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 20:05:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139109#M1113945</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T20:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139111#M1113947</link>
      <description>&lt;P&gt;This routing for Which device in my topolgy ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 20:09:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139111#M1113947</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T20:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139115#M1113949</link>
      <description>&lt;P&gt;- Server&amp;nbsp;10.0.99.73 routing table=server 2:&lt;/P&gt;&lt;P&gt;[locngu@mdta-vip1 ~]$ route -n&lt;BR /&gt;Kernel IP routing table&lt;BR /&gt;Destination Gateway Genmask Flags Metric Ref Use Iface&lt;BR /&gt;0.0.0.0 10.0.99.250 0.0.0.0 UG 100 0 0 ens192&lt;BR /&gt;0.0.0.0 10.0.0.250 0.0.0.0 UG 101 0 0 ens224&lt;BR /&gt;10.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 ens224&lt;BR /&gt;10.0.0.0 0.0.0.0 255.255.255.0 U 100 0 0 ens224&lt;BR /&gt;10.0.99.0 0.0.0.0 255.255.255.0 U 0 0 0 ens192&lt;BR /&gt;10.0.99.0 0.0.0.0 255.255.255.0 U 100 0 0 ens192&lt;BR /&gt;192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;L3SW: we don't have L3 switch.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 20:16:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139115#M1113949</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T20:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139117#M1113950</link>
      <description>&lt;P&gt;This capture in ASA2 (in my topolgy) inside is good there is no looping.&lt;/P&gt;
&lt;P&gt;Below in your original post is from asa2 ( in my topolgy)&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;colo-fw1/pri/act# sh cap asp | i ttl&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1: 12:18:02.529300 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request Drop-reason: (ttl-exceeded) ttl exceeded, Drop-location: frame 0x000000aab4d031a8 flow (NA)/NA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 20:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139117#M1113950</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T20:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139121#M1113952</link>
      <description>&lt;P&gt;Sorry I just read this. So you think loop may stay at ASA1 network, don't you?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 20:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139121#M1113952</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T20:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139127#M1113953</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;colo&lt;/STRONG&gt;-&lt;STRONG&gt;fw1&lt;/STRONG&gt;/pri/act# sh cap asp | i ttl&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1: 12:18:02.529300 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request Drop-reason: (ttl-exceeded) ttl exceeded, Drop-location: frame 0x000000aab4d031a8 flow (NA)/NA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;this Colo-FW1 is ASA2 in my topolgy which connect to server 10.0.99.73 ?&lt;BR /&gt;if Yes and then you&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;capture traffic in ASA2 Inside interface and you see request/reply ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 21:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139127#M1113953</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T21:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139145#M1113954</link>
      <description>&lt;P&gt;Yes, I see replied from inside interface:&lt;/P&gt;&lt;P&gt;colo-fw1/pri/act# show cap in | i 10.0.99.73&lt;BR /&gt;1: 12:13:40.132576 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request&lt;BR /&gt;2: 12:13:40.132714 10.0.99.73 &amp;gt; 10.89.100.5 icmp: echo reply&lt;BR /&gt;3: 12:13:40.441505 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request&lt;BR /&gt;4: 12:13:40.441658 10.0.99.73 &amp;gt; 10.89.100.5 icmp: echo reply&lt;BR /&gt;7: 12:13:41.143272 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 21:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139145#M1113954</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-02T21:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139146#M1113955</link>
      <description>&lt;P&gt;then it temporally loop, if you ping from site to site over vpn and there is no drop then every thing is OK.&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 21:59:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139146#M1113955</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T21:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139173#M1113957</link>
      <description>&lt;P&gt;Nope, the drop in ASP-DROP is still there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;51: 19:25:17.180944 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request Drop-reason: (ttl-exceeded) ttl exceeded, Drop-location: frame 0x000000aab4d031a8 flow (NA)/NA&lt;BR /&gt;71: 19:25:22.168951 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request Drop-reason: (ttl-exceeded) ttl exceeded, Drop-location: frame 0x000000aab4d031a8 flow (NA)/NA&lt;BR /&gt;colo-fw1/pri/act#&lt;/P&gt;&lt;P&gt;Ping still replies normally in the inside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;colo-fw1/pri/act# show cap in | i 10.0.99.73&lt;BR /&gt;3: 19:27:54.472708 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request&lt;BR /&gt;4: 19:27:54.472875 10.0.99.73 &amp;gt; 10.89.100.5 icmp: echo reply&lt;BR /&gt;5: 19:27:54.540545 10.0.99.73.4001 &amp;gt; 10.89.100.131.50082: P 3096680285:3096680333(48) ack 1114464398 win 238&lt;BR /&gt;6: 19:27:54.541414 10.0.99.73.4001 &amp;gt; 10.89.100.148.64767: P 2833687425:2833687473(48) ack 1772863204 win 238&lt;BR /&gt;7: 19:27:54.830080 10.89.100.148.64767 &amp;gt; 10.0.99.73.4001: . ack 2833687473 win 1020&lt;BR /&gt;8: 19:27:54.830447 10.89.100.131.50082 &amp;gt; 10.0.99.73.4001: . ack 3096680333 win 1020&lt;BR /&gt;11: 19:27:55.480352 10.89.100.5 &amp;gt; 10.0.99.73 icmp: echo request&lt;/P&gt;&lt;P&gt;Users report the connection is slow.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 00:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139173#M1113957</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-03T00:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139581#M1113981</link>
      <description>&lt;P&gt;The network team at ASA1 worked with its ISP and change routes for it to a better path. Problem is solved. Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 17:04:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5139581#M1113981</guid>
      <dc:creator>loc.nguyen</dc:creator>
      <dc:date>2024-07-03T17:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: ttl-exceeded- packet drop in Site to Site VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5140547#M1114028</link>
      <description>&lt;P&gt;You are so so welcome&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2024 11:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ttl-exceeded-packet-drop-in-site-to-site-vpn-tunnel/m-p/5140547#M1114028</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-05T11:17:34Z</dc:date>
    </item>
  </channel>
</rss>

