<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to clear a flow on Cisco ASA? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037959#M135881</link>
    <description>&lt;P&gt;I have an interface with an access-list bound to that interface as "in" ACL with the following line as first line of the ACL:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list from-mpls line 1 extended deny udp host 10.255.9.2 eq syslog host 10.255.7.254 eq syslog&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But with packet-tracer, i see the following:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input versatel-mpls udp 10.255.9.2 514 10.255.7.2 514 detailed&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found flow with id 2606510442, using existing flow&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_encrypt&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_ipsec_tunnel_flow&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: versatel-mpls&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How can i get rid of that existing flow, that leads here to allowing the packet even if the access-list denies it? The firmware of the ASA is 9.2.4(10).&lt;/P&gt;
&lt;P&gt;I know, i can get rid of that flow with rebooting the asa, but isn't there another possibility (the ASA is in production, so i can't just reboot at any time)?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 09:19:06 GMT</pubDate>
    <dc:creator>jilse-iph</dc:creator>
    <dc:date>2019-03-12T09:19:06Z</dc:date>
    <item>
      <title>How to clear a flow on Cisco ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037959#M135881</link>
      <description>&lt;P&gt;I have an interface with an access-list bound to that interface as "in" ACL with the following line as first line of the ACL:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list from-mpls line 1 extended deny udp host 10.255.9.2 eq syslog host 10.255.7.254 eq syslog&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But with packet-tracer, i see the following:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input versatel-mpls udp 10.255.9.2 514 10.255.7.2 514 detailed&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found flow with id 2606510442, using existing flow&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_encrypt&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_ipsec_tunnel_flow&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: versatel-mpls&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How can i get rid of that existing flow, that leads here to allowing the packet even if the access-list denies it? The firmware of the ASA is 9.2.4(10).&lt;/P&gt;
&lt;P&gt;I know, i can get rid of that flow with rebooting the asa, but isn't there another possibility (the ASA is in production, so i can't just reboot at any time)?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037959#M135881</guid>
      <dc:creator>jilse-iph</dc:creator>
      <dc:date>2019-03-12T09:19:06Z</dc:date>
    </item>
    <item>
      <title>I believe this should do it:</title>
      <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037960#M135882</link>
      <description>&lt;P&gt;I believe this should do it:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;clear conn protocol udp address 10.255.9.2 address 10.255.7.2&amp;nbsp;&lt;/PRE&gt;</description>
      <pubDate>Thu, 04 May 2017 14:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037960#M135882</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-04T14:19:07Z</dc:date>
    </item>
    <item>
      <title>After the "clear conn"</title>
      <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037961#M135883</link>
      <description>&lt;P&gt;After the "clear conn" command, the connection doesn't show up anymore, but the packet-tracer output still generates Phase 1 with "FLOW-LOOKUP" and a found flow. So that command deletes the connection from the connection table, but not the flow record from the flow-cache. Maybe it is a bug in firmware 9.2.4(10), but the questions remains: how can i get rid of that flow?&lt;/P&gt;
&lt;P&gt;I tried the "clear conn" already before i asked that question. I currently implemented a workaround with nat on several machines to make syslog traffic from one ASA not matching this flow anymore ...&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 07:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037961#M135883</guid>
      <dc:creator>jilse-iph</dc:creator>
      <dc:date>2017-05-05T07:45:32Z</dc:date>
    </item>
    <item>
      <title>That's an odd one - I've not</title>
      <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037962#M135884</link>
      <description>&lt;P&gt;That's an odd one - I've not seen it happen before that "clear conn" doesn't clear the flow.&lt;/P&gt;
&lt;P&gt;Does a packet capture show the traffic actively flowing?&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 09:35:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037962#M135884</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-05T09:35:53Z</dc:date>
    </item>
    <item>
      <title>No. The ASA is located at our</title>
      <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037963#M135885</link>
      <description>&lt;P&gt;No. The ASA is located at our customer, and i have no direct access to that network.&lt;/P&gt;
&lt;P&gt;But syslog messages reach our syslog server with the workaround (doing nat on several ASAs, so the traffic doesn't match that flow anymore), but that traffic doesn't reach our syslog server without that workaround (there is no ACL blocking that traffic). Seems, that i have tol ive with that workaround for the next time ...&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 10:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037963#M135885</guid>
      <dc:creator>jilse-iph</dc:creator>
      <dc:date>2017-05-05T10:29:36Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037964#M135886</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;try &lt;STRONG&gt;clear local-host &amp;lt;IP ADD&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 12:04:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037964#M135886</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-05-05T12:04:25Z</dc:date>
    </item>
    <item>
      <title>Unfortunately this did also</title>
      <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037965#M135887</link>
      <description>&lt;P&gt;Unfortunately this did also not work. But i have&amp;nbsp; a workaround (the nat configuration), so it is not so important anymore. Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 13:02:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3037965#M135887</guid>
      <dc:creator>jilse-iph</dc:creator>
      <dc:date>2017-05-05T13:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: I believe this should do it:</title>
      <link>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3715291#M135888</link>
      <description>&lt;P&gt;This worked for me. I was having the same issue as traffic was already on wire before i have created rule and after adding Block rule for the same traffic - snort verdict is allow. With the help of this command now its blocking the traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks Marvin!!&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 20:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-clear-a-flow-on-cisco-asa/m-p/3715291#M135888</guid>
      <dc:creator>pro_engineering</dc:creator>
      <dc:date>2018-09-28T20:14:42Z</dc:date>
    </item>
  </channel>
</rss>

