<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Looking at just the case you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893653#M155011</link>
    <description>&lt;P&gt;Looking at just the case you posted, "&lt;SPAN&gt;10.10.100.44:58773 to 10.10.1.3:80", it using the&amp;nbsp;BYOD_IN zone-pair, which is using the&amp;nbsp;BYOD_IN_POLICY service policy. &amp;nbsp;Traffic is going from VLAN40 to VLAN75.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This class of traffic is current set to "pass" rather than "inspect", so it wont create a return path to allow the return traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;policy-map type inspect BYOD_IN_POLICY&lt;BR /&gt;&lt;STRONG&gt; class type inspect BYOD_TO_NAS&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;   pass log&lt;/STRONG&gt;&lt;BR /&gt; class type inspect BYOD_TO_IN_DNS&lt;BR /&gt;   inspect&lt;BR /&gt; class type inspect BYOD_TO_DC&lt;BR /&gt;   pass log&lt;BR /&gt; class class-default&lt;BR /&gt; drop log&lt;/SPAN&gt;&lt;/PRE&gt;</description>
    <pubDate>Sun, 10 Apr 2016 19:56:26 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-04-10T19:56:26Z</dc:date>
    <item>
      <title>HELP Ios ZBF Drops TCP traffic with "Invalid Segment"</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893643#M155000</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After more than a week researching this i am just about ready to throw the box off the window.&lt;/P&gt;
&lt;P&gt;In the office we have four zones configured on an ISR-G2 router. Namely the outside, inside, dmz and byod.&lt;/P&gt;
&lt;P&gt;I am trying to inspect a set of protocols on traffic going from the byod to the inside but the router keeps droping all tcp traffic&amp;nbsp;with the following message:&lt;/P&gt;
&lt;P&gt;156277: Apr &amp;nbsp;7 16:34:36.679 EET: %FW-6-DROP_PKT: Dropping tcp session 10.10.100.44:58773 10.10.1.3:80 on zone-pair BYOD_IN class BYOD_TO_NAS due to &amp;nbsp;Invalid Segment with ip ident 17171&lt;/P&gt;
&lt;P&gt;What I&amp;nbsp;find is interesting is that the box seems to be dropping only tcp traffic, udp and icmp goes through properly&lt;/P&gt;
&lt;P&gt;This is definately a firewall issue since when&amp;nbsp;I&amp;nbsp;change&amp;nbsp;the related class map to pass traffic then traffic goes through as expected.&lt;/P&gt;
&lt;P&gt;The box is running the following ios.&lt;/P&gt;
&lt;P&gt;Version 15.4(3)M3, RELEASE SOFTWARE (fc2)&lt;/P&gt;
&lt;P&gt;I have posted&amp;nbsp;below the relevant part from my config for your consideration.&lt;/P&gt;
&lt;P&gt;Please let me know if you see anything out of place.&lt;/P&gt;
&lt;P&gt;I would also be happy&amp;nbsp;if you could point me to some&amp;nbsp;document that I&amp;nbsp;may have missed that may explain this behavior.&lt;/P&gt;
&lt;P&gt;I thank you all in advance,&lt;/P&gt;
&lt;P&gt;Stathis&lt;/P&gt;
&lt;P&gt;Config follows:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;========================&lt;/P&gt;
&lt;P&gt;INTERFACE CONFIGIRATION&lt;/P&gt;
&lt;P&gt;========================&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description BYOD_NETWORK&lt;BR /&gt; ip address 10.10.100.2 255.255.255.0&lt;BR /&gt; ip helper-address 10.10.1.4&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; zone-member security BYOD&lt;BR /&gt; ip tcp adjust-mss 1412&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;interface Vlan75&lt;BR /&gt; description Management Vlan&lt;BR /&gt; ip address 10.10.1.101 255.255.255.0&lt;BR /&gt; ip helper-address 10.10.1.4&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip authentication mode eigrp 100 md5&lt;BR /&gt; ip authentication key-chain eigrp 100 EIGRP_KEYS&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt; ip tcp adjust-mss 1412&lt;BR /&gt; ip policy route-map Distribute&lt;BR /&gt; ip ospf authentication message-digest&lt;BR /&gt; ip ospf message-digest-key 1 md5 7 xxxxx&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;============================&lt;/P&gt;
&lt;P&gt;BYOD TO SERVER POLICIES&lt;/P&gt;
&lt;P&gt;============================&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt; Policy Map type inspect BYOD_IN_POLICY&lt;BR /&gt; Class BYOD_TO_NAS&lt;BR /&gt; Inspect&lt;BR /&gt; Class BYOD_TO_IN_DNS&lt;BR /&gt; Inspect&lt;BR /&gt; Class class-default&lt;BR /&gt; Drop log&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Class Map type inspect match-all BYOD_TO_NAS&lt;BR /&gt; Match class-map BYOD_TO_NAS_PROTOCOLS&lt;BR /&gt; Match access-group name BYOD_TO_NAS&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Class Map type inspect match-any BYOD_TO_NAS_PROTOCOLS&lt;BR /&gt; Match protocol http&lt;BR /&gt; Match protocol https&lt;BR /&gt; Match protocol ftp&lt;BR /&gt; Match protocol microsoft-ds&lt;BR /&gt; Match protocol nfs&lt;BR /&gt; Match protocol cifs&lt;BR /&gt; Match protocol netbios-dgm&lt;BR /&gt; Match protocol netbios-ns&lt;BR /&gt; Match protocol netbios-ssn&lt;BR /&gt; Match protocol ftps&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Extended IP access list BYOD_TO_NAS&lt;BR /&gt; 10 permit ip 10.10.100.0 0.0.0.255 host 10.10.1.3&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;===============================&lt;/P&gt;
&lt;P&gt;SERVER TO BYOD POLICIES&lt;/P&gt;
&lt;P&gt;===============================&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Policy Map type inspect IN_TO_BYOD_ALLOWED&lt;BR /&gt; Class NAS_TO_BYOD&lt;BR /&gt; Inspect&lt;BR /&gt; Class class-default&lt;BR /&gt; Drop log&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Class Map type inspect match-all NAS_TO_BYOD&lt;BR /&gt; Match class-map IN_TO_BYOD_GENERAL_PROTOCOLS&lt;BR /&gt; Match access-group name NAS_TO_BYOD&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Class Map type inspect match-any IN_TO_BYOD_GENERAL_PROTOCOLS (id 264)&lt;BR /&gt; Match protocol tcp&lt;BR /&gt; Match protocol udp&lt;BR /&gt; Match protocol icmp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Extended IP access list NAS_TO_BYOD&lt;BR /&gt; 10 permit ip host 10.10.1.3 10.10.100.0 0.0.0.255&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893643#M155000</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2019-03-12T07:35:44Z</dc:date>
    </item>
    <item>
      <title>Are you able to upgrade to 15</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893644#M155001</link>
      <description>&lt;P&gt;Are you able to upgrade to 15.4(3)M5?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Try changing this:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;Class Map type inspect match-all BYOD_TO_NAS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;  Match class-map BYOD_TO_NAS_PROTOCOLS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;  Match access-group name BYOD_TO_NAS&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;to:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;&lt;SPAN&gt;Class Map type inspect match-all BYOD_TO_NAS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;  Match access-group name BYOD_TO_NAS&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And see if that has any impact. &amp;nbsp;I don't think there is much advantage to specifying the protocols as well. &amp;nbsp;And if you are missing a protocol it will break it - and well, it is broken at the moment.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2016 20:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893644#M155001</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-07T20:09:22Z</dc:date>
    </item>
    <item>
      <title>Hi Philip,</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893645#M155002</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks very much for taking a look at this.&lt;/P&gt;
&lt;P&gt;Actually I don't think i can upgrade the ios and in fact I&amp;nbsp;think I&amp;nbsp;have already tried to remove the protocols and allow all as you suggested but i think this has to impact.&lt;/P&gt;
&lt;P&gt;I will give it another shot tomorrow since i am not in the office right now.&lt;/P&gt;
&lt;P&gt;Do you think this is related to the version of the ios are there any reported bugs?&lt;/P&gt;
&lt;P&gt;Thanks again,&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2016 20:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893645#M155002</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-07T20:17:52Z</dc:date>
    </item>
    <item>
      <title>I think there is a 10% change</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893646#M155004</link>
      <description>&lt;P&gt;I think there is a 10% change it is the IOS version. &amp;nbsp;But 15.4(3)M5 is the current maintenance release in that train - so the router has like got two service packs of bug fixes available for it that have not been applied.&lt;/P&gt;
&lt;P&gt;Might as well apply bug fix releases when they are available if you are having an issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am more suspicious about the protocol selection.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2016 20:22:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893646#M155004</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-07T20:22:09Z</dc:date>
    </item>
    <item>
      <title>Sure ok.</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893647#M155005</link>
      <description>&lt;P&gt;Sure ok.&lt;/P&gt;
&lt;P&gt;I 'll try to get that release and see if anything changes.&lt;/P&gt;
&lt;P&gt;It just does not make any sense to me that the same box is allowing inter zone traffic for the outside to inside and vice versa but is dropping byod to inside and vice versa. I also tried an intrazone config and its droping everything there as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Essentially i changed the config on the interface from BYOD to inside and it still dropped everything.&lt;/P&gt;
&lt;P&gt;Anyway i ll try to work on this tomorrow and will let you know how it goes.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Stathis&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2016 20:27:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893647#M155005</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-07T20:27:37Z</dc:date>
    </item>
    <item>
      <title>Hi Philip,</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893648#M155006</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;I just tried your suggestion and we can see that with just the inspect in place there is no change.&lt;/P&gt;
&lt;P&gt;So if we remove the protocols everything gets dropped. Again we see the same message on the firewall&lt;/P&gt;
&lt;P&gt;159393: Apr 8 12:34:11.947 EET: %FW-6-DROP_PKT: Dropping tcp session 10.10.100.43:49266 10.10.1.3:5222 on zone-pair BYOD_IN class BYOD_TO_NAS due to Invalid Segment with ip ident 1262&lt;/P&gt;
&lt;P&gt;I am trying to get a hold of the new ios version but i fear this will not resolve this.&lt;/P&gt;
&lt;P&gt;Any ideas will be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2016 09:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893648#M155006</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-08T09:42:49Z</dc:date>
    </item>
    <item>
      <title>Hi again,</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893649#M155007</link>
      <description>&lt;P&gt;Hi again,&lt;/P&gt;
&lt;P&gt;We were able to get the new firmware after all and unfortunately there is no change.&lt;/P&gt;
&lt;P&gt;We still get the same messages all tcp traffic is still blocked between the zones with the same generic "Invalid Segment with ip ident" message.&lt;/P&gt;
&lt;P&gt;If anyone could shed some light into this i would be grateful.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2016 16:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893649#M155007</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-08T16:04:20Z</dc:date>
    </item>
    <item>
      <title>Are you able to attach your</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893650#M155008</link>
      <description>&lt;P&gt;Are you able to attach your config to the thread as a file attachment?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 12:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893650#M155008</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-10T12:35:11Z</dc:date>
    </item>
    <item>
      <title>Hi Philip,</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893651#M155009</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;I have attached a sanitised version of the config as requested.&lt;/P&gt;
&lt;P&gt;Please let me know if you see anything that would explain this behavior.&lt;/P&gt;
&lt;P&gt;I thank you in advance&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 13:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893651#M155009</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-10T13:47:29Z</dc:date>
    </item>
    <item>
      <title>There servers and devices</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893652#M155010</link>
      <description>&lt;P&gt;There servers and devices definitely only have a single NIC in them, and there is only a single default gateway in each network? &amp;nbsp;If traffic went by one path and came back by another you might be able to get an error like this.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 19:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893652#M155010</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-10T19:49:28Z</dc:date>
    </item>
    <item>
      <title>Looking at just the case you</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893653#M155011</link>
      <description>&lt;P&gt;Looking at just the case you posted, "&lt;SPAN&gt;10.10.100.44:58773 to 10.10.1.3:80", it using the&amp;nbsp;BYOD_IN zone-pair, which is using the&amp;nbsp;BYOD_IN_POLICY service policy. &amp;nbsp;Traffic is going from VLAN40 to VLAN75.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This class of traffic is current set to "pass" rather than "inspect", so it wont create a return path to allow the return traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;policy-map type inspect BYOD_IN_POLICY&lt;BR /&gt;&lt;STRONG&gt; class type inspect BYOD_TO_NAS&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;   pass log&lt;/STRONG&gt;&lt;BR /&gt; class type inspect BYOD_TO_IN_DNS&lt;BR /&gt;   inspect&lt;BR /&gt; class type inspect BYOD_TO_DC&lt;BR /&gt;   pass log&lt;BR /&gt; class class-default&lt;BR /&gt; drop log&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 10 Apr 2016 19:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893653#M155011</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-10T19:56:26Z</dc:date>
    </item>
    <item>
      <title>Hi Philip,</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893654#M155012</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;All servers and clients have the right DHCP confifuration with a single default gateway on each network.&lt;/P&gt;
&lt;P&gt;The configuration has been modified with pass since the inspect drops all tcp traffic as i have explained.&lt;/P&gt;
&lt;P&gt;When we change to inspect, as it should be, we see the logs that i have already posted and all tcp (and only tcp) traffic blocked.&lt;/P&gt;
&lt;P&gt;Wireshark reveals nothing of interest.&lt;/P&gt;
&lt;P&gt;Do you see anything on the config that would suggest this madness?&lt;/P&gt;
&lt;P&gt;Many thanks,&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 20:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893654#M155012</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-10T20:14:30Z</dc:date>
    </item>
    <item>
      <title>Negative, I do not see</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893655#M155014</link>
      <description>&lt;P&gt;Negative, I do not see anything else that would cause this issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hold everything, you have a route-map on vlan75,&amp;nbsp;Distribute_traffic, which is also matching this traffic and forcing it out somewhere different.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can we do a quick experiment? &amp;nbsp;Change back to using "inspect" and remote "Distribute_traffic" from vlan75. &amp;nbsp;Then you can put it back.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If this makes it work then we need to modify&amp;nbsp;Distribute_traffic so that it does not apply to this traffic.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 20:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893655#M155014</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-10T20:20:57Z</dc:date>
    </item>
    <item>
      <title>You probably need to change</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893656#M155015</link>
      <description>&lt;P&gt;You probably need to change the access-lists used by Distribute_traffic from being like:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ip access-list extended Mgt_Network
 permit ip host 10.10.1.4 any
 permit ip host 10.10.1.3 any&lt;/PRE&gt;
&lt;P&gt;to being like:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ip access-list extended Mgt_Network&lt;BR /&gt; deny ip 10.10.1.4 10.10.100.0 0.0.0.255&lt;BR /&gt; deby ip 10.10.1.3 10.10.100 0.0.0.255
 permit ip host 10.10.1.4 any
 permit ip host 10.10.1.3 any&lt;/PRE&gt;</description>
      <pubDate>Sun, 10 Apr 2016 20:23:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893656#M155015</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-10T20:23:13Z</dc:date>
    </item>
    <item>
      <title>Hi Philip,</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893657#M155016</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;Yeah that actually does make some sense. Let me try this and i will get back to you with the results shortly.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 20:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893657#M155016</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-10T20:33:26Z</dc:date>
    </item>
    <item>
      <title>Hi Philip,</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893658#M155017</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I did try this suggestion but unfortunately there is no change.&lt;/P&gt;
&lt;P&gt;I also tried removing the route-map completely again the same behavior persists.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 21:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893658#M155017</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-10T21:05:25Z</dc:date>
    </item>
    <item>
      <title>Hi All,</title>
      <link>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893659#M155018</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We were able to resolve this after all.&lt;/P&gt;
&lt;P&gt;It was actually not related to that particular ISR.&lt;/P&gt;
&lt;P&gt;In fact the problem was with a core switch in the network that was interefering with the routing to that router.&lt;/P&gt;
&lt;P&gt;Thank you Philip for the interest you demonstrated in this.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2016 08:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-ios-zbf-drops-tcp-traffic-with-quot-invalid-segment-quot/m-p/2893659#M155018</guid>
      <dc:creator>stathis_iku</dc:creator>
      <dc:date>2016-04-18T08:56:07Z</dc:date>
    </item>
  </channel>
</rss>

