<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That is what out thoughts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940927#M156835</link>
    <description>&lt;P&gt;That is what out thoughts were as well. And as you recommended, we did clear all connection states during an outage window and recreated sessions individually in an attempt to initiate TCP Bypass. Even then, it seems the class map was never attributed any hits. Cisco TAC simply advised us to upgrade our code to version 9.5(2)208 from 9.5(2)204.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Aug 2016 17:55:08 GMT</pubDate>
    <dc:creator>bjamesdowning</dc:creator>
    <dc:date>2016-08-10T17:55:08Z</dc:date>
    <item>
      <title>ASA TCP Bypass feature not functioning</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940921#M156749</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am attempting to configure TCP-Bypass for a specific subset of traffic on an ASAv running&amp;nbsp;Software Version 9.5(2)204. I have configured an ACL to match the source and destination specifically, set up a class map to reference the ACL, attached the class map to the default global policy with the 'set connection advanced-options tcp-state-bypass.' When generating the targeted traffic and issuing a 'show conn' no connection display a lowercase 'b' to indicate TCP bypass has been initiated. Additionally, when running a packet-tracer command, the traffic continues to fall back to the class-default regardless of how broad/specific the Class-Map ACL is. Below contains the ACL, Class-Map, and Policy-Map configs, as well as the ACL hit count, and output of the packet-tracer. The end result of the packet tracer is 'allow,' I just posted it to display the traffic hitting the default class rather than TEST_MAP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ACL:&lt;/P&gt;
&lt;P&gt;access-list TEST_ACL line 1 extended permit tcp host 1.1.1.1 any4 eq 1433 &lt;BR /&gt;access-list TEST_ACL line 2 extended permit tcp host 1.1.1.1 any4 eq 1434 &lt;BR /&gt;access-list TEST_ACL line 3 extended permit tcp host 1.1.1.1 any4 eq 9053&lt;/P&gt;
&lt;P&gt;CLASS-MAP:&lt;/P&gt;
&lt;P&gt;class-map TEST_MAP&lt;BR /&gt; match access-list TEST_ACL&lt;BR /&gt; &lt;BR /&gt;POLICY-MAP:&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect snmp&lt;BR /&gt; inspect dns migrated_dns_map_1&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect dcerpc&lt;BR /&gt; inspect icmp&lt;BR /&gt; class TEST_MAP&lt;BR /&gt; set connection random-sequence-number disable&lt;BR /&gt; set connection advanced-options tcp-state-bypass&lt;BR /&gt; class class-default&lt;BR /&gt; set connection timeout dcd&lt;BR /&gt; &lt;BR /&gt;SERVICE-POLICY&lt;/P&gt;
&lt;P&gt;service-policy global_policy global&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;PACKET-TRACER&lt;/P&gt;
&lt;P&gt;packet-tracer input INTERNAL_TEST tcp 1.1.1.1 5764 2.2.2.2 1433 detailed&lt;/P&gt;
&lt;P&gt;//relevant output:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;class-map class-default&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set connection timeout idle 1193:00:00 dcd 0:00:15 5 embryonic 0:00:30 half-closed 0:10:00&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; DCD: enabled, retry-interval 0:00:15, max-retries 5&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; DCD: client-probe 0, server-probe 0, conn-expiration 0&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f663aa4c530, priority=7, domain=conn-set, deny=false&lt;BR /&gt; hits=17828, user_data=0x7f662417a3e0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=INTERNAL_TEST, output_ifc=any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;No hits on ACL when actual traffic is generated:&lt;/P&gt;
&lt;P&gt;access-list TEST_ACL; 3 elements; name hash: 0x4a5798e5&lt;BR /&gt;access-list TEST_ACL line 1 extended permit tcp host 1.1.1.1 any4 eq 1433 (hitcnt=0) &lt;BR /&gt;access-list TEST_ACL line 2 extended permit tcp host 1.1.1.1 any4 eq 1434 (hitcnt=0) &lt;BR /&gt;access-list TEST_ACL line 3 extended permit tcp host 1.1.1.1 any4 eq 9053 (hitcnt=0)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:05:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940921#M156749</guid>
      <dc:creator>bjamesdowning</dc:creator>
      <dc:date>2019-03-12T08:05:38Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940922#M156765</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you proved output of:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show service-policy &lt;/PRE&gt;
&lt;P&gt;And also test this:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;service-policy TEST_MAP interface &amp;lt;INTERFACE&amp;gt;&lt;/PRE&gt;
&lt;P&gt;//Cristian&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 11:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940922#M156765</guid>
      <dc:creator>Cristian Nilsson</dc:creator>
      <dc:date>2016-08-05T11:45:39Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940923#M156782</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Remember you need to clear the local host connections for that traffic for the TCP state bypass take effect or the ASA will continue using the old connections entries and wont mark the "b" for bypass under the "show conn"&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 20:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940923#M156782</guid>
      <dc:creator>kvaldelo</dc:creator>
      <dc:date>2016-08-05T20:19:33Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940924#M156800</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please change this TCP state bypass from global policy to interface based service-policy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So create a new test policy map and bind it to the interface on which the traffic hits first.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Aug 2016 00:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940924#M156800</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-08-07T00:35:44Z</dc:date>
    </item>
    <item>
      <title>Thanks for the response. We</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940925#M156813</link>
      <description>&lt;P&gt;Thanks for the response. We have yet to try this, however is there any particular reason TCP Bypass will not function when applied to the Global Policy? It is my understanding that the Global Policy is already applied to all interfaces. Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2016 16:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940925#M156813</guid>
      <dc:creator>bjamesdowning</dc:creator>
      <dc:date>2016-08-10T16:12:56Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940926#M156823</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;TCP State bypass will work regardless if using global policy or applied to a specific interface&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2016 17:20:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940926#M156823</guid>
      <dc:creator>kvaldelo</dc:creator>
      <dc:date>2016-08-10T17:20:55Z</dc:date>
    </item>
    <item>
      <title>That is what out thoughts</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940927#M156835</link>
      <description>&lt;P&gt;That is what out thoughts were as well. And as you recommended, we did clear all connection states during an outage window and recreated sessions individually in an attempt to initiate TCP Bypass. Even then, it seems the class map was never attributed any hits. Cisco TAC simply advised us to upgrade our code to version 9.5(2)208 from 9.5(2)204.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2016 17:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940927#M156835</guid>
      <dc:creator>bjamesdowning</dc:creator>
      <dc:date>2016-08-10T17:55:08Z</dc:date>
    </item>
    <item>
      <title>Turns out placing the bypass</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940928#M156845</link>
      <description>&lt;P&gt;Turns out placing the bypass setting directly on the incoming interface seemed to work. There is now a bug report for the behavior submitted to the ASA developers. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2016 13:44:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-bypass-feature-not-functioning/m-p/2940928#M156845</guid>
      <dc:creator>bjamesdowning</dc:creator>
      <dc:date>2016-08-15T13:44:19Z</dc:date>
    </item>
  </channel>
</rss>

