<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic you must disable bfd echo in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bfd-throught-asa-in-transparent-mode/m-p/2814119#M174220</link>
    <description>&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;you must disable bfd echo under the routers' interfaces.&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;because bfd echo packets have the same source and the destination IP address.&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;In asa , this type of packet will be drop. you can use show asp drop to check the drop packets:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Slowpath security checks failed:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; This counter is incremented and packet is dropped when the security appliance is:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1) In routed mode receives a through-the-box:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - L2 broadcast packet&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - IPv4 packet with destination IP address equal to 0.0.0.0&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - IPv4 packet with source IP address equal to 0.0.0.0&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) In routed or transparent mode and receives a through-the-box IPv4 packet with:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - first octet of the source IP address equal to zero&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - source IP address equal to the loopback IP address&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - network part of source IP address equal to all 0's&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - network part of the source IP address equal to all 1's&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - source IP address host part equal to all 0's or all 1's&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt; 3) In routed or transparent mode and receives an IPv4 or IPv6 packet with same source &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt; and destination IP addresses&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H2&gt;</description>
    <pubDate>Wed, 18 May 2016 13:12:45 GMT</pubDate>
    <dc:creator>a271755880</dc:creator>
    <dc:date>2016-05-18T13:12:45Z</dc:date>
    <item>
      <title>BFD throught ASA in transparent mode</title>
      <link>https://community.cisco.com/t5/network-security/bfd-throught-asa-in-transparent-mode/m-p/2814118#M174219</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;There is a problem with my ASA and BFD through it. BGP sessions are constantly breaking:&lt;/P&gt;
&lt;P&gt;*Dec 7 05:47:34.476: %BGP-5-ADJCHANGE: neighbor 192.168.0.2 Up&lt;BR /&gt;*Dec 7 05:47:34.992: %BGP-5-NBR_RESET: Neighbor 192.168.0.2 reset (BFD adjacency down)&lt;BR /&gt;*Dec 7 05:47:34.993: %BGP-5-ADJCHANGE: neighbor 192.168.0.2 Down BFD adjacency down&lt;BR /&gt;*Dec 7 05:47:34.993: %BGP_SESSION-5-ADJCHANGE: neighbor 192.168.0.2 IPv4 Unicast topology base removed from session BFD adjacency down&lt;BR /&gt;*Dec 7 05:47:48.813: %BGP-5-ADJCHANGE: neighbor 192.168.0.2 Up&lt;BR /&gt;*Dec 7 05:47:49.327: %BGP-5-NBR_RESET: Neighbor 192.168.0.2 reset (Peer closed the session)&lt;BR /&gt;*Dec 7 05:47:49.328: %BGP-5-ADJCHANGE: neighbor 192.168.0.2 Down Peer closed the session&lt;BR /&gt;*Dec 7 05:47:49.328: %BGP_SESSION-5-ADJCHANGE: neighbor 192.168.0.2 IPv4 Unicast topology base removed from session Peer closed the session&lt;/P&gt;
&lt;P&gt;without ASA everything is ok. BFD neighbors are up, BGP is established.&lt;/P&gt;
&lt;P&gt;Here is my config on ASA:&lt;/P&gt;
&lt;P&gt;access-list ALLOW-ANY_IN ethertype permit any&lt;/P&gt;
&lt;P&gt;access-list ALLOW-ANY_OUT ethertype permit any&lt;/P&gt;
&lt;P&gt;access-list capt ethertype permit any&lt;/P&gt;
&lt;P&gt;access-list ALLOW-ANY-IP_IN extended permit tcp any eq 3784 any&lt;BR /&gt;access-list ALLOW-ANY-IP_IN extended permit tcp any eq 3785 any&lt;BR /&gt;access-list ALLOW-ANY-IP_IN extended permit udp any eq 3784 any&lt;BR /&gt;access-list ALLOW-ANY-IP_IN extended permit udp any eq 3785 any&lt;BR /&gt;access-list ALLOW-ANY-IP_IN extended permit ip any any&lt;BR /&gt;access-list ALLOW-ANY-IP_OUT extended permit tcp any eq 3784 any&lt;BR /&gt;access-list ALLOW-ANY-IP_OUT extended permit tcp any eq 3785 any&lt;BR /&gt;access-list ALLOW-ANY-IP_OUT extended permit udp any eq 3785 any&lt;BR /&gt;access-list ALLOW-ANY-IP_OUT extended permit udp any eq 3784 any&lt;BR /&gt;access-list ALLOW-ANY-IP_OUT extended permit ip any any&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;access-group ALLOW-ANY_IN in interface inside&lt;BR /&gt;access-group ALLOW-ANY-IP_IN in interface inside&lt;BR /&gt;access-group ALLOW-ANY_OUT in interface outside&lt;BR /&gt;access-group ALLOW-ANY-IP_OUT in interface outside&lt;/P&gt;
&lt;P&gt;but these lists didn't catch anything with bfd ports.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;P.S.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;ASA5585-SSP-60,&amp;nbsp;Cisco Adaptive Security Appliance Software Version 9.1(5)21.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bfd-throught-asa-in-transparent-mode/m-p/2814118#M174219</guid>
      <dc:creator>S.Girutskiy1</dc:creator>
      <dc:date>2019-03-12T07:00:27Z</dc:date>
    </item>
    <item>
      <title>you must disable bfd echo</title>
      <link>https://community.cisco.com/t5/network-security/bfd-throught-asa-in-transparent-mode/m-p/2814119#M174220</link>
      <description>&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;you must disable bfd echo under the routers' interfaces.&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;because bfd echo packets have the same source and the destination IP address.&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;In asa , this type of packet will be drop. you can use show asp drop to check the drop packets:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Slowpath security checks failed:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; This counter is incremented and packet is dropped when the security appliance is:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1) In routed mode receives a through-the-box:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - L2 broadcast packet&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - IPv4 packet with destination IP address equal to 0.0.0.0&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - IPv4 packet with source IP address equal to 0.0.0.0&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) In routed or transparent mode and receives a through-the-box IPv4 packet with:&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - first octet of the source IP address equal to zero&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - source IP address equal to the loopback IP address&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - network part of source IP address equal to all 0's&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - network part of the source IP address equal to all 1's&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - source IP address host part equal to all 0's or all 1's&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 style="margin: 0in; font-family: 'Microsoft YaHei'; font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt; 3) In routed or transparent mode and receives an IPv4 or IPv6 packet with same source &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt; and destination IP addresses&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H2&gt;</description>
      <pubDate>Wed, 18 May 2016 13:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bfd-throught-asa-in-transparent-mode/m-p/2814119#M174220</guid>
      <dc:creator>a271755880</dc:creator>
      <dc:date>2016-05-18T13:12:45Z</dc:date>
    </item>
  </channel>
</rss>

