<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Firewall - Normal(Waiting) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768043#M178785</link>
    <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;Im trying to get the failover state for one of the inside interfaces to change to Monitored, and it doesnt seem to be working. The switchport settings on the primary unit for the interface is exactly the same .&amp;nbsp;Tried bouncing the switchport which the inside interface connects to, to no avail.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anything that I may be missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TPPASAFW-5525/sec/stby# show failover&lt;BR /&gt;Failover On&amp;nbsp;&lt;BR /&gt;Failover unit Secondary&lt;BR /&gt;Failover LAN Interface: failover-interface GigabitEthernet0/7 (up)&lt;BR /&gt;Unit Poll frequency 1 seconds, holdtime 15 seconds&lt;BR /&gt;Interface Poll frequency 5 seconds, holdtime 25 seconds&lt;BR /&gt;Interface Policy 1&lt;BR /&gt;Monitored Interfaces 5 of 216 maximum&lt;BR /&gt;MAC Address Move Notification Interval not set&lt;BR /&gt;Version: Ours 9.2(3)4, Mate 9.2(3)4&lt;BR /&gt;Last Failover at: 18:38:51 AEST May 12 2015&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; This host: Secondary - Standby Ready&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Active time: 0 (sec)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 0: ASA5525 hw/sw rev (1.0/9.2(3)4) status (Up Sys)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-internal (192.168.103.3): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-dmz (192.168.101.2): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt; Interface firewall-ext-apnic (x): Normal (Waiting) &amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface logs (192.168.205.8): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface management (192.168.109.3): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 1: IPS5525 hw/sw rev (N/A/7.1(9)E4) status (Up/Up)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IPS, 7.1(9)E4, Up&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Other host: Primary - Active&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Active time: 10962400 (sec)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 0: ASA5525 hw/sw rev (1.0/9.2(3)4) status (Up Sys)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-internal (192.168.103.2): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-dmz (192.168.101.1): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-ext-apnic (x): Normal (Monitored)&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface logs (192.168.205.7): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface management (192.168.109.2): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 1: IPS5525 hw/sw rev (N/A/7.1(9)E4) status (Up/Up)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IPS, 7.1(9)E4, Up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks loads!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:36:28 GMT</pubDate>
    <dc:creator>Chin</dc:creator>
    <dc:date>2019-03-12T06:36:28Z</dc:date>
    <item>
      <title>ASA Firewall - Normal(Waiting)</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768043#M178785</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;Im trying to get the failover state for one of the inside interfaces to change to Monitored, and it doesnt seem to be working. The switchport settings on the primary unit for the interface is exactly the same .&amp;nbsp;Tried bouncing the switchport which the inside interface connects to, to no avail.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anything that I may be missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TPPASAFW-5525/sec/stby# show failover&lt;BR /&gt;Failover On&amp;nbsp;&lt;BR /&gt;Failover unit Secondary&lt;BR /&gt;Failover LAN Interface: failover-interface GigabitEthernet0/7 (up)&lt;BR /&gt;Unit Poll frequency 1 seconds, holdtime 15 seconds&lt;BR /&gt;Interface Poll frequency 5 seconds, holdtime 25 seconds&lt;BR /&gt;Interface Policy 1&lt;BR /&gt;Monitored Interfaces 5 of 216 maximum&lt;BR /&gt;MAC Address Move Notification Interval not set&lt;BR /&gt;Version: Ours 9.2(3)4, Mate 9.2(3)4&lt;BR /&gt;Last Failover at: 18:38:51 AEST May 12 2015&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; This host: Secondary - Standby Ready&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Active time: 0 (sec)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 0: ASA5525 hw/sw rev (1.0/9.2(3)4) status (Up Sys)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-internal (192.168.103.3): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-dmz (192.168.101.2): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt; Interface firewall-ext-apnic (x): Normal (Waiting) &amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface logs (192.168.205.8): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface management (192.168.109.3): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 1: IPS5525 hw/sw rev (N/A/7.1(9)E4) status (Up/Up)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IPS, 7.1(9)E4, Up&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Other host: Primary - Active&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Active time: 10962400 (sec)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 0: ASA5525 hw/sw rev (1.0/9.2(3)4) status (Up Sys)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-internal (192.168.103.2): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-dmz (192.168.101.1): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface firewall-ext-apnic (x): Normal (Monitored)&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface logs (192.168.205.7): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface management (192.168.109.2): Normal (Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 1: IPS5525 hw/sw rev (N/A/7.1(9)E4) status (Up/Up)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IPS, 7.1(9)E4, Up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks loads!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:36:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768043#M178785</guid>
      <dc:creator>Chin</dc:creator>
      <dc:date>2019-03-12T06:36:28Z</dc:date>
    </item>
    <item>
      <title>&gt;&gt; Are you able to ping the</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768044#M178786</link>
      <description>&lt;P&gt;&amp;gt;&amp;gt; Are you able to ping the across the two units on the active IP and Stand by IP configuraed on interface "firewall-ext-apnic" ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Make sure that interfaces on switch connected to ASA's "firewall-ext-apnic" interface is present in same VLAN on the switch.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Is &amp;nbsp;ip verify reverse-path interface firewall-ext-apnic &amp;nbsp;present in your configuration? If present try removing it and test it?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2015 07:46:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768044#M178786</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-09-16T07:46:11Z</dc:date>
    </item>
    <item>
      <title>&gt;&gt; Are you able to ping the</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768045#M178787</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal; background-color: rgb(249, 249, 249);"&gt;&amp;gt;&amp;gt; Are you able to ping the across the two units on the active IP and Stand by IP configuraed on interface "firewall-ext-apnic" ? No, not able to ping to interface ip on &amp;nbsp;from the primary unit.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal; background-color: rgb(249, 249, 249);"&gt;&amp;gt;&amp;gt; Make sure that interfaces on switch connected to ASA's "firewall-ext-apnic" interface is present in same VLAN on the switch. Theyre&amp;nbsp;both on the same vlan&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal; background-color: rgb(249, 249, 249);"&gt;&amp;gt;&amp;gt; Is &amp;nbsp;ip verify reverse-path interface firewall-ext-apnic &amp;nbsp;present in your configuration? If present try removing it and test it? &amp;nbsp;It is, and it seems to have packet dropping and the count keeps increasing, how do i check the source and destination of the packets that are being dropped ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;TPPASAFW-5525/sec/stby# show &lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;ip&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt; verify &lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;statis&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size:14px;"&gt;interface firewall-internal: 0&lt;/SPAN&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-size:14px;"&gt;unicast&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;rpf drops&lt;BR /&gt;interface firewall-dmz: 0 unicast rpf drops&lt;BR /&gt;interface firewall-ext-apnic: 4411598 unicast rpf drops&lt;BR /&gt;interface logs: 0 unicastrpf drops&lt;BR /&gt;interface management: 0 unicastrpf drops &lt;SPAN style="line-height: normal; background-color: rgb(249, 249, 249);"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;TPPASAFW-5525/sec/stby# show asp drop frame rpf-violated &amp;nbsp;&lt;BR /&gt;&amp;nbsp; Reverse-pathverify failed (rpf-violated) &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4411557&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Last clearing: Never&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;TPPASAFW-5525/sec/stby# show asp drop frame rpf-violated &amp;nbsp;&lt;BR /&gt;&amp;nbsp; Reverse-path&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;verify failed (rpf-violated) &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4411557&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Last clearing: Never&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;I checked the firewall log files and did not see any logs that show reverse-path checks/drops. How do I ensure the logging captures the logs since &lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;i&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt; see an incrementing value when &lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;i&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt; do the show asp drop command?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Logging is &lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;enabled :&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 512000&lt;BR /&gt;logging&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;asdm&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;-buffer-size 500&lt;BR /&gt;logging monitor informational&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size:14px;"&gt;logging&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt; buffered debugging&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size:14px;"&gt;logging&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt; trap informational&lt;BR /&gt;logging&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt;asdm&lt;/SPAN&gt;&lt;SPAN style="font-size:14px;"&gt; informational&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks so much !&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 00:58:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768045#M178787</guid>
      <dc:creator>Chin</dc:creator>
      <dc:date>2015-09-17T00:58:15Z</dc:date>
    </item>
    <item>
      <title>Hi,&gt;&gt; You can try running</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768046#M178788</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; You can try running packet-tracer on both the ASAs to check the reason of packet drop.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Apply packet captures on each unit with specific source IP and destination IP and initiate ICMP.&amp;nbsp;This would let us know if the traffic is reaching the other unit or not.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Also ensure you have Primary and secondary IP configured for interface&amp;nbsp;&lt;SPAN style="font-size: 14.4px; line-height: normal; background-color: rgb(249, 249, 249);"&gt;irewall-ext-apnic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; From the rpf output i see that there are multiple interfaces with rpf enabled and their status is monitored. You may try removing the rpf check for testing purpose. If removing rpf check works then we might be hitting the defect:&amp;nbsp;https://tools.cisco.com/bugsearch/bug/CSCut29589/?reffering_site=dumpcr&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 06:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768046#M178788</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-09-17T06:22:57Z</dc:date>
    </item>
    <item>
      <title>Thanks Risseth. Will try the</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768047#M178789</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Thanks&lt;/SPAN&gt;&lt;SPAN style="font-size:12px;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size:12px;"&gt;Risseth&lt;/SPAN&gt;&lt;SPAN style="font-size:12px;"&gt;. Will try the options out.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2015 00:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-normal-waiting/m-p/2768047#M178789</guid>
      <dc:creator>AdamAlphonz</dc:creator>
      <dc:date>2015-09-30T00:13:00Z</dc:date>
    </item>
  </channel>
</rss>

