<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remove the IP SLA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599885#M197640</link>
    <description>&lt;P&gt;Remove the IP SLA configuration from the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;sla monitor schedule 1 life forever start-time now&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;no&amp;nbsp;sla monitor 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;You already have enabled DPD so you should be good to go.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Let me know if afterwards the VPN is up and of course if you understand why we are doing this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&lt;STRONG&gt;Make sure you rate all of my answers.&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;Regards,&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;Jcarvaja&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&lt;SPAN style="background-color: rgb(249, 249, 249);"&gt;Senior Network Security and Core Specialist&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color: rgb(249, 249, 249);"&gt;CCIE #42930, 2-CCNP, JNCIS-SEC&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color: rgb(249, 249, 249);"&gt;For inmediate assistance hire&amp;nbsp;us at http://i-networks.us/payment&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jan 2015 20:16:18 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2015-01-26T20:16:18Z</dc:date>
    <item>
      <title>ICMP echo-reply packets being dropped</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599880#M197635</link>
      <description>&lt;P&gt;I've got a 5505 connected to Amazon VPC, and it works, but the VPN is flapping because replies to SLA monitor echos are being dropped by the ASA. I can see the echo-replys going out from my Amazon instance, but the SLA monitor never gets them. I can't figure out what is wrong with my config, if anything.&lt;/P&gt;&lt;P&gt;The network is Clients -&amp;gt; ASA -&amp;gt; Comcast Gateway in Bridge Mode -&amp;gt; Amazon VPC&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;ASA Version 9.0(1)&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 162.17.xx.xx&amp;nbsp;255.255.255.252&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network comcast-gw&lt;BR /&gt;&amp;nbsp;host 162.17.yy.yy&lt;BR /&gt;object network amzn-vpn-1&lt;BR /&gt;&amp;nbsp;host 72.21...&lt;BR /&gt;object network amzn-vpn-2&lt;BR /&gt;&amp;nbsp;host 72.21...&lt;BR /&gt;object network asa5505&lt;BR /&gt;&amp;nbsp;host 162.17.xx.xx&lt;BR /&gt;object network inside-network&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network outside-network&lt;BR /&gt;&amp;nbsp;subnet 162.17.xx.xx-1&amp;nbsp;255.255.255.252&lt;BR /&gt;object network amzn-vpc&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.255.0.0&lt;BR /&gt;access-list amzn_vpn_in extended permit ip object amzn-vpn-1 object asa5505&amp;nbsp;&lt;BR /&gt;access-list amzn_vpn_in extended permit ip object amzn-vpn-2 object asa5505&amp;nbsp;&lt;BR /&gt;access-list amzn_out extended permit ip any4 object amzn-vpc&amp;nbsp;&lt;BR /&gt;access-list amzn_in extended permit ip object amzn-vpc object inside-network&amp;nbsp;&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static inside-network inside-network destination static amzn-vpc amzn-vpc no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 162.17.yy.yy 1&lt;BR /&gt;sla monitor 1&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 10.0.1.84 interface outside&lt;BR /&gt;&amp;nbsp;frequency 5&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;BR /&gt;crypto ipsec ikev1 transform-set transform-amzn esp-aes esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association lifetime seconds 3600&lt;BR /&gt;crypto ipsec security-association replay window-size 128&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ipsec df-bit clear-df outside&lt;BR /&gt;crypto map amzn_vpn_map 1 match address amzn_out&lt;BR /&gt;crypto map amzn_vpn_map 1 set pfs&amp;nbsp;&lt;BR /&gt;crypto map amzn_vpn_map 1 set peer 72.21... 72.21...&amp;nbsp;&lt;BR /&gt;crypto map amzn_vpn_map 1 set ikev1 transform-set transform-amzn&lt;BR /&gt;crypto map amzn_vpn_map interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca …&lt;BR /&gt;&amp;nbsp; &amp;nbsp; …&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp identity address&amp;nbsp;&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 201&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 28800&lt;BR /&gt;group-policy filter internal&lt;BR /&gt;group-policy filter attributes&lt;BR /&gt;&amp;nbsp;vpn-filter value amzn_in&lt;BR /&gt;tunnel-group 72.21... type ipsec-l2l&lt;BR /&gt;tunnel-group 72.21... general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy filter&lt;BR /&gt;tunnel-group 72.21... ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;&amp;nbsp;isakmp keepalive threshold 10 retry 3&lt;BR /&gt;tunnel-group 72.21... type ipsec-l2l&lt;BR /&gt;tunnel-group 72.21... general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy filter&lt;BR /&gt;tunnel-group 72.21... ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;&amp;nbsp;isakmp keepalive threshold 10 retry 3&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599880#M197635</guid>
      <dc:creator>travisbullock1</dc:creator>
      <dc:date>2019-03-12T05:23:17Z</dc:date>
    </item>
    <item>
      <title>Hello, I have implemented</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599881#M197636</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have implemented many VPCs between Cisco ASAs and the Amazon Cloud and I have always bypassed the SLA configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know it's in the Amazon Document they gave you but it's not required and most important, the config most of the time does not include in the Crypto ACL the Outside Interface IP address of the ASA (This will need to be on both sides). In your case the ASA Config is good for this as you are using the any4 keyword.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would rely entirely on something different for the VPN monitoring as DPD and KeepAlives for the VPN tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you really want to leave the configuration the way it is provide us the logs errors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this makes sense to you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;BR /&gt;Senior Network Security and Core Specialist&lt;BR /&gt;CCIE #42930, 2-CCNP, JNCIS-SEC&lt;BR /&gt;For inmediate assistance hire&amp;nbsp;us at http://i-networks.us/payment&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jan 2015 20:36:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599881#M197636</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2015-01-24T20:36:35Z</dc:date>
    </item>
    <item>
      <title>Thanks for the feedback Julio</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599882#M197637</link>
      <description>&lt;P&gt;Thanks for the feedback Julio.&amp;nbsp;I would like to use the built-in SLA Monitor instead of setting up a dedicated separate box. This feature on the ASA is intended for this purpose right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are no errors, but as I mentioned the echo-reply, which *is* being sent by the Amazon instance I set up,&amp;nbsp;isn't captured by the sla monitor:&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;ciscoasa# show sla monitor operational-state&lt;/DIV&gt;&lt;DIV&gt;Entry number: 1&lt;/DIV&gt;&lt;DIV&gt;Modification time: 20:24:16.154 UTC Fri Jan 23 2015&lt;/DIV&gt;&lt;DIV&gt;Number of Octets Used by this Entry: 1480&lt;/DIV&gt;&lt;DIV&gt;Number of operations attempted: 25595&lt;/DIV&gt;&lt;DIV&gt;Number of operations skipped: 25595&lt;/DIV&gt;&lt;DIV&gt;Current seconds left in Life: Forever&lt;/DIV&gt;&lt;DIV&gt;Operational state of entry: Active&lt;/DIV&gt;&lt;DIV&gt;Last time this entry was reset: Never&lt;/DIV&gt;&lt;DIV&gt;Connection loss occurred: FALSE&lt;/DIV&gt;&lt;DIV&gt;Timeout occurred: TRUE&lt;/DIV&gt;&lt;DIV&gt;Over thresholds occurred: FALSE&lt;/DIV&gt;&lt;DIV&gt;Latest RTT (milliseconds): NoConnection/Busy/Timeout&lt;/DIV&gt;&lt;DIV&gt;Latest operation start time: 19:29:46.167 UTC Mon Jan 26 2015&lt;/DIV&gt;&lt;DIV&gt;Latest operation return code: Timeout&lt;/DIV&gt;&lt;DIV&gt;RTT Values:&lt;/DIV&gt;&lt;DIV&gt;RTTAvg: 0&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;RTTMin: 0&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;RTTMax: 0&lt;/DIV&gt;&lt;DIV&gt;NumOfRTT: 0&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;RTTSum: 0&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;RTTSum2: 0&lt;/DIV&gt;</description>
      <pubDate>Mon, 26 Jan 2015 19:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599882#M197637</guid>
      <dc:creator>travisbullock1</dc:creator>
      <dc:date>2015-01-26T19:33:52Z</dc:date>
    </item>
    <item>
      <title>Hello, I never mentioned to</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599883#M197638</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I never mentioned to use a different box, Using DPD and VPN Keepalives will be in the ASA as well but done at the IPSec level (which is what you are using to establish the VPN).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No need to use the IP SLA feature as it's just more overhead when you actually dont need it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will need to see the Amazon Instance Config, basically make sure that Traffic to the Outside Interface of your firewall is being encrypted when the source is on the Amazon Side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That does not makes sense to me as you could use other features but if you still want to go with it. Check that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PD: The ASA is not dropping any packets, it's just not getting any replies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure you rate all of my answers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);"&gt;Senior Network Security and Core Specialist&lt;/SPAN&gt;&lt;BR style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);" /&gt;&lt;SPAN style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);"&gt;CCIE #42930, 2-CCNP, JNCIS-SEC&lt;/SPAN&gt;&lt;BR style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);" /&gt;&lt;SPAN style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);"&gt;For inmediate assistance hire&amp;nbsp;us at http://i-networks.us/paymen&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2015 20:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599883#M197638</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2015-01-26T20:02:24Z</dc:date>
    </item>
    <item>
      <title>OK, what config do you mean?</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599884#M197639</link>
      <description>&lt;P&gt;OK, what config do you mean? I did not configure the Amazon instance; it is simply a normal instance with a security group that allows traffic from my local subnets and to anything.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2015 20:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599884#M197639</guid>
      <dc:creator>travisbullock1</dc:creator>
      <dc:date>2015-01-26T20:11:23Z</dc:date>
    </item>
    <item>
      <title>Remove the IP SLA</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599885#M197640</link>
      <description>&lt;P&gt;Remove the IP SLA configuration from the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;sla monitor schedule 1 life forever start-time now&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;no&amp;nbsp;sla monitor 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;You already have enabled DPD so you should be good to go.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Let me know if afterwards the VPN is up and of course if you understand why we are doing this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&lt;STRONG&gt;Make sure you rate all of my answers.&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;Regards,&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;Jcarvaja&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&lt;SPAN style="background-color: rgb(249, 249, 249);"&gt;Senior Network Security and Core Specialist&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color: rgb(249, 249, 249);"&gt;CCIE #42930, 2-CCNP, JNCIS-SEC&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color: rgb(249, 249, 249);"&gt;For inmediate assistance hire&amp;nbsp;us at http://i-networks.us/payment&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2015 20:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599885#M197640</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2015-01-26T20:16:18Z</dc:date>
    </item>
    <item>
      <title>OK, I don't understand how</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599886#M197641</link>
      <description>&lt;P&gt;OK, I don't understand how removing SLA will prevent my VPN from flapping every 20-30 minutes. I did remove it, but within a few minutes I get log errors as always as DPD loses service:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Jan 26 2015&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;20:19:04&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;713123&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Group = 72.21.xxx.xxx, IP = 72.21.xxxxxx, IKE lost contact with remote peer, deleting connection (keepalive type: DPD)&lt;/P&gt;&lt;P&gt;5&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Jan 26 2015&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;20:19:04&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;713259&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Group = 72.21.xxx.xxx, IP = 72.21.xxxxxx, Session is being torn down. Reason: Lost Service&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2015 20:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599886#M197641</guid>
      <dc:creator>travisbullock1</dc:creator>
      <dc:date>2015-01-26T20:24:03Z</dc:date>
    </item>
    <item>
      <title>Well, why did you not</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599887#M197642</link>
      <description>&lt;P&gt;Well, why did you not mentioned that in the post instead of blaming the SLA Process?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;"but the VPN is flapping because replies to SLA monitor echos are being dropped by the ASA"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2015 20:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599887#M197642</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2015-01-26T20:39:54Z</dc:date>
    </item>
    <item>
      <title>According to a support</title>
      <link>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599888#M197643</link>
      <description>&lt;P&gt;According to a support engineer at&amp;nbsp;Amazon who looked at my config and error logs, *if*&amp;nbsp;SLA was receiving echo replies&amp;nbsp;then I would not be having issues with my connection. Are you saying that isn't&amp;nbsp;true? More importantly, do you have any suggestions to change my config that will actually help me?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2015 20:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-echo-reply-packets-being-dropped/m-p/2599888#M197643</guid>
      <dc:creator>travisbullock1</dc:creator>
      <dc:date>2015-01-26T20:49:24Z</dc:date>
    </item>
  </channel>
</rss>

