<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA5585-X Crash in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936893#M24195</link>
    <description>&lt;P&gt;We have two of this firewalls the other one working perfectly with the same version !!!&lt;/P&gt;</description>
    <pubDate>Tue, 08 Oct 2019 04:48:02 GMT</pubDate>
    <dc:creator>m-hossainagri</dc:creator>
    <dc:date>2019-10-08T04:48:02Z</dc:date>
    <item>
      <title>Cisco ASA5585-X Crash</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936470#M24192</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have a cisco asa5585-x firewall and it is crashing twice per week and it is generating crash dumps.&lt;/P&gt;&lt;P&gt;can somebody help please?&lt;/P&gt;&lt;P&gt;ASA-SSL-VPN-III# show version&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.6(4)12&lt;BR /&gt;Device Manager Version 7.9(2)152&lt;/P&gt;&lt;P&gt;Compiled on Wed 11-Jul-18 21:59 PDT by builders&lt;BR /&gt;System image file is "disk0:/asa964-12-smp-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;ASA-SSL-VPN-III up 4 hours 32 mins&lt;/P&gt;&lt;P&gt;Hardware: ASA5585-SSP-20, 12029 MB RAM, CPU Xeon 5500 series 2133 MHz, 1 CPU (8 cores)&lt;BR /&gt;Internal ATA Compact Flash, 2048MB&lt;BR /&gt;BIOS Flash S25FL032P @ 0x0, 4096KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-5585 on-board accelerator (revision 0x1)&lt;BR /&gt;Boot microcode : CNPx-MC-BOOT-2.00&lt;BR /&gt;SSL/IKE microcode : CNPx-MC-SSL-SB-PLUS-0005&lt;BR /&gt;IPSec microcode : CNPx-MC-IPSEC-MAIN-0026&lt;BR /&gt;Number of accelerators: 2&lt;/P&gt;&lt;P&gt;Programmable device : Cisco CPLD revision 0x8&lt;BR /&gt;&lt;BR /&gt;0: Int: Internal-Data0/0 : address is 0000.0001.0001, irq 5&lt;BR /&gt;2: Int: Internal-Data0/1 : address is 0000.0001.0002, irq 10&lt;BR /&gt;3: Ext: Management0/0 : address is cc16.7e5f.4650, irq 10&lt;BR /&gt;4: Ext: Management0/1 : address is cc16.7e5f.4651, irq 5&lt;BR /&gt;16: Ext: GigabitEthernet0/0 : address is cc16.7e5f.4652, irq 255&lt;BR /&gt;17: Ext: GigabitEthernet0/1 : address is cc16.7e5f.4653, irq 255&lt;BR /&gt;18: Ext: GigabitEthernet0/2 : address is cc16.7e5f.4654, irq 255&lt;BR /&gt;19: Ext: GigabitEthernet0/3 : address is cc16.7e5f.4655, irq 255&lt;BR /&gt;20: Ext: GigabitEthernet0/4 : address is cc16.7e5f.4656, irq 255&lt;BR /&gt;21: Ext: GigabitEthernet0/5 : address is cc16.7e5f.4657, irq 255&lt;BR /&gt;22: Ext: GigabitEthernet0/6 : address is cc16.7e5f.4658, irq 255&lt;BR /&gt;23: Ext: GigabitEthernet0/7 : address is cc16.7e5f.4659, irq 255&lt;BR /&gt;24: Ext: TenGigabitEthernet0/8: address is cc16.7e5f.465a, irq 255&lt;BR /&gt;25: Ext: TenGigabitEthernet0/9: address is cc16.7e5f.465b, irq 255&lt;BR /&gt;26: Int: Internal-Data0/2 : address is 0000.0100.001b, irq 255&lt;BR /&gt;27: Int: Internal-Data0/3 : address is 0000.0100.001c, irq 255&lt;BR /&gt;28: Int: Not used : irq 255&lt;BR /&gt;29: Int: Not used : irq 255&lt;BR /&gt;30: Int: Not used : irq 255&lt;BR /&gt;31: Int: Not used : irq 255&lt;BR /&gt;32: Int: Not used : irq 255&lt;BR /&gt;33: Int: Not used : irq 255&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 1024 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 2 perpetual&lt;BR /&gt;Carrier : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 10000 perpetual&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 10000 perpetual&lt;BR /&gt;Total VPN Peers : 10000 perpetual&lt;BR /&gt;AnyConnect for Mobile : Enabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Enabled perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 2 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;10GE I/O : Disabled perpetual&lt;BR /&gt;Cluster : Disabled perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5585-SSP-20 VPN Premium license.&lt;/P&gt;&lt;P&gt;Serial Number: JAD203406TB&lt;BR /&gt;Running Permanent Activation Key: 0x2b04c87d 0xc4d9e032 0x8d00e988 0xf048e4e4 0x0321f1b6&lt;BR /&gt;Configuration register is 0x1&lt;/P&gt;&lt;P&gt;Image type : Release&lt;BR /&gt;Key version : A&lt;/P&gt;&lt;P&gt;Configuration has not been modified since last system restart.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 14:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936470#M24192</guid>
      <dc:creator>m-hossainagri</dc:creator>
      <dc:date>2019-10-07T14:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5585-X Crash</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936652#M24194</link>
      <description>&lt;P&gt;This sounds very "buggy".&amp;nbsp; I suggest upgrading the ASA to 9.6.4.34 or higher.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 19:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936652#M24194</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-07T19:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5585-X Crash</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936893#M24195</link>
      <description>&lt;P&gt;We have two of this firewalls the other one working perfectly with the same version !!!&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2019 04:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936893#M24195</guid>
      <dc:creator>m-hossainagri</dc:creator>
      <dc:date>2019-10-08T04:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5585-X Crash</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936928#M24196</link>
      <description>&lt;P&gt;Just because one ASA is not affected by a bug doesnt mean that another ASA will not be affected.&amp;nbsp; For example, we have a client with a lot of 3650 switches and they are heavily affected by bugs, while another client with same equipment is not.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It might be that there is a feature or configuration on the affected ASA that is triggering the bug, or it might be something else entirely.&lt;/P&gt;
&lt;P&gt;If you want to identify if this is a bug I would suggest opening a TAC case.&amp;nbsp; But upgrading to the latest ASA software within the minor release you are running would also be a good starting point.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2019 06:32:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5585-x-crash/m-p/3936928#M24196</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-08T06:32:50Z</dc:date>
    </item>
  </channel>
</rss>

