<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA deny from ip x.x.x.x to ip x.x.x.x Ip options &amp;quot;Router  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-deny-from-ip-x-x-x-x-to-ip-x-x-x-x-ip-options-quot/m-p/2129104#M393976</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sujit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP packets with "ip options" set are being dropped by the ASA due to security reasons.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A bug was filed in this regard and later an enhancement request was filed to find out a way to clear the ip options from the packet or ignore it and let it pass through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the bug id : CSCSE96428&lt;/P&gt;&lt;P&gt;Here is the enhancement request : &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCsh73388" target="_blank"&gt;CSCsh73388&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bug is fixed on 8.2(2). You can either upgrade the ASA IOS or check which application is sending ip packets with router options and have them disable it to proceed furher on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Dec 2012 16:35:12 GMT</pubDate>
    <dc:creator>julomban</dc:creator>
    <dc:date>2012-12-18T16:35:12Z</dc:date>
    <item>
      <title>Cisco ASA deny from ip x.x.x.x to ip x.x.x.x Ip options "Router Alert"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-deny-from-ip-x-x-x-x-to-ip-x-x-x-x-ip-options-quot/m-p/2129103#M393975</link>
      <description>&lt;P&gt;Can any body help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am facing a problem &lt;/P&gt;&lt;P&gt;when i am callling my polycom viedo end point to any polycomvideo end point through public ip no video comes from far end but from far end they are watching my video .&lt;/P&gt;&lt;P&gt;I have ASA firewall version 8.0(4) and i have configured a static nat and enable the necessary port.but when i am watching firewall log see that&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;deny ip from x.x.x.x to ip x.x.x.x Ip options "Router Alert". &lt;/STRONG&gt;i thik for this alert i am not able to see the far end video.&lt;/P&gt;&lt;P&gt;plese help me how to recver this problem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sujit Dasgupta&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-deny-from-ip-x-x-x-x-to-ip-x-x-x-x-ip-options-quot/m-p/2129103#M393975</guid>
      <dc:creator>sdasgupta</dc:creator>
      <dc:date>2019-03-12T00:38:33Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA deny from ip x.x.x.x to ip x.x.x.x Ip options "Router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-deny-from-ip-x-x-x-x-to-ip-x-x-x-x-ip-options-quot/m-p/2129104#M393976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sujit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP packets with "ip options" set are being dropped by the ASA due to security reasons.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A bug was filed in this regard and later an enhancement request was filed to find out a way to clear the ip options from the packet or ignore it and let it pass through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the bug id : CSCSE96428&lt;/P&gt;&lt;P&gt;Here is the enhancement request : &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCsh73388" target="_blank"&gt;CSCsh73388&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bug is fixed on 8.2(2). You can either upgrade the ASA IOS or check which application is sending ip packets with router options and have them disable it to proceed furher on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 16:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-deny-from-ip-x-x-x-x-to-ip-x-x-x-x-ip-options-quot/m-p/2129104#M393976</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2012-12-18T16:35:12Z</dc:date>
    </item>
  </channel>
</rss>

