<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco 887VA-W - dropped packets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010635#M439476</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi There&lt;/P&gt;&lt;P&gt;This is just my suggestion, could you remove your ZFW completely, and ensure this is working. If yes, then when you paste in your ZFW config, and this don't work fine.. Then we can narrow down to ZFW config or bug. Could you paste your ZFW config here?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Jul 2012 03:48:06 GMT</pubDate>
    <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
    <dc:date>2012-07-30T03:48:06Z</dc:date>
    <item>
      <title>Cisco 887VA-W - dropped packets</title>
      <link>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010632#M439473</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an 887VA-w connected at home. I am using ip virtual-reassembly an all interfaces (dialer and all internal VLANs), I am also using CBAC (currently setting up ZBF). The issue I am having is that I keep getting drop packet error messages and the reasons can differ. Below are some of the outputs I recieve:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jul 14 2012 23:38:09: %FW-6-DROP_PKT: Dropping Other session 64.215.255.24:443 192.168.12.11:59748&amp;nbsp; due to&amp;nbsp; Retransmitted Segment with Invalid Flags with ip ident 0 tcpflags 0x5004 seq.no 4247336252 ack 0&lt;/P&gt;&lt;P&gt;Home-Router#&lt;/P&gt;&lt;P&gt;Jul 14 2012 23:38:49: %FW-6-DROP_PKT: Dropping Other session 64.215.255.24:443 192.168.12.11:59825&amp;nbsp; due to&amp;nbsp; Retransmitted Segment with Invalid Flags with ip ident 0 tcpflags 0x5004 seq.no 570307557 ack 0&lt;/P&gt;&lt;P&gt;Home-Router#&lt;/P&gt;&lt;P&gt;Jul 14 2012 23:39:26: %FW-6-DROP_PKT: Dropping http session 77.73.32.100:80 192.168.12.11:59859&amp;nbsp; due to&amp;nbsp; SYN inside current window with ip ident 0 tcpflags 0x8012 seq.no 3980996654 ack 398106525&lt;/P&gt;&lt;P&gt;Home-Router#&lt;/P&gt;&lt;P&gt;Jul 14 2012 23:40:01: %FW-6-DROP_PKT: Dropping Other session 92.21.177.174:52564 23.32.26.224:443&amp;nbsp; due to&amp;nbsp; Retransmitted Segment with Invalid Flags with ip ident 50491 tcpflags 0x5004 seq.no 2961330137 ack 0&lt;/P&gt;&lt;P&gt;Home-Router#&lt;/P&gt;&lt;P&gt;Jul 14 2012 23:41:06: %FW-6-DROP_PKT: Dropping Other session 173.194.34.94:443 192.168.12.11:59736&amp;nbsp; due to&amp;nbsp; Retransmitted Segment with Invalid Flags with ip ident 7027 tcpflags 0x5004 seq.no 3898183889 ack 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done a show ip virtual-reassembly on all the interfaces and the counter is shown as 0. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone shed some light on this situation??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ash&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010632#M439473</guid>
      <dc:creator>Ashley Sahonta</dc:creator>
      <dc:date>2019-03-11T23:31:00Z</dc:date>
    </item>
    <item>
      <title>Cisco 887VA-W - dropped packets</title>
      <link>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010633#M439474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: justify;"&gt;Hi Bro&lt;/P&gt;&lt;P style="text-align: justify;"&gt;This error message indicates that the IP 173.194.34.94 has received and acknowledge the various retransmitted packets from 192.168.12.11:59736. This can be seen occurring numerous times, based on the countless TCP Sequence Numbers, as shown in your capture. Why is 192.168.12.11 sending out numerous packets? What device is 192.168.12.11?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;This has nothing to do with the “ip virtual-reassembly” command as this error doesn’t concern fragmentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Perhaps, could you remove the “ip inspect XXX in” command, and verify if you’re still getting this message. If yes, then this is a configuration error in your CBAC. I’m guessing you’ve not enabled ZFW yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;By the way, perhaps this URL could assist you further &lt;A _jive_internal="true" href="https://community.cisco.com/thread/237095"&gt;https://supportforums.cisco.com/thread/237095&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;P/S: If you think my comments are helpful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jul 2012 19:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010633#M439474</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-20T19:00:08Z</dc:date>
    </item>
    <item>
      <title>Cisco 887VA-W - dropped packets</title>
      <link>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010634#M439475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response. I previously had CBAC, I have now removed all CBAC config and applied zone based firewall and I am still get the drop messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using version 15.1. Do you know if this is a bug issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ash&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Jul 2012 21:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010634#M439475</guid>
      <dc:creator>Ashley Sahonta</dc:creator>
      <dc:date>2012-07-29T21:22:39Z</dc:date>
    </item>
    <item>
      <title>Cisco 887VA-W - dropped packets</title>
      <link>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010635#M439476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi There&lt;/P&gt;&lt;P&gt;This is just my suggestion, could you remove your ZFW completely, and ensure this is working. If yes, then when you paste in your ZFW config, and this don't work fine.. Then we can narrow down to ZFW config or bug. Could you paste your ZFW config here?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 03:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010635#M439476</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-30T03:48:06Z</dc:date>
    </item>
    <item>
      <title>Cisco 887VA-W - dropped packets</title>
      <link>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010636#M439477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the zone based firewall config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ICMP&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;class-map type inspect match-any DHCP-to-SELF&lt;/P&gt;&lt;P&gt; match protocol bootps&lt;/P&gt;&lt;P&gt; match protocol bootpc&lt;/P&gt;&lt;P&gt;class-map type inspect match-any TRAFFIC-to-SELF&lt;/P&gt;&lt;P&gt; match access-group name ICMP-TRAFFIC-ACL&lt;/P&gt;&lt;P&gt; match access-group name VTY-IN&lt;/P&gt;&lt;P&gt; match access-group 99&lt;/P&gt;&lt;P&gt; match access-group name ALLOW-DHCP&lt;/P&gt;&lt;P&gt; match access-group name HTTPS-to-SELF&lt;/P&gt;&lt;P&gt;class-map type inspect match-any INSIDE-OUT&lt;/P&gt;&lt;P&gt; match protocol dns&lt;/P&gt;&lt;P&gt; match protocol ntp&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt; match protocol ftp&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt; match protocol bittorrent&lt;/P&gt;&lt;P&gt; match protocol pptp&lt;/P&gt;&lt;P&gt; match protocol isakmp&lt;/P&gt;&lt;P&gt; match protocol ipsec-msft&lt;/P&gt;&lt;P&gt; match protocol ssh&lt;/P&gt;&lt;P&gt; match protocol tftp&lt;/P&gt;&lt;P&gt; match protocol bootpc&lt;/P&gt;&lt;P&gt; match protocol bootps&lt;/P&gt;&lt;P&gt;class-map type inspect match-any OUTSIDE-IN&lt;/P&gt;&lt;P&gt; match access-group name WAN-IN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect INSIDE-to-SELF&lt;/P&gt;&lt;P&gt; class type inspect DHCP-to-SELF&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt; class type inspect TRAFFIC-to-SELF&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-to-SELF&lt;/P&gt;&lt;P&gt; class type inspect OUTSIDE-IN&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect ICMP&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;policy-map type inspect INSIDE-OUT&lt;/P&gt;&lt;P&gt; class type inspect INSIDE-OUT&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect ICMP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; police rate 8000 burst 1000&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-IN&lt;/P&gt;&lt;P&gt; class type inspect OUTSIDE-IN&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect ICMP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; police rate 8000 burst 1000&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security inside&lt;/P&gt;&lt;P&gt; description *** INSIDE ZONE ***&lt;/P&gt;&lt;P&gt;zone security outside&lt;/P&gt;&lt;P&gt; description *** OUTSIDE ZONE ***&lt;/P&gt;&lt;P&gt;zone-pair security INSIDE-to-OUTSIDE source inside destination outside&lt;/P&gt;&lt;P&gt; service-policy type inspect INSIDE-OUT&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE-IN source outside destination inside&lt;/P&gt;&lt;P&gt; service-policy type inspect OUTSIDE-IN&lt;/P&gt;&lt;P&gt;zone-pair security INSIDE-to-SELF source inside destination self&lt;/P&gt;&lt;P&gt; service-policy type inspect INSIDE-to-SELF&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE-to-SELF source outside destination self&lt;/P&gt;&lt;P&gt; service-policy type inspect OUTSIDE-to-SELF&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will remove the firewall and see if the errors persist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 21:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010636#M439477</guid>
      <dc:creator>Ashley Sahonta</dc:creator>
      <dc:date>2012-07-30T21:08:51Z</dc:date>
    </item>
    <item>
      <title>Cisco 887VA-W - dropped packets</title>
      <link>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010637#M439478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just turned off the zone based firewall and it seems that it was the firewall causing the drop packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have used CBAC before and not so much ZBF, however I have never come across these type of errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if there is anything odd within the ZBF config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ash&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 21:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010637#M439478</guid>
      <dc:creator>Ashley Sahonta</dc:creator>
      <dc:date>2012-07-30T21:15:02Z</dc:date>
    </item>
    <item>
      <title>Cisco 887VA-W - dropped packets</title>
      <link>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010638#M439479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ashley,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course it is the ZBFW dropping the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZBFW performs a deep packet inspection and will track and mantain a state table for the TCP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; In this case we are getting packets that do not agree with the information previusly seen on a current TCP session, that is why the packets are getting lost.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ZBFW is doing it's job successfully, now you will need to focus on why this device is receiving tcp packets with invalid flags.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if you want to solve this for the moment (workaround) instead of inspecting the traffic just pass it. Again this would be a workaround.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 21:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-887va-w-dropped-packets/m-p/2010638#M439479</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-30T21:36:55Z</dc:date>
    </item>
  </channel>
</rss>

