<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FWSM won't connect after first connection on a specific Vlan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783131#M494296</link>
    <description>&lt;P&gt;Greetings!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using a 6509 Sup720 FWSM VSS Cluster. Failover isn't active on FWSM modules yet, so I'm using the FWSM module on slot 4 of the VSS Switch and I'm using multiple contexts (multiple-vlan-interface enabled), 1 routed and 13 transparent. The routed is FWCTX-BACKEND.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a SVI configured for management access in this cluster, which is Vlan 10 (172.20.101.0/24). I have an ACS 1121 appliance on version 5.2.26 which is the TACACS+ AAA device manager (172.20.0.2/25) on Vlan220 whose default gateway is 172.20.0.1 the FWCTX-BACKEND DMZ interface (Vlan220) on FWCTX-BACKEND on the FWSM module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My aaa rules on the 6500 are as follow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication fail-message ^CCC*** Failed login. Five consecutive fails will revoke.***^C&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa accounting exec default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 0 default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 7 default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip tacacs source-interface Vlan10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tacacs-server host 172.20.0.2&lt;/P&gt;&lt;P&gt;tacacs-server host 172.20.0.3&lt;/P&gt;&lt;P&gt;tacacs-server timeout 3&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;tacacs-server key &amp;lt;OMITTED&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The route to the ACS is done, from the MSFC through the FWCTX-BACKEND. From the 6500 config prompt I can ping 172.20.101.250 (Intf Vlan10 @FWCTX-BACKEND) but not 172.20.0.2(ACS) - hence my auth problem. But from the FWCTX-BACKEND(172.20.101.250) I can't ping the 6500 (172.20.101.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enabling debug icmp and I get this message:&lt;/P&gt;&lt;P&gt;CORE-01(config)#do ping 172.20.101.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 172.20.101.250, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;CORE_CSC-01(config)#&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.535 BRT: ICMP: dst (172.20.101.1) host unreachable rcv from 172.20.101.250&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.543 BRT: ICMP: dst (172.20.101.1) host unreachable rcv from 172.20.101.250&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.543 BRT: ICMP: dst (172.20.101.1) host unreachable rcv from 172.20.101.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no way that 172.20.101.1 could be unreachble to 172.20.101.250, they are on the same subnet and using the same vlan tag, so no routes are needed, but apparently thats is what the log states.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I reload the 6500, I can make the first ping from 6500 172.20.101.1 to ACS 172.20.0.2 but as soon as it ends, I can't ping anymore. The same thing happens to my RA access. I've set SSH permission to 6500 at 201.x.x.129, SVI Vlan200, and 201.x.x.132, interface Vlan200 INTERNET FWCTX-BACKEND. I can authenticate a SSH session to the 6500 on ACS only one time after a reboot, every other request to the 6500 are then treated locally, the FWCTX-BACKEND SSH session always authenticate on the ACS and I can't explain why that happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;[6500]&lt;/P&gt;&lt;P&gt;This SVI on the VSS is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; ip address 172.20.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routing for this SVI is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 172.20.0.2 255.255.255.255 172.20.101.250&lt;/P&gt;&lt;P&gt;ip route 172.20.0.3 255.255.255.255 172.20.101.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[FWSM]&lt;/P&gt;&lt;P&gt;@FWCTX-BACKEND&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; nameif MGMT&lt;/P&gt;&lt;P&gt; security-level 60&lt;/P&gt;&lt;P&gt; ip address 172.20.101.250 255.255.255.0 standby 172.20.101.251&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt; nameif RA&lt;/P&gt;&lt;P&gt; security-level 1&lt;/P&gt;&lt;P&gt; ip address 201.x.x.132 255.255.255.248 standby 201.x.x.133&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Interface Vlan220&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 52&lt;/P&gt;&lt;P&gt; ip address 172.20.0.1 255.255.255.0 standby 172.20.0.4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_IN line 2 extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list DMZ_IN line 3 extended permit ip host 172.20.0.2 host 10.1.98.64 &lt;/P&gt;&lt;P&gt;access-list DMZ_IN line 4 extended permit ip host 172.20.0.3 host 10.1.98.64 &lt;/P&gt;&lt;P&gt;access-list DMZ_IN line 5 extended permit ip host 172.20.0.2 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 1 remark ### ACESSO : GCC-ACS-01 : 172.20.0.2 ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 2 extended permit tcp any host 172.20.0.2 eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 3 extended permit tcp any host 172.20.0.2 eq tacacs &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 4 remark ### ACESSO : GCC-ACS-01 : 172.20.0.2 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/62436"&gt;@ad&lt;/a&gt; ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 5 extended permit tcp any host 172.20.0.2 eq 88 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 6 extended permit tcp any host 172.20.0.2 eq 445 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 7 extended permit tcp any host 172.20.0.2 eq 464 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 8 extended permit tcp any host 172.20.0.2 eq 3268 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 9 extended permit udp any host 172.20.0.2 eq ntp &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 10 extended permit udp any host 172.20.0.2 eq 389 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 11 remark ### ACESSO : GCC-ACS-02 : 172.20.0.3 ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 12 extended permit tcp any host 172.20.0.3 eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 13 extended permit tcp any host 172.20.0.3 eq tacacs &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 14 remark ### ACESSO : GCC-ACS-02 : 172.20.0.3 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/62436"&gt;@ad&lt;/a&gt; ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 15 extended permit tcp any host 172.20.0.3 eq 88 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 16 extended permit tcp any host 172.20.0.3 eq 445 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 17 extended permit tcp any host 172.20.0.3 eq 464 6&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 18 extended permit tcp any host 172.20.0.3 eq 3268 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 19 extended permit udp any host 172.20.0.3 eq ntp &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 20 extended permit udp any host 172.20.0.3 eq 389 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 21 remark ### ACESSO : GCC-ACS-01 : 172.20.0.2&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 22 extended permit tcp host 172.20.0.2 any eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 23 extended permit tcp host 172.20.0.2 any eq tacacs &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 24 remark ### ACESSO : GCC-ACS-01 : 172.20.0.2 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/62436"&gt;@ad&lt;/a&gt; ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 25 extended permit tcp host 172.20.0.2 any eq 88 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 26 extended permit tcp host 172.20.0.2 any eq 445 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 27 extended permit tcp host 172.20.0.2 any eq 464 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 28 extended permit tcp host 172.20.0.2 any eq 3268&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 29 extended permit udp host 172.20.0.2 any eq ntp &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 30 extended permit udp host 172.20.0.2 any eq 389&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 31 remark ### ACESSO : GCC-ACS-02 : 172.20.0.3&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 32 extended permit tcp host 172.20.0.3 any eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 33 extended permit tcp host 172.20.0.3 any eq tacacs &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 34 remark ### ACESSO : GCC-ACS-02 : 172.20.0.3 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/62436"&gt;@ad&lt;/a&gt; ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 35 extended permit tcp host 172.20.0.3 any eq 88 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 36 extended permit tcp host 172.20.0.3 any eq 445 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 37 extended permit tcp host 172.20.0.3 any eq 464 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 38 extended permit tcp host 172.20.0.3 any eq 3268&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 39 extended permit udp host 172.20.0.3 any eq ntp &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 40 extended permit udp host 172.20.0.3 any eq 389 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 41 extended permit ip host 10.1.98.64 host 172.20.0.2 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 42 extended permit ip host 172.20.0.2 host 10.1.98.64 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 43 extended permit ip any host 10.1.98.64&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list MGMT_IN line 1 extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ_IN in interface DMZ&lt;/P&gt;&lt;P&gt;access-group DMZ_OUT out interface DMZ&lt;/P&gt;&lt;P&gt;access_group MGMT_IN in interface MGMT&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Resume:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH 201.x.x.129 (6500) &amp;gt; aaa credentials &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/143750"&gt;@acs&lt;/a&gt;: only first connection after a reboot will work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; aaa credentials LOCAL: after that only local credentials will work since it can't connect to ACS through FWSM&lt;/P&gt;&lt;P&gt;SSH 201.x.x.132 (FWSM) &amp;gt; aaa credentials &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/143750"&gt;@acs&lt;/a&gt;: everytime ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone give any help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance, Dan&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:45:08 GMT</pubDate>
    <dc:creator>danielfycosta</dc:creator>
    <dc:date>2019-03-11T21:45:08Z</dc:date>
    <item>
      <title>FWSM won't connect after first connection on a specific Vlan</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783131#M494296</link>
      <description>&lt;P&gt;Greetings!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using a 6509 Sup720 FWSM VSS Cluster. Failover isn't active on FWSM modules yet, so I'm using the FWSM module on slot 4 of the VSS Switch and I'm using multiple contexts (multiple-vlan-interface enabled), 1 routed and 13 transparent. The routed is FWCTX-BACKEND.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a SVI configured for management access in this cluster, which is Vlan 10 (172.20.101.0/24). I have an ACS 1121 appliance on version 5.2.26 which is the TACACS+ AAA device manager (172.20.0.2/25) on Vlan220 whose default gateway is 172.20.0.1 the FWCTX-BACKEND DMZ interface (Vlan220) on FWCTX-BACKEND on the FWSM module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My aaa rules on the 6500 are as follow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication fail-message ^CCC*** Failed login. Five consecutive fails will revoke.***^C&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa accounting exec default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 0 default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 7 default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip tacacs source-interface Vlan10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tacacs-server host 172.20.0.2&lt;/P&gt;&lt;P&gt;tacacs-server host 172.20.0.3&lt;/P&gt;&lt;P&gt;tacacs-server timeout 3&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;tacacs-server key &amp;lt;OMITTED&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The route to the ACS is done, from the MSFC through the FWCTX-BACKEND. From the 6500 config prompt I can ping 172.20.101.250 (Intf Vlan10 @FWCTX-BACKEND) but not 172.20.0.2(ACS) - hence my auth problem. But from the FWCTX-BACKEND(172.20.101.250) I can't ping the 6500 (172.20.101.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enabling debug icmp and I get this message:&lt;/P&gt;&lt;P&gt;CORE-01(config)#do ping 172.20.101.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 172.20.101.250, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;CORE_CSC-01(config)#&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.535 BRT: ICMP: dst (172.20.101.1) host unreachable rcv from 172.20.101.250&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.539 BRT: ICMP: echo reply rcvd, src 172.20.101.250, dst 172.20.101.1&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.543 BRT: ICMP: dst (172.20.101.1) host unreachable rcv from 172.20.101.250&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 1 18:44:24.543 BRT: ICMP: dst (172.20.101.1) host unreachable rcv from 172.20.101.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no way that 172.20.101.1 could be unreachble to 172.20.101.250, they are on the same subnet and using the same vlan tag, so no routes are needed, but apparently thats is what the log states.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I reload the 6500, I can make the first ping from 6500 172.20.101.1 to ACS 172.20.0.2 but as soon as it ends, I can't ping anymore. The same thing happens to my RA access. I've set SSH permission to 6500 at 201.x.x.129, SVI Vlan200, and 201.x.x.132, interface Vlan200 INTERNET FWCTX-BACKEND. I can authenticate a SSH session to the 6500 on ACS only one time after a reboot, every other request to the 6500 are then treated locally, the FWCTX-BACKEND SSH session always authenticate on the ACS and I can't explain why that happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;[6500]&lt;/P&gt;&lt;P&gt;This SVI on the VSS is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; ip address 172.20.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routing for this SVI is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 172.20.0.2 255.255.255.255 172.20.101.250&lt;/P&gt;&lt;P&gt;ip route 172.20.0.3 255.255.255.255 172.20.101.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[FWSM]&lt;/P&gt;&lt;P&gt;@FWCTX-BACKEND&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; nameif MGMT&lt;/P&gt;&lt;P&gt; security-level 60&lt;/P&gt;&lt;P&gt; ip address 172.20.101.250 255.255.255.0 standby 172.20.101.251&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt; nameif RA&lt;/P&gt;&lt;P&gt; security-level 1&lt;/P&gt;&lt;P&gt; ip address 201.x.x.132 255.255.255.248 standby 201.x.x.133&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Interface Vlan220&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 52&lt;/P&gt;&lt;P&gt; ip address 172.20.0.1 255.255.255.0 standby 172.20.0.4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_IN line 2 extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list DMZ_IN line 3 extended permit ip host 172.20.0.2 host 10.1.98.64 &lt;/P&gt;&lt;P&gt;access-list DMZ_IN line 4 extended permit ip host 172.20.0.3 host 10.1.98.64 &lt;/P&gt;&lt;P&gt;access-list DMZ_IN line 5 extended permit ip host 172.20.0.2 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 1 remark ### ACESSO : GCC-ACS-01 : 172.20.0.2 ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 2 extended permit tcp any host 172.20.0.2 eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 3 extended permit tcp any host 172.20.0.2 eq tacacs &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 4 remark ### ACESSO : GCC-ACS-01 : 172.20.0.2 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/62436"&gt;@ad&lt;/a&gt; ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 5 extended permit tcp any host 172.20.0.2 eq 88 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 6 extended permit tcp any host 172.20.0.2 eq 445 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 7 extended permit tcp any host 172.20.0.2 eq 464 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 8 extended permit tcp any host 172.20.0.2 eq 3268 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 9 extended permit udp any host 172.20.0.2 eq ntp &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 10 extended permit udp any host 172.20.0.2 eq 389 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 11 remark ### ACESSO : GCC-ACS-02 : 172.20.0.3 ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 12 extended permit tcp any host 172.20.0.3 eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 13 extended permit tcp any host 172.20.0.3 eq tacacs &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 14 remark ### ACESSO : GCC-ACS-02 : 172.20.0.3 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/62436"&gt;@ad&lt;/a&gt; ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 15 extended permit tcp any host 172.20.0.3 eq 88 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 16 extended permit tcp any host 172.20.0.3 eq 445 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 17 extended permit tcp any host 172.20.0.3 eq 464 6&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 18 extended permit tcp any host 172.20.0.3 eq 3268 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 19 extended permit udp any host 172.20.0.3 eq ntp &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 20 extended permit udp any host 172.20.0.3 eq 389 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 21 remark ### ACESSO : GCC-ACS-01 : 172.20.0.2&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 22 extended permit tcp host 172.20.0.2 any eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 23 extended permit tcp host 172.20.0.2 any eq tacacs &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 24 remark ### ACESSO : GCC-ACS-01 : 172.20.0.2 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/62436"&gt;@ad&lt;/a&gt; ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 25 extended permit tcp host 172.20.0.2 any eq 88 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 26 extended permit tcp host 172.20.0.2 any eq 445 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 27 extended permit tcp host 172.20.0.2 any eq 464 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 28 extended permit tcp host 172.20.0.2 any eq 3268&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 29 extended permit udp host 172.20.0.2 any eq ntp &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 30 extended permit udp host 172.20.0.2 any eq 389&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 31 remark ### ACESSO : GCC-ACS-02 : 172.20.0.3&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 32 extended permit tcp host 172.20.0.3 any eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 33 extended permit tcp host 172.20.0.3 any eq tacacs &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 34 remark ### ACESSO : GCC-ACS-02 : 172.20.0.3 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/62436"&gt;@ad&lt;/a&gt; ###&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 35 extended permit tcp host 172.20.0.3 any eq 88 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 36 extended permit tcp host 172.20.0.3 any eq 445 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 37 extended permit tcp host 172.20.0.3 any eq 464 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 38 extended permit tcp host 172.20.0.3 any eq 3268&lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 39 extended permit udp host 172.20.0.3 any eq ntp &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 40 extended permit udp host 172.20.0.3 any eq 389 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 41 extended permit ip host 10.1.98.64 host 172.20.0.2 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 42 extended permit ip host 172.20.0.2 host 10.1.98.64 &lt;/P&gt;&lt;P&gt;access-list DMZ_OUT line 43 extended permit ip any host 10.1.98.64&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list MGMT_IN line 1 extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ_IN in interface DMZ&lt;/P&gt;&lt;P&gt;access-group DMZ_OUT out interface DMZ&lt;/P&gt;&lt;P&gt;access_group MGMT_IN in interface MGMT&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Resume:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH 201.x.x.129 (6500) &amp;gt; aaa credentials &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/143750"&gt;@acs&lt;/a&gt;: only first connection after a reboot will work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; aaa credentials LOCAL: after that only local credentials will work since it can't connect to ACS through FWSM&lt;/P&gt;&lt;P&gt;SSH 201.x.x.132 (FWSM) &amp;gt; aaa credentials &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/143750"&gt;@acs&lt;/a&gt;: everytime ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone give any help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance, Dan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:45:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783131#M494296</guid>
      <dc:creator>danielfycosta</dc:creator>
      <dc:date>2019-03-11T21:45:08Z</dc:date>
    </item>
    <item>
      <title>FWSM won't connect after first connection on a specific Vlan</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783132#M494323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Daniel...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have both FWSMs configured even though failover isnt working yet? If so, theres a possibilty that both FWSMs are trying to claim the 172.20.101.250 IP address. If both FWSM are configured with the same config without failover, take one FWSM module offline until you are ready to do failover. Retest your ping again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, use the packet capture commands on the FWSM to find out whats happening with the ICMP packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-17345"&gt;https://supportforums.cisco.com/docs/DOC-17345&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 20:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783132#M494323</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-11-03T20:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM won't connect after first connection on a specific Vlan</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783133#M494329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Edward!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Thx for your reply!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I'm not using failover, I might've missed to say that the other FWSM module isn't configured, nor have allocated interfaces to it in the VSS MSFC and that happens only to this management vlan/svi, VLAN 10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I have some issues using capture on FWSM, tried using permit ip any any acls with packet-length 1500 capture with circular-buffer but some traffic isn't captured at all even when connections are ok, my guess, it's because of its virtual interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;\o/&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 22:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783133#M494329</guid>
      <dc:creator>danielfycosta</dc:creator>
      <dc:date>2011-11-03T22:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM won't connect after first connection on a specific Vlan</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783134#M494337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; If you are using VSS, I would suspect packet capture to work in your version of code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you configured capture correctly and you dont see the packet in the capture, than that would mean the packet nevers arrives to the FWSM.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 22:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783134#M494337</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-11-03T22:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM won't connect after first connection on a specific Vlan</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783135#M494340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's what I thought but the again, from the 6500 config prompt I actually get echo replys(!) from the FWCTX, with capture enabled as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list CAP permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; capture mgmt access-list CAP interface MGMT packet-length 1500 circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it shows blank and no hit counts. Same happens usind RTMonitor in ASDM (6.2.(2f)) some packets that are permited and routed correctly aren't actually noticed. I don't get any logging for the missing/dropped/denied echo replies from the FWCTX to the 6500 MSFC nor for the successful replies from the 6500 to the FWCTX withh ASDM Debugging logging on.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 23:12:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783135#M494340</guid>
      <dc:creator>danielfycosta</dc:creator>
      <dc:date>2011-11-03T23:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM won't connect after first connection on a specific Vlan</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783136#M494343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; sho theres no output when doing 'show capture mgmt'? How about just 'show capture'?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 23:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783136#M494343</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-11-03T23:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM won't connect after first connection on a specific Vlan</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783137#M494348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nothing man. Counters on zero bytes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 23:46:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-won-t-connect-after-first-connection-on-a-specific-vlan/m-p/1783137#M494348</guid>
      <dc:creator>danielfycosta</dc:creator>
      <dc:date>2011-11-03T23:46:39Z</dc:date>
    </item>
  </channel>
</rss>

