<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSM deploy error in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3916066#M6086</link>
    <description>&lt;P&gt;I see a lot of people have read the "recipe" but no comments. Maybe some explanation is need it. CSM cannot deploy because sees too many differences, lets say. So the idea is to limit that, replacing manually old ACLs with new ACLs generated by CSM. Like I said previously, for me it's working perfectly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe Cisco fixed this bug in newer CSM versions but I did't get the chance to test that.&lt;/P&gt;</description>
    <pubDate>Thu, 29 Aug 2019 13:01:07 GMT</pubDate>
    <dc:creator>Catalin Ciubotariu</dc:creator>
    <dc:date>2019-08-29T13:01:07Z</dc:date>
    <item>
      <title>CSM deploy error</title>
      <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3867331#M6081</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have found a previous question related to the same error I'm getting but no answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have rearranged the policy based on different new sections, different logic. I didn't changed the content of the sections, so basically the policy is the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now when I'm trying to deploy the new policy, I'm getting this error:&lt;/P&gt;&lt;P&gt;"An error response from the device prevented successful completion of this operation. The device provided the following description: no access-list … log default Specified access-list does not exist."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems like a bug for me, since the access-list is the one to be deployed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is random error, if I'm moving the section or the rule, I'm hitting the same error on different rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering if somebody had the same error at some point and how was solved it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance for your feedback!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3867331#M6081</guid>
      <dc:creator>Catalin Ciubotariu</dc:creator>
      <dc:date>2020-02-21T17:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: CSM deploy error</title>
      <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3867701#M6082</link>
      <description>&lt;P&gt;what is the version of CSM ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is this FWSM or ASA ? if ASA what is the Code running on that ASA ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 20:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3867701#M6082</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-06-04T20:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: CSM deploy error</title>
      <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3867992#M6083</link>
      <description>&lt;P&gt;CSM 4.15&lt;/P&gt;&lt;P&gt;ASA 9.6(3)9&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 10:11:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3867992#M6083</guid>
      <dc:creator>Catalin Ciubotariu</dc:creator>
      <dc:date>2019-06-05T10:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: CSM deploy error</title>
      <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3910030#M6084</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the same issue, please could you tell me how resolve this issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jordi&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 08:20:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3910030#M6084</guid>
      <dc:creator>jordi.torres</dc:creator>
      <dc:date>2019-08-19T08:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: CSM deploy error</title>
      <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3912181#M6085</link>
      <description>&lt;P&gt;Hi Jordi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only workaround I found is to manipulate in CLI the config directly on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The steps I used:&lt;/P&gt;&lt;P&gt;1. change the deployment mode on CSM to a file instead of the device. This option is in Tools &amp;gt; Cisco Security Manager Administration &amp;gt; Deployment&lt;/P&gt;&lt;P&gt;2. copy the full config on your machine to file1&lt;/P&gt;&lt;P&gt;3. go on CLI to the ASA unable to deploy&lt;/P&gt;&lt;P&gt;4. &amp;lt;show run&amp;gt; and copy all access-lists to file2&lt;/P&gt;&lt;P&gt;5. on file2 search and replace &amp;lt;access-list&amp;gt; with&amp;nbsp;&amp;lt;no access-list&amp;gt;&lt;/P&gt;&lt;P&gt;6. from file1 copy and paste all access-list to file3&lt;/P&gt;&lt;P&gt;7. from file1 copy and paste all access-group to file4&lt;/P&gt;&lt;P&gt;8. go back to CLI on the ASA and&lt;/P&gt;&lt;P&gt;&amp;nbsp;a. paste file2&lt;/P&gt;&lt;P&gt;&amp;nbsp;b. paste file3&lt;/P&gt;&lt;P&gt;&amp;nbsp;c. paste file4&lt;/P&gt;&lt;P&gt;9. go back to CSM and change back the deployment from file to device&lt;/P&gt;&lt;P&gt;10. on the policy which you are trying to deploy on CSM, disable a not very important rule&lt;/P&gt;&lt;P&gt;11. save and deploy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For me worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;&lt;P&gt;Catalin&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 09:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3912181#M6085</guid>
      <dc:creator>Catalin Ciubotariu</dc:creator>
      <dc:date>2019-08-22T09:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: CSM deploy error</title>
      <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3916066#M6086</link>
      <description>&lt;P&gt;I see a lot of people have read the "recipe" but no comments. Maybe some explanation is need it. CSM cannot deploy because sees too many differences, lets say. So the idea is to limit that, replacing manually old ACLs with new ACLs generated by CSM. Like I said previously, for me it's working perfectly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe Cisco fixed this bug in newer CSM versions but I did't get the chance to test that.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2019 13:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3916066#M6086</guid>
      <dc:creator>Catalin Ciubotariu</dc:creator>
      <dc:date>2019-08-29T13:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: CSM deploy error</title>
      <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3926068#M6087</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have opened on case to Cisco TAC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This deployment is failing because of defect &lt;STRONG&gt;CSCuy23983&lt;/STRONG&gt;.&amp;nbsp; This is caused because the first line of the delta config change is "&lt;STRONG&gt;no access list".&lt;/STRONG&gt;&amp;nbsp; This fails because the ASA does not have &lt;STRONG&gt;log default&lt;/STRONG&gt; appended to the ACE and the CSM is trying to negate it.&amp;nbsp; This defect is impacts &lt;STRONG&gt;&lt;EM&gt;4.15 and 4.16&lt;/EM&gt;&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4.17(0.65) and 4.17(0) SP1&lt;/STRONG&gt; are both fixed versions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;workaround of this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no access-list CSM_FW_ACL_outside_3 extended permit tcp any object XXXXXX eq www &lt;STRONG&gt;log default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which is using “&lt;STRONG&gt;log default&lt;/STRONG&gt;” at the end of this rule, I have checked internally about this issue and in order to immediately fix this so that you can deploy the change, you will need to make a change to the ACL Parameters in CSM &amp;amp; then re-deploy the job. See steps below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Tools &amp;gt; Security Manager Administration &amp;gt; Deployment. This should open the 'Deployment' window to the right.&lt;/LI&gt;&lt;LI&gt;Look for the 'ACL Parameters' section.&lt;/LI&gt;&lt;LI&gt;Change the "Optimize the Deployment of Access Rules For:" option from &lt;STRONG&gt;'Speed'&lt;/STRONG&gt; to &lt;STRONG&gt;'Traffic'&lt;/STRONG&gt; and save the change.&lt;/LI&gt;&lt;LI&gt;Close that window, then re-deploy your job.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+Note about the differences between the 2 options:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Speed (default)-Increases deployment speed by sending only the delta (difference) between the new and old ACLs. This is the recommended option. By making use of ACL line numbers, this approach selectively adds, updates, or deletes ACEs at specific positions and avoids resending the entire ACL. Because the ACL being edited is still in use, there is a small chance that some traffic might be handled incorrectly between the time an ACE is removed and the time that it is added to a new position. The ACL line number feature is supported by most Cisco IOS, PIX and ASA versions, and became available in FWSM from FWSM 3.1(1).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traffic-This approach switches ACLs seamlessly and avoids traffic interruption. However, deployment takes longer and uses more device memory before the temporary ACLs are deleted. First, a temporary copy is made of the ACL that is intended for deployment. This temporary ACL binds to the target interface. Then the old ACL is recreated with its original name but with the content of the new ACL. It also binds to the target interface. At this point, the temporary ACL is deleted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jordi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 07:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3926068#M6087</guid>
      <dc:creator>jordi.torres</dc:creator>
      <dc:date>2019-09-18T07:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: CSM deploy error</title>
      <link>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3926126#M6088</link>
      <description>&lt;P&gt;Hi Jordi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good to know about ACLs deployment option from 'speed' to 'traffic'.&lt;/P&gt;&lt;P&gt;Thanks for sharing!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Catalin&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 08:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csm-deploy-error/m-p/3926126#M6088</guid>
      <dc:creator>Catalin Ciubotariu</dc:creator>
      <dc:date>2019-09-18T08:48:38Z</dc:date>
    </item>
  </channel>
</rss>

