<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 Random Connection Drops in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465528#M645961</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Same Problem but it happens when i download too!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 31 Jul 2010 08:22:57 GMT</pubDate>
    <dc:creator>yahyajaber</dc:creator>
    <dc:date>2010-07-31T08:22:57Z</dc:date>
    <item>
      <title>ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465526#M645959</link>
      <description>&lt;P&gt;Ok folks, got a puzzle for ya here. First, the background info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our network consists of Catalyst 2950 Managed switches connected to an MPLS router as our primary point of service. We also had a PIX506E connected to an AT&amp;amp;T DSL modem, which acted as a local VPN endpoint, as well as a site to site tunnel back to corporate - the route tracking for failover performed at the switch level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We never had any problems with it. We recently replaced the PIX with an ASA - same infrastructure. The tunnel comes up, failover works better than before (previously we'd have to reboot the PIX to drop the tunnel for failback). However, now we're having a very strange issue of the ASA5505 dropping connections randomly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example: I'm remote desktoped to my home server. At random, the connection will say that it has been lost, then reconnect. On the ASA I see the connection torn down with TCP RESET-I, and two seconds later, rebuilt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example2: From another workstation, I attempt to watch a youtube stream. The video loads partially, then stops. Refreshing the video causes it to reload, and it sometimes loads or stops at a different spot - earlier or later than the previous stop. It's random.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've seen no established root cause - connections have lasted between 30 seconds and 30 minutes before randomly dropping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Troubleshooting so far: I've dropped the MTU to 1492 to account for PPPoE encapsulation, however that has not fixed the problem. The ACL's and VPN setup are identical to the previous PIX. The AT&amp;amp;T Router has the ASA set to a public IP address (No NAT) and has the firewall disabled for that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This set up worked fine under the PIX. The ASA is running 8.2(2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've cleared my asp drop to see if there's a specific packet drop category occuring. Immediately after clearing, l2_acl and acl-drop both start incrementing, but the connection stream is fine. When a connection stream drops, nothing new is added to the list. Occassionaly TCP Failed 3 way handshake and slowpath secruity check failed packets show up, but they don't seem related to the drops.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another side note - normal connection teardowns appear to be TCP RESET-I as well, from just basic web browsing. At least they appear to be judging from my coworker's web browsing habits...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, like I said - seems random, no root cause established, and honestly I'm baffled. If anyone's got an idea, you let me know...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's my config, vpn, passwords, etc removed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2)&lt;BR /&gt;!&lt;BR /&gt;names&lt;BR /&gt;name 192.168.240.0 corporate-network&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; mac-address 4c75.6115.0d01&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address *.*.*.* 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.20.12.10 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan91&lt;BR /&gt; mac-address 4c75.6115.0d91&lt;BR /&gt; no forward interface Vlan20&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.91.0.252 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 91&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa822-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object 10.20.11.0 255.255.255.0&lt;BR /&gt; network-object corporate-network 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object 10.20.11.0 255.255.255.0&lt;BR /&gt; network-object corporate-network 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit icmp any any&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 10.20.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_2&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.20.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_2&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.20.12.0 255.255.255.0 10.90.10.0 255.255.255.192&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.20.11.0 255.255.255.0 10.90.10.0 255.255.255.192&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip corporate-network 255.255.255.0 10.90.10.0 255.255.255.192&lt;BR /&gt;access-list TASV_splitTunnelAcl standard permit 10.20.12.0 255.255.255.0&lt;BR /&gt;access-list TASV_splitTunnelAcl standard permit 10.20.11.0 255.255.255.0&lt;BR /&gt;access-list TASV_splitTunnelAcl standard permit corporate-network 255.255.255.0&lt;BR /&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 10.20.12.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging host inside 10.20.12.17&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;no logging message 405001&lt;BR /&gt;no logging message 710005&lt;BR /&gt;logging message 106026 level warnings&lt;BR /&gt;mtu outside 1492&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool VpnPool 10.90.10.25-10.90.10.60 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-625-53.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 101 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 101 10.20.12.0 255.255.255.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 *.*.*.* 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.20.12.214 255.255.255.255 inside&lt;BR /&gt;http 10.20.12.182 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;fragment size 300 inside&lt;BR /&gt;sysopt connection tcpmss 0&lt;BR /&gt;no service resetoutbound interface outside&lt;BR /&gt;no service resetoutbound interface inside&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 10 set transform-set TRANS_ESP_3DES_SHA ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map2 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map2 interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.20.12.25 255.255.255.255 inside&lt;BR /&gt;ssh 10.20.12.214 255.255.255.255 inside&lt;BR /&gt;ssh timeout 20&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcp-client update dns server none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;no threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.20.12.14 source inside prefer&lt;BR /&gt;webvpn&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns default_DNS&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 768&lt;BR /&gt;&amp;nbsp; no nat-rewrite&lt;BR /&gt;&amp;nbsp; id-randomization&lt;BR /&gt;&amp;nbsp; id-mismatch action log&lt;BR /&gt;policy-map type inspect dcerpc default_DCERPC&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; timeout pinhole 0:01:00&lt;BR /&gt;!&lt;BR /&gt;Cryptochecksum:18c6fab94f08788ae39661317f6888c2&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465526#M645959</guid>
      <dc:creator>Michichael</dc:creator>
      <dc:date>2019-03-11T18:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465527#M645960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure why some device is sending messages with the reset flag.&amp;nbsp; Can you list the log messages (w/o the public ip's)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest that you use a combination of captures and logs to get to the bottom of the issue.&lt;/P&gt;&lt;P&gt;-- Get the issue to occur&lt;/P&gt;&lt;P&gt;-- Set your logging to "logging trap debugging" and then grep your logs for the internal ip address that you are having the issue (or use ASDM live logging)&lt;/P&gt;&lt;P&gt;-- Set up captures on the inside&lt;/P&gt;&lt;P&gt;-- See what traffic is sent just prior to the reset flags being sent, and see what device is sourcing the reset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit ip any host ip_address_of_host&lt;/P&gt;&lt;P&gt;access-list capin permit ip any 10.20.12.10&lt;/P&gt;&lt;P&gt;capture capin access-list capin interface inside&lt;/P&gt;&lt;P&gt;show capture capin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jul 2010 17:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465527#M645960</guid>
      <dc:creator>marbrow2</dc:creator>
      <dc:date>2010-07-30T17:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465528#M645961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Same Problem but it happens when i download too!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Jul 2010 08:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465528#M645961</guid>
      <dc:creator>yahyajaber</dc:creator>
      <dc:date>2010-07-31T08:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465529#M645962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dealing with other issues at the moment, but I will post the results as soon as I have time to test it. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Aug 2010 17:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465529#M645962</guid>
      <dc:creator>Michichael</dc:creator>
      <dc:date>2010-08-03T17:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465530#M645963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This sounds like physical layer problem but could be wrong, &lt;SPAN style="background-color: #f8fafd;"&gt;beside what Mark has asked you to do , in addition,&amp;nbsp; could you look at your&amp;nbsp; interfaces to rule out you are not dropping packets due to&amp;nbsp; transmission mismatch .. same applies for your local hosts&amp;nbsp; switchport and nic settings, always good to rule out the physical and move up the latter.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Aug 2010 23:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465530#M645963</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2010-08-03T23:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465531#M645964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, so far so good - I haven't had any random drops since correcting the MTU (DSL requires an MTU of 1492, since 8 bytes are used for PPPoE Encapsulation). I think that might have been our culprit, but I will leave this open for a few more days as I test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For anyone having this problem - set your outside interface to an MTU of 1492 if you're on DSL, especially on 2Wire modems/routers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Aug 2010 23:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465531#M645964</guid>
      <dc:creator>Michichael</dc:creator>
      <dc:date>2010-08-03T23:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465532#M645965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It may make sense to also change the MSS on the firewall in&amp;nbsp; order to keep TCP packets small enough to avoid fragmentation. If you&amp;nbsp; have dropped the MTU down to 1492 an MSS of the default of 1380 (which i&amp;nbsp; see has been changed in the configuration for some reason) should help&amp;nbsp; keep TCP in check as well. You can set this value with the command&amp;nbsp; 'sysopt connection tcpmss 1380'. 1380 would leave 112 bytes available for headers etc (1492-1380).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Magnus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Aug 2010 01:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465532#M645965</guid>
      <dc:creator>Magnus Mortensen</dc:creator>
      <dc:date>2010-08-04T01:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465533#M645966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the suggestion. I have not had to implement it - it appears the MTU issue fixed everything - I have had no further drops on the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again, the solution was to set my MTU to 1492 due to being on a DSL Connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you everyone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Aug 2010 23:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465533#M645966</guid>
      <dc:creator>Michichael</dc:creator>
      <dc:date>2010-08-04T23:00:06Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Random Connection Drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465534#M645967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good call on the 2Wire routers, pesky PPPoE. One must also clarify that the PPPoE session lives at the Cisco ASA not at the DSL gear, which is some times what they want you to do; may be if the session lives at the DSL box they internally know about this MTU issue and control it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long story short, the MTU did work here as well:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1492&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Dec 2012 20:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-random-connection-drops/m-p/1465534#M645967</guid>
      <dc:creator>bbiandov</dc:creator>
      <dc:date>2012-12-01T20:30:04Z</dc:date>
    </item>
  </channel>
</rss>

