<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Please recommend me which OS version of ASA? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/please-recommend-me-which-os-version-of-asa/m-p/1344808#M834176</link>
    <description>&lt;P&gt;I've been using OS 8.0(3) on ASA for Dynamicmap. It's site to site VPN with hub and spokes environment. Hub router is using static ip address. Spoke routers are using dynamic ip addresses. The problem is that multiple tunnels of the same branch site are connecting to HQ. HQ will get stuck on that. Can't encrypt/decrypt. I did search. it would relate to these bugs.&lt;/P&gt;&lt;P&gt;&amp;lt;b&amp;gt;&lt;/P&gt;&lt;P&gt;CSCsg86538 Bug Details 	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dynamic L2L tunnel fails if the remote peer ip is changed &lt;/P&gt;&lt;P&gt;None&lt;/P&gt;&lt;P&gt;Symptom:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote peer fails to re-establish the dynamic VPN tunnel once a new ip address is obtained. The &lt;/P&gt;&lt;P&gt;IKE phase II has to timeout on ASA side inorder to restablish the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Conditions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The peer ip address changes &lt;/P&gt;&lt;P&gt;Peer does not support IKE keepalive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workaround:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manually clear the ipsec peer on ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1st Found-In &lt;/P&gt;&lt;P&gt;7.0&lt;/P&gt;&lt;P&gt;7.2(1.9) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixed-In &lt;/P&gt;&lt;P&gt;7.0(6.29)&lt;/P&gt;&lt;P&gt;7.1(2.49)&lt;/P&gt;&lt;P&gt;7.2(2.20)&lt;/P&gt;&lt;P&gt;8.0(1.9)&lt;/P&gt;&lt;P&gt;8.0(2.7)&lt;/P&gt;&lt;P&gt;8.2(0.15)	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;########################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCsl51292 Bug Details 	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPSEC VPN tunnel on 8.0.3 fails every couple days. &lt;/P&gt;&lt;P&gt;ASA running version 8.0.3, fails all IPSEC tunnels lan to lan and remote access vpn tunnels after 2 days or so. No logs from when it failed, but after it fails and turning on logging, can see that it fails Phase 1 MSG 4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We see that the symptom of this problem shows up in show memory- where the Crypto free goes to 0%:&lt;/P&gt;&lt;P&gt;DMA memory:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Crypto free: 0 bytes ( 0%)&lt;/P&gt;&lt;P&gt;Crypto used: (26%)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not related to any SSL functionality that we can tell at this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workaround:&lt;/P&gt;&lt;P&gt;Reload ASA &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1st Found-In &lt;/P&gt;&lt;P&gt;8.0(3) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixed-In &lt;/P&gt;&lt;P&gt;8.0(3.10)&lt;/P&gt;&lt;P&gt;8.1(1.2)&lt;/P&gt;&lt;P&gt;7.2(4)&lt;/P&gt;&lt;P&gt;8.0(103.3)&lt;/P&gt;&lt;P&gt;7.2(3.22)	&lt;/P&gt;&lt;P&gt;##########################&lt;/P&gt;&lt;P&gt;CSCso50996 Bug Details 	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA dropping the packet instead of encrypting it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Symptom:&lt;/P&gt;&lt;P&gt;ASA/PIX stops encrypting data to a remote IPSec peer (either L2L or Remote&lt;/P&gt;&lt;P&gt;Access). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Conditions:&lt;/P&gt;&lt;P&gt;The problem is that after an IPSec SA goes down and comes back up (including&lt;/P&gt;&lt;P&gt;phase 2 rekeys), it's possible that a duplicate vpn-context and classifier&lt;/P&gt;&lt;P&gt;entry are created and added to the ASA's ASP classifier table for crypto. The&lt;/P&gt;&lt;P&gt;ASA should only have a single ASP classifier/vpn-context per IPSec flow (ie.&lt;/P&gt;&lt;P&gt;inbound vs. outbound) in its database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workaround:&lt;/P&gt;&lt;P&gt;Reload the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1st Found-In &lt;/P&gt;&lt;P&gt;7.0&lt;/P&gt;&lt;P&gt;8.0(3)&lt;/P&gt;&lt;P&gt;7.2(4) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixed-In &lt;/P&gt;&lt;P&gt;7.2(4.1)&lt;/P&gt;&lt;P&gt;8.0(3.13)&lt;/P&gt;&lt;P&gt;8.0(103.11)&lt;/P&gt;&lt;P&gt;7.0(7.13)&lt;/P&gt;&lt;P&gt;7.1(2.70)	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/b&amp;gt;&lt;/P&gt;&lt;P&gt;  However,I can't use keepalive to solve this problem. Because third party routers have been using at branch sites. As CISCO document says keepalive works with cisco family. (grin)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   You guys who can recommend me which IOS is stable enough for this kind of this scenario(dynamic map). Please advise. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;Toshi&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 15:48:31 GMT</pubDate>
    <dc:creator>Thotsaphon Lueangwattanaphong</dc:creator>
    <dc:date>2019-03-11T15:48:31Z</dc:date>
    <item>
      <title>Please recommend me which OS version of ASA?</title>
      <link>https://community.cisco.com/t5/network-security/please-recommend-me-which-os-version-of-asa/m-p/1344808#M834176</link>
      <description>&lt;P&gt;I've been using OS 8.0(3) on ASA for Dynamicmap. It's site to site VPN with hub and spokes environment. Hub router is using static ip address. Spoke routers are using dynamic ip addresses. The problem is that multiple tunnels of the same branch site are connecting to HQ. HQ will get stuck on that. Can't encrypt/decrypt. I did search. it would relate to these bugs.&lt;/P&gt;&lt;P&gt;&amp;lt;b&amp;gt;&lt;/P&gt;&lt;P&gt;CSCsg86538 Bug Details 	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dynamic L2L tunnel fails if the remote peer ip is changed &lt;/P&gt;&lt;P&gt;None&lt;/P&gt;&lt;P&gt;Symptom:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote peer fails to re-establish the dynamic VPN tunnel once a new ip address is obtained. The &lt;/P&gt;&lt;P&gt;IKE phase II has to timeout on ASA side inorder to restablish the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Conditions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The peer ip address changes &lt;/P&gt;&lt;P&gt;Peer does not support IKE keepalive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workaround:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manually clear the ipsec peer on ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1st Found-In &lt;/P&gt;&lt;P&gt;7.0&lt;/P&gt;&lt;P&gt;7.2(1.9) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixed-In &lt;/P&gt;&lt;P&gt;7.0(6.29)&lt;/P&gt;&lt;P&gt;7.1(2.49)&lt;/P&gt;&lt;P&gt;7.2(2.20)&lt;/P&gt;&lt;P&gt;8.0(1.9)&lt;/P&gt;&lt;P&gt;8.0(2.7)&lt;/P&gt;&lt;P&gt;8.2(0.15)	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;########################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCsl51292 Bug Details 	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPSEC VPN tunnel on 8.0.3 fails every couple days. &lt;/P&gt;&lt;P&gt;ASA running version 8.0.3, fails all IPSEC tunnels lan to lan and remote access vpn tunnels after 2 days or so. No logs from when it failed, but after it fails and turning on logging, can see that it fails Phase 1 MSG 4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We see that the symptom of this problem shows up in show memory- where the Crypto free goes to 0%:&lt;/P&gt;&lt;P&gt;DMA memory:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Crypto free: 0 bytes ( 0%)&lt;/P&gt;&lt;P&gt;Crypto used: (26%)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not related to any SSL functionality that we can tell at this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workaround:&lt;/P&gt;&lt;P&gt;Reload ASA &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1st Found-In &lt;/P&gt;&lt;P&gt;8.0(3) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixed-In &lt;/P&gt;&lt;P&gt;8.0(3.10)&lt;/P&gt;&lt;P&gt;8.1(1.2)&lt;/P&gt;&lt;P&gt;7.2(4)&lt;/P&gt;&lt;P&gt;8.0(103.3)&lt;/P&gt;&lt;P&gt;7.2(3.22)	&lt;/P&gt;&lt;P&gt;##########################&lt;/P&gt;&lt;P&gt;CSCso50996 Bug Details 	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA dropping the packet instead of encrypting it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Symptom:&lt;/P&gt;&lt;P&gt;ASA/PIX stops encrypting data to a remote IPSec peer (either L2L or Remote&lt;/P&gt;&lt;P&gt;Access). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Conditions:&lt;/P&gt;&lt;P&gt;The problem is that after an IPSec SA goes down and comes back up (including&lt;/P&gt;&lt;P&gt;phase 2 rekeys), it's possible that a duplicate vpn-context and classifier&lt;/P&gt;&lt;P&gt;entry are created and added to the ASA's ASP classifier table for crypto. The&lt;/P&gt;&lt;P&gt;ASA should only have a single ASP classifier/vpn-context per IPSec flow (ie.&lt;/P&gt;&lt;P&gt;inbound vs. outbound) in its database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workaround:&lt;/P&gt;&lt;P&gt;Reload the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1st Found-In &lt;/P&gt;&lt;P&gt;7.0&lt;/P&gt;&lt;P&gt;8.0(3)&lt;/P&gt;&lt;P&gt;7.2(4) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixed-In &lt;/P&gt;&lt;P&gt;7.2(4.1)&lt;/P&gt;&lt;P&gt;8.0(3.13)&lt;/P&gt;&lt;P&gt;8.0(103.11)&lt;/P&gt;&lt;P&gt;7.0(7.13)&lt;/P&gt;&lt;P&gt;7.1(2.70)	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/b&amp;gt;&lt;/P&gt;&lt;P&gt;  However,I can't use keepalive to solve this problem. Because third party routers have been using at branch sites. As CISCO document says keepalive works with cisco family. (grin)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   You guys who can recommend me which IOS is stable enough for this kind of this scenario(dynamic map). Please advise. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;Toshi&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-recommend-me-which-os-version-of-asa/m-p/1344808#M834176</guid>
      <dc:creator>Thotsaphon Lueangwattanaphong</dc:creator>
      <dc:date>2019-03-11T15:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: Please recommend me which OS version of ASA?</title>
      <link>https://community.cisco.com/t5/network-security/please-recommend-me-which-os-version-of-asa/m-p/1344809#M834188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dynamic L2L have been around since verion 7.0 code.  I run dynamic L2L on 7.2(4) with no issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jun 2009 07:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-recommend-me-which-os-version-of-asa/m-p/1344809#M834188</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-06-26T07:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Please recommend me which OS version of ASA?</title>
      <link>https://community.cisco.com/t5/network-security/please-recommend-me-which-os-version-of-asa/m-p/1344810#M834201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No one can tell you which version will work  in your environment because nobody understand your environment, except Cisco if you open TAC case with them.  Just because 7.2(4) works in one environment does not mean it will work in yours especially when it comes to VPN INTEROPERABILITY.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jun 2009 10:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-recommend-me-which-os-version-of-asa/m-p/1344810#M834201</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2009-06-26T10:54:00Z</dc:date>
    </item>
  </channel>
</rss>

