<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5510 Anti-Replay Checking in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-anti-replay-checking/m-p/865032#M960256</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are 3 possible situations that can trigger this error and they are here:&lt;/P&gt;&lt;P&gt;1. The IPSec encrypted packets are forwarded out of order by the encrypting router. This&lt;/P&gt;&lt;P&gt;is typically a result of QoS configuration on the encrypting router. This is why you may&lt;/P&gt;&lt;P&gt;contact your peer administrator to make sure if they are using Q0S or not, and also to see&lt;/P&gt;&lt;P&gt;if they are sneding the packets out of order or they are getting disordered in the path&lt;/P&gt;&lt;P&gt;between the peer and your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The IPSec packets received by the decrypting router are out of order due to packet&lt;/P&gt;&lt;P&gt;reordering at an intermediate device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. The received IPSec packet is fragmented and requires reassembly before authentication&lt;/P&gt;&lt;P&gt;verification and decryption. Since the reassembly process is taking place at the process&lt;/P&gt;&lt;P&gt;level, it's possible that the by the time the large packet is reassembled, 64 smaller&lt;/P&gt;&lt;P&gt;packets have already been processed by the crypto engine, thus causing the large packet to&lt;/P&gt;&lt;P&gt;miss the anti-replay window.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope you are in sync with me until this point. Now, to avoid these error messages we&lt;/P&gt;&lt;P&gt;need to disable anti-replay check in case the packets are arriving&lt;/P&gt;&lt;P&gt;out of order. In the ASA platfomr, this can opnly be done by disabling authentciation for&lt;/P&gt;&lt;P&gt;this peer. This means that you have to disable authentication on the transform-set used&lt;/P&gt;&lt;P&gt;for this peer. For example, if you were previously using 3des for ecnryption and md5 for&lt;/P&gt;&lt;P&gt;authentication, then you have to use this new tranfomr set for this peer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TEST esp-3des&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of: crypto ipsec transform-set TEST esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case of fragmentation it will be better to avoid fragmentation by using lower mtu value or fragmentation before encryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Nov 2007 20:51:40 GMT</pubDate>
    <dc:creator>ebreniz</dc:creator>
    <dc:date>2007-11-27T20:51:40Z</dc:date>
    <item>
      <title>Cisco ASA 5510 Anti-Replay Checking</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-anti-replay-checking/m-p/865031#M960255</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My logs on my ASA are screaming with error 402119, which corresponds with ESP packets failing anti-replay checking.  It's only for two different users, but when it happens, it happens about 75 errors right in a row in my logs.  I know in IOS you can adjust the window size for replay checking or just disable it altogether using the set security-association replay command set, but my research shows no means of doing this with ASA or the PIX.  I'd really like these errors to go away.  Help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Grant&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-anti-replay-checking/m-p/865031#M960255</guid>
      <dc:creator>gdawsont2systems</dc:creator>
      <dc:date>2019-03-11T11:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 Anti-Replay Checking</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-anti-replay-checking/m-p/865032#M960256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are 3 possible situations that can trigger this error and they are here:&lt;/P&gt;&lt;P&gt;1. The IPSec encrypted packets are forwarded out of order by the encrypting router. This&lt;/P&gt;&lt;P&gt;is typically a result of QoS configuration on the encrypting router. This is why you may&lt;/P&gt;&lt;P&gt;contact your peer administrator to make sure if they are using Q0S or not, and also to see&lt;/P&gt;&lt;P&gt;if they are sneding the packets out of order or they are getting disordered in the path&lt;/P&gt;&lt;P&gt;between the peer and your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The IPSec packets received by the decrypting router are out of order due to packet&lt;/P&gt;&lt;P&gt;reordering at an intermediate device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. The received IPSec packet is fragmented and requires reassembly before authentication&lt;/P&gt;&lt;P&gt;verification and decryption. Since the reassembly process is taking place at the process&lt;/P&gt;&lt;P&gt;level, it's possible that the by the time the large packet is reassembled, 64 smaller&lt;/P&gt;&lt;P&gt;packets have already been processed by the crypto engine, thus causing the large packet to&lt;/P&gt;&lt;P&gt;miss the anti-replay window.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope you are in sync with me until this point. Now, to avoid these error messages we&lt;/P&gt;&lt;P&gt;need to disable anti-replay check in case the packets are arriving&lt;/P&gt;&lt;P&gt;out of order. In the ASA platfomr, this can opnly be done by disabling authentciation for&lt;/P&gt;&lt;P&gt;this peer. This means that you have to disable authentication on the transform-set used&lt;/P&gt;&lt;P&gt;for this peer. For example, if you were previously using 3des for ecnryption and md5 for&lt;/P&gt;&lt;P&gt;authentication, then you have to use this new tranfomr set for this peer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TEST esp-3des&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of: crypto ipsec transform-set TEST esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case of fragmentation it will be better to avoid fragmentation by using lower mtu value or fragmentation before encryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Nov 2007 20:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-anti-replay-checking/m-p/865032#M960256</guid>
      <dc:creator>ebreniz</dc:creator>
      <dc:date>2007-11-27T20:51:40Z</dc:date>
    </item>
  </channel>
</rss>

