<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA5506 often stops vpn connection in the morning in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa5506-often-stops-vpn-connection-in-the-morning/m-p/3326452#M972340</link>
    <description>one correction: the hub site ASA model is Cisco ASA5516x.</description>
    <pubDate>Wed, 07 Feb 2018 07:10:17 GMT</pubDate>
    <dc:creator>jude</dc:creator>
    <dc:date>2018-02-07T07:10:17Z</dc:date>
    <item>
      <title>Cisco ASA5506 often stops vpn connection in the morning</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5506-often-stops-vpn-connection-in-the-morning/m-p/3326387#M972339</link>
      <description>&lt;P&gt;I need some specialists to help with this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have 2&amp;nbsp; ASA5506 with same configuration in two spoke sites, IPSEC-vpn-connected to&amp;nbsp; ASA5515 in the hub site (same hub-spoke vpn). Internet and cross-site traffic works very well, but after some hours one spoke site stops sending traffic out from the ASA5506 (the other one never had problem).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASDM connection from internet works fine as I'm managing the problem ASA5506 remotely. What I have found:&lt;/P&gt;
&lt;P&gt;- 21 incidents out of 60 occurred in the morning round 8:00 AM, when nobody works in the spoke site, but many users start to work in the hub site. Other events occurred in the working hours mostly.&lt;/P&gt;
&lt;P&gt;- IPSEC SA&amp;nbsp;is still active when it stops sending traffic out. SA sent packets still increases, but received packets won't increase.&lt;/P&gt;
&lt;P&gt;- There is 50%-70% packet loss pinging the spoke site's isp router IP from ASA5506 (same network segment) during incident time, but no packet loss to ping ASA5506 outside IP from internet.&lt;/P&gt;
&lt;P&gt;- The problem can be resoled by reloading either the spoke ASA5506, or the hub ASA5515.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IPSEC lifetime is disabled. 'Show asp drop' displays packet drop increase for 'l2_acl', 'acl_drop' and 'sp_security_failed' when traffic stops, but they are quite similar as that when no problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISP presented bandwidth utilization graph, there were some peak times reaching bandwidth limit, but the peak times don't match the times when connection stopped in general.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume&amp;nbsp;it's a vpn issue as I can still remotely manage the ASA during the problem time. It might also be related to user traffic as 1/3 incidents occurred between 8:00-8:05, but don't know how to figure out why the packets are not sent.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm posting my configuration file below but the IP addresses are not real for safety consideration:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.5(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ASA5506&lt;BR /&gt;domain-name mycompany.net&lt;BR /&gt;enable password ****** encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd ****** encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 151.218.145.237 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.201.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name mycompany.net&lt;BR /&gt;object network CSM&lt;BR /&gt; host 171.66.30.203&lt;BR /&gt; description 171.66.30.203&lt;BR /&gt;object network Net_10.0.0.0-8_RFC1918&lt;BR /&gt; subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network Net_172.16.0.0-12_RFC1918&lt;BR /&gt; subnet 172.16.0.0 255.240.0.0&lt;BR /&gt;object network Net_192.168.0.0-16_RFC1918&lt;BR /&gt; subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object network test_1.1.1.1&lt;BR /&gt; host 1.1.1.1&lt;BR /&gt;object network OutsideIP&lt;BR /&gt; host 151.218.145.237&lt;BR /&gt;object network CSM_VPN_NAT_0_OBJ_NET_1&lt;BR /&gt; subnet 10.201.0.0 255.255.254.0&lt;BR /&gt;object network CSM_VPN_NAT_0_OBJ_NET_2&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network CSM_VPN_NAT_0_OBJ_NET_3&lt;BR /&gt; subnet 10.201.0.0 255.255.255.0&lt;BR /&gt;object-group network RFC1918&lt;BR /&gt; description All pricate addresses&lt;BR /&gt; network-object 10.0.0.0 255.0.0.0&lt;BR /&gt; network-object 172.16.0.0 255.240.0.0&lt;BR /&gt; network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;object-group network GRP_RFC1918&lt;BR /&gt; network-object object Net_172.16.0.0-12_RFC1918&lt;BR /&gt; network-object object Net_192.168.0.0-16_RFC1918&lt;BR /&gt; network-object object Net_10.0.0.0-8_RFC1918&lt;BR /&gt;object-group network Allowed_WAN_Hosts&lt;BR /&gt; description Internet hosts allowed all IP traffic&lt;BR /&gt; network-object object test_1.1.1.1&lt;BR /&gt;object-group service NTP&lt;BR /&gt; description NTP Protocols&lt;BR /&gt; service-object tcp destination eq 123 &lt;BR /&gt; service-object udp destination eq ntp &lt;BR /&gt;object-group service Synology&lt;BR /&gt; service-object tcp destination range 5000 5001 &lt;BR /&gt;object-group service Apple&lt;BR /&gt; service-object tcp destination eq 16384 &lt;BR /&gt; service-object tcp destination eq 16385 &lt;BR /&gt; service-object tcp destination eq 16386 &lt;BR /&gt;object-group service Internet_Access&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object tcp destination eq ftp &lt;BR /&gt; service-object tcp destination eq ftp-data &lt;BR /&gt; service-object tcp destination eq nntp &lt;BR /&gt; service-object udp destination eq domain &lt;BR /&gt; service-object tcp destination eq domain &lt;BR /&gt; service-object tcp destination eq pop3 &lt;BR /&gt; service-object tcp destination eq imap4 &lt;BR /&gt; service-object tcp destination eq ssh &lt;BR /&gt; service-object tcp destination eq 8080 &lt;BR /&gt; service-object tcp destination eq 8000 &lt;BR /&gt; service-object tcp destination eq 5938 &lt;BR /&gt; service-object tcp destination eq 4443 &lt;BR /&gt; service-object tcp destination eq 10020 &lt;BR /&gt; group-object NTP&lt;BR /&gt; group-object Synology&lt;BR /&gt; group-object Apple&lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object Net_10.0.0.0-8_RFC1918 object-group GRP_RFC1918 &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object Net_172.16.0.0-12_RFC1918 object-group GRP_RFC1918 &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit object-group Internet_Access object Net_10.0.0.0-8_RFC1918 any &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit object-group Internet_Access object Net_172.16.0.0-12_RFC1918 any &lt;BR /&gt;access-list CSM_FW_ACL_inside remark Bypass WAN IP with special ports&lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object Net_10.0.0.0-8_RFC1918 object-group Allowed_WAN_Hosts &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object Net_172.16.0.0-12_RFC1918 object-group Allowed_WAN_Hosts &lt;BR /&gt;access-list CSM_FW_ACL_inside extended deny ip any any &lt;BR /&gt;access-list CSM_FW_ACL_outside extended permit ip object-group GRP_RFC1918 object Net_10.0.0.0-8_RFC1918 &lt;BR /&gt;access-list CSM_FW_ACL_outside extended permit ip object-group GRP_RFC1918 object Net_172.16.0.0-12_RFC1918 &lt;BR /&gt;access-list CSM_FW_ACL_outside extended permit ip object CSM object OutsideIP &lt;BR /&gt;access-list CSM_FW_ACL_outside extended deny ip any any &lt;BR /&gt;access-list CSM_IPSEC_ACL_2 extended permit ip 10.201.0.0 255.255.255.0 any4 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;no logging hide username&lt;BR /&gt;logging standby&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging debug-trace&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static CSM_VPN_NAT_0_OBJ_NET_3 CSM_VPN_NAT_0_OBJ_NET_3 destination static CSM_VPN_NAT_0_OBJ_NET_2 CSM_VPN_NAT_0_OBJ_NET_2 no-proxy-arp route-lookup&lt;BR /&gt;nat (management,outside) source static CSM_VPN_NAT_0_OBJ_NET_3 CSM_VPN_NAT_0_OBJ_NET_3 destination static CSM_VPN_NAT_0_OBJ_NET_2 CSM_VPN_NAT_0_OBJ_NET_2 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source dynamic RFC1918 interface destination static CSM CSM&lt;BR /&gt;access-group CSM_FW_ACL_outside in interface outside&lt;BR /&gt;access-group CSM_FW_ACL_inside in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 151.218.145.238 1&lt;BR /&gt;route outside 171.66.30.203 255.255.255.255 151.218.145.238 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable 4443&lt;BR /&gt;http 151.43.54.243 255.255.255.255 outside&lt;BR /&gt;http 88.45.123.123 255.255.255.255 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;snmp-server host inside 10.161.20.112 community *****&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set CSM_TS_1 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set CSM_TS_2 esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map CSM_outside_map 1 match address CSM_IPSEC_ACL_2&lt;BR /&gt;crypto map CSM_outside_map 1 set pfs group5&lt;BR /&gt;crypto map CSM_outside_map 1 set peer 213.102.216.16 &lt;BR /&gt;crypto map CSM_outside_map 1 set ikev1 transform-set CSM_TS_1 CSM_TS_2&lt;BR /&gt;crypto map CSM_outside_map 1 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map CSM_outside_map 1 set reverse-route&lt;BR /&gt;crypto map CSM_outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto isakmp identity address &lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 5&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 1&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 151.43.54.243 255.255.255.255 outside&lt;BR /&gt;ssh 88.45.123.123 255.255.255.255 outside&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 inside&lt;BR /&gt;ssh 172.16.0.0 255.240.0.0 inside&lt;BR /&gt;ssh 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 60&lt;BR /&gt;management-access inside&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 97.165.172.58 source outside&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username myadmin password ****** encrypted privilege 15&lt;BR /&gt;username mygroup password ****** encrypted privilege 15&lt;BR /&gt;username nysfg password ****** encrypted privilege 15&lt;BR /&gt;tunnel-group 213.102.216.16 type ipsec-l2l&lt;BR /&gt;tunnel-group 213.102.216.16 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt; class class-default&lt;BR /&gt; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt; no active&lt;BR /&gt; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt; destination address email callhome@cisco.com&lt;BR /&gt; destination transport-method http&lt;BR /&gt; subscribe-to-alert-group diagnostic&lt;BR /&gt; subscribe-to-alert-group environment&lt;BR /&gt; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5506-often-stops-vpn-connection-in-the-morning/m-p/3326387#M972339</guid>
      <dc:creator>jude</dc:creator>
      <dc:date>2020-02-21T15:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5506 often stops vpn connection in the morning</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5506-often-stops-vpn-connection-in-the-morning/m-p/3326452#M972340</link>
      <description>one correction: the hub site ASA model is Cisco ASA5516x.</description>
      <pubDate>Wed, 07 Feb 2018 07:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5506-often-stops-vpn-connection-in-the-morning/m-p/3326452#M972340</guid>
      <dc:creator>jude</dc:creator>
      <dc:date>2018-02-07T07:10:17Z</dc:date>
    </item>
  </channel>
</rss>

