cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
573
Views
5
Helpful
5
Replies

CSCvb61056 - 9.6.2 TCP connection doesn't work through L2TP

This is a really bad bug. There is no evidence about the circumstances, the SYN-ACK package vanishes silently. Usually you test the VPN with PING which is perfectly working, as it is with DNS (udp). TCP traffic is entirely timing out. Anyconnect clients are working fine.

I have verified this on 5515, 5512 (9.6(2)), 5506 (9.6(2)3).

The only option for me was finally to downgrade to 9.6(1). 

1 Accepted Solution

Accepted Solutions

Palani Mohan
Cisco Employee
Cisco Employee

This bug is close to getting resolved. Until then, your options are:

  • downgrade to 9.6.1
  • use IKEv2 with native client instead of L2TP

Does this help?

Kind regards ... Palani

View solution in original post

5 Replies 5

Palani Mohan
Cisco Employee
Cisco Employee

This bug is close to getting resolved. Until then, your options are:

  • downgrade to 9.6.1
  • use IKEv2 with native client instead of L2TP

Does this help?

Kind regards ... Palani

Thank you, Palani.

Just one question - will it be resolved in the 9.6(2) trail or will there be a 9.6(3) ?

Regards,

Chris

Hi Chris

The bug is not yet resolved. So, it is not clear which releases would have the fix. I expect some clarity in early Dec.

Kind regards ... Palani

Again thank you for your quick answer. I'm just wondering that it takes until December. The initial 9.6(2) is from August. Maybe I underestimate the impact to fix it, because the Anyconnect Client in this scenario is perfectly running.

Isn't a large user community using this option? We have changed most of our RAS VPN's to L2TP/PSK when PPTP was discontinued on the ASA platform some couple of years ago. IKEv2 was not supported at that time and still many client systems do not support it "on-board".

I'm not really dealing with VPN's every day - researching this to the extent necessary to consider it a bug took me several hours. I hope you understand, but during this process I simply did not want to accept that Cisco is releasing a Interim (3) release after almost 3 month still containing such a fundamental flaw.

Hi Chris

First of, regret the inconvenience caused.

Please do not view the following as defending the bug. As a customer, I expect better from my vendor. Any bug in sw is inconvenience for which there is no excuse.

As far as I can tell, this bug was first experienced in early October. Less than 10 customers are impacted so far, that I know of. Regardless, this bug is assigned the highest severity.

Between the time I responded on this thread and today, the bug has been resolved. Within a week or so, we should have clarity on which releases would have the fix and the ETA of the next release.

I hope this helps .... Palani