02-24-2018 08:56 AM - edited 02-21-2020 07:25 AM
Hello all.
I have made a few tests with content block and got stuck with an unexpected behavior - or a bad understanding from my part. 3D sensor runs v6.2.2.2-1, if that adds to the question.
According to the documentation [1]: "The Block and Block with reset actions deny traffic without further inspection of any kind. Block with reset rules also reset the connection."
I was expecting the "Block" action to be completely silent for both parties, until the connection timeout happens, and the "Block with reset" action to be an immediate stop of the connection with both sides aware of the connection being terminated.
I applied some policies for HTTP/HTTPS traffic and I can see traffic being blocked as soon as it matches the policy, however it does not matter if the policy is set to Block with our without reset, on the client side it always delays until the connection time out. Please see attachment for visual details. And this completely destroys the end user experience, as some external services have delays over 2 minutes (for whatever reason).
Am I missing something?
02-24-2018 09:02 AM
Hello Alexander,
You are right on the way the Block and Block with Reset is supposed to work. Block is suppose to leave the page loading until it times out, Block with Reset should be immediate. The one sending the RST is the device itself.
If this is not working, please open an SR for further investigation.
02-24-2018 06:33 PM
I have a TAC open (delayed after a few hiccups in Cisco's escalation process) and was able to speak to an engineer, however while researching this further, seems I'm hitting bug CSCvf47736. Still waiting to hear from the engineer if my problem confirms as this bug.
02-25-2018 06:22 AM
02-25-2018 07:14 AM
Yes, we do have SSL policies for internal traffic decryption and for session recording purposes. Not that we are decrypting traffic from this particular policy but a SSL policy is applied. Seems my large scale deployment is going to get postponed - again...
02-25-2018 09:30 AM
That is unfortunate. Currently the Fixed version for the bug are 6.2.2.2 and 6.2.3.
I know the versions above are also listed in the problem version, but this is because they were found in it during testing and will be fixed prior to release.
Version 6.2.2.2 should be released by the end of the month.
Otherwise the only other option would be to reimage the ASA to FTD. But that would much more work than needed, specially when there is a fixed version around the corner.
02-28-2018 05:46 AM
03-01-2018 09:00 AM
03-01-2018 09:07 AM
03-01-2018 11:13 AM
03-07-2018 04:44 PM - edited 03-07-2018 04:48 PM
I got CSCvi31751 created “just for me”... now back to the waiting game.
Workaround: set SSL Inspection policy to None at the Access List. You will miss SSL decryption and SSL session statistics.
03-30-2018 02:48 AM
Hello! I have the same issue. But it seems that in 6.2.2.2 it was resolved.
I see that with do not decrypt rule and block with reset action everithing is ok.
Could you confirm that you are still facing wit the bug in 6.2.2.2-109?
04-07-2018 07:44 PM
On 6.2.2.2 it was acting the same way - if a SSL policy is added, it was a no go. I found out 6.2.3 is out, and gave it a shot. Enabled the SSL policy again and it seems it is fixed. I need to do some more testing but it looks promising.
02-05-2019 02:32 AM
I have the same issue with 6.2.3.9 doesn't matter if ssl decrypt is enabled or disabled.....
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide