10-12-2021 10:27 PM
Hi There,
I tried to build site to site IPsec VPN tunnel between cisco ASA 5506x (Branch office) and ANS hub, tunnel is up but I see only RX traffic, TX count is zero. Checked at branch office firewall asp drop packet I see ANS hub ip address (2.2.2.2) is trying to communicate with branch office (1.1.1.1) but packets are dropped at Branch office ASA due to SP-security checks failed, please find the below output for your reference.
ASA1# show cap asp | in 2.2.2.2
1907: 21:29:52.802265 2.2.2.2.500 > 1.1.1.1.500 udp 384 Drop-reason: (SP-security checks failed) SLOWPATH security checks failed
ASA1#
Please let me the know the troubleshooting steps to resolve this issue.
Regards,
Antony Xavier.
10-12-2021 11:26 PM
Hello,
not sure what 'ANS hub' is exactly, but slow path security check failures usually have to do with access rules. Can you post the configs of the ASA and whatever device is on the other side ?
10-14-2021 05:16 AM - edited 10-14-2021 05:17 AM
Hello @Antony.xavier ,
you may have a Firepower module on board and you mi ght be sending all the traffic to it for deep inspection.
Check the presence of the SFR module using
show module
and from the configuration of your ASA you need to check if you are sending to sfr module
use the following link as a reference
if you have something like the following:
ciscoasa(config)# access-list sfr_redirect extended permit ip any any
ciscoasa(config)# class-map sfr
ciscoasa(config-cmap)# match access-list sfr_redirect
Note: You cannot configure both a passive mode and inline mode at the same time on the ASA. Only one type of security policy is allowed.
ciscoasa(config)# policy-map global_policy
ciscoasa(config-pmap)# class sfr
ciscoasa(config-pmap-c)# sfr fail-open
Hope to help
Giuseppe
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide