VPN traffic interruption on ASA5540 Running 8.3 code
Intermittently, L2L VPNs traversing a particular interface on my ASA 5540 get torn down and are not able to complete phase 1. These tunnels run for weeks with the exact config in the ASA, and then randomly stop passing traffic. Importantly, this affects only VPN related traffic. Additionally, we run SSL VPN through the same interface on the ASA and that stops allowing incoming connections as well. I also have L2L VPN tunnels built up to other interfaces on the ASA and they are not affected.
My ASAs are running in active/standby and I can force a failover to whatever unit is acting as the standby, and the issue is immediately cleared with no other intervention. Recently, this issue presented and I noticed that my dynamic ARP table had multiple erroneous interfaces bound to the MAC address of the interface that has issues with VPN traffic. Instead of performing a failover event, I cleared the dynamic arp entries and the issue was immediately resolved. I can only assume that the HA failover process also forces an arp cache clear, which explains why that resolved the issue previously.
I have had the same hardware running the same code for quite some time and this issue only recently cropped up. There were no config changes made to the ASA for some time prior to the first manifestation of the issue.
I have debug logging enabled and am send this info to a syslog server. I captured output from some of these events but haven’t been able to make heads or tails of it.
Hi experts,I would like any suggestions on this topology. We are is the middle of replacing our old ASA5520 with the new FirePower. Our current firewall terminate our IPsec tunnels and the GRE is terminated on the first inside router's loopback on the sec...
Hi All, A customer wants to authenticate Anyconnect VPN users from an ASA using the client installed certificate and then with AD. i.e. Is this a corporate device?Would we recommend authenticating the cert on the ASA then passing the AD check to ISE ...
Hello Team, we are getting alert in FMC stating policy deployment failed, we are running on 6.2.0 version and not sure which version is stable version to re mediate this issue, in one event i have seen restart will resolve this issue but is it perman...
Threat Hunting 101
In the latest Cisco Cybersecurity report, we explore all there is to know about threat hunting and provide a how-to guide for creating a threat hunting team.
Here are some of th...
What Is Cisco Identity Services Engine?
Cisco Identity Services Engine (ISE) is an all-in-one enterprise policy control product that enables comprehensive secure wired, wireless, and Virtual Private Networking (VPN) access.
Cisco ISE offers...