cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2281
Views
8
Helpful
27
Replies

Traffic not passing |#pkts encaps: 0, #pkts encrypt

tshabbircisco
Level 1
Level 1

 

Hello,

We are facing weird issue, suddenly working VPN went down, while reviewing, we found that tunnel is up however traffic is not passing. I can see pkts encap:0 and pkts decaps increasing. I have verified ACL/NAT thoroughly but unable to find the root cause.

Additionally, packet tracer also looks good. Urgent help is required. Here are some Environment details and some outputs


Environment:
OnPrem
Cisco ASA 5545
ASA Ver: 9.2
ASDM Ver: 7.2
ASA Interesting Network: 10.20.31.0/24

Azure Side
Routed :
VNET Interesting Traffic: 10.20.80.0/20


#show crypto ipsec sa peer AZ.AZ.AZ.AZ
peer address: AZ.AZ.AZ.AZ
Crypto map tag: Outside-W_map, seq num: 56, local addr: ASA-ASA-ASA-ASA

access-list Outside-W_cryptomap_51 extended permit ip 10.20.31.0 255.255.255.0 10.20.80.0 255.255.240.0
local ident (addr/mask/prot/port): (10.20.31.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.20.80.0/255.255.240.0/0/0)
current_peer: AZ.AZ.AZ.AZ


#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 9722, #pkts decrypt: 9722, #pkts verify: 9722
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#TFC rcvd: 0, #TFC sent: 0
#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0
#send errors: 0, #recv errors: 0

local crypto endpt.: ASA-ASA-ASA-ASA/500, remote crypto endpt.: AZ.AZ.AZ.AZ/500
path mtu 1500, ipsec overhead 74(44), media mtu 1500
PMTU time remaining (sec): 0, DF policy: copy-df
ICMP error validation: disabled, TFC packets: disabled
current outbound spi: 2BB3FCD4
current inbound spi : F48DFC9C

inbound esp sas:
spi: 0xF48DFC9C (4102945948)
transform: esp-aes-256 esp-sha-hmac no compression
in use settings ={L2L, Tunnel, IKEv2, }
slot: 0, conn_id: 142692352, crypto-map: Outside-W_map
sa timing: remaining key lifetime (kB/sec): (4331501/2054)
IV size: 16 bytes
replay detection support: N
outbound esp sas:
spi: 0x2BB3FCD4 (733215956)
transform: esp-aes-256 esp-sha-hmac no compression
in use settings ={L2L, Tunnel, IKEv2, }
slot: 0, conn_id: 142692352, crypto-map: Outside-W_map
sa timing: remaining key lifetime (kB/sec): (4285440/2054)
IV size: 16 bytes
replay detection support: N

show vpn-sessiondb detail l2l filter ipaddress AZ.AZ.AZ.AZ

Session Type: LAN-to-LAN Detailed

Connection : AZ.AZ.AZ.AZ
Index : 34837 IP Addr : AZ.AZ.AZ.AZ
Protocol : IKEv2 IPsec
Encryption : IKEv2: (1)AES256 IPsec: (2)AES256
Hashing : IKEv2: (1)SHA1 IPsec: (2)SHA1
Bytes Tx : 4413844 Bytes Rx : 11750792
Login Time : 21:18:53 EDT Tue May 2 2023
Duration : 11h:27m:01s

IKEv2 Tunnels: 1
IPsec Tunnels: 2

IKEv2:
Tunnel ID : 34837.1
UDP Src Port : 500 UDP Dst Port : 500
Rem Auth Mode: preSharedKeys
Loc Auth Mode: preSharedKeys
Encryption : AES256 Hashing : SHA1
Rekey Int (T): 28800 Seconds Rekey Left(T): 14948 Seconds
PRF : SHA1 D/H Group : 2
Filter Name :

IPsec:
Tunnel ID : 34837.3
Local Addr : 10.20.31.0/255.255.255.0/0/0
Remote Addr : 10.20.80.0/255.255.240.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 3600 Seconds Rekey Left(T): 1406 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4607974 K-Bytes
Idle Time Out: 30 Minutes Idle TO Left : 29 Minutes
Bytes Tx : 0 Bytes Rx : 500492
Pkts Tx : 0 Pkts Rx : 9878

IPsec:
Tunnel ID : 34837.4
Local Addr : 10.20.31.0/255.255.255.0/0/0
Remote Addr : 10.35.0.0/255.255.0.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 3600 Seconds Rekey Left(T): 3301 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4607965 K-Bytes
Idle Time Out: 30 Minutes Idle TO Left : 30 Minutes
Bytes Tx : 2725786 Bytes Rx : 6715217
Pkts Tx : 49620 Pkts Rx : 48589

packet-tracer input inside-D tcp 10.20.31.130 111 10.20.80.11 80

Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list

Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 3
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 via 212.X.X.X, Outside-W

Phase: 4
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (Inside-D,Outside-W) source static NETWORK_OBJ_10.20.31.0_24 NETWORK_OBJ_10.20.31.0_24 destination static DM_INLINE_NETWORK_32 DM_INLINE_NETWORK_32 no-proxy-arp route-lookup
Additional Information:
NAT divert to egress interface Outside-W
Untranslate 10.20.80.11/80 to 10.20.80.11/80

Phase: 5
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group Inside-access-IN in interface Inside-D
access-list Inside-access-IN extended permit ip any any
Additional Information:

Phase: 6
Type: CONN-SETTINGS
Subtype:
Result: ALLOW
Config:
class-map class-default
match any
policy-map global_policy
class class-default
set connection decrement-ttl
service-policy global_policy global
Additional Information:

Phase: 7
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (Inside-D,Outside-W) source static NETWORK_OBJ_10.20.31.0_24 NETWORK_OBJ_10.20.31.0_24 destination static DM_INLINE_NETWORK_32 DM_INLINE_NETWORK_32 no-proxy-arp route-lookup
Additional Information:
Static translate 10.20.31.130/111 to 10.20.31.130/111

Phase: 8
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:

Phase: 9
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 10
Type: FOVER
Subtype: standby-update
Result: ALLOW
Config:
Additional Information:

Phase: 11
Type: VPN
Subtype: encrypt
Result: ALLOW
Config:
Additional Information:

Phase: 12
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (Inside-D,Outside-W) source static NETWORK_OBJ_10.20.31.0_24 NETWORK_OBJ_10.20.31.0_24 destination static DM_INLINE_NETWORK_32 DM_INLINE_NETWORK_32 no-proxy-arp route-lookup
Additional Information:

Phase: 13
Type: USER-STATISTICS
Subtype: user-statistics
Result: ALLOW
Config:
Additional Information:

Phase: 14
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:

Phase: 15
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:

Phase: 16
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 17
Type: USER-STATISTICS
Subtype: user-statistics
Result: ALLOW
Config:
Additional Information:

Phase: 18
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 1033661206, packet dispatched to next module

Result:
input-interface: Inside-D
input-status: up
input-line-status: up
output-interface: Outside-W
output-status: up
output-line-status: up
Action: allow

27 Replies 27

Hi @tshabbircisco , That's a good news . I am glad issue is resolved and i was able to help. 

Disabling Data-based rekey is not required unless you have huge amount of traffic that goes over tunnels on ASA . In that case , to avoid any inconsistencies in SA creation , you can proceed with disabling it . The Rekey will then be time-based only . 

FYI - Workaround that you have applied is not a permanent fix unless you move ASA to Fix version . However i have seen minimal chances of its reoccurrence .

THANKYOU FOR YOUR APPRECIATION AND TRUST 

Regards 
Salman Mahajan 

Yes, I shared asp drops but output not included 10.20.80.0/20. I shared in previous comments

Yes, we have dozen of active VPNs on the same firewall.

@tshabbircisco 
Since asp capture shows no output for 10.20.80.0/20 and as you are saying there are dozens of VPN on the Firewall . It is either of the two then 

1.Overlapping ACL ( causing interesting traffic to other active SA for encryption )
2.Stale asp entry issue 

@Salman Mahajan 

Please advise how to further analyze both cases of Overlapping ACL and Stale ASP Entry 

@tshabbircisco 
We shall isolate on Overlapping ACL Part first . Can you share below outputs :- 

show run | in 10.20.80.0
show crypto ipsec sa | inc ident|caps|spi 


Hi Salman,

capture asp type asp-drop all [Buffer Full - 524224 bytes]
match ip any 10.20.80.0 255.255.240.0
match tcp host 10.20.31.130 host 10.20.80.11
capture capin type raw-data interface Inside-D [Capturing - 5652 bytes]
match ip any 10.20.80.0 255.255.240.0

But output shows all drops but not for 10.20.80.0/20

P3HR-ASA/sec/act# sh cap asp

617 packets captured

1: 21:15:46.047299 14.17.65.110.443 > 212.69.144.99.80: udp 9 Drop-reason: (acl-drop) Flow is denied by configured rule
2: 21:15:46.054135 35.203.211.225.55469 > 212.69.144.15.10508: S 1526368572:1526368572(0) win 1024 <mss 1460> Drop-reason: (acl-drop) Flow is denied by configured rule
3: 21:15:46.203389 103.45.97.171.42615 > 212.69.144.75.1433: S 2865632:2865632(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
4: 21:15:46.215931 10.20.31.151.3389 > 45.227.254.48.25473: . ack 3303818669 win 516 Drop-reason: (tcp-not-syn) First TCP packet not SYN
5: 21:15:46.300170 10.20.31.151.3389 > 152.89.196.111.57515: . ack 980010676 win 516 Drop-reason: (tcp-not-syn) First TCP packet not SYN
6: 21:15:46.352688 176.111.174.88.42348 > 212.69.144.112.3405: S 4288501496:4288501496(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
7: 21:15:46.357479 45.93.201.51.53253 > 212.69.144.28.333: S 2639930126:2639930126(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
8: 21:15:46.359356 92.63.197.157.58765 > 212.69.144.14.5537: S 3485939288:3485939288(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
9: 21:15:46.443183 162.216.150.163.52201 > 212.69.144.41.56943: S 3958804931:3958804931(0) win 1024 <mss 1460> Drop-reason: (acl-drop) Flow is denied by configured rule
10: 21:15:46.455802 10.20.31.151.3389 > 185.122.204.76.23605: . ack 795932622 win 516 Drop-reason: (tcp-not-syn) First TCP packet not SYN
11: 21:15:46.464514 94.102.61.40.44625 > 212.69.144.76.12001: S 2579234941:2579234941(0) win 65535 Drop-reason: (acl-drop) Flow is denied by configured rule
12: 21:15:46.477697 10.20.31.90.60074 > 34.204.109.226.443: R 4210283990:4210283990(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order
13: 21:15:46.533419 94.102.61.40.38853 > 212.69.144.76.18008: S 224450766:224450766(0) win 65535 Drop-reason: (acl-drop) Flow is denied by configured rule
14: 21:15:46.663127 185.156.73.57.50966 > 212.69.144.91.9922: S 2652064710:2652064710(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
15: 21:15:46.676677 194.165.16.78.42085 > 212.69.144.19.3389: P 1837961821:1837961938(117) ack 830241196 win 259 Drop-reason: (tcp-not-syn) First TCP packet not SYN
16: 21:15:46.682902 194.165.16.78.42085 > 212.69.144.19.3389: P 1837961938:1837962023(85) ack 830241196 win 259 Drop-reason: (tcp-not-syn) First TCP packet not SYN
17: 21:15:46.703897 194.165.16.78.42085 > 212.69.144.19.3389: R 1837962023:1837962023(0) ack 830241196 win 0 Drop-reason: (tcp-not-syn) First TCP packet not SYN
18: 21:15:46.724114 94.102.61.40.44655 > 212.69.144.122.14496: S 452913162:452913162(0) win 65535 Drop-reason: (acl-drop) Flow is denied by configured rule
19: 21:15:46.728401 5.10.250.241.54421 > 146.88.180.0.3391: S 2876364308:2876364308(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
20: 21:15:46.751029 10.20.31.155.3389 > 45.227.253.194.48730: R 2742815200:2742815200(0) ack 3086433478 win 0 Drop-reason: (tcp-not-syn) First TCP packet not SYN
21: 21:15:46.751059 10.20.31.155.3389 > 45.227.253.194.48730: R 2742815200:2742815200(0) win 0 Drop-reason: (tcp-not-syn) First TCP packet not SYN
22: 21:15:46.822986 10.20.31.151.3389 > 88.214.25.137.25306: . ack 1098173291 win 516 Drop-reason: (tcp-not-syn) First TCP packet not SYN
23: 21:15:46.823031 10.20.31.151.3389 > 88.214.25.137.25306: R 3341596647:3341596647(0) ack 1098173291 win 0 Drop-reason: (tcp-not-syn) First TCP packet not SYN
24: 21:15:46.837404 14.17.65.110.443 > 212.69.144.99.80: udp 9 Drop-reason: (acl-drop) Flow is denied by configured rule
25: 21:15:46.837435 14.17.65.110.443 > 212.69.144.99.80: udp 9 Drop-reason: (acl-drop) Flow is denied by configured rule
26: 21:15:46.871170 192.241.239.10.60115 > 212.69.144.35.4332: S 3187203597:3187203597(0) win 65535 Drop-reason: (acl-drop) Flow is denied by configured rule
27: 21:15:46.952785 92.63.197.153.56495 > 212.69.144.75.19999: S 1055580786:1055580786(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
28: 21:15:46.964748 61.219.18.151.65520 > 212.69.144.104.23: S 3561328744:3561328744(0) win 49352 Drop-reason: (acl-drop) Flow is denied by configured rule
29: 21:15:46.981043 207.99.59.87.995 > 212.69.144.23.55767: . ack 4258708938 win 524 Drop-reason: (acl-drop) Flow is denied by configured rule
30: 21:15:46.998285 94.102.61.40.37486 > 212.69.144.86.10080: S 2087227232:2087227232(0) win 65535 Drop-reason: (acl-drop) Flow is denied by configured rule
31: 21:15:47.002303 35.203.210.14.50308 > 146.88.180.4.30085: S 1355257855:1355257855(0) win 65535 <mss 1460> Drop-reason: (acl-drop) Flow is denied by configured rule
32: 21:15:47.011367 89.248.163.167.58646 > 212.69.144.19.33553: S 2468033536:2468033536(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
33: 21:15:47.014907 89.248.165.187.41171 > 212.69.144.54.34629: S 597002798:597002798(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
34: 21:15:47.083873 91.240.118.243.54488 > 212.69.144.36.9443: S 1709409639:1709409639(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
35: 21:15:47.094096 78.128.112.58.52978 > 212.69.144.12.33412: S 1065344867:1065344867(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
36: 21:15:47.187856 78.128.113.102.48598 > 212.69.144.18.4449: S 3587400358:3587400358(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
37: 21:15:47.193730 94.102.61.40.56414 > 212.69.144.13.12001: S 4265383152:4265383152(0) win 65535 Drop-reason: (acl-drop) Flow is denied by configured rule
38: 21:15:47.298339 13.64.137.162.10752 > 212.69.144.91.443: R 3820287615:3820287615(0) ack 0 win 0 Drop-reason: (tcp-not-syn) First TCP packet not SYN
39: 21:15:47.316466 194.165.16.14.31381 > 212.69.144.12.80: R 3264222892:3264222892(0) win 0 Drop-reason: (tcp-not-syn) First TCP packet not SYN
40: 21:15:47.327894 70.104.129.111.24160 > 212.69.144.12.20009: udp 68 Drop-reason: (acl-drop) Flow is denied by configured rule
41: 21:15:47.328825 94.102.61.40.49741 > 212.69.144.72.14496: S 2771298511:2771298511(0) win 65535 Drop-reason: (acl-drop) Flow is denied by configured rule
42: 21:15:47.333265 14.17.65.110.443 > 212.69.144.99.80: udp 9 Drop-reason: (acl-drop) Flow is denied by configured rule
43: 21:15:47.373393 89.248.163.7.59708 > 212.69.144.92.35722: S 1999566946:1999566946(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule
44: 21:15:47.422661 90.176.72.208.50087 > 212.69.144.84.23: S 1421659266:1421659266(0) win 14600 <mss 1452> Drop-reason: (acl-drop) Flow is denied by configured rule
45: 21:15:47.431801 147.78.47.167.8424 > 212.69.144.12.80: R 3905632397:3905632397(0) win 0 Drop-reason: (tcp-not-syn) First TCP packet not SYN
46: 21:15:47.480962 92.63.197.157.58765 > 212.69.144.47.5537: S 4269166857:4269166857(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule

Hi,

I edited my post as I thought its VTI instead of crypto map. Just do the inside pcap as suggested the guys. 

 

**** please remember to rate useful posts

It is a crypto map tunnel and egress interface will show Outside only .

Thx mate. I thought I saw VTI (probably confused with different post). I will edit mine. 

hello friend, 
please do same packet capture but with detail keyword 

@MHM Cisco World 

 

P3HR-ASA/sec/act# packet-tracer input inside-D tcp 10.20.31.130 111 10.20.80.1$

Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ffed3fc1de0, priority=13, domain=capture, deny=false
hits=71389761, user_data=0x7ffed400a190, cs_id=0x0, l3_type=0x0
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0000.0000.0000
input_ifc=Inside-D, output_ifc=any

Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ffecffecd30, priority=1, domain=permit, deny=false
hits=173187681846, user_data=0x0, cs_id=0x0, l3_type=0x8
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0100.0000.0000
input_ifc=Inside-D, output_ifc=any

Phase: 3
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 via 212.x.x.x, Outside-W

Phase: 4
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (Inside-D,Outside-W) source static NETWORK_OBJ_10.20.31.0_24 NETWORK_OBJ_10.20.31.0_24 destination static DM_INLINE_NETWORK_32 DM_INLINE_NETWORK_32 no-proxy-arp route-lookup
Additional Information:
NAT divert to egress interface Outside-W
Untranslate 10.20.80.11/80 to 10.20.80.11/80

Phase: 5
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group Inside-access-IN in interface Inside-D
access-list Inside-access-IN extended permit ip any any
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ffed01c2590, priority=13, domain=permit, deny=false
hits=3847504114, user_data=0x7ffec7632400, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0,, dscp=0x0
input_ifc=Inside-D, output_ifc=any

Phase: 6
Type: CONN-SETTINGS
Subtype:
Result: ALLOW
Config:
class-map class-default
match any
policy-map global_policy
class class-default
set connection decrement-ttl
service-policy global_policy global
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ffecf548830, priority=7, domain=conn-set, deny=false
hits=3860987124, user_data=0x7ffecf545de0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=Inside-D, output_ifc=any

Phase: 7
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (Inside-D,Outside-W) source static NETWORK_OBJ_10.20.31.0_24 NETWORK_OBJ_10.20.31.0_24 destination static DM_INLINE_NETWORK_32 DM_INLINE_NETWORK_32 no-proxy-arp route-lookup
Additional Information:
Static translate 10.20.31.130/111 to 10.20.31.130/111
Forward Flow based lookup yields rule:
in id=0x7ffeda8e3ec0, priority=6, domain=nat, deny=false
hits=20010, user_data=0x7ffed2fdc830, cs_id=0x0, flags=0x0, protocol=0
src ip/id=10.20.31.0, mask=255.255.255.0, port=0, tag=0
dst ip/id=10.20.80.0, mask=255.255.240.0, port=0, tag=0, dscp=0x0
input_ifc=Inside-D, output_ifc=Outside-W

Phase: 8
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ffece8d9f50, priority=0, domain=nat-per-session, deny=false
hits=6150700729, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=any

Phase: 9
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ffecf87b8a0, priority=0, domain=inspect-ip-options, deny=true
hits=5941832062, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=Inside-D, output_ifc=any

Phase: 10
Type: FOVER
Subtype: standby-update
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ffed01be690, priority=21, domain=lu, deny=true
hits=37405752, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, tag=0, dscp=0x0
input_ifc=Inside-D, output_ifc=any

Phase: 11
Type: VPN
Subtype: encrypt
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
out id=0x7ffed3f6b0f0, priority=70, domain=encrypt, deny=false
hits=226687, user_data=0x43eeba04, cs_id=0x7ffed20d7540, reverse, flags=0x0, protocol=0
src ip/id=10.20.31.0, mask=255.255.255.0, port=0, tag=0
dst ip/id=10.20.80.0, mask=255.255.240.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=Outside-W

Phase: 12
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (Inside-D,Outside-W) source static NETWORK_OBJ_10.20.31.0_24 NETWORK_OBJ_10.20.31.0_24 destination static DM_INLINE_NETWORK_32 DM_INLINE_NETWORK_32 no-proxy-arp route-lookup
Additional Information:
Forward Flow based lookup yields rule:
out id=0x7ffee0f39aa0, priority=6, domain=nat-reverse, deny=false
hits=20453, user_data=0x7ffee0f7a320, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=10.20.31.0, mask=255.255.255.0, port=0, tag=0
dst ip/id=10.20.80.0, mask=255.255.240.0, port=0, tag=0, dscp=0x0
input_ifc=Inside-D, output_ifc=Outside-W

Phase: 13
Type: USER-STATISTICS
Subtype: user-statistics
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
out id=0x7ffecf53fff0, priority=0, domain=user-statistics, deny=false
hits=5886559492, user_data=0x7ffed041e3f0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=Outside-W

Phase: 14
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:
Reverse Flow based lookup yields rule:
in id=0x7ffed4d9c9f0, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=358339, user_data=0x43f315b4, cs_id=0x7ffed20d7540, reverse, flags=0x0, protocol=0
src ip/id=10.20.80.0, mask=255.255.240.0, port=0, tag=0
dst ip/id=10.20.31.0, mask=255.255.255.0, port=0, tag=0, dscp=0x0
input_ifc=Outside-W, output_ifc=any

Phase: 15
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Reverse Flow based lookup yields rule:
in id=0x7ffece8d9f50, priority=0, domain=nat-per-session, deny=false
hits=6150700731, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=any

Phase: 16
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Reverse Flow based lookup yields rule:
in id=0x7ffed00f28a0, priority=0, domain=inspect-ip-options, deny=true
hits=5712670089, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=Outside-W, output_ifc=any

Phase: 17
Type: USER-STATISTICS
Subtype: user-statistics
Result: ALLOW
Config:
Additional Information:
Reverse Flow based lookup yields rule:
out id=0x7ffecf540eb0, priority=0, domain=user-statistics, deny=false
hits=5520261211, user_data=0x7ffed041e3f0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=Inside-D

Phase: 18
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 1036220607, packet dispatched to next module
Module information for forward flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_tcp_normalizer
snp_fp_translate
snp_fp_adjacency
snp_fp_encrypt
snp_fp_fragment
snp_ifc_stat

Module information for reverse flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_ipsec_tunnel_flow
snp_fp_translate
snp_fp_tcp_normalizer
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat

Result:
input-interface: Inside-D
input-status: up
input-line-status: up
output-interface: Outside-W
output-status: up
output-line-status: up
Action: allow

P3HR-ASA/sec/act#

I see standby-update ?
are FW is HA ?

ASA# sh asp table vpn-context detail | beg 7ffed041e3f0 <<- if it not showing then remove the include and use command with it 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: