Thanks for your reply Richard... that would certainly be a good place to look if we were running QoS on either of the ASAs in question. I was also thinking that it could be related to MTU but it's an issue that just started to appear across the entire subnet.
Fortunately for me, the issue...
I have an L2L Tunnel between an ASA5540 and an ASA5505 that has been working correctly for months. No updates have taken place, but I'm now seeing about 50% packet loss between the sites.
The isakmp/ipsec tunnels are active and are not displaying any errors/drops/discards. I don't see any...
We wondered if maybe it was an overflow issue but can't find anything that would lead us to believe it, or indicate the source of the problem. The only thing that these switches have in common besides being 4948s is that they are all server switches, and it's most HP servers behind them (but not...
No, they reboot at different intervals, usually a few weeks to a few months apart. They are also plugged into different rack power strips on one massive UPS (along with other switch models that have no odd behavior).
Just doing some investigating and it appears to create a dump, but I'm not...
Thanks for the reply brianinms -- definitely a good place to start. We have a group of about 16 switches that are attached to the same UPS and (so far) it's only the 4948-10GEs that reboot themselves at seemingly random intervals. Solarwinds would also report the node as down/up in the case of...
We're encountering a very strange problem with Catalyst 4948-10GE switches that are rebooting themselves without cause (that we can find). Nothing appears in syslog or any other error logs but Solarwinds does see them reboot and the uptime reflects the reboot as well.
Has anyone ever had this...
We are trying to get an old Cisco 3002 hardware VPN client to connect site-to-site with our central ASA5540 running the latest IOS version.
The client and the ASA successfully complete the IKE Phase 1 negotiations using a pre-shared key, but then the VPN device appears to stop responding and...
By scrubbed config, he means to put X's in place of the middle 2 octets of any public addresses in your config, thus eliminating any security concerns.
Without being able to see the entire configuration it's often very difficult to pin-point configuration issues.
You need to use the tunnel-group name and associated pre-shared key as the "Group Authentication" information in the Cisco VPN client. Once you connect to the host using this information, it should prompt you for the local username and password that you configured.
The host addresses have started to change dynamically as we set up blocking rules, so we've deduced that a host somewhere has been compromised and is creating the spoofed traffic. Thanks for your help.
Thanks for your reply unclerico.
The problem is that I can't, for the life of me, find the source of this traffic.
The core switch does not contain ANY ARP information regarding any of the addresses in question, nor is there anything in the mac address table to trace back.
I don't even know...
I could really use your help as I'm still fairly wet behind the ears when it comes to this sort of thing.
Our ASA has been flooded with "Deny reverse path check" drops and I can't figure out for the life of me how to find the culprit. I'll elaborate... first, here is an example from the ASA...
I have an ASA5505 to which I would like to add a redundant (backup) ISP link. It is currently a simple inside/outside configuration (no DMZ required).
From what I have been able to find so far, it appears that I will need to upgrade from the base license to the security-plus license in...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.