Brksec 3055
Brksec 3055
Brksec 3055
Prapanch Ramamoorthy
Engineer, Technical Services
7 years of Cisco TAC experience
Primarily focused on security
praprama@cisco.com
3
Housekeeping
Interrupt anytime for questions
Phones in Silent mode.
Prior understanding of ASA.
Session scope:
Focus on troubleshooting ASA features and integration with FirePOWER module.
FirePOWER features out-of-scope.
Other Sessions of Interest
BRKSEC-2042 - Web Filtering and Content Control in the Enterprise
BRKSEC-2700 - Building a Highly Secure Internet Edge
BRKSEC-3010 - Firepower 9300 Deep Dive
BRKSEC-3032 - Advanced - ASA Clustering Deep Dive
Agenda
Architecture
Packet Flow
Troubleshooting Tools
Case Studies
Best Practices
Architecture
ASA 5500-X Block Diagram
System Bus
Management0/0
1GE
SFR RAM SFR CPU
Ethernet
6x1Gbps 6x1Gbps* or
8x1Gbps**
External Interfaces On-board Interfaces
6x1GE 6x1GE* or 8x1GE**
*Half of the 10Gbps uplinks towards MAC used for traffic to/from SFR
ASA 5585-x with FirePOWER services
ASA controls all ports including those on FirePOWER SSP module.
Ingress Frame Processing
Frames are received from wire into ingress FIFO queues
32/48KB on 1GE (except management ports), 512KB on 10GE
Network Interface Controller (NIC) moves frames to main memory via RX rings
Each ring slot points to a main memory address (block or buffer)
Single RX ring per 1GE, multiple RX rings per 10GE
Shared RX rings on 10GE MACs (ASA5585/SM) and 1GE uplink (ASA5505)
Select Interface 0,
RX Ring 0 always
Other than
IPv4/IPv6
Select Interface 0,
RX Ring 3 based on
source/destination IP hash
IPv4/IPv6 Other Select Interface 1,
than TCP/UDP RX Ring 2 from
source/destination IP and
TCP/UDP port hash
TCP/UDP
10GE MAC Interface Information
Check Internal-Data 10GE MAC interfaces on ASA5585 and ASASM for errors
All buffering logic asa# show interface detail | begin Internal-Data
is on 10GE CPU Interface Internal-Data0/0 "", is up, line protocol is up
Hardware is i82599_xaui rev01, BW 10000 Mbps, DLY 10 usec
complex uplinks
[]
Queue Stats: Packet load should be
RX[00]: 325778 packets, 31260705 bytes, 0 overrun evenly distributed
Blocks free curr/low: 511/509 across all RX rings
RX[01]: 203772 packets, 28370570 bytes, 0 overrun
Multiple receive
Blocks free curr/low: 511/508
(RX) rings with RX[02]: 1043360 packets, 143224467 bytes, 1231 overrun Overrun drops occur at
hash based flow Blocks free curr/low: 511/509 RX ring level in 9.0(2)+
load-balancing RX[03]: 66816 packets, 10873206 bytes, 0 overrun
Blocks free curr/low: 511/510
RX[04]: 122346 packets, 13580127 bytes, 0 overrun Maximum/current free
Blocks free curr/low: 511/429 RX ring slot capacity is
TX[00]: 0 packets, 0 bytes, 0 underruns updated by CPU
Multiple transmit
Blocks free curr/low: 511/511
(TX) rings with TX[01]: 0 packets, 0 bytes, 0 underruns
hash based flow Blocks free curr/low: 511/511
load-balancing TX[02]: 0 packets, 0 bytes, 0 underruns
Blocks free curr/low: 511/511
[]
CPU Packet Processing
Control plane
Control Plane
Application inspection,
management traffic, failover,
clustering, etc.
Slow path
Slow path
New conn creation, ACL
check, NAT check, logging
Fast Path
Fast path
Processes existing
connections, find egress
interface, NAT, transmit packet
CPU Complex
Multiple-Core Platforms
Some firewalls have more than one CPU cores
ASA5500-X, ASA5580, ASA5585-X, ASASM
Multiple-core ASAs run many Data Path processes in parallel
Only one core can touch a single connection at any given time
One core runs Control Path process at all times
Dedicated Control Plane process that is separate from Data Path
System-wide tasks and everything that cannot be accelerated in Data Path
Multi-Core ASA Control Path Queue
asa# show asp event dp-cp
Request DP-CP EVENT QUEUE QUEUE-LEN HIGH-WATER Requests
queue Punt Event Queue 0 0 in queue
Identity-Traffic Event Queue 0 4
General Event Queue 0 3 Max requests
Syslog Event Queue 0 7
ever in queue
Non-Blocking Event Queue 0 0
Midpath High Event Queue 0 1
Midpath Norm Event Queue 0 2
SRTP Event Queue 0 0
HA Event Queue 0 3
Yes
No Yes Yes Yes Yes
RX Ingress Existing NAT ACL Stateful NAT IP Egress L3 L2 TX
Pkt Interface Conn Untranslate Permit Inspection Header Interface Route Addr Pkt
No No No No No
Ingress FIFO
full
CPU
2. Frame
dropped causing
overruns
RX Ring
(slots) Buffer Blocks
(fixed size)
Packet Processing: Ingress Interface
1. Ethernet frame
arrives on the wire
Yes
No Yes Yes Yes Yes
RX Ingress Existing NAT ACL Stateful NAT IP Egress L3 L2 TX
Pkt Interface Conn Untranslate Permit Inspection Header Interface Route Addr Pkt
No No No No No
Yes
No Yes Yes Yes Yes
RX Ingress Existing NAT ACL Stateful NAT IP Egress L3 L2 TX
Pkt Interface Conn Untranslate Permit Inspection Header Interface Route Addr Pkt
No No No No No
Yes
No Yes Yes Yes Yes
RX Ingress Existing NAT ACL Stateful NAT IP Egress L3 L2 TX
Pkt Interface Conn Untranslate Permit Inspection Header Interface Route Addr Pkt
No No No No No
Network NAT
object network Servers
subnet 10.0.54.0 255.255.255.0
nat (inside,outside) static 203.0.113.0
Define class-map
2 class-map SFR-redirect
match access-list SFR
Define policy-map
3 policy-map SFR-policy
class SFR-redirect
sfr fail-open [monitor-only]
Apply service-policy
Packet is virtually forwarded to egress interface (not forwarded to the Ethernet NIC yet)
Egress interface is determined first by translation rules or existing conn entry, only THEN
the routing table
If NAT does not divert to the egress interface, the global routing table is consulted to
determine egress interface
NAT Traffic Diversion
Where would this packet go?
nat (inside,outside) source static 172.16.0.0-net 192.168.0.0-net
nat (dmz,outside) source static 172.16.12.0-net 192.168.12.0-net
inside outside
172.16.0.0/16
172.16.12.0/24
DMZ
172.16.12.4
Packet Processing: L3 Route Lookup
FirePOWER
Module
Yes
No Yes Yes Yes Yes
RX Ingress Existing NAT ACL Stateful NAT IP Egress L3 L2 TX
Pkt Interface Conn Untranslate Permit Inspection Header Interface Route Addr Pkt
No No No No No
Once a Layer 3 route has been found, and next hop IP address identified, Layer 2
resolution is performed
Layer 2 rewrite of MAC header
Yes
No Yes Yes Yes Yes
RX Ingress Existing NAT ACL Stateful NAT IP Egress L3 L2 TX
Pkt Interface Conn Untranslate Permit Inspection Header Interface Route Addr Pkt
No No No No No
Interfaces
Source: Inside Destination: Outside
10.1.1.9
Servers
Packet Flow With the Flow defined,
Eng Accounting examination of configuration
issues boils down to just the two
Interfaces: Inside and Outside
Outside
198.133.219.25
Uses of Syslogs
Primary mechanism for recording connections to and through the firewall
The best troubleshooting tool available
Archival Purposes Live Debugging Purposes
Console
Syslog/FTP Server
Flash Local
Trap Syslog.
Buffer
SNMP Server ASDM
ASA Syslog Level vs. Number of Messages
Number of Messages (SUM)
Log
Description
Level
Ver. 7.0 Ver. 7.2 Ver. 8.0 Ver. 8.1 Ver. 8.2 Ver. 8.3 Ver. 8.4 Ver. 9.1
0 Emergencies 0 0 0 0 0 0 0 0
1 Alerts 62 (62) 77 (77) 78 (78) 87 (87) 87 (87) 95 (95) 109 (109) 117 (117)
2 Critical 29 (91) 35 (112) 49 (127) 50 (137) 56 (143) 57 (152) 63 (172) 72 (189)
3 Errors 274 (365) 334 (446) 361 (488) 363 (500) 384 (527) 408 (560) 448 (620) 521 (710)
179
4 Warnings 267 (713) 280 (768) 281 (781) 315 (842) 324 (884) 357 (997) 420 (1130)
(544)
161
5 Notifications 206 (919) 216 (984) 218 (999) 237 (1079) 246 (1130) 265 (1242) 285 (1415)
(705)
234 302
6 Informational 335 (1319) 337 (1336) 368 (1447) 377 (1507) 395 (1637) 430 (1845)
(939) (1221)
217 258
7 Debugging 266 (1585) 267 (1603) 269 (1716) 269 (1776) 276 (1913) 295 (2140)
(1156) (1479)
Custom Syslog Levels
Assign any syslog message to any available level
Levels
Problem:
0Emergency
You want to record what exec commands are 1Alert
being executed on the firewall; syslog ID 111009
records this information, but by default it is at 2Critical
level 7 (debug) 3Errors
ASA-7-111009: User johndoe executed cmd: show run 4Warnings
5Notifications
The problem is we dont want to log all 1775
6Informational
other syslogs that are generated at debug level
7Debugging
asa(config)# logging message 111009 level 3
FlowSets Supported:
Flow Creation
Flow Teardown
Flow Denied
Flow Update in ASA 8.4(5)+ and 9.1(2)+
Interface outside:
Service-policy: sfr-policy
Class-map: SFR-redirect
SFR: card status Up, mode fail-open monitor-only
packet input 0, packet output 273099, drop 0, reset-drop 0
Global policy:
Service-policy: global_policy
Class-map: inspection_default
Inspect: dns, packet 36843, lock fail 0, drop 12, reset-drop 0, 5-min-pkt-rate 107 pkts/sec, v6-fail-close 0
Inspect: ftp, packet 0, lock fail 0, drop 0, reset-drop 0, 5-min-pkt-rate 0 pkts/sec, v6-fail-close 0
Inspect: http, packet 2261132, lock fail 0, drop 0, reset-drop 0, 5-min-pkt-rate 4298 pkts/sec, v6-fail-close 0
asa# show service-policy flow tcp host 10.1.9.6 host 10.8.9.3 eq 1521
Global policy:
Service-policy: global_policy Define the flow
Class-map: inspection_default
Match: default-inspection-traffic
Action:
Input flow: inspect sqlnet
Class-map: class-default
Match: any
Action:
Output flow: Input flow: set connection random-sequence-number disable
Interface outside:
Service-policy: sfr-policy Review the actions
Class-map: c1
Match: access-list sfr-acl
Access rule: permit ip any any
Action:
Output flow: sfr fail-open monitor-only
Accelerated Security Path (ASP)
Packets and flows dropped in the ASP will increment a counter
Frame drop counters are per packet
Flow drops are per flow
See command reference under show asp drop for full list of counters
asa# show asp drop
Frame drop:
Invalid encapsulation (invalid-encap) 10897
Invalid tcp length (invalid-tcp-hdr-length) 9382
Invalid udp length (invalid-udp-length) 10
No valid adjacency (no-adjacency) 5594
No route to host (no-route) 1009
Reverse-path verify failed (rpf-violated) 15
Flow is denied by access rule (acl-drop) 25247101
First TCP packet not SYN (tcp-not-syn) 36888
Bad TCP Checksum (bad-tcp-cksum) 893
Packet Capture Inside Capture Outside Capture
4 packets captured
DROP
Packets are captured at the first and last points they can be in the flow
Ingress packets are captured before most packet processing
Egress packets are captured after all processing
Transit packets show the destination MAC address rewritten
Self-sourced packets may show an empty MAC address (0000.0000.0000)
Capturing ASP Drops
Capture all frames dropped in the ASP
asa# capture drops type asp-drop all
Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (outside,dmz) source dynamic any interface destination static interface Win7-vm service rdp-outside rdp-outside
Additional Information:
NAT divert to egress interface dmz
Untranslate 172.18.254.139/3389 to 192.168.103.221/3389
.
Sample Packet Tracer Output
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group outside_in in interface outside
access-list outside_in extended permit tcp any any eq 3389
Additional Information:
Phase: 8
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (outside,dmz) source dynamic any interface destination static interface Win7-vm service rdp-outside rdp-outside
Additional Information:
Dynamic translate 172.18.124.66/1234 to 192.168.103.221/1234
Phase: 12
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 16538274, packet dispatched to next module
Packet Tracer in ASDM
Associated
configuration
CMGR VM: The total free bytes (3110612992) on disk0: is less than the required
(3221225472).
CMGR VM: In cmgr_kvm_recover_actual Failed to make qemu disk image for slot 2, ret 0
http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/firewall/asa-95-firewall-
config/access-sfr.html#task_77246B728A544812B83969E719B2F439
Traffic Troubleshooting
Isolate problem to ASA or FirePOWER module.
Modify traffic classifier to exclude traffic for certain hosts/protocols
Step 2: Gather the basic information - show tech from ASAs and
troubleshoots from FirePOWER modules.
Step 3: Analyse the data:
FirePOWER logs indicate loss of control plane communication with the ASA.
No reload or signs of oversubscription on either module.
Possible causes on ASA:
Memory/Block depletion
CPU oversubscription
Case Study: Failover troubleshooting
Step 4: Since ASAs are continuously, disable monitoring of
FirePOWER health temporarily for easier troubleshooting:
ciscoasa(config)# no monitor-interface service-module
Case Study: Failover Troubleshooting
Following is the CPU usage on the Active ASA:
CPU utilization for 5 seconds = 94%; 1 minute: 21%; 5 minutes: 9%
inside outside
192.168.1.101 10.1.1.1
7. Apply stateful checks, update
6. Send first data packet
flags to UI (inside data seen)
TCP outside 10.1.1.1:80 inside 192.168.1.101:50141, idle 0:00:00, bytes 153, flags UIO
inside outside
192.168.1.101 10.1.1.1
For your
Connection Flags reference
%ASA-6-302014: Teardown TCP connection 90 for outside:10.1.1.1/80 to inside:192.168.1.101/1107 duration 0:00:30 bytes 0
SYN Timeout
%ASA-6-302014: Teardown TCP connection 3681 for DMZ:172.16.171.125/21 to inside:192.168.1.110/24245 duration 0:01:03
bytes 12504 TCP Reset-O
For your
reference
TCP Connection Termination Reasons
Reason Description
Conn-Timeout Connection Ended Because It Was Idle Longer Than the Configured Idle Timeout
FIN Timeout Force Termination After Ten Minutes Awaiting the Last ACK or After Half-Closed Timeout
Idle Timeout Connection Timed Out Because It Was Idle Longer than the Timeout Value
@CiscoTACPodcast
Podcast Episodes
Ep. # Topic Ep. # Topic
41 Troubleshooting ASA Clustering 27 IOS Embedded Event Manager (EEM)
40 Introduction to ASA Clustering 26 Troubleshooting IPSec VPNs
39 Voice Security Concepts and Best Practices 25 Understanding DMVPN and GETVPN
38 Introduction to OnePK 24 The Cisco Identity Services Engine
37 ASA Network Address Translation (NAT) 23 The Cisco ASA Services Module
How Cisco uses the Web Security Appliance to protect its
36 Network Management at Cisco Live! 2013 22
network
35 Identity Services Engine v1.2 21 Cisco Live! Las Vegas 2011
34 Cisco Live! 2013 Orland, FL 20 This Week In TAC!
Virtual Security: The ASA 1000v and Virtual Security
33 19 Troubleshooting the NAC Appliance
Gateway (VSG)
Useful ASA and IPS Commands and Features You Might
32 Investigating Syslogs: Tips and Tricks 18
Not Know About
Answering Questions From The Cisco Support
31 A look into ASA Quality with the Quality Assurance Team 17
Community
30 Introducing FlexVPN 16 Mitigating a SQL attack with ASA, IPS and IOS Firewall
29 Cisco Live! 2012 San Diego 15 Using Certificates on the ASA and IOS platforms
28 The History of the PIX 14 TCP connections through the ASA and FWSM
Supportforums.cisco.com
https://supportforums.cisco.com/docs/DOC-5727
ASA Memory
ASA memory is used by configuration, processes, transit packets
asa# show memory
Free memory: 250170904 bytes (47%)
Used memory: 286700008 bytes (53%)
------------- ------------------
Total memory: 536870912 bytes (100%)
%ASA-3-321007: System is low on free memory blocks of size 1550 (10 CNT out of 7196 MAX)
Maximum ACL Limits
ACL table size is only bound by available memory
Compiled into binary structure, no performance advantage from order
Each ACE uses a minimum of 212 bytes of RAM
Connection rate is impacted beyond maximum recommended values
5510 5520 5540 5550 5580-20 5580-40
5505 5512-X 5515-X 5525-X 5545-X 5555-X 5585-10 5585-20 5585-40 5585-60 ASASM
Maximum
25K 100K 100K 250K 400K 600K 500K 750K 1M 2M 2M
recommended (8.4+)
Issue show access-list | include elements to see how many ACEs you have
ACE Explosion with Object Groups
All configured ACLs are expanded before programming
access-list IN permit tcp object-group INSIDE object-group DMZ_SERVERS object-group TCP_SERVICES
10 source IP 21 destination IP
addresses addresses
33 TCP ports 6930 rules
inside outside
192.168.1.101 72.163.4.161
Example: TCP Ping
inside outside
198.51.100.2
192.168.1.101 4. Untranslate destination 72.163.4.161
198.51.100.2/3465
192.168.1.101/3465, apply
3. If the path is operational,
security policies, report TCP
server at 10.1.1.1/80 replies
ping status, discard packet
with TCP SYN ACK back to
client at 198.51.100.2/3465
Failover Basics
Internet
Active/Standby vs. Primary/Secondary
Stateful failover (optional)
A failover only occurs when either firewall
determines the standby firewall is healthier
than the active firewall Stateful
Both firewalls swap MAC LAN Link
and IP addresses when a failover occurs Secondary Primary
(Standby) (Active)
Level 1 syslogs will give
reason of failover
Corp
Verifying Failover Operation
asa# show failover
Failover On
Failover unit Primary
Failover LAN Interface: failover Redundant5 (up)
Unit Poll frequency 200 milliseconds, holdtime 1 seconds
Interface Poll frequency 500 milliseconds, holdtime 5 seconds
Interface Policy 1
Monitored Interfaces 2 of 250 maximum
Version: Ours 8.4(5), Mate 8.4(4)
Last Failover at: 10:37:11 UTC May 14 2010
This host: Primary - Active
Active time: 1366024 (sec)
slot 0: ASA5580 hw/sw rev (1.0/8.1(2)) status (Up Sys)
Interface outside (10.8.20.241): Normal
Interface inside (10.89.8.29): Normal
Other host: Secondary - Standby Ready
Active time: 0 (sec)
slot 0: ASA5580 hw/sw rev (1.0/8.1(2)24) status (Up Sys)
Interface outside (10.8.20.242): Normal
Interface inside (10.89.8.30): Normal
Stateful Failover Logical Update Statistics
Link : stateful Redundant6 (up)
Stateful Obj xmit xerr rcv rerr
General 424525 0 424688 0
sys cmd 423182 0 423182 0
What to Do After a Failover Event
Always check the syslogs to determine root cause
Example: switch port failed on inside interface of active firewall
Syslogs from Primary (Active) ASA
ASA-4-411002: Line protocol on Interface inside, changed state to down
ASA-1-105007: (Primary) Link status Down on interface 1
ASA-1-104002: (Primary) Switching to STNDBYinterface check, mate is healthier
Prevent config changes made directly to the standby (9.3(2) and later)
ASA-SM(config)# failover standby config-lock
Case Study: Excessive Logging
logging enable 4 logging destinations (buffer,
logging buffered debugging
console, SNMP, and syslog)
logging console debugging
logging trap debugging
logging history debugging
3 syslog servers
logging host inside 192.168.1.10
logging host inside 192.168.1.11
logging host DMZ 192.168.2.121
3 SNMP servers
snmp-server host inside 192.168.1.10
snmp-server host inside 192.168.1.11
snmp-server host DMZ 192.168.2.121 3 Netflow collectors
logging enable
Do not duplicate syslogs
logging flow-export-syslogs disable
and Netflow data
logging list FAILOVER message 104003
Reduce severity
logging trap errors
level for syslogs Send only certain
logging history FAILOVER
syslogs as SNMP traps
logging host inside 192.168.1.10
logging host DMZ 192.168.2.121
snmp-server host inside 192.168.1.10
Not all SNMP servers
snmp-server host DMZ 192.168.2.121 poll need to receive traps
flow-export destination inside 192.168.1.10
flow-export destination DMZ 192.168.2.121
Xlate Table
show xlate displays information about NAT translations through the ASA
Second biggest memory consumer after conn table, no hardcoded size limit
You can limit the output to just the local or global IP
asa# show xlate local 10.2.1.2
5014 in use, 5772 most used
TCP PAT from inside:192.168.103.220/57762 to outside:10.2.1.2/43756 flags ri
idle 0:00:00 timeout 0:00:30
TCP PAT from inside:192.168.103.220/57761 to outside:10.2.1.2/54464 flags ri
idle 0:00:00 timeout 0:00:30
show nat displays information about the NAT table of the ASA
detail keyword will display object definitions
Watch the hit counts for policies that are not matching traffic
asa# show nat detail
Manual NAT Policies (Section 1)
1 (inside) to (outside) source static science-obj science-obj destination static vpn-obj vpn-obj
translate_hits = 0, untranslate_hits = 0
Source - Origin: 192.168.0.0/16, Translated: 192.168.0.0/16
Destination - Origin: 172.16.1.0/24, Translated: 172.16.1.0/24
nat (inside,outside) source static 192_168_1_0 192_168_1_0 destination static 192_168_2_0 192_168_2_0
nat (inside,any) source static 10_0_0_0 10_0_0_0 destination static 10_0_0_0 10_0_0_0 route-lookup
Policy Ordering
Interface-specific ACL
Global ACL
Solution
Create a logging list with only syslog ID 711001
ASA(config)# logging list Networkers message 711001 .
8.3.1 8.3.2
8.3
8.5.1
8.5 ASA-SM only
8.6.1
8.6
Availability Zero Downtime Upgrades
HighState State
Start
Act Stb
Primary Secondary
Issue failover active Act
Stb Copy new image over and reboot
Upgrade Complete
Example: Show Output Filters
Examples
Display the interface stats starting with the inside interface
show interface | begin inside
Display the access-list entries that contain address 10.1.1.5
show access-list | grep 10.1.1.5
Display the config, except for the access-lists
show run | exclude access-list
Display only access-list entries that have non-zero hitcounts
show access-list | grep v hitcnt=0
Display a count of the number of connections each host has
show local-host | include host|count/limit
Note: You must Include a Space on Either Side of the Pipe for the Command to Be
Accepted; Also, Trailing Spaces Are Counted
Cisco PIX/ASA/FWSM Code Base History
In Sync PIX/ASA
PIX Feature Releases
6.0(1) 6.1(1) 6.2(1) 6.3(1) 7.0(1) 7.1(1) 7.2(1) 8.0(2) 8.3(1)
Port Features
Bug Fixes
FWSM
1.1(1) 2.2(1) 2.3(1) 3.1(1) 3.2(1) 4.0(1) 4.1(1)
Feature Releases SafeHarbor
2.3(2) 4.0(2) 4.0(4) 4.0(11)
1.1(2) 1.1(3)
Maintenance SafeHarbor
Releases 3.2(2) 3.2(4) 3.2(17)
SafeHarbor GD
3.1(2) 3.1(6) 3.1(10) 3.1(17)
Time
Debug ICMP Trace
Valuable tool used to troubleshoot connectivity issues
Provides interface and translation information to quickly
determine flow
Echo-replies must be explicitly permitted through ACL, or ICMP inspection
must be enabled
Internet
Cable WAN
100 Mbps 100 Mbps 2 Mbps
Modem
ASA-5505
Case Study: Poor Voice Quality
Solution: Traffic Shaping
What is traffic shaping, and why is it needed here?
Why wont policing work?
Why wont priority queuing alone work?
Shape to
2 Mbps
Cable WAN
Modem 2 Mbps
100 Mbps ASA-5505 100 Mbps
Case Study: Poor Voice Quality Configuration Example
(Traffic Shaping)
Solution
Prioritise voice traffic and shape all traffic down to 2 Mbps on the outside
interface. class-map voice-traffic
match dscp af13 ef
!
policy-map qos_class_policy
class voice-traffic
priority
!
policy-map qos_outside_policy
class class-default
shape average 2000000
service-policy qos_class_policy
!
service-policy qos_outside_policy interface
outside
To view statistics on the operation of the shaper, use the command
show service-policy shape
Case Study: Poor Voice Quality
Things to Keep in Mind:
Shaping can only be applied to the class class-default
Shaping only works in the outbound direction on
an interface
The shaping value is in bits per second, and must be a multiple of 8000
The shaping policy is applied to all sub-interfaces on
a physical interface
Not supported on the ASA-5580 platform
Not supported in Transparent or Multi-context mode
Case Study:
Intermittent Access To
Web Server
Problem Description
Public web server is protected by the ASA
Most external clients are not able to load companys web page
HTTP connections
to 192.168.1.50
Statically translate
192.168.1.50 10.1.1.50
10.1.1.50
Clients
Monitoring Connection and Traffic Rates in ASDM
VLAN 310.14.3.x
VLAN 4 .1 10.14.3.89 192.168.5.4
10.1.1.2 Inbound Packet
Inside Outside
CTX2 .2 MSFC
VLAN 5
10.1.2.2
Inside
CTX3 .3 Shared interface
VLAN 6
10.1.3.2
0 Emergencies 0 0 0 0 0
Partition Limit - Configured Limit = Available to Partition Limit - Configured Limit = Available to allocate
allocate 1000 - 1000 = 0
19219 - 19219 = 0
FWSM and Control Point
The traffic that makes it to the control point is traffic that requires Layer 7 fixup (embedded NAT,
or cmd inspection)
FTP
VoIP (SIP/SKINNY/H.323/RTSP) Control Point (CP) Central CPU
DNS
XDMCP, etc.
Traffic sourced from, or destined to, the FWSM also goes through the control point Session Manager
Syslogs NP 3
AAA (RADIUS/TACACS+)
URL filtering (WebSense/N2H2)
Management traffic (telnet/SSH/HTTPS/SNMP) Fast Path Fast Path
NP 1 NP 2
Failover communications
FWSM
Routing protocols (OSPF/ RIP)
etc. C6K Backplane Interface
FWSMEnabling the Completion Unit
Due to the FWSMs NP architecture, there exists a possibility that packets
arriving with a low inter-packet gap might be re-ordered by the firewall
4 3 2 1 4 2 3 1
This issue might be encountered when performing TCP throughput testing, or passing high
speed TCP flows through the FWSM
Examples: CIFS, FTP, AFP, backups
FWSM version 3.1(10) and 3.2(5) introduce a new command sysopt np completion-unit
to ensure the firewall maintains the packet order (by enabling a hardware knob on the NPs
called the completion unit)
In multiple mode enter this command in the admin context configuration; It will then be enabled
for all contexts on the firewall
Case Study: Intermittent
UDP Connectivity Failure
Problem Summary
After reloading the ASA, wireless mobility traffic (UDP and IP Protocol 93) from
inside WLC to DMZ WLC fails
Other traffic (TCP) recovers successfully
The problem is mitigated by running clear local-host on the ASA
1. Standalone ASA
is reloaded
10.10.1.2 DMZ
2. UDP/16666 and
10.10.9.0/28
IP/93 connections fail
10.10.9.3
Checking Connection Table and Drops
Connections are built and passing traffic through the ASA
asa# show conn address 10.10.1.2
asa# capture IN interface inside match udp host 10.10.1.2 host 10.10.9.3
asa# capture OUT interface dmz match udp host 10.10.1.2 host 10.10.9.3
10.10.1.2 DMZ
10.10.9.0/28
10.10.9.3
Syslog ID Destination
Reason
Case Study: Advanced Syslog Analysis
Results:
grep used to find the syslogs we want
awk used to print the destination column (IP/port)
uniq used to print only unique entries, with a count
sort used to display ordered list, highest count first
syslogserver-sun% grep 302014 syslog.txt | grep "SYN Timeout" | awk '{print $13}' | uniq
-c | sort -r -n
673 inside:10.100.19.190/21
451 dmz:192.168.5.13/80
392 dmz:192.168.5.11/443
358 inside:10.0.0.67/1521
119 inside:10.0.1.142/80
Failover
What to Do After a Failover
Additional Failover Commands
What to Do After a Failover
Starting with FWSM 2.3 and Cisco ASA/PIX 7.0, the
reason for failover is saved in the failover history
This information is not saved across reboots
FWSM 3.1(5) both ingress and egress transient packets can Session Manager
be captured which flow NP 3
through hardware
Capture requires an ACL to be applied
Capture copies the matched packets in hardware to the control point Fast Path Fast Path
where they are captured; be careful not to flood the control point with too much traffic NP 1 NP 1
FWSM
C6K Backplane Interface
Online Tools
Bug Toolkit
Select Security,
then Cisco ASA
5500 Series
Bug ToolkitAdvanced Search
Version
Search
Keywords
Severity
Status
Bug ToolkitSearch Results
First Fixed-In
Releases
Output Interpreter
Linked off the
Technical Support
and Documentation
Tools and Resources
Section on CCO
Device
Information
CPU, Memory,
Conns/Sec,
Interface Traffic
Real-Time
Syslogs
Great for
Using ASDM for Monitoring Monitoring
Trends
Up to Four
Different Graphs
Can Be Displayed
ASDM: Editing Rules from the Log Viewer
Right-Click on
Message to View or
Edit Associated Rule
ASDM: Syslogs Explained
Opening a TAC Case
If after using all your troubleshooting tools you still
cannot resolve the problem, please open a TAC case
http://www.cisco.com/techsupport/servicerequest/
At a minimum include:
Detailed problem description
Output from show tech
Optionally include:
Syslogs captured during time of problem
Sniffer traces from both interfaces using the capture
command (capturing only the relevant packets, and saved in
pcap format)
Q&A
Complete Your Online Session Evaluation
Give us your feedback and receive a
Cisco 2016 T-Shirt by completing the
Overall Event Survey and 5 Session
Evaluations.
Directly from your mobile device on the Cisco Live
Mobile App
By visiting the Cisco Live Mobile Site
http://showcase.genie-connect.com/ciscolivemelbourne2016/
Visit any Cisco Live Internet Station located
throughout the venue
Learn online with Cisco Live!
T-Shirts can be collected Friday 11 March Visit us online after the conference
for full access to session videos and
at Registration presentations.
www.CiscoLiveAPAC.com
Thank you