cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
271
Views
1
Helpful
5
Replies

Azure Traffic Manager Probes being dropped by ASA after upgrade

After upgrading ASA to version 9.18.4 we are seeing Azure Traffic Manager probes being dropped (or discarded). 

In the logs we see 'TCP access denied by ACL from <traffic manager IP> to Outside Interface /443' 

It works fine when reverting back to 9.16.4 

Not configuration changed were made

Has anyone seen this happen? What is it in the config that allows the probes? 

5 Replies 5

tvotna
Spotlight
Spotlight

It seems there are two discussions for the same issue:

https://community.cisco.com/t5/network-security/asa-dropping-azure-traffic-manager-http-health-probes/td-p/5079384

ASA only needs "webvpn" / "enable Outside" (or "http server enable" / "http <subnet> <mask> Outside") in order to respond to SYN packets over TCP/443. Do you have it enabled? Do you have any control-plane ACLs assigned (check with "show run access-group")?

What happens after SYN, when GET request arrives, is a big question. I'm not aware of any filtering by request URL, although who knows...

You can collect "capture cap-asp type asp-drop match ..." for TCP/443 to the firewall IP address. Then display it with "show capture cap-asp [packet-number <N>]". It will show memory address where drop happened, such as "Drop-location: frame 0x0000564694f7624e". TAC will be able to decode it and tell you exactly where drop happened.

 

 

We have webvpn enabled and http server enabled (I assume this is for ASDM). We have ensure that the control plane ACL is replicated from the working ASA. 

In the logs we are seeing TCP Reset-O from the Azure Traffic Manager IP  addresses. 

I've attached a picture of the logs. The ASA seems to allow the probes for a minute or so, then it times out

Can you help with what is happening here please

isinfrastructure1_0-1714647096280.png

 

Most of the connections timed out after 30 seconds of inactivity, which is a typical TCP SYN timeout, so it looks like TCP 3WHS didn't complete.

Do you reload the ASA and after that probes start working for a minute or so? What do you mean by "control plane ACL is replicated"? Is it a failover pair and you send probes to a standby IP address, or you just mean that control plane ACL is identical between working and non-working ASAs running different versions of code?

Please provide

show run webvpn
show run http

Then start captures:

capture cap-out int OUTSIDE_INET match tcp any host <ASA-IP>
capture cap-asp type asp-drop match any host <ASA-IP>

and periodically collect:

show resource usage all
show asdm sessions
show quota management-session
show asp table socket
show asp table socket stats detail
show asp drop
show processes | grep Unicorn

Then copy captures off the device:

copy /pcap capture:cap-out ftp://.......
copy /pcap capture:cap-asp ftp://.......
no capture cap-out
no capture cap-asp

Then provide collected information.

 

So you have control acl' 

And you config http 0.0.0.0 0.0.0.0 also ?

If yes the subnet config with http command override the control acl' 

I.e. if you permit traffic in control acl and dont specify subnet in http command that not work.

MHM

Review Cisco Networking products for a $25 gift card