[c-nsp] Timeout value on ASA
Judith Sanders
jasanders at ptci.com
Wed May 9 14:09:01 EDT 2012
Here is an output from my ASA- this is part of my tunnel that the applications timeout thru...
I see that they have been idle for four plus hours and the timeout is all 0-does this mean no timeout? or does this just mean default to the 3 hour timeout?
NAT from inside:172.16.1.201 to outside:64.250.19x.xx
flags s idle 4:23:07 timeout 0:00:00
NAT from inside:172.16.1.202 to outside:64.250.19x.xxx
flags s idle 4:05:15 timeout 0:00:00
NAT from any:172.16.3.131 to any:64.250.19x.xxx
flags s idle 0:25:16 timeout 0:00:00
NAT from inside:172.17.22.121 to outside:64.250.19x.xxx
flags s idle 4:12:58 timeout 0:00:00
NAT from inside:172.17.23.121 to outside:64.250.19x.xx
flags s idle 4:21:48 timeout 0:00:00
Judith Sanders
Pioneer Telephone
Inside Plant Networking Services
jasanders at ptci.com<mailto:jasanders at ptci.com> 405.375.0645
"Our lives change when our habits change."
Matthew Kelly
From: David White, Jr. (dwhitejr) [mailto:dwhitejr at cisco.com]
Sent: Wednesday, May 09, 2012 12:51 PM
To: Antonio Soares
Cc: 'Peter Rathlev'; Judith Sanders; cisco-nsp at puck.nether.net
Subject: Re: [c-nsp] Timeout value on ASA
Hi Antonio,
The first output is showing "PATed" connections - or ones which have been Port Address Translated. In this case, the xlate timeout is hard-coded to 30 seconds, and is not user configurable.
If instead you look at "NATed" connections, you will see the timeout would be set to the user-configured value - 3 hours in your case.
Hope that helps explain it.
Sincerely,
David.
Antonio Soares wrote:
Hi David,
Can you elaborate a little more about the xlate timeout, it's something I
never understood very well. For example, taking this output as an example:
ASA# sh xlate
2 in use, 229 most used
Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T -
twice
UDP PAT from IN:xxx.xxx.xxx.xxx/54337 to OUT:xxx.xxx.xxx.xxx/6630 flags ri
idle 0:00:01 timeout 0:00:30
TCP PAT from IN:xxx.xxx.xxx.xxx/1028 to OUT:xxx.xxx.xxx.xxx/5281 flags ri
idle 0:00:13 timeout 0:00:30
Why do we see 30 seconds as the timeout ? By default it's 3 hours:
ASA# sh runn timeout
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat
0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect
0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
ASA#
timeout xlate:
Configure idle time after which a dynamic address will be returned to the
free pool, default is 3:00:00
The output above was taken from an ASA. For example, this FWSM reflects the
timeout correctly as configured globally (25 minutes):
FWSM# sh xlate debug
Flags: D - DNS, d - dump, I - identity, i - inside, n - no random,
o - outside, r - portmap, s - static
45 in use, 281 most used
NAT from IN:172.23.254.149 to OUT:xxx.xxx.xxx.xxx flags i idle 0:06:35
timeout 0:25:00 connections 1
NAT from IN:172.23.254.155 to OUT:xxx.xxx.xxx.xxx flags i idle 0:00:54
timeout 0:25:00 connections 0
NAT from IN:172.23.254.167 to OUT:xxx.xxx.xxx.xxx flags i idle 0:00:14
timeout 0:25:00 connections 6
This debug option is not available on the ASA.
Thanks.
Regards,
Antonio Soares, CCIE #18473 (R&S/SP)
amsoares at netcabo.pt<mailto:amsoares at netcabo.pt>
http://www.ccie18473.net
-----Original Message-----
From: cisco-nsp-bounces at puck.nether.net<mailto:cisco-nsp-bounces at puck.nether.net>
[mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of David White, Jr.
(dwhitejr)
Sent: terça-feira, 8 de Maio de 2012 23:20
To: Peter Rathlev; Judith Sanders
Cc: 'cisco-nsp at puck.nether.net<mailto:cisco-nsp at puck.nether.net>'
Subject: Re: [c-nsp] Timeout value on ASA
An alternative is to use Dead Connection Detection (DCD) on the ASA to
validate if both endpoints on the idle connection are still alive, and if so
reset the idle timeout, else tear it down.
http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/conns
_connlimits.html#wp1080752
Additionally, one point for Peter. Increasing the idle conn timeout does
not require you to increase the xlate timeout. The xlate timeout only takes
effect once all conns associated to that xlate no longer exist.
Sincerely,
David.
Peter Rathlev wrote:
Hi Judith,
On Tue, 2012-05-08 at 19:16 +0000, Judith Sanders wrote:
I have a Cisco ASA5520-I have an established VPN with a third party
vendor. We are running applications over this tunnel and experiencing
timeouts. The tunnel never drops, just the application. I know that
there are default timeouts set on the ASA for certain protocols, but
if the tunnel is established, would it not be an application issue
and not a firewall/VPN timeout issue?
The ASA defaults for TCP timeouts (1 hour IIRC) are not compliant with
RFC 5782 "NAT Behavioral Requirements for TCP", a BCP. It specifies
that the timeout "MUST NOT be less than 2 hours 4 minutes". Use
"timeout conn 2:04:00" on the ASA to adjust. You might also want to
consider adjusting the "timeout xlate" upwards at the same time.
Informational level debugging can tell you if and why the ASA have
torn down a session; the "ASA-6-302014" messsage ("Teardown TCP ...")
states the specific reason. Look for "Conn-timeout", meaning that the
TCP connection has been idle for too long and is therefore closed.
Even with a 2:04:00 timeout you still need to convince the application
developers to actually use TCP Keep-Alives. We have been forced to
apply a 24 hour timeout for certain connections because the developers
couldn't/wouldn't use Keep-Alives. A policy-map can select just the
right connections, so you avoid a long timeout for every connection
through the ASA.
_______________________________________________
cisco-nsp mailing list cisco-nsp at puck.nether.net<mailto:cisco-nsp at puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
***************************
This email message and any files transmitted with it are intended solely
for the use of the individual or entity for whom it is addressed. It
may contain confidential and privileged information. If you are not the
intended recipient, please contact the sender and destroy all paper and
electronic copies of this message and its contents. Any unauthorized
review, use, disclosure or distribution of this email or any file
attachments is strictly prohibited.
More information about the cisco-nsp
mailing list