News Stay informed about the latest enterprise technology news and product updates.

Cisco ASA and BGP peering problems: Command line tips

If you run into BGP peering problems because of a Cisco ASA or PIX firewallin the middle, there are a few simple command line fixes that will quickly solve the problem. Fast Packet blogger Brandon Carroll explains.

If you have a Cisco ASA or PIX firewall you may have run into BGP peering problems. There are a few simple command line fixes to get the two peers talking and authenticating.

Here are your two problems:

1. The ASA strips TCP Option 19. This is used by Border Gateway Protocol (BGP) for authentication.

2. The ASA randomizes the TCP sequence numbers.

Fast Packet blogger Ivan Pepeljnak explains how BOTH vCloud and VEPA fail in virtualization networking

With Option 19 being stripped, BGP routers configured for authentication will not see credentials coming from their peer and thus will not establish the BGP neighbor. You can perform a little command line kung-fu to solve this issue:

First match the BGP Traffic. 

                access-list BGP extended permit tcp any eq bgp any

                access-list BGP extended permit tcp any any eq bgp

Next create a TCP Map that allows Option 19.

                tcp-map BGP

                tcp-options range 19 19 allow

Now create a class-map to match the BGP ACL you created earlier.

                class-map BGP

                match access-list BGP

Finally, apply the class-map to the global policy:

                policy-map global_policy

                class BGP

                set connection advanced-options BGP

Now for the second issue, while you are still in the policy-map configuration mode, you need to disable the random-sequence numbering.

                set connection random-sequence-number disable

There you have it: A fairly simple configuration that can solve a ton of headaches. And here's some good news: Once you learn how the ASA handles this BGP traffic, you may start to understand why you are having other issues in your networks.

In many cases I've seen TCP maps used to deal with problems passing application traffic through ASAs by allowing or denying certain attributes of TCP. Also, when things seem a little funny it may not hurt to disable the random-sequence numbering. Some applications use the sequence numbers for authentication. If the sequence number changes, the packet may not authenticate. When in doubt, try using something like the Wireshark network analyzer to capture the packets on both sides of the ASA to see what changes, and then try to remove the ASA from the traffic path. If you can see what's changed and verify functionality without the ASA, you can often get the ASA to stop preventing successful traffic flows.

About the author: Brandon Carroll, CCIE # 23837, is a full-time instructor with Ascolta, with a focus in network security and business development. He is also the author of the GlobalConfig blog.

This was last published in January 2011

Dig Deeper on Network Security Best Practices and Products

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close