ASA Series Syslog Messages
ASA Series Syslog Messages
ASA Series Syslog Messages
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Preface v
INDEX
Table 1 New, Changed, and Deprecated Syslog Messages for Version 8.2(5)
New Syslog Messages 103005, 114023, 120012, 313009, 413007, 413008, 447001, 735024-735027
Changed Syslog Messages 722036
(Documentation)
Changed Syslog Messages None
(Code)
Deprecated Syslog Messages None
Table 2 lists the new, changed, and deprecated syslog messages for Version 8.3(3). For complete syslog
message descriptions, see Chapter 1, “Syslog Messages.”
Table 2 New, Changed, and Deprecated Syslog Messages for Version 8.3(3)
Table 3 New, Changed, and Deprecated Syslog Messages for Version 8.4.4(1)
Table 4 lists the new, changed, and deprecated syslog messages for Version 8.4(5). For complete syslog
message descriptions, see Chapter 1, “Syslog Messages.”
Table 4 New, Changed, and Deprecated Syslog Messages for Version 8.4.(5)
Table 5 lists the new, changed, and deprecated syslog messages for Version 8.4(6). For complete syslog
message descriptions, see Chapter 1, “Syslog Messages.”
Table 5 New, Changed, and Deprecated Syslog Messages for Version 8.4.(6)
Table 6 lists the new, changed, and deprecated syslog messages for Version 8.7(1). For complete syslog
message descriptions, see Chapter 1, “Syslog Messages.”
Table 6 New, Changed, and Deprecated Syslog Messages for Version 8.7(1)
Table 7 New, Changed, and Deprecated Syslog Messages for Version 9.0(1)
New Syslog Messages 109038, 109039, 114023, 302022-302027, 313009, 317007, 317008, 318101-318123,
318125-318128, 325004-325006, 402131, 409101-409123, 409125, 409128,
426101-426104, 429007, 503101, 613101-613104, 751019, 751020, 751021,
766001-766020, 766201-766204, 766251-766254, 766301-766313, 767001,
775001-775007
Changed Syslog Messages 103004, 103005, 106023, 106100, 106010, 106014, 109014, 113019, 313005, 418001,
(Documentation) 424001, 509001, 713900-713906, 722051, 725001-725006, 735026-735029,
737009-737011, 737013, 737014, 737016
Changed Syslog Messages 103005, 109014, 106100, 113019, 722051, 725001-725006, 735026-735029,
(Code) 737009-737011, 737013, 737014, 737016
Deprecated Syslog Messages 302009
Table 8 lists the new, changed, and deprecated syslog messages for Version 9.0(2). For complete syslog
message descriptions, see Chapter 1, “Syslog Messages.”
Table 8 New, Changed, and Deprecated Syslog Messages for Version 9.0(2)
Table 9 lists the new, changed, and deprecated syslog messages for Version 9.0(3). For complete syslog
message descriptions, see Chapter 1, “Syslog Messages.”
Table 9 New, Changed, and Deprecated Syslog Messages for Version 9.0(3)
Table 10 New, Changed, and Deprecated Syslog Messages for Version 9.1(1)
Table 11 lists the new, changed, and deprecated syslog messages for Version 9.1(2). For complete syslog
message descriptions, see Chapter 1, “Syslog Messages.”
Table 11 New, Changed, and Deprecated Syslog Messages for Version 9.1(2)
Table 12 lists the new, changed, and deprecated syslog messages for Version 9.1(3). For complete syslog
message descriptions, see Chapter 1, “Syslog Messages.”
Table 12 New, Changed, and Deprecated Syslog Messages for Version 9.1(3)
Table 13 New, Changed, and Deprecated Syslog Messages for Version 9.1(4)
Note When a number is skipped in a sequence, the message is no longer in the ASA code.
For information about how to configure logging, SNMP, and NetFlow, see the CLI configuration guide.
Table 1-1 lists the message classes and the ranges of message IDs that are associated with each class.
The valid range for message IDs is between 100000 and 999999.
Table 1-1 Syslog Message Classes and Associated Message ID Numbers (continued)
101001
Explanation The failover cable is present and functioning correctly. Primary can also be listed as
Secondary for the secondary unit.
101002
Explanation The failover cable is present, but not functioning correctly. Primary can also be listed as
Secondary for the secondary unit.
101003, 101004
Error Message %ASA-1-101003: (Primary) Failover cable not connected (this unit).
Error Message %ASA-1-101004: (Primary) Failover cable not connected (other unit).
Explanation Failover mode is enabled, but the failover cable is not connected to one unit of the
failover pair. Primary can also be listed as Secondary for the secondary unit.
Recommended Action Connect the failover cable to both units of the failover pair.
101005
Explanation The failover cable is connected, but the primary unit is unable to determine its status.
103001
Explanation The primary unit is unable to communicate with the secondary unit over the failover
cable. Primary can also be listed as Secondary for the secondary unit. Table 1-2 lists the reason
codes and the descriptions to determine why the failover occurred.
Reason
Code Description
1 The local unit is not receiving the hello packet on the failover LAN interface when LAN
failover occurs or on the serial failover cable when serial failover occurs, and declares that
the peer is down.
2 An interface did not pass one of the four failover tests, which are as follows: 1) Link Up, 2)
Monitor for Network Traffic, 3) ARP, and 4) Broadcast Ping.
3 No proper ACK for 15+ seconds after a command was sent on the serial cable.
4 The failover LAN interface is down, and other data interfaces are not responding to
additional interface testing. In addition, the local unit is declaring that the peer is down.
5 The standby peer went down during the configuration synchronization process.
Recommended Action Verify that the failover cable is connected correctly and both units have the
same hardware, software, and configuration. If the problem persists, contact the Cisco TAC.
103002
Explanation The primary unit has detected that the network interface on the secondary unit is okay.
Primary can also be listed as Secondary for the secondary unit.
103003
Explanation The primary unit has detected a bad network interface on the secondary unit. Primary
can also be listed as Secondary for the secondary unit.
Recommended Action Check the network connections on the secondary unit and the network hub
connection. If necessary, replace the failed network interface.
103004
Error Message %ASA-1-103004: (Primary) Other firewall reports this firewall failed.
Reason: reason-string
Explanation The primary unit received a message from the secondary unit indicating that the primary
unit has failed. Primary can also be listed as Secondary for the secondary unit. The reason can be
one of the following:
• Missed poll packets on failover command interface exceeded threshold.
• LAN failover interface failed.
• Peer failed to enter Standby Ready state.
• Failed to complete configuration replication. This firewall's configuration may be out of sync.
• Failover message transmit failure and no ACK for busy condition received.
103005
Error Message %ASA-1-103005: (Primary) Other firewall reporting failure. Reason: SSM
card failure
Explanation The secondary unit has reported an SSM card failure to the primary unit. Primary can
also be listed as Secondary for the secondary unit.
103006
Explanation The ASA has detected a peer unit that is running a version that is different than the local
unit and is not compatible with the HA Hitless Upgrade feature.
• ver_num—Version number
Recommended Action Install the same or a compatible version image on both units.
103007
Explanation The ASA has detected that the peer unit is running a version that is not identical, but
supports Hitless Upgrade and is compatible with the local unit. The system performance may be
degraded because the image version is not identical, and the ASA may develop a stability issue if
the nonidentical image runs for an extended period.
• ver_num—Version number
Recommended Action Install the same image version on both units as soon as possible.
104001, 104002
Explanation You have forced the failover pair to switch roles, either by entering the failover active
command on the standby unit, or the no failover active command on the active unit. Primary can
also be listed as Secondary for the secondary unit. Possible values for the string variable are as
follows:
• state check
• bad/incomplete config
• ifc [interface] check, mate is healthier
• the other side wants me to standby
• in failed state, cannot be active
• switch to failed state
Recommended Action If the message occurs because of manual intervention, no action is required.
Otherwise, use the cause reported by the secondary unit to verify the status of both units of the pair.
104003
Recommended Action Check the messages for the primary unit for an indication of the nature of the
problem (see message 104001). Primary can also be listed as Secondary for the secondary unit.
104004
Explanation A previously failed unit reports that it is operating again. Primary can also be listed as
Secondary for the secondary unit.
105001
Explanation In version 7.x and later, this message may indicate the following: failover has been
automatically disabled because of a mode mismatch (single or multiple), a license mismatch
(encryption or context), or a hardware difference (one unit has an IPS SSM installed, and its peer
has a CSC SSM installed). Primary can also be listed as Secondary for the secondary unit.
105002
Explanation You have used the failover command with no arguments on the console, after having
previously disabled failover. Primary can also be listed as Secondary for the secondary unit.
105003
Explanation The ASA is testing the specified network interface with the other unit of the failover
pair. Primary can also be listed as Secondary for the secondary unit.
Recommended Action None required. The ASA monitors its network interfaces frequently during
normal operation.
105004
Explanation The test of the specified network interface was successful. Primary can also be listed as
Secondary for the secondary unit.
105005
Explanation One unit of the failover pair can no longer communicate with the other unit of the pair.
Primary can also be listed as Secondary for the secondary unit.
Recommended Action Verify that the network connected to the specified interface is functioning
correctly.
105006, 105007
Explanation The results of monitoring the link status of the specified interface have been reported.
Primary can also be listed as Secondary for the secondary unit.
Recommended Action If the link status is down, verify that the network connected to the specified
interface is operating correctly.
105008
Explanation Testing of a specified network interface has occurred. This testing is performed only if
the ASA fails to receive a message from the standby unit on that interface after the expected interval.
Primary can also be listed as Secondary for the secondary unit.
105009
Explanation The result (either Passed or Failed) of a previous interface test has been reported.
Primary can also be listed as Secondary for the secondary unit.
Recommended Action None required if the result is Passed. If the result is Failed, you should check
the network cable connection to both failover units, that the network itself is functioning correctly,
and verify the status of the standby unit.
105010
Explanation Block memory was depleted. This is a transient message and the ASA should recover.
Primary can also be listed as Secondary for the secondary unit.
Recommended Action Use the show blocks command to monitor the current block memory.
105011
Explanation The failover cable is not permitting communication between the primary and secondary
units. Primary can also be listed as Secondary for the secondary unit.
105020
Explanation When a failover occurs, the active ASA detects a partial configuration in memory.
Normally, this is caused by an interruption in the replication service. Primary can also be listed as
Secondary for the secondary unit.
Recommended Action After the ASA detects the failover, the ASA automatically reboots and loads
the configuration from flash memory and/or resynchronizes with another ASA. If failovers occurs
continuously, check the failover configuration and make sure that both ASAs can communicate with
each other.
105021
Explanation During configuration synchronization, a standby unit will reload itself if some other
process locks the configuration for more than five minutes, which prevents the failover process from
applying the new configuration. This can occur when an administrator pages through a running
configuration on the standby unit while configuration synchronization is in process. See also the
show running-config command in privileged EXEC mode and the pager lines num command in
global configuration mode in the Cisco ASA 5500 Series Command Reference.
Recommended Action Avoid viewing or modifying the configuration on the standby unit when it first
boots up and is in the process of establishing a failover connection with the active unit.
105031
105032
Recommended Action Check the connectivity of the LAN failover interface. Make sure that the speed
or duplex setting is correct.
105034
Explanation The peer has just booted and sent the initial contact message.
105035
Error Message %ASA-1-105035: Receive a LAN failover interface down msg from peer.
Explanation The peer LAN failover interface link is down. The unit switches to active mode if it is
in standby mode.
Recommended Action Check the connectivity of the peer LAN failover interface.
105036
Explanation The ASA dropped an unacknowledged LAN failover command message, indicating a
connectivity problem exists on the LAN failover interface.
105037
Error Message %ASA-1-105037: The primary and standby units are switching back and
forth as the active unit.
Explanation The primary and standby units are switching back and forth as the active unit, indicating
a LAN failover connectivity problem or software bug exists.
Recommended Action Make sure that the LAN interface cable is connected.
105038
Explanation When a failover occurs, the active ASA detects a partial configuration in memory.
Normally, this is caused by an interruption in the replication service. Primary can also be listed as
Secondary for the secondary unit.
Recommended Action Once the failover is detected by the ASA, the ASA automatically reboots and
loads the configuration from flash memory and/or resynchronizes with another ASA. If failovers
occur continuously, check the failover configuration and make sure that both ASAs can
communicate with each other.
105039
Error Message %ASA-1-105039: (Primary) Unable to verify the Interface count with
mate. Failover may be disabled in mate.
Explanation Failover initially verifies that the number of interfaces configured on the primary and
secondary ASAs are the same. This message indicates that the primary ASA is not able to verify the
number of interfaces configured on the secondary ASA. This message indicates that the primary
ASA is not able to communicate with the secondary ASA over the failover interface. Primary can
also be listed as Secondary for the secondary unit.
Recommended Action Verify the failover LAN, interface configuration, and status on the primary and
secondary ASAs. Make sure that the secondary ASA is running the ASA application and that
failover is enabled.
105040
Explanation The primary and secondary ASAs should run the same failover software version to act
as a failover pair. This message indicates that the secondary ASA failover software version is not
compatible with the primary ASA. Failover is disabled on the primary ASA. Primary can also be
listed as Secondary for the secondary ASA.
Recommended Action Maintain consistent software versions between the primary and secondary
ASAs to enable failover.
105042
Explanation The interface used to send failover messages to the secondary ASA is functioning.
Primary can also be listed as Secondary for the secondary ASA.
105043
Recommended Action Check the connectivity of the LAN failover interface. Make sure that the speed
or duplex setting is correct.
105044
Error Message %ASA-1-105044: (Primary) Mate operational mode mode is not compatible
with my mode mode.
Explanation When the operational mode (single or multiple) does not match between failover peers,
failover will be disabled.
Recommended Action Configure the failover peers to have the same operational mode, and then
reenable failover.
105045
Explanation When the feature licenses do not match between failover peers, failover will be disabled.
Recommended Action Configure the failover peers to have the same feature license, and then reenable
failover.
105046
Explanation Two failover units have a different type of chassis. For example, one has a three-slot
chassis; the other has a six-slot chassis.
Recommended Action Make sure that the two failover units are the same.
105047
Error Message %ASA-1-105047: Mate has a io_card_name1 card in slot slot_number which
is different from my io_card_name2
Explanation The two failover units have different types of cards in their respective slots.
Recommended Action Make sure that the card configurations for the failover units are the same.
105048
Explanation The failover process detected that different applications are running on the service
modules in the active and standby units. The two failover units are incompatible if different service
modules are used.
• unit—Primary or secondary
• application—The name of the application, such as InterScan Security Card
Recommended Action Make sure that both units have identical service modules before trying to
reenable failover.
106001
Explanation An attempt was made to connect to an inside address is denied by the security policy
that is defined for the specified traffic type. The IP address displayed is the real IP address instead
of the IP address that appears through NAT. Possible tcp_flags values correspond to the flags in the
TCP header that were present when the connection was denied. For example, a TCP packet arrived
for which no connection state exists in the ASA, and it was dropped. The tcp_flags in this packet are
FIN and ACK.
The tcp_flags are as follows:
106002
Error Message %ASA-2-106002: protocol Connection denied by outbound list acl_ID src
inside_address dest outside_address
Explanation The specified connection failed because of an outbound deny command. The protocol
variable can be ICMP, TCP, or UDP.
Recommended Action Use the show outbound command to check outbound lists.
106006
Explanation An inbound UDP packet was denied by the security policy that is defined for the
specified traffic type.
106007
Recommended Action If the inside port number is 53, the inside host probably is set up as a caching
name server. Add an access-list command statement to permit traffic on UDP port 53 and a
translation entry for the inside host. If the outside port number is 53, a DNS server was probably too
slow to respond, and the query was answered by another server.
106010
Recommended Action Modify the security policy if traffic should be permitted. If the message occurs
at regular intervals, contact the remote peer administrator.
106011
Explanation The message appears under normal traffic conditions if there are internal users that are
accessing the Internet through a web browser. Any time a connection is reset, when the host at the
end of the connection sends a packet after the ASA receives the connection reset, this message
appears. It can typically be ignored.
Recommended Action Prevent this message from getting logged to the syslog server by entering the
no logging message 106011 command.
106012
Explanation An IP packet was seen with IP options. Because IP options are considered a security
risk, the packet was discarded.
Recommended Action Contact the remote host system administrator to determine the problem. Check
the local site for loose source routing or strict source routing.
106013
Error Message %ASA-2-106013: Dropping echo request from IP_address to PAT address
IP_address
Explanation The ASA discarded an inbound ICMP Echo Request packet with a destination address
that corresponds to a PAT global address. The inbound packet is discarded because it cannot specify
which PAT host should receive the packet.
106014
Explanation The ASA denied any inbound ICMP packet access. By default, all ICMP packets are
denied access unless specifically allowed.
106015
Explanation The ASA discarded a TCP packet that has no associated connection in the ASA
connection table. The ASA looks for a SYN flag in the packet, which indicates a request to establish
a new connection. If the SYN flag is not set, and there is no existing connection, the ASA discards
the packet.
Recommended Action None required unless the ASA receives a large volume of these invalid TCP
packets. If this is the case, trace the packets to the source and determine the reason these packets
were sent.
106016
Explanation A packet arrived at the ASA interface that has a destination IP address of 0.0.0.0 and a
destination MAC address of the ASA interface. In addition, this message is generated when the ASA
discarded a packet with an invalid source address, which may include one of the following or some
other invalid address:
• Loopback network (127.0.0.0)
• Broadcast (limited, net-directed, subnet-directed, and all-subnets-directed)
• The destination host (land.c)
To further enhance spoof packet detection, use the icmp command to configure the ASA to discard
packets with source addresses belonging to the internal network, because the access-list command
has been deprecated and is no longer guaranteed to work correctly.
Recommended Action Determine if an external user is trying to compromise the protected network.
Check for misconfigured clients.
106017
Error Message %ASA-2-106017: Deny IP due to Land Attack from IP_address to IP_address
Explanation The ASA received a packet with the IP source address equal to the IP destination, and
the destination port equal to the source port. This message indicates a spoofed packet that is
designed to attack systems. This attack is referred to as a Land Attack.
Recommended Action If this message persists, an attack may be in progress. The packet does not
provide enough information to determine where the attack originates.
106018
Error Message %ASA-2-106018: ICMP packet type ICMP_type denied by outbound list
acl_ID src inside_address dest outside_address
Explanation The outgoing ICMP packet with the specified ICMP from local host (inside_address) to
the foreign host (outside_address) was denied by the outbound ACL list.
106020
Explanation The ASA discarded an IP packet with a teardrop signature containing either a small
offset or fragment overlapping. This is a hostile event that circumvents the ASA or an Intrusion
Detection System.
Recommended Action Contact the remote peer administrator or escalate this issue according to your
security policy.
106021
Error Message %ASA-1-106021: Deny protocol reverse path check from source_address to
dest_address on interface interface_name
The ASA looks up a route based on the source_address. If an entry is not found and a route is not
defined, then this message appears and the connection is dropped.
If there is a route, the ASA checks which interface it corresponds to. If the packet arrived on another
interface, it is either a spoof or there is an asymmetric routing environment that has more than one
path to a destination. The ASA does not support asymmetric routing.
If the ASA is configured on an internal interface, it checks static route command statements or RIP,
and if the source_address is not found, then an internal user is spoofing their address.
Recommended Action Even though an attack is in progress, if this feature is enabled, no user action
is required. The ASA repels the attack.
106022
Explanation A packet matching a connection arrived on a different interface from the interface on
which the connection began. In addition, the ip verify reverse-path command is not configured.
For example, if a user starts a connection on the inside interface, but the ASA detects the same
connection arriving on a perimeter interface, the ASA has more than one path to a destination. This
is known as asymmetric routing and is not supported on the ASA.
An attacker also might be attempting to append packets from one connection to another as a way to
break into the ASA. In either case, the ASA shows this message and drops the connection.
106023
Explanation A real IP packet was denied by the ACL. This message appears even if you do not have
the log option enabled for an ACL. The IP address is the real IP address instead of the values that
display through NAT. Both user identity information and FQDN information is provided for the IP
addresses if a matched one is found. The ASA logs either identity information (domain\user) or
FQDN (if the username is not available). If the identity information or FQDN is available, the ASA
logs this information for both the source and destination.
Recommended Action If messages persist from the same source address, a footprinting or port
scanning attempt might be occurring. Contact the remote host administrator.
106024
Explanation The access list compilation process has run out of memory. All configuration
information that has been added since the last successful access list was removed from the ASA, and
the most recently compiled set of access lists will continue to be used.
Recommended Action Access lists, AAA, ICMP, SSH, Telnet, and other rule types are stored and
compiled as access list rule types. Remove some of these rule types so that others can be added.
106025, 106026
Error Message %ASA-6-106025: Failed to determine the security context for the
packet:sourceVlan:source_address dest_address source_port dest_port protocol
Error Message %ASA-6-106026: Failed to determine the security context for the
packet:sourceVlan:source_address dest_address source_port dest_port protocol
Explanation The security context of the packet in multiple context mode cannot be determined. Both
messages can be generated for IP packets being dropped in either router and transparent mode.
106027
Explanation The security context of the packet in multiple context mode cannot be determined. This
message is generated for non-IP packets being dropped in transparent mode only.
106100
Explanation The initial occurrence or the total number of occurrences during an interval are listed.
This message provides more information than message 106023, which only logs denied packets, and
does not include the hit count or a configurable level.
When an access-list line has the log argument, it is expected that this message ID might be triggered
because of a nonsynchronized packet reaching the ASA and being evaluated by the access list. For
example, if an ACK packet is received on the ASA (for which no TCP connection exists in the
connection table), the ASA might generate message 106100, indicating that the packet was
permitted; however, the packet is later correctly dropped because of no matching connection.
The following list describes the message values:
• permitted | denied | est-allowed—These values specify if the packet was permitted or denied by
the ACL. If the value is est-allowed, the packet was denied by the ACL but was allowed for an
already established session (for example, an internal user is allowed to accesss the Internet, and
responding packets that would normally be denied by the ACL are accepted).
• protocol—TCP, UDP, ICMP, or an IP protocol number.
• interface_name—The interface name for the source or destination of the logged flow. The
VLAN interfaces are supported.
• source_address—The source IP address of the logged flow. The IP address is the real IP address
instead of the values that display through NAT.
• dest_address—The destination IP address of the logged flow. The IP address is the real IP
address instead of the values that display through NAT.
• source_port—The source port of the logged flow (TCP or UDP). For ICMP, the number after
the source port is the message type.
• idfw_user—The user identity username, including the domain name that is added to the existing
syslog when the ASA can find the username for the IP address.
• sg_info—The security group tag that is added to the syslog when the ASA can find a security
group tag for the IP address. The security group name is displayed with the security group tag,
if available.
• dest_port—The destination port of the logged flow (TCP or UDP). For ICMP, the number after
the destination port is the ICMP message code, which is available for some message types. For
type 8, it is always 0. For a list of ICMP message types, see the following URL:
http://www.iana.org/assignments/icmp-parameters/icmp-parameters.xml.
• hit-cnt number—The number of times this flow was permitted or denied by this ACL entry in
the configured time interval. The value is 1 when the ASA generates the first message for this
flow.
• first hit—The first message generated for this flow.
• number-second interval—The interval in which the hit count is accumulated. Set this interval
using the access-list command with the interval option.
• hash codes—Two are always printed for the object group ACE and the constituent regular ACE.
Values are determined on which ACE that the packet hit. To display these hash codes, enter the
show-access list command.
106101
Error Message %ASA-1-106101 The number of ACL log deny-flows has reached limit
(number).
Explanation If you configured the log option for an ACL deny statement (access-list id deny
command), and a traffic flow matches the ACL statement, the ASA caches the flow information.
This message indicates that the number of matching flows that are cached on the ASA exceeds the
user-configured limit (using the access-list deny-flow-max command). This message might be
generated as a result of a DoS attack.
• number—The limit configured using the access-list deny-flow-max command
106102
Explanation A packet was either permitted or denied by an access-list that was applied through a
VPN filter. This message is the VPN/AAA filter equivalent of message 106100.
106103
Error Message %ASA-4-106103: access-list acl_ID denied protocol for user username
interface_name/source_address source_port interface_name/dest_address dest_port
hit-cnt number first hit hash codes
Explanation A packet was denied by an access-list that was applied through a VPN filter. This
message is the VPN/AAA filter equivalent of message106023.
107001
Explanation The ASA received a RIP reply message with bad authentication. This message might be
caused by a misconfiguration on the router or the ASA or by an unsuccessful attempt to attack the
routing table of the ASA.
Recommended Action This message indicates a possible attack and should be monitored. If you are
not familiar with the source IP address listed in this message, change your RIP authentication keys
between trusted entities. An attacker might be trying to determine the existing keys.
107002
Explanation A router bug, a packet with non-RFC values inside, or a malformed entry may have
caused this message to appear. This should not happen, and may be an attempt to exploit the routing
table of the ASA.
Recommended Action This message indicates a possible attack and should be monitored. The packet
has passed authentication, if enabled, and bad data is in the packet. Monitor the situation and change
the keys if there are any doubts about the originator of the packet.
108002
Explanation A Mail Guard (SMTP) message has been generated by the inspect esmtp command.
The ASA has replaced an invalid character in an e-mail address with a space.
108003
Explanation The ASA has detected a malicious pattern in an e-mail address and drops the
connection. An attack is in progress.
108004
Explanation An ESMTP classification is performed on an ESMTP message, and the specified criteria
are satisfied. The configured action is taken.
• action_class—The class of action: ESMTP Classification for ESMTP match commands;
ESMTP Parameter for parameter commands
• action—Action taken: Dropped, Dropped connection for, Reset connection for, or Masked
header flags for
• req_resp—Request or Response
• src_ifc—Source interface name
• sip|sport—Source IP address or source port
• dest_ifc—Destination interface name
• dip|dport—Destination IP address or destination port
• further info—One of the following:
For a single match command: matched Class id: match_command (for example, matched Class
1234: match body length 100).
For parameter commands: parameter-command: descriptive-message (for example, mail-relay:
No Mail Relay allowed)
108005
Explanation An ESMTP classification is performed on an ESMTP message, and the specified criteria
are satisfied. The standalone log action is taken.
• action_class—The class of action: ESMTP Classification for ESMTP match commands;
ESMTP Parameter for parameter commands
• req_resp—Request or Response
• src_ifc—Source interface name
• sip|sport—Source IP address or source port
• dest_ifc—Destination interface name
• dip|dport—Destination IP address or destination port
• further info—One of the following:
For a single match command: matched Class id: match_command (for example, matched Class
1234: match body length 100)
108006
Explanation This event is generated when an ESMTP message size exceeds the size declared in the
RCPT command.
• src_ifc—Source interface name
• sip|sport—Source IP address or source port
• dest_ifc—Destination interface name
• dip|dport—Destination IP address or destination port
• decl_size—Declared size
• act_size—Actual size
108007
Error Message %ASA-6-108007: TLS started on ESMTP session between client client-side
interface-name: client IP address/client port and server server-side
interface-name: server IP address/server port
Explanation On an ESMTP connection, the server has responded with a 220 reply code to the client
STARTTLS command. The ESMTP inspection engine no longer inspects the traffic on this
connection.
• client-side interface-name—The name for the interface that faces the client side
• client IP address—The IP address of the client
• client port—The TCP port number for the client
• server-side interface-name—The name for the interface that faces the server side
• server IP address—The IP address of the server
• server port—The TCP port number for the server
Recommended Action Log and review the message. Check whether the ESMTP policy map associated
with this connection has the allow-tls action log setting. If not, contact the Cisco TAC.
109001
Explanation The ASA is configured for AAA and detects an authentication request by the specified
user.
109002
Explanation An authentication request failed because the specified authentication server cannot be
contacted by the module.
Recommended Action Check that the authentication daemon is running on the specified
authentication server.
109003
Recommended Action Ping the authentication servers from the ASA. Make sure that the daemons are
running.
109005
109006
Explanation The specified authentication request failed, possibly because of an incorrect password.
109007
109008
Explanation A user is not authorized to access the specified address, possibly because of an incorrect
password.
109010
Explanation An authentication request cannot be processed because the server has too many requests
pending.
Recommended Action Check to see if the authentication server is too slow to respond to
authentication requests. Enable the Flood Defender feature with the floodguard enable command.
109011
Error Message %ASA-2-109011: Authen Session Start: user 'user', sid number
Explanation An authentication session started between the host and the ASA and has not yet
completed.
109012
Error Message %ASA-5-109012: Authen Session End: user 'user', sid number, elapsed
number seconds
Explanation The authentication cache has timed out. Users must reauthenticate on their next
connection. You can change the duration of this timer with the timeout uauth command.
109013
Error Message %ASA-3-109013: User must authenticate before using this service
Recommended Action Authenticate using FTP, Telnet, or HTTP before using the service.
109014
Explanation A request to authenticate did not have a corresponding request for authorization.
Recommended Action Ensure that both the aaa authentication and aaa authorization command
statements are included in the configuration.
109016
Error Message %ASA-3-109016: Can't find authorization ACL acl_ID for user 'user'
Explanation The specified on the AAA server for this user does not exist on the ASA. This error can
occur if you configure the AAA server before you configure the ASA. The Vendor-Specific Attribute
(VSA) on your AAA server might be one of the following values:
• acl=acl_ID
• shell:acl=acl_ID
• ACS:CiscoSecured-Defined-ACL=acl_ID
Recommended Action Add the ACL to the ASA, making sure to use the same name specified on the
AAA server.
109017
Error Message %ASA-4-109017: User at IP_address exceeded auth proxy connection limit
(max)
Explanation A user has exceeded the user authentication proxy limit, and has opened too many
connections to the proxy.
Recommended Action Increase the proxy limit by entering the proxy-limit proxy_limit command, or
ask the user to close unused connections. If the error persists, it may indicate a possible DoS attack.
109018
Explanation The downloaded authorization has no ACEs. This situation might be caused by
misspelling the attribute string ip:inacl# or omitting the access-list command.
junk:junk# 1=permit tcp any any eq junk ip:inacl#1=”
Recommended Action Correct the ACL components that have the indicated error on the AAA server.
109019
Error Message %ASA-3-109019: Downloaded ACL acl_ID has parsing error; ACE string
Explanation An error occurred during parsing the sequence number NNN in the attribute string
ip:inacl#NNN= of a downloaded authorization. The reasons include: - missing = - contains
nonnumeric, nonpace characters between # and = - NNN is greater than 999999999.
ip:inacl# 1 permit tcp any any
Recommended Action Correct the ACL element that has the indicated error on the AAA server.
109020
Explanation One of the components of the downloaded authorization has a configuration error. The
entire text of the element is included in the message. This message is usually caused by an invalid
access-list command statement.
Recommended Action Correct the ACL component that has the indicated error on the AAA server.
109021
Recommended Action None required. However, if this error appears repeatedly, contact the Cisco
TAC.
109022
Explanation For each HTTPS authentication, the ASA dedicates a process to service the
authentication request. When the number of concurrently running processes exceeds the
system-imposed limit, the ASA does not perform the authentication, and this message appears.
109023
Explanation Based on the configured policies, you need to be authenticated before you can use this
service port.
Recommended Action Authenticate using Telnet, FTP, or HTTP before attempting to use this service
port.
109024
Explanation The ASA is configured for AAA and a user attempted to make a TCP connection across
the ASA without prior authentication.
109025
Error Message %ASA-6-109025: Authorization denied (acl=acl_ID) for user 'user' from
source_address/source_port to dest_address/dest_port on interface interface_name
using protocol
Explanation The check failed. The check either matched a deny or did not match anything, such as
an implicit deny. The connection was denied by the user acl_ID, which was defined according to the
AAA authorization policy on the Cisco Secure Access Control Server (ACS).
109026
Error Message %ASA-3-109026: [aaa protocol] Invalid reply digest received; shared
server key may be mismatched.
Explanation The response from the AAA server cannot be validated. The configured server key is
probably incorrect. This message may be generated during transactions with RADIUS or TACACS+
servers.
Recommended Action Verify that the server key, configured using the aaa-server command, is
correct.
109027
Explanation The response from the AAA server cannot be validated. The configured server key is
probably incorrect. This message may be displayed during transactions with RADIUS or TACACS+
servers. The server_IP_address is the IP address of the relevant AAA server. The user is the user
name associated with the connection.
Recommended Action Verify that the server key, configured using the aaa-server command, is
correct.
109028
Error Message %ASA-4-109028: aaa bypassed for same-security traffic from ingress_
interface:source_address/source_port to egress_interface:dest_address/dest_port
Explanation AAA is being bypassed for same security traffic that matches a configured AAA rule.
This can only occur when traffic passes between two interfaces that have the same configured
security level, when the same security traffic is permitted, and if the AAA configuration uses the
include or exclude syntax.
109029
Explanation A syntax error occurred while parsing an access list that was downloaded from a
RADIUS server during user authentication.
• string—An error message detailing the syntax error that prevented the access list from parsing
correctly
Recommended Action Use the information presented in this message to identify and correct the syntax
error in the access list definition within the RADIUS server configuration.
109030
Error Message %ASA-4-109030: Autodetect ACL convert wildcard did not convert ACL
access_list source|dest netmask netmask.
Explanation A dynamic ACL that is configured on a RADIUS server is not converted by the
mechanism for automatically detecting wildcard netmasks. The problem occurs because this
mechanism cannot determine if the netmask is a wildcard or a normal netmask.
• access_list—The access list that cannot be converted
• source—The source IP address
• dest—The destination IP address
• netmask—The subnet mask for the destination or source address in dotted-decimal notation
Recommended Action Check the access list netmask on the RADIUS server for the wildcard
configuration. If the netmask is supposed to be a wildcard, and if all access list netmasks on that
server are wildcards, then use the wildcard setting for acl-netmask-convert for the AAA server.
Otherwise, change the netmask to a normal netmask or to a wildcard netmask that does not contain
holes (that is, where the netmask presents consecutive binary 1s. For example,
00000000.00000000.00011111.11111111 or hex 0.0.31.255). If the mask is supposed to be normal
and all access list netmasks on that server are normal, then use the normal setting for
acl-netmask-convert for the AAA server.
109031
Explanation A user has tried to authenticate to an NT domain that was configured for guest account
access and the username is not a valid username on the NT server. The connection is denied.
Recommended Action If the user is a valid user, add an account to the NT server. If the user is not
allowed access, no action is required.
109032
Error Message %ASA-3-109032: Unable to install ACL access_list, downloaded for user
username; Error in ACE: ace.
Explanation The ASA received an access control list from a RADIUS server to apply to a user
connection, but an entry in the list contains a syntax error. Th euse of a list containing an error could
result in the violation of a security policy, so the ASA failed to authenticate the user.
• access_list—The name assigned to the dynamic access list as it would appear in the output of
the show access-list command
• username—The name of the user whose connection will be subject to this access list
• ace—The access list entry that was being processed when the error was detected
Recommended Action Correct the access list definition in the RADIUS server configuration.
109033
Error Message %ASA-4-109033: Authentication failed for admin user user from src_IP.
Interactive challenge processing is not supported for protocol connections
Recommended Action Reconfigure AAA so that challenge processing does not occur for these
connection types. This generally means to avoid authenticating these connection types to RSA
SecurID servers or to any token-based AAA server via RADIUS.
109034
Error Message %ASA-4-109034: Authentication failed for network user user from
src_IP/port to dst_IP/port. Interactive challenge processing is not supported for
protocol connections
Recommended Action Reconfigure AAA so that challenge processing does not occur for these
connection types. This generally means to avoid authenticating these connection types to RSA
SecurID servers or to any token-based AAA server via RADIUS.
109036
Error Message %ASA-6-109036: Exceeded 1000 attribute values for the attribute name
attribute for user username.
Explanation The LDAP response message contains an attribute that has more than 1000 values.
• attribute_name—The LDAP attribute name
• username—The username at login
109037
Error Message %ASA-3-109037: Exceeded 5000 attribute values for the attribute name
attribute for user username.
Explanation The ASA supports multiple values of the same attribute received from a AAA server. If
the AAA server sends a response containing more than 5000 values for the same attribute, then the
ASA treats this response message as being malformed and rejects the authentication. This condition
has only been seen in lab environments using specialized test tools. It is unlikely that the condition
would occur in a real-world production network.
• attribute_name—The LDAP attribute name
• username—The username at login
Recommended Action Capture the authentication traffic between the ASA and AAA server using a
protocol sniffer (such as WireShark), then forward the trace file to the Cisco TAC for analysis.
109038
Explanation The AAA subsystem tried to parse an attribute from the AAA server into an internal
representation and failed.
• string-from-server—String received from the AAA server, truncated to 40 characters.
• type—The type of the specified attribute
Recommended Action Verify that the attribute is being generated correctly on the AAA server. For
additional information, use the debug ldap and debug radius commands.
109039
Explanation A packet containing IPv6 addresses or IPv4 addresses translated to IPv6 addresses by
NAT requires AAA authentication or authorization. AAA authentication and authorization do not
support IPv6 addresses. The packet is dropped.
• lifc—The ingress interface
• laddr—The source IP address
• fifc—The egress interface
• faddr—The destination IP address after NAT translation, if any
109100
Error Message %ASA-6-109100: Received CoA update from coa-source-ip for user
username, with session ID: audit-session-id, changing authorization attributes
Explanation The ASA has successfully processed the CoA policy update request from coa-source-ip
for user username with session id audit-session-id. This syslog message is generated after a change
of authorization policy update has been received by the ASA, validated and applied. In a non-error
case, this is the only syslog message that is generated when a change of authorization is received
and processed.
• coa-source-ip—Originating IP address of the change of authorization request
• username—User whose session is being changed
• audit-session-id—The global ID of the session being modified
109101
Error Message %ASA-6-109101: Received CoA disconnect request from coa-source-ip for
user username, with audit-session-id: audit-session-id
Explanation The ASA has received a correctly formatted Disconnect-Request for an active VPN
session and has successfully terminated the connection.
• coa-source-ip—Originating IP address of the change of authorization request
• username—User whose session is being changed
• audit-session-id—The global ID of the session being modified
109102
Error Message %ASA-4-109102: Received CoA action-type from coa-source-ip, but cannot
find named session audit-session-id
Explanation The ASA has received a valid change of authorization request, but the session ID
specified in the request does not match any active sessions on the ASA. This could be the result of
the change of authorization server attempting to issue a change of authorization on a session that has
already been closed by the user.
• action-type—The requested change of authorization action (update or disconnect)
• coa-source-ip—Originating IP address of the change of authorization request
• audit-session-id—The global ID of the session being modified
109103
Error Message %ASA-3-109103: CoA action-type from coa-source-ip failed for user
username, with session ID: audit-session-id.
Explanation The ASA has received a correctly formatted change of authorization request, but was
unable to process it successfully.
• action-type—The requested change of authorization action (update or disconnect)
• coa-source-ip—Originating IP address of the change of authorization request
• username—User whose session is being changed
• audit-session-id—The global ID of the session being modified
Recommended Action Investigate the relevant VPN subsystem logs to determine why the updated
attributes could not be applied or why the session could not be terminated.
109104
Error Message %ASA-3-109104: CoA action-type from coa-source-ip failed for user
username, session ID: audit-session-id. Action not supported.
Explanation The ASA has received a correctly formatted change of authorization request, but did not
process it because the indicated action is not supported by the ASA.
• action-type—The requested change of authorization action (update or disconnect)
• coa-source-ip—Originating IP address of the change of authorization request
• username—User whose session is being changed
• audit-session-id—The global ID of the session being modified
110002
Error Message %ASA-6-110002: Failed to locate egress interface for protocol from src
interface:src IP/src port to dest IP/dest port
Explanation .An error occurred when the ASA tried to find the interface through which to send the
packet.
• protocol—The protocol of the packet
• src interface—The interface from which the packet was received
• src IP—The source IP address of the packet
• src port—The source port number
• dest IP—The destination IP address of the packet
• dest port—The destination port number
Recommended Action Copy the error message, the configuration, and any details about the events
leading up to the error, and contact Cisco TAC.
110003
Error Message %ASA-6-110003: Routing failed to locate next-hop for protocol from src
interface:src IP/src port to dest interface:dest IP/dest port
Explanation .An error occurred when the ASA tried to find the next hop on an interface routing table.
• protocol—The protocol of the packet
• src interface—The interface from which the packet was received
• src IP—The source IP address of the packet
• src port—The source port number
• dest IP—The destination IP address of the packet
• dest port—The destination port number
Recommended Action Copy the error message, the configuration, and any details about the events
leading up to the error, and contact Cisco TAC. During debugging, use the show asp table routing
command to view the routing table details.
111001
Explanation You have entered the write command to store your configuration on a device (either
floppy, flash memory, TFTP, the failover standby unit, or the console terminal). The IP_address
indicates whether the login was made at the console port or with a Telnet connection.
111002
Explanation You have entered the read command to read your configuration from a device (either
floppy disk, flash memory, TFTP, the failover standby unit, or the console terminal). The IP_address
indicates whether the login was made at the console port or with a Telnet connection.
111003
Explanation You have erased the contents of flash memory by entering the write erase command at
the console. The IP_address value indicates whether the login was made at the console port or
through a Telnet connection.
Recommended Action After erasing the configuration, reconfigure the ASA and save the new
configuration. Alternatively, you can restore information from a configuration that was previously
saved, either on a floppy disk or on a TFTP server elsewhere on the network.
111004
Explanation You have entered the config floppy/memory/ network command or the write
floppy/memory/network/standby command. The IP_address value indicates whether the login
was made at the console port or through a Telnet connection.
Recommended Action None required if the message ends with OK. If the message indicates a failure,
try to fix the problem. For example, if writing to a floppy disk, ensure that the floppy disk is not
write protected; if writing to a TFTP server, ensure that the server is up.
111005
Explanation You have exited the configuration mode. The IP_address value indicates whether the
login was made at the console port or through a Telnet connection.
111007
Explanation You have entered the reload or configure command to read in a configuration. The
device text can be floppy, memory, net, standby, or terminal. The IP_address value indicates whether
the login was made at the console port or through a Telnet connection.
111008
Explanation The user entered any command, with the exception of a show command.
111009
Explanation The user entered a command that does not modify the configuration. This message
appears only for show commands.
111010
111111
112001
Explanation A request to clear the module configuration was completed. The source file and line
number are identified.
113001
Error Message %ASA-3-113001: Unable to open AAA session. Session limit [limit]
reached.
Explanation The AAA operation on an IPsec tunnel or WebVPN connection cannot be performed
because of the unavailability of AAA resources. The limit value indicates the maximum number of
concurrent AAA transactions.
113003
Error Message %ASA-6-113003: AAA group policy for user user is being set to
policy_name.
Explanation The group policy that is associated with the tunnel group is being overridden with a
user-specific policy, policy_name. The policy_name is specified using the username command
when LOCAL authentication is configured or is returned in the RADIUS CLASS attribute when
RADIUS authentication is configured.
113004
Explanation The AAA operation on an IPsec or WebVPN connection has been completed
successfully. The AAA types are authentication, authorization, or accounting. The
server_IP_address is the IP address of the relevant AAA server. The user is the user name associated
with the connection.
113005
113006
Error Message %ASA-6-113006: User user locked out on exceeding number successive
failed authentication attempts
Explanation A locally configured user is being locked out. This happens when a configured number
of consecutive authentication failures have occurred for this user and indicates that all future
authentication attempts by this user will be rejected until an administrator unlocks the user using the
clear aaa local user lockout command. The user is the user that is now locked, and the number is
the consecutive failure threshold configured using the aaa local authentication attempts max-fail
command.
Recommended Action Try unlocking the user using the clear_aaa_local_user_lockout command or
adjusting the maximum number of consecutive authentication failures that are tolerated.
113007
Explanation A locally configured user that was locked out after exceeding the maximum number of
consecutive authentication failures set by using the aaa local authentication attempts max-fail
command has been unlocked by the indicated administrator.
113008
Explanation The AAA transaction for a user associated with an IPsec or WebVPN connection was
completed successfully. The user is the username associated with the connection.
113009
Error Message %ASA-6-113009: AAA retrieved default group policy policy for user user
113010
Error Message %ASA-6-113010: AAA challenge received for user user from server
server_IP_address
Explanation The authentication of an IPsec connection has occurred with a SecurID server. The user
will be prompted to provide further information before being authenticated.
• user—The username associated with the connection
• server _IP_address—The IP address of the relevant AAA server
113011
Error Message %ASA-6-113011: AAA retrieved user specific group policy policy for user
user
113012
Error Message %ASA-6-113012: AAA user authentication Successful: local database: user
= user
Explanation The user associated with a IPsec or WebVPN connection has been successfully
authenticated to the local user database.
• user—The username associated with the connection
113013
Error Message %ASA-6-113013: AAA unable to complete the request Error: reason =
reason: user = user
Explanation The AAA transaction for a user associated with an IPsec or WebVPN connection has
failed because of an error or has been rejected because of a policy violation.
• reason—The reason details
• user—The username associated with the connection
113014
Explanation The device was unable to communicate with the configured AAA server during the
AAA transaction associated with an IPsec or WebVPN connection. This may or may not result in a
failure of the user connection attempt depending on the backup servers configured in the aaa-server
group and the availability of those servers.
113015
Error Message %ASA-6-113015: AAA user authentication Rejected: reason = reason: local
database: user = user
Explanation A request for authentication to the local user database for a user associated with an IPsec
or WebVPN connection has been rejected.
• reason—The details of why the request was rejected
• user—The username associated with the connection
113016
Explanation The AAA transaction for a user associated with an IPsec or WebVPN connection has
failed because of an error or rejected due to a policy violation.
• reason—The reason details
• server_IP_address—The IP address of the relevant AAA server
• user—The username associated with the connection
113017
Explanation The AAA transaction for a user associated with an IPsec or WebVPN connection has
failed because of an error or rejected because of a policy violation. This event only appears when
the AAA transaction is with the local user database rather than with an external AAA server.
• reason—The reason details
• user—The username associated with the connection
113018
Explanation An ACL entry in unsupported format was downloaded from the authentication server.
The following list describes the message values:
• user—User trying to log in
• ACL_entry—Unsupported ACL entry downloaded from the authentication server
• action—Action taken when encountering the unsupported ACL entry
Recommended Action The ACL entry on the authentication server has to be changed by the
administrator to conform to the supported ACL entry formats.
113019
Explanation An indication of when and why the longest idle user is disconnected.
• group—Group name
• username—Username
• IP—Peer address
• Session Type—Session type (for example, IPsec or UDP)
• duration—Connection duration in hours, minutes, and seconds
• Bytes xmt—Number of bytes transmitted
• Bytes rcv—Number of bytes received
• reason—Reason for disconnection:
User Requested
Lost Carrier
Lost Service
Idle Timeout
Max time exceeded
Administrator Reset
Administrator Reboot
Administrator Shutdown
Port Error
NAS Error
NAS Request
NAS Reboot
Port unneeded
Connection preempted. Indicates that the allowed number of simultaneous (same user) logins
has been exceeded. To resolve this problem, increase the number of simultaneous logins or have
users only log in once with a given username and password.
Port Suspended
Service Unavailable
Callback
User error
Host Requested
SA Expired
IKE Delete
Bandwidth Management Error
Certificate Expired
Phase 2 Mismatch
Firewall Mismatch
Peer Address Changed
ACL Parse Error
Phase 2 Error
Configuration Error
Peer Reconnected
Internal Error
Crypto map policy not found
L2TP initiated
VLAN Mapping Error
NAC-Policy Error
Dynamic Access Policy terminate
Client type not supported
Unknown
Recommended Action Unless the reason indicates a problem, then no action is required.
113020
Error Message %ASA-3-113020: Kerberos error: Clock skew with server ip_address
greater than 300 seconds
Explanation Authentication for an IPsec or WebVPN user through a Kerberos server has failed
because the clocks on the ASA and the server are more than five minutes (300 seconds) apart. When
this occurs, the connection attempt is rejected.
• ip_address—The IP address of the Kerberos server
Recommended Action Synchronize the clocks on the ASA and the Kerberos server.
113021
Error Message %ASA-3-113021: Attempted console login failed. User username did NOT
have appropriate Admin Rights.
Explanation A user has tried to access the management console and was denied.
• username—The username entered by the user
Recommended Action If the user is a newly added admin rights user, check that the service type
(LOCAL or RADIUS authentication server) for that user is set to allow access:
• nas-prompt—Allows login to the console and exec privileges at the required level, but not
enable (configuration modification) access
• admin—Allows all access and can be further constrained by command privileges
Otherwise, the user is inappropriately trying to access the management console; the action to be
taken should be consistent with company policy for these matters.
113022
Explanation The ASA has tried an authentication, authorization, or accounting request to the AAA
server and did not receive a response within the configured timeout window. The AAA server will
be marked as failed and has been removed from service.
• protocol—The type of authentication protocol, which can be one of the following:
- RADIUS
- TACACS+
- NT
- RSA SecurID
- Kerberos
- LDAP
Recommended Action Verify that the AAA server is online and is accessible from the ASA.
113023
Error Message %ASA-2-113023: AAA Marking protocol server ip-addr in server group tag
as ACTIVE
Explanation The ASA has reactivated the AAA server that was previously marked as failed. The
AAA server is now available to service AAA requests.
• protocol—The type of authentication protocol, which can be one of the following:
- RADIUS
- TACACS+
- NT
- RSA SecurID
- Kerberos
- LDAP
• ip-addr—The IP address of the AAA server
• tag—The server group name
113024
Error Message %ASA-5-113024: Group tg: Authenticating type connection from ip with
username, user_name, from client certificate
Explanation The prefill username feature overrides the username with one derived from the client
certificate for use in AAA.
• tg—The tunnel group
• type—The type of connection (ssl-client or clientless)
• ip—The IP address of the connecting user
• user_name—The name extracted from the client certificate for use in AAA
113025
Error Message %ASA-5-113025: Group tg: fields Could not authenticate connection type
connection from ip
Recommended Action The administrator should check that the authentication aaa certificate, ssl
certificate-authentication, and authorization-dn-attributes keywords have been set correctly.
113026
Error Message %ASA-4-113026: Error error while executing Lua script for group tunnel
group
Explanation An error occurred while extracting a username from the client certificate for use in
AAA. This message is only generated when the username-from-certificate use-script option is
enabled.
• error—Error string returned from the Lua environment
• tunnel group—The tunnel group attempting to extract a username from a certificate
Recommended Action Examine the script being used by the username-from-certificate use-script
option for errors.
113027
Explanation The script file cannot be loaded successfully. No tunnel groups using the
username-from-certificate use-script option work correctly.
Recommended Action The administrator should check the script file for errors using ASDM. Use the
debug aaa command to obtain a more detailed error message that may be useful.
113028
Error Message %ASA-7-113028: Extraction of username from VPN client certificate has
string. [Request num]
Explanation The processing request of a username from a certificate is running or has finished.
• num—The ID of the request (the value of the pointer to the fiber), which is a monotonically
increasing number.
• string—The status message, which can one of the following:
- been requested
- started
- finished with error
- finished successfully
- completed
113029
Error Message %ASA-4-113029: Group group User user IP ipaddr Session could not be
established: session limit of num reached
Explanation The user session cannot be established because the current number of sessions exceeds
the maximum session load.
Recommended Action Increase the configured limit, if possible, to create a load-balanced cluster.
113030
Error Message %ASA-4-113030: Group group User user IP ipaddr User ACL acl from AAA
doesn't exist on the device, terminating connection.
Recommended Action Modify the configuration to add the specified ACL or to correct the ACL name.
113031
Error Message %ASA-4-113031: Group group User user IP ipaddr AnyConnect vpn-filter
filter is an IPv6 ACL; ACL not applied.
Explanation The type of ACL to be applied is incorrect. An IPv6 ACL has been configured as an IPv4
ACL through the vpn-filter command.
• group—The group policy name of the user
• user—The username
• ipaddr—The public (not assigned) IP address of the user
• filter—The name of the VPN filter
Recommended Action Validate the VPN filter and IPv6 VPN filter configurations on the ASA, and the
filter parameters on the AAA (RADIUS) server. Make sure that the correct type of ACL is specified.
113032
Explanation The type of ACL to be applied is incorrect. An IPv4 ACL has been configured as an IPv6
ACL through the ipv6-vpn-filter command.
• group—The group policy name of the user
• user—The username
• ipaddr—The public (not assigned) IP address of the user
• filter—The name of the VPN filter
Recommended Action Validate the VPN filter and IPv6 VPN filter configurations on the ASA and the
filter parameters on the AAA (RADIUS) server. Make sure that the correct type of ACL is specified.
113033
Error Message %ASA-6-113033: Group group User user IP ipaddr AnyConnect session not
allowed. ACL parse error.
Explanation The WebVPN session for the specified user in this group is not allowed because the
associated ACL did not parse. The user will not be allowed to log in via WebVPN until this error
has been corrected.
• group—The group policy name of the user
• user—The username
• ipaddr—The public (not assigned) IP address of the user
113034
Error Message %ASA-4-113034: Group group User user IP ipaddr User ACL acl from AAA
ignored, AV-PAIR ACL used instead.
Explanation The specified ACL was not used because a Cisco AV-PAIR ACL was used.
• group—The name of the group
• user—The name of the user
• ipaddr—The IP address
• acl—The name of the ACL
Recommended Action Determine the correct ACL to use and correct the configuration.
113035
Error Message %ASA-4-113035: Group group User user IP ipaddr Session terminated:
AnyConnect not enabled or invalid AnyConnect image on the ASA.
Explanation The user logged in via the AnyConnect client. The SVC service is not enabled globally,
or the SVC image is invalid or corrupted. The session connection has been terminated.
• group—The name of the group policy with which the user is trying to connect
• user—The name of the user who is trying to connect
• iaddrp—The IP address of the user who is trying to connect
Recommended Action Enable the SVC globally using the svc-enable command. Validate the integrity
and versions of the SVC images by reloading new images using the svc image command.
113036
Error Message %ASA-4-113036: Group group User user IP ipaddr AAA parameter name value
invalid.
Explanation The given parameter has a bad value. The value is not shown because it might be very
long.
• group—The name of the group
• user—The name of the user
• ipadddr—The IP address
• name—The name of the parameter
113037
Error Message %ASA-6-113037: Reboot pending, new sessions disabled. Denied user
login.
Explanation A user was unable to log in to WebVPN because the ASA is in the process of rebooting.
113038
Error Message %ASA-4-113038: Group group User user IP ipaddr Unable to create
AnyConnect parent session.
Explanation The AnyConnect session was not created for the user in the specified group because of
resource issues. For example, the user may have reached the maximum login limit.
• group—The name of the group
• user—The name of the user
• ipadddr—The IP address
113039
Error Message %ASA-6-113039: Group group User user IP ipaddr AnyConnect parent
session started.
Explanation The AnyConnect session has started for the user in this group at the specified IP address.
When the user logs in via the AnyConnect login page, the AnyConnect session starts.
• group—The name of the group
• user—The name of the user
• ipadddr—The IP address
113040
Error Message %ASA-4-113040: Terminating the VPN connection attempt from attempted
group. Reason: This connection is group locked to locked group.
Explanation The tunnel group over which the connection is attempted is not the same as the tunnel
group set in the group lock.
• attempted group—The tunnel group over which the connection came in
Recommended Action Check the group-lock value in the group policy or the user attributes.
114001
Error Message %ASA-1-114001: Failed to initialize 4GE SSM I/O card (error
error_string).
Explanation The system failed to initialize a 4GE SSM I/O card because of an I2C error or a switch
initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114002
Error Message %ASA-1-114002: Failed to initialize SFP in 4GE SSM I/O card (error
error_string).
Explanation The system failed to initialize an SFP connector in a 4GE SSM I/O card because of an
I2C error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are the I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114003
Error Message %ASA-1-114003: Failed to run cached commands in 4GE SSM I/O card (error
error_string).
Explanation The system failed to run cached commands in a 4GE SSM I/O card because of an I2C
error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are the I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
3. Power cycle the device. When you turn off the power, make sure you wait several seconds before
turning the power on.
4. If the problem persists, contact the Cisco TAC.
114004
Explanation he user has been notified that a 4GE SSM I/O initialization is starting.
• syslog_id—Message identifier
114005
Explanation The user has been notified that an 4GE SSM I/O initialization is finished.
• syslog_id—Message identifier
114006
Error Message %ASA-3-114006: Failed to get port statistics in 4GE SSM I/O card (error
error_string).
Explanation The ASA failed to obtain port statistics in a 4GE SSM I/O card because of an I2C error
or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are the I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114007
Error Message %ASA-3-114007: Failed to get current msr in 4GE SSM I/O card (error
error_string).
Explanation The ASA failed to obtain the current module status register information in a 4GE SSM
I/O card because of an I2C error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are the I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114008
Error Message %ASA-3-114008: Failed to enable port after link is up in 4GE SSM I/O
card due to either I2C serial bus access error or switch access error.
Explanation The ASA failed to enable a port after the link transition to Up state is detected in a 4GE
SSM I/O card because of either an I2C serial bus access error or a switch access error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114009
Error Message %ASA-3-114009: Failed to set multicast address in 4GE SSM I/O card
(error error_string).
Explanation The ASA failed to set the multicast address in a 4GE SSM I/O card because of an I2C
error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114010
Error Message %ASA-3-114010: Failed to set multicast hardware address in 4GE SSM I/O
card (error error_string).
Explanation The ASA failed to set the multicast hardware address in a 4GE SSM I/O card because
of an I2C error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
- I2C_DATA_PTR_ERROR
114011
Error Message %ASA-3-114011: Failed to delete multicast address in 4GE SSM I/O card
(error error_string).
Explanation The ASA failed to delete the multicast address in a 4GE SSM I/O card because of either
an I2C error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114012
Error Message %ASA-3-114012: Failed to delete multicast hardware address in 4GE SSM
I/O card (error error_string).
Explanation The ASA failed to delete the multicast hardware address in a 4GE SSM I/O card because
of an I2C error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114013
Error Message %ASA-3-114013: Failed to set mac address table in 4GE SSM I/O card
(error error_string).
Explanation The ASA failed to set the MAC address table in a 4GE SSM I/O card because of an I2C
error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114014
Error Message %ASA-3-114014: Failed to set mac address in 4GE SSM I/O card (error
error_string).
Explanation The ASA failed to set the MAC address in a 4GE SSM I/O card because of an I2C error
or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114015
Error Message %ASA-3-114015: Failed to set mode in 4GE SSM I/O card (error
error_string).
Explanation The ASA failed to set individual or promiscuous mode in a 4GE SSM I/O card because
of an I2C error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114016
Error Message %ASA-3-114016: Failed to set multicast mode in 4GE SSM I/O card (error
error_string).
Explanation The ASA failed to set the multicast mode in a 4GE SSM I/O card because of an I2C
error or a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are the I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114017
Error Message %ASA-3-114017: Failed to get link status in 4GE SSM I/O card (error
error_string).
Explanation The ASA failed to obtain link status in a 4GE SSM I/O card because of an I2C serial
bus access error or a switch access error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are the I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114018
Error Message %ASA-3-114018: Failed to set port speed in 4GE SSM I/O card (error
error_string).
Explanation The ASA failed to set the port speed in a 4GE SSM I/O card because of an I2C error or
a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are the I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114019
Error Message %ASA-3-114019: Failed to set media type in 4GE SSM I/O card (error
error_string).
Explanation The ASA failed to set the media type in a 4GE SSM I/O card because of an I2C error or
a switch initialization error.
• syslog_id—Message identifier
• error_string—An I2C serial bus error or a switch access error, which is a decimal error code.
The following are the I2C serial bus errors:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114020
Error Message %ASA-3-114020: Port link speed is unknown in 4GE SSM I/O card.
Explanation The ASA cannot detect the port link speed in a 4GE SSM I/O card.
114021
Error Message %ASA-3-114021: Failed to set multicast address table in 4GE SSM I/O
card due to error.
Explanation The ASA failed to set the multicast address table in the 4GE SSM I/O card because of
either an I2C serial bus access error or a switch access error.
• error—A switch access error (a decimal error code) or an I2C serial bus error. Possible I2C
serial bus errors include:
- I2C_BUS_TRANSACTION_ERROR
- I2C_CHKSUM_ERROR
- I2C_TIMEOUT_ERROR
- I2C_BUS_COLLISION_ERROR
- I2C_HOST_BUSY_ERROR
- I2C_UNPOPULATED_ERROR
- I2C_SMBUS_UNSUPPORT
- I2C_BYTE_COUNT_ERROR
- I2C_DATA_PTR_ERROR
114022
Error Message %ASA-3-114022: Failed to pass broadcast traffic in 4GE SSM I/O card
due to error_string
Explanation The ASA failed to pass broadcast traffic in the 4GE SSM I/O card because of a switch
access error.
• error_string—A switch access error, which will be a decimal error code
114023
Error Message %ASA-3-114023: Failed to cache/flush mac table in 4GE SSM I/O card due
to error_string.
Explanation A failure to cache or flush the MAC table in a 4GE SSM I/O card occurred because of
an I2C serial bus access error or a switch access error. This message rarely occurs.
• error_string— Either an I2C serial bus error (see the second bullet for possible values) or a
switch access error (which is a decimal error code).
• I2C serial bus errors are as follows:
I2C_BUS_TRANSACTION_ERROR
I2C_CHKSUM_ERROR
I2C_TIMEOUT_ERROR
I2C_BUS_COLLISION_ERROR
I2C_HOST_BUSY_ERROR
I2C_UNPOPULATED_ERROR
I2C_SMBUS_UNSUPPORT
I2C_BYTE_COUNT_ERROR
I2C_DATA_PTR_ERROR
Note When you turn off the power, make sure that you wait several seconds before powering on
again. After you complete steps 1-3, if the problem persists, contact the Cisco TAC and
provide the information described in step 1. You may need to RMA the ASA.
115000
Explanation The critical assertion has gone off and is used during development in checked builds
only, but never in production builds.
• process name— The name of the process
• fiber name —The name of the fiber
• component name—The name of the specified component
• subcomponent name—The name of the specified subcomponent
• filename—The name of the specified file
• line number—The line number for the specified line
• condition—The specified condition
Recommended Action A high priority defect should be filed, the reason for the assertion should be
investigated, and the problem corrected.
115001
Error Message %ASA-3-115001: Error in process: process name fiber: fiber name,
component: component name, subcomponent: subcomponent name, file: filename, line:
line number, cond: condition
Explanation An error assertion has gone off and is used during development in checked builds only,
but never in production builds.
• process name— The name of the process
• fiber name —The name of the fiber
• component name—The name of the specified component
• subcomponent name—The name of the specified subcomponent
• filename—The name of the specified file
• line number—The line number for the specified line
• condition—The specified condition
Recommended Action A defect should be filed, the reason for the assertion should be investigated,
and the problem fixed.
115002
Error Message %ASA-4-115002: Warning in process: process name fiber: fiber name,
component: component name, subcomponent: subcomponent name, file: filename, line:
line number, cond: condition
Explanation A warning assertion has gone off and is used during development in checked builds
only, but never in production builds.
• process name— The name of the process
• fiber name —The name of the fiber
• component name—The name of the specified component
• subcomponent name—The name of the specified subcomponent
• filename—The name of the specified file
• line number—The line number for the specified line
• condition—The specified condition
Recommended Action The reason for the assertion should be investigated and if a problem is found,
a defect should be filed, and the problem corrected.
120001
Explanation The Smart Call-Home module started successfully after system bootup and failover in
a stable state, and is ready to process Smart-Call Home events.
120002
120003
Explanation The Smart Call-Home module retrieved an event from the queue to process.
• group—The event group, which may be the following: inventory, configuration, diagnostic,
environment, snapshot, telemetry, threat, and test.
• title—The event title
120004
Explanation A Smart Call-Home event was dropped. The event may have been dropped because of
an internal error, the event queue is full, or the Smart Call-Home module was disabled after the
message was generated, but before it was processed.
• group—The event group, which can be any of the following: inventory, configuration,
diagnostic, environment, snapshot, telemetry, threat, and test.
• title—The event title
• reason—The drop reason, which can any of the following:
Internal Error—Various internal system errors occurred, such as being out of memory or parsing
a CLI failed.
Queue Full—The number of events reached the configured limit.
Cancelled—The event was cancelled because the Smart Call-Home module is disabled.
Recommended Action If the drop reason is Queue Full, try to increase the event queue size and the
rate-limit configuration to avoid event queue buildup. If the drop reason is Internal Error, turn on
debugging by entering the debug sch fail command to obtain more detailed debugging information.
120005
Explanation A Smart Call-Home message was dropped. The message may have been dropped
because of an internal error, a network error, or the Smart Call-Home module was disabled after the
message was generated, but before it was delivered.
• group—The event group, which can be any of the following: inventory, configuration,
diagnostic, environment, snapshot, telemetry, threat, and test.
• destination—The e-mail or URL destination
• reason—The drop reason, which can any of the following:
Recommended Action If the drop reason is Delivery Failed, the message is dropped after three
unsuccessful retransmissions, or because the error is local (such as no route to destination). Search
message 120006 for the delivery failure reason, or turn on debugging by entering the debug sch fail
command to obtain more detailed debugging information.
120006
Explanation An error occurred while the Smart Call Home module tried to deliver a message. The
error may be transient. The message is not dropped when message 120006 is generated. The
message may be queued for retransmission. The message is only dropped when message 120005 is
generated.
• group—The event group, which can be any of the following: inventory, configuration,
diagnostic, environment, snapshot, telemetry, threat, and test
• destination—The e-mail or URL destination
• reason—The failure reason
Recommended Action Check the error reason in the message. If the reason is NO_ROUTE,
INVALID_ADDRESS, or INVALID_URL, check the system configuration, DNS, and the name
setting.
120007
120008
Explanation The Smart Call Home module is enabled, an event group is also enabled, and that event
group is subscribed to by at least one active profile. If these conditions are met, then all clients of
that group will be activated.
• client—The name of the Smart Call Home client
120009
Explanation The Smart Call Home module is disabled, an event group is enabled, or an event group
is no longer subscribed to by any active profile. If these conditions are met, clients of that event
group will be deactivated.
• client—The name of the Smart Call Home client
120010
Error Message %ASA-3-120010: Notify command command to SCH client client failed.
Reason reason.
Explanation The Smart Call Home module notified Smart Call Home clients of certain events
through the callback function. If the client does not interpret the command correctly, does not
understand the command, or cannot process the command, an error will be returned.
• command—ENABLE, DISABLE, or READY
• client—The name of the Smart Call Home client
• reason—The reason for failure
Recommended Action Turn on debugging by entering the debug sch fail command to obtain more
detailed debugging information.
120012
Explanation The administrator was notified that a user has responded to the Smart Call Home prompt
to enable, disable, or postpone anonymous reporting.
• username—The user who responded to the prompt
• choice—The available entries are enable, disable, or postpone
Recommended Action To enable anonymous reporting in the future, enter the call-home reporting
anonymous command. To disable anonymous reporting, enter the no call-home reporting
anonymous command.
199001
Explanation The address of the host that is initiating an ASA reboot with the reload command has
been recorded.
199002
Explanation The ASA finished its initial boot and the flash memory reading sequence, and is ready
to begin operating normally.
Note You cannot block this message by using the no logging message command.
199003
Explanation The ASA received a packet from the outside network that uses a larger MTU than the
inside network. The ASA then sent an ICMP message to the outside host to negotiate an appropriate
MTU. The log message includes the sequence number of the ICMP message.
199005
199010
199011
Recommended Action Contact the Cisco TAC and attach a log file.
199012
Recommended Action Contact the Cisco TAC and attach a log file.
199013
199014
199015
199016
199017
199018
199019
199020
Error Message %ASA-2-199020: System memory utilization has reached X%. System will
reload if memory usage reaches the configured trigger level of Y%.
Explanation The system memory utilization has reached 80% of the system memory watchdog
facility's configured value.
Recommended Action Reduce system memory utilization by reducing traffic load, removing traffic
inspections, reducing the number of ACL entries, and so on. If a memory leak is suspected, contact
Cisco TAC.
199021
Error Message %ASA-1-199021: System memory utilization has reached the configured
watchdog trigger level of Y%. System will now reload
Explanation .The system memory utilization has reached 100% of the system memory watchdog
facility's configured value. The system will automatically reload.
Recommended Action Reduce system memory utilization by reducing traffic load, removing traffic
inspections, reducing the number of ACL entries, and so on. If a memory leak is suspected, contact
Cisco TAC.
201002
Explanation The maximum number of TCP connections to the specified global address was
exceeded.
• econns—The maximum number of embryonic connections
• nconns—The maximum number of connections permitted for the static or xlate global address
Recommended Action Use the show static or show nat command to check the limit imposed on
connections to a static address. The limit is configurable.
201003
Explanation The number of embryonic connections from the specified foreign address with the
specified static global address to the specified local address exceeds the embryonic limit. When the
limit on embryonic connections to the ASA is reached, the ASA attempts to accept them anyway,
but puts a time limit on the connections. This situation allows some connections to succeed even if
the ASA is very busy. This message indicates a more serious overload than message 201002, which
can be caused by a SYN attack, or by a very heavy load of legitimate traffic.
• nconns—The maximum number of embryonic connections received
Recommended Action Use the show static command to check the limit imposed on embryonic
connections to a static address.
201004
Explanation The maximum number of UDP connections to the specified global address was
exceeded.
• udp conn limit—The maximum number of UDP connections permitted for the static address or
translation
Recommended Action Use the show static or show nat command to check the limit imposed on
connections to a static address. You can configure the limit.
201005
Error Message %ASA-3-201005: FTP data connection failed for IP_address IP_address
Explanation The ASA cannot allocate a structure to track the data connection for FTP because of
insufficient memory.
Recommended Action Reduce the amount of memory usage or purchase additional memory.
201006
Explanation The ASA cannot preallocate connections for inbound standard output for rsh commands
because of insufficient memory.
Recommended Action Check the rsh client version; the ASA only supports the Berkeley rsh client
version. You can also reduce the amount of memory usage, or purchase additional memory.
201008
Explanation You have enabled TCP system log messaging and the syslog server cannot be reached,
or when using the ASA syslog server (PFSS) and the disk on the Windows NT system is full, or when
the auto-update timeout is configured and the auto-update server is not reachable.
Recommended Action Disable TCP syslog messaging. If using PFSS, free up space on the Windows
NT system where PFSS resides. Also, make sure that the syslog server is up and you can ping the
host from the ASA console. Then restart TCP system message logging to allow traffic. If the Auto
Update Server has not been contacted for a certain period of time, enter the [no] auto-update
timeout period command to have it stop sending packets.
201009
Error Message %ASA-3-201009: TCP connection limit of number for host IP_address on
interface_name exceeded
Explanation The maximum number of connections to the specified static address was exceeded.
• number—The maximum of connections permitted for the host
• IP_address—The host IP address
• interface_name—The name of the interface to which the host is connected
Recommended Action Use the show static and show nat commands to check the limit imposed on
connections to an address. The limit is configurable.
201010
• dest_address/dest_port—The destination real IP address and the destination port of the packet
initiating the connection
• interface_name—The name of the interface on which the policy limit is enforced
201011
Error Message %ASA-3-201011: Connection limit exceeded cnt/limit for dir packet from
sip/sport to dip/dport on interface if_name.
Explanation A new connection through the ASA resulted in exceeding at least one of the configured
maximum connection limits. This message applies both to connection limits configured using a
static command, or to those configured using Cisco Modular Policy Framework. The new
connection will not be allowed through the ASA until one of the existing connections is torn down,
which brings the current connection count below the configured maximum.
• cnt—Current connection count
• limit—Configured connection limit
• dir—Direction of traffic, inbound or outbound
• sip—Source real IP address
• sport—Source port
• dip—Destination real IP address
• dport—Destination port
• if_name—Name of the interface on which the traffic was received
201012
Explanation An attempt to establish a TCP connection failed because the per-client embryonic
connection limit was exceeded. By default, this message is rate limited to 1 message every 10
seconds.
• curr num—The current number
• limit—The configured limit
• [input|output]—Input or output packet on interface interface_name
• IP_address—Real IP address
• port—TCP or UDP port
Recommended Action When the limit is reached, any new connection request will be proxied by the
ASA to prevent a SYN flood attack. The ASA will only connect to the server if the client is able to
finish the three-way handshake. This usually does not affect the end user or the application.
However, if this creates a problem for any application that has a legitimate need for a higher number
of embryonic connections, you can adjust the setting by entering the set connection
per-client-embryonic-max command.
201013
Error Message %ASA-3-201013: Per-client connection limit exceeded curr num/limit for
[input|output] packet from ip/port to ip/port on interface interface_name
Explanation A connection was rejected because the per-client connection limit was exceeded.
• curr num—The current number
• limit—The configured limit
• [input|output]—The input or output packet on interface interface_name
• ip—The real IP address
• port—The TCP or UDP port
• interface_name—The name of the interface on which the policy is applied
Recommended Action When the limit is reached, any new connection request will be silently dropped.
Normally an application will retry the connection, which will cause a delay or even a timeout if all
retries also fail. If an application has a legitimate need for a higher number of concurrent
connections, you can adjust the setting by entering the set connection per-client-max command.
202001
Recommended Action Check the size of the global pool compared to the number of inside network
clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of translates and
connections. This error message can also be caused by insufficient memory; reduce the amount of
memory usage, or purchase additional memory, if possible.
202005
202010
Error Message %ASA-3-202010: [NAT | PAT] pool exhausted for pool-name, port range
[1-511 | 512-1023 | 1024-65535]. Unable to create protocol connection from
in-interface:src-ip/src-port to out-interface:dst-ip/dst-port
• pool-name—The name of the NAT or PAT pool
• protocol—The protocol used to create the connection
• in-interface—The ingress interface
• src-ip—The source IP address
• src-port—The source port
• out-interface—The egress interface
• dest-ip—The destination IP address
• dst-port—The destination port
Recommended Action Use the show nat pool and show nat detail commands to determine why all
addresses and ports in the pool are used up. If this occurs under normal conditions, then add
additional IP addresses to the NAT/PAT pool.
202011
Error Message %ASA-3-202011: Connection limit exceeded econns/limit for dir packet
from source_address/source_port to dest_address/dest_port on interface
interface_name
• source_address/source_port—The source IP address and the source port of the packet initiating
the connection
• dest_address/dest_port—The destination IP address and the destination port of the packet
initiating the connection
• interface_name—The name of the interface on which the policy limit is enforced
208005
Explanation The ASA received a nonzero value (an internal error) when attempting to clear the
configuration in flash memory. The message includes the reporting subroutine filename and line
number.
Recommended Action For performance reasons, the end host should be configured not to inject IP
fragments. This configuration change is probably because of NFS. Set the read and write size equal
to the interface MTU for NFS.
209003
Explanation Too many IP fragments are currently awaiting reassembly. By default, the maximum
number of fragments is 200 (to raise the maximum, see the fragment size command in the command
reference). The ASA limits the number of IP fragments that can be concurrently reassembled. This
restriction prevents memory depletion at the ASA under abnormal network conditions. In general,
fragmented traffic should be a small percentage of the total traffic mix. An exception is in a network
environment with NFS over UDP where a large percentage is fragmented traffic; if this type of traffic
is relayed through the ASA, consider using NFS over TCP instead. To prevent fragmentation, see
the sysopt connection tcpmss bytes command in the command reference.
Recommended Action If this message persists, a denial of service (DoS) attack might be in progress.
Contact the remote peer administrator or upstream provider.
209004
Explanation An IP fragment is malformed. The total size of the reassembled IP packet exceeds the
maximum possible size of 65,535 bytes.
Recommended Action A possible intrusion event may be in progress. If this message persists, contact
the remote peer administrator or upstream provider.
209005
Error Message %ASA-4-209005: Discard IP fragment set with more than number elements:
src = Too many elements are in a fragment set.
Explanation The ASA disallows any IP packet that is fragmented into more than 24 fragments. For
more information, see the fragment command in the command reference.
Recommended Action A possible intrusion event may be in progress. If the message persists, contact
the remote peer administrator or upstream provider. You can change the number of fragments per
packet by using the fragment chain xxx interface_name command.
210001
Recommended Action If this error persists after traffic lessens through the ASA, report this error to
the Cisco TAC.
210002
Explanation Stateful Failover cannot allocate a block of memory to transmit stateful information to
the standby ASA.
Recommended Action Check the failover interface using the show interface command to make sure
its transmit is normal. Also check the current block memory using the show block command. If
current available count is 0 within any of the blocks of memory, then reload the ASA software to
recover the lost blocks of memory.
210003
Explanation Stateful Failover received an unsupported Logical Update object and was unable to
process it. This can be caused by corrupted memory, LAN transmissions, and other events.
Recommended Action If you see this error infrequently, then no action is required. If this error occurs
frequently, check the Stateful Failover link LAN connection. If the error was not caused by a faulty
failover link LAN connection, determine if an external user is trying to compromise the protected
network. Also check for misconfigured clients.
210005
Explanation Stateful Failover cannot allocate a new connection on the standby unit. This may be
caused by little or no RAM memory available within the ASA.
Recommended Action Check the available memory using the show memory command to make sure
that the ASA has free memory. If there is no available memory, add more physical memory to the
ASA.
210006
Explanation Stateful Failover was unable to locate a NAT group for the IP address on the standby
unit. The active and standby ASAs may be out-of-sync with each other.
Recommended Action Use the write standby command on the active unit to synchronize system
memory with the standby unit.
210007
Recommended Action Check the available memory by using the show memory command to make
sure that the ASA has free memory available. If no memory is available, add more memory.
210008
Explanation The ASA cannot find a translation slot record for a Stateful Failover connection; as a
result, the ASA cannot process the connection information.
Recommended Action Use the write standby command on the active unit to synchronize system
memory between the active and standby units.
210010
Explanation Stateful Failover was unable to allocate a new record for a UDP connection.
Recommended Action Check the available memory by using the show memory command to make
sure that the ASA has free memory available. If no memory is available, add more memory.
210011
Error Message %ASA-3-210011: Connection limit exceeded cnt/limit for dir packet from
sip/sport to dip/dport on interface if_name.
Explanation Establishing a new connection through the ASA has resulted in exceeding at least one
of the configured maximum connection limits. The message applies both for connection limits
configured using a static command, or to those configured using Cisco Modular Policy Framework.
The new connection will not be allowed through the ASA until one of the existing connections is
torn down, which brings the current connection count below the configured maximum. Because
connection limits are configured for a good reason, this message may indicate a possible DOS
attack, in which case the source of the traffic may be a spoofed IP address.
• cnt—Current connection count
• limit—Configured connection limit
• dir—Direction of traffic, inbound or outbound
• sip—Source IP address
• sport—Source port
• dip—Destination IP address
• dport—Destination port
• if_name—Name of the interface on which the traffic unit was received, either Primary or
Secondary
Recommended Action If the source IP address is not totally random, identifying the source and
blocking it using an access list might help. In other cases, getting sniffer traces and analyzing the
source of the traffic helps to isolate unwanted traffic from legitimate traffic.
210020
Explanation Stateful Failover is unable to allocate a specific PAT address that is in use.
Recommended Action Use the write standby command on the active unit to synchronize system
memory between the active and standby units.
210021
Recommended Action Enter the write standby command on the active unit to synchronize system
memory between the active and standby units.
210022
Explanation Stateful Failover assigns a sequence number for each record sent to the standby unit.
When a received record sequence number is out of sequence with the last updated record, the
information in between is assumed to be lost, and this error message is sent as a result.
Recommended Action Unless LAN interruptions occur, check the available memory on both ASA
units to ensure that enough memory is available to process the stateful information. Use the show
failover command to monitor the quality of stateful information updates.
211001
Recommended Action If this message occurs periodically, it can be ignored. If it repeats frequently,
contact the Cisco TAC.
211003
Recommended Action If this message occurs periodically, it can be ignored. If it repeats frequently,
contact the Cisco TAC.
211004
Error Message %ASA-1-211004: WARNING: Minimum Memory Requirement for ASA version ver
not met for ASA image. min MB required, actual MB found.
Explanation The ASA does not meet the minimum memory requirements for this version. A memory
upgrade is required. If a memory upgrade is not immediately available, then downgrade the ASA to
Version 8.2(1) or lower. Continuing to run an 8.3 image without meeting the minimum memory
requirements is not supported and may result in critical system failures.
• ver—Running image version number
• min—Minimum required amount of RAM to run the installed image. The available memory
upgrade PID numbers are as follows:
ASA5505-MEM-512=
ASA5510-MEM-1GB=
ASA5520-MEM-2GB=
ASA5540-MEM-2GB=
• actual—Amount of RAM currently installed in the system
Recommended Action Install the required amount of RAM. Use the memory upgrade PID numbers to
order the required amount of RAM.
212001
Error Message %ASA-3-212001: Unable to open SNMP channel (UDP port port) on interface
interface_number, error code = code
Explanation The ASA is unable to receive SNMP requests destined for the ASA from SNMP
management stations located on this interface. The SNMP traffic passing through the ASA on any
interface is not affected. The error codes are as follows:
• An error code of -1 indicates that the ASA cannot open the SNMP transport for the interface.
This can occur when the user attempts to change the port on which SNMP accepts queries to
one that is already in use by another feature. In this case, the port used by SNMP will be reset
to the default port for incoming SNMP queries (UDP 161).
• An error code of -2 indicates that the ASA cannot bind the SNMP transport for the interface.
Recommended Action After the ASA reclaims some of its resources when traffic is lighter, reenter the
snmp-server host command for that interface.
212002
Error Message %ASA-3-212002: Unable to open SNMP trap channel (UDP port port) on
interface interface_number, error code = code
Explanation The ASA is unable to send its SNMP traps from the ASA to SNMP management stations
located on this interface. The SNMP traffic passing through the ASA on any interface is not affected.
The error codes are as follows:
• An error code of -1 indicates that the ASA cannot open the SNMP trap transport for the
interface.
• An error code of -2 indicates that the ASA cannot bind the SNMP trap transport for the
interface.
• An error code of -3 indicates that the ASA cannot set the trap channel as write-only.
Recommended Action After the ASA reclaims some of its resources when traffic is lighter, reenter the
snmp-server host command for that interface.
212003
Explanation An internal error occurred in receiving an SNMP request destined for the ASA on the
specified interface. The error codes are as follows:
• An error code of -1 indicates that the ASA cannot find a supported transport type for the
interface.
• An error code of -5 indicates that the ASA received no data from the UDP channel for the
interface.
• An error code of -7 indicates that the ASA received an incoming request that exceeded the
supported buffer size.
• An error code of -14 indicates that the ASA cannot determine the source IP address from the
UDP channel.
• An error code of -22 indicates that the ASA received an invalid parameter.
Recommended Action None required. The ASA SNMP agent goes back to wait for the next SNMP
request.
212004
Explanation An internal error occurred in sending an SNMP response from the ASA to the specified
host on the specified interface. The error codes are as follows:
• An error code of -1 indicates that the ASA cannot find a supported transport type for the
interface.
• An error code of -2 indicates that the ASA sent an invalid parameter.
• An error code of -3 indicates that the ASA was unable to set the destination IP address in the
UDP channel.
• An error code of -4 indicates that the ASA sent a PDU length that exceeded the supported UDP
segment size.
• An error code of -5 indicates that the ASA was unable to allocate a system block to construct
the PDU.
212005
Explanation The length of the incoming SNMP request that is destined for the ASA exceeds the size
of the internal data buffer (512 bytes) used for storing the request during internal processing. The
ASA is unable to process this request. The SNMP traffic passing through the ASA on any interface
is not affected.
Recommended Action Have the SNMP management station resend the request with a shorter length.
For example, instead of querying multiple MIB variables in one request, try querying only one MIB
variable in a request. You may need to modify the configuration of the SNMP manager software.
212006
Explanation The ASA cannot process the SNMP request being sent to it for the following reasons:
• user not found—The username cannot be located in the local SNMP user database.
• username exceeds maximum length—The username embedded in the PDU exceeds the
maximum length allowed by the SNMP RFCs.
• authentication algorithm failure—An authentication failure caused by an invalid password or a
packet authenticated using the incorrect algorithm.
• privacy algorithm failure—A privacy failure caused by an invalid password or a packet
encrypted using the incorrect algorithm.
• error decrypting request—An error occurred in the platform crypto module decrypting the user
request.
• error encrypting response—An error occurred in the platform crypto module encrypting the user
response or trap notification.
• engineBoots has reached maximum value—The engineBoots variable has reached the
maximum allowed value. For more information, see message 212011.
Recommended Action Check the ASA SNMP server settings and confirm that the NMS configuration
is using the expected user, authentication, and encryption settings. Enter the show crypto
accelerator statistics command to isolate errors in the platform crypto module.
212009
Error Message %ASA-5-212009: Configuration request for SNMP group groupname failed.
User username, reason.
Explanation A user has tried to change the SNMP server group configuration. One or more users that
refer to the group have insufficient settings to comply with the requested group changes.
• groupname—A string that represents the group name
• username—A string that represents the username
• reason—A string that represents one of the following reasons:
- missing auth-password—A user has tried to add authentication to the group, and the user has
not specified an authentication password
- missing priv-password—A user has tried to add privacy to the group, and the user has not
specified an encryption password
- reference group intended for removal—A user has tried to remove a group that has users
belonging to it
Recommended Action The user must update the indicated user configurations before changing the
group or removing indicated users, and then add them again after making changes to the group.
212010
Error Message %ASA-3-212010: Configuration request for SNMP user %s failed. Host %s
reason.
Explanation A user has tried to change the SNMP server user configuration by removing one or more
hosts that reference the user. One message is generated per host.
• %s—A string that represents the username or hostname
• reason—A string the represents the following reason:
- references user intended for removal—The name of the user to be removed from the host.
Recommended Action The user must either update the indicated host configuration before changing a
user or remove the indicated hosts, then add them again after making changes to the user.
212011
Explanation The device has rebooted 214783647 times, which is the maximum allowed value of the
engineBoots variable, or an error reading the persistent value from flash memory has occurred. The
engineBoots value is stored in flash memory in the flash:/snmp/ctx-name file, where ctx-name is the
name of the context. In single mode, the name of this file is flash:/snmp/single_vf. In multi-mode,
the name of the file for the admin context is flash:/snmp/admin. During a reboot, if the device is
unable to read from the file or write to the file, the engineBoots value is set to the maximum.
• %s—A string that represents the reason that the engineBoots value is set to the maximum
allowed value. The two valid strings are “device reboots” and “error accessing persistent data.”
Recommended Action For the first string, the administrator must delete all SNMP Version 3 users and
add them again to reset the engineBoots variable to 1. All subsequent Version 3 queries will fail until
all users have been removed. For the second string, the administrator must delete the
context-specific file, then delete all SNMP Version users, and add them again to reset the
engineBoots variable to 1. All subsequent Version 3 queries will fail until all users have been
removed.
212012
Error Message %ASA-3-212012: Unable to write SNMP engine data to persistent storage.
Explanation The SNMP engine data is written to the file, flash:/snmp/context-name. For example: in
single mode, the data is written to the file, flash:/snmp/single_vf. In the admin context in
multi-mode, the file is written to the directory, flash:/snmp/admin. The error may be caused by a
failure to create the flash:/snmp directory or the flash:/snmp/context-name file. The error may also
be caused by a failure to write to the file.
Recommended Action The system administrator should remove the flash:/snmp/context-name file,
then remove all SNMP Version 3 users, and add them again. This procedure should recreate the
flash:/snmp/context-name file. If the problem persists, the system administrator should try
reformatting the flash.
213001
Error Message %ASA-3-213001: PPTP control daemon socket io string, errno = number.
213002
Error Message %ASA-3-213002: PPTP tunnel hashtable insert failed, peer = IP_address.
Explanation An internal software error occurred while creating a new PPTP tunnel.
213003
Explanation An internal software error occurred while closing a PPP virtual interface.
213004
Explanation An internal software error occurred while allocating an IP address to the PPTP client
when the IP local address pool was depleted.
Recommended Action Consider allocating a larger pool with the ip local pool command.
213005
Explanation The DAP is dynamically created by selecting configured access policies based on the
authorization rights of the user and the posture assessment results of the remote endpoint device.
The resulting dynamic policy indicates that the session should be terminated.
213006
Explanation There was either an error in retrieving the DAP policy record data, or the action
configuration was missing.
Recommended Action A configuration change might have resulted in deleting a DAP record. Use
ASDM to recreate the DAP record.
214001
Explanation An incoming encrypted data packet destined for the ASA management port indicates a
packet length exceeding the specified upper limit. This may be a hostile event. The ASA
immediately terminates this management connection.
Recommended Action Ensure that the management connection was initiated by Cisco Secure Policy
Manager.
215001
217001
Recommended Action If sufficient memory exists, then send the error message, the configuration, and
any details about the events leading up to the error to the Cisco TAC.
216001
Explanation Various internal errors have occurred that should not appear during normal operation.
The severity level varies depending on the cause of the message.
• n—The message severity
• function—The affected component
• message—A message describing the cause of the problem
Recommended Action Search the Bug Toolkit for the specific text message and try to use the Output
Interpreter to resolve the problem. If the problem persists, contact the Cisco TAC.
216002
Explanation A task registers for event notification, but the task cannot handle the specific event.
Events that can be watched include those associated with queues, booleans, and timer services. If
any of the registered events occur, the scheduler wakes up the task to process the event. This message
is generated if an unexpected event woke up the task, but it does not know how to handle the event.
If an event is left unprocessed, it can wake up the task very often to make sure that it is processed,
but this should not occur under normal conditions. If this message appears, it does not necessarily
mean the device is unusable, but something unusual has occurred and needs to be investigated.
• major_id—Event identifier
216003
Explanation An unexpected timer event woke up the task, but the task does not know how to handle
the event. A task can register a set of timer services with the scheduler. If any of the timers expire,
the scheduler wakes up the task to take action. This message is generated if the task is awakened by
an unrecognized timer event.
An expired timer, if left unprocessed, wakes up the task continuously to make sure that it is
processed, and this is undesirable. This should not occur under normal conditions. If this message
appears, it does not necessarily mean the device is unusable, but something unusual has occurred
and needs to be investigated.
• timer_ptr—Pointer to the timer
• timer_id—Timer identifier
• task_string—Custom string passed by the task to identify itself
• function—The function that received the unexpected event
• line_num—Line number in the code
216004
Explanation An internal logic error has occurred, which should not occur during normal operation.
• error—Internal logic error. Possible errors include the following:
- Exception
- Dereferencing null pointer
- Array index out of bounds
- Invalid buffer size
- Writing from input
- Source and destination overlap
- Invalid date
216005
Explanation A duplex mismatch on the port caused a problem in which the port can no longer
transmit packets. This condition was detected, and the switch was reset to autorecover. This message
applies only to the ASA 5505.
• interface_name—The interface name that was locked up
Recommended Action A duplex mismatch exists between the specified port and the ASA 5505 that is
connected to it. Correct the duplex mismatch by either setting both devices to autorecover, or hard
coding the duplex mismatch for both devices to be the same.
218001
Explanation The module in slot# of the ASA cannot be identified as a genuine Cisco product. Cisco
warranties and support programs apply only to genuine Cisco products. If Cisco determines that the
cause of a support issue is related to non-Cisco memory, SSM modules, SSC modules, or other
modules, Cisco may deny support under your warranty or under a Cisco support program such as
SmartNet.
Recommended Action If this message recurs, copy it exactly as it appears on the console or in the
system log. Research and try to resolve the error using the Output Interpreter. Also perform a search
with the Bug Toolkit. If the problem persists, contact the Cisco TAC.
218002
Error Message %ASA-2-218002: Module (slot#) is a registered proto-type for Cisco Lab
use only, and not certified for live network operation.
Explanation The hardware in the specified location is a prototype module that came from a Cisco lab.
Recommended Action If this message reoccurs, copy it exactly as it appears on the console or in the
system log. Research and try to resolve the error using the Output Interpreter. Also perform a search
with the Bug Toolkit. If the problem persists, contact the Cisco TAC.
218003
Error Message %ASA-2-218003: Module Version in slot# is obsolete. The module in slot
= slot# is obsolete and must be returned via RMA to Cisco Manufacturing. If it is
a lab unit, it must be returned to Proto Services for upgrade.
Explanation Obsolete hardware has been detected or the show module command has been run for
the module. This message is generated once per minute after it first appears.
Recommended Action If this message recurs, copy it exactly as it appears on the console or in the
system log. Research and try to resolve the error using the Output Interpreter. Also perform a search
with the Bug Toolkit. If the problem persists, contact the Cisco TAC.
218004
Recommended Action If this message recurs, copy it exactly as it appears on the console or in the
system log. Research and try to resolve the error using the Output Interpreter. Also perform a search
with the Bug Toolkit. If the problem persists, contact the Cisco TAC.
219002
Explanation The I2C serial bus API has failed because of a hardware or software problem.
• I2C_API_name—The I2C API that failed, which can be one of the following:
– I2C_read_byte_w_wait()
– I2C_read_word_w_wait()
– I2C_read_block_w_wait()
– I2C_write_byte_w_wait()
– I2C_write_word_w_wait()
– I2C_write_block_w_wait()
– I2C_read_byte_w_suspend()
– I2C_read_word_w_suspend()
– I2C_read_block_w_suspend()
– I2C_write_byte_w_suspend()
– I2C_write_word_w_suspend()
– I2C_write_block_w_suspend()
• slot_number—The hexadecimal number of the slot where the I/O operation that generated the
message occurred. The slot number cannot be unique to a slot in the chassis. Depending on the
chassis, two different slots might have the same I2C slot number. Also, the value is not
necessarily less than or equal to the number of slots. The value depends on the way the I2C
hardware is wired.
• device_number—The hexadecimal number of the device on the slot for which the I/O operation
was performed
• address—The hexadecimal address of the device on which the I/O operation occurred
• byte_count—The byte count in decimal format of the I/O operation
• error_string—The reason for the error, which can be one of the following:
– I2C_BUS_TRANSACTION_ERROR
– I2C_CHKSUM_ERROR
– I2C_TIMEOUT_ERROR
– I2C_BUS_COLLISION_ERROR
– I2C_HOST_BUSY_ERROR
– I2C_UNPOPULATED_ERROR
– I2C_SMBUS_UNSUPPORT
– I2C_BYTE_COUNT_ERROR
– I2C_DATA_PTR_ERROR
302003
Explanation An H.245 connection has been started from the outside_address to the inside_address.
The ASA has detected the use of an Intel Internet Phone. The foreign port (outside_port) only
appears on connections from outside the ASA. The local port value (inside_port) only appears on
connections that were started on an internal interface.
302004
Explanation An H.323 UDP back connection has been preallocated to the foreign address
(outside_address) from the local address (inside_address). The ASA has detected the use of an Intel
Internet Phone. The foreign port (outside_port) only appears on connections from outside the ASA.
The local port value (inside_port) only appears on connections that were started on an internal
interface.
302010
302012
Error Message %ASA-6-302012: Pre-allocate H225 Call Signalling Connection for faddr
IP_address/port to laddr IP_address
302013
302014
Explanation A TCP connection between two hosts was deleted. The following list describes the
message values:
• id —A unique identifier
• interface, real-address, real-port—The actual socket
• duration—The lifetime of the connection
• bytes—The data transfer of the connection
• user—The AAA name of the user
• idfw_user—The name of the identity firewall user
• reason—The action that causes the connection to terminate. Set the reason variable to one of
the TCP termination reasons listed in Table 1-3.
Table 1-3 TCP Termination Reasons
Reason Description
Conn-timeout The connection ended when a flow is closed because of the expiration of its
inactivity timer.
Deny Terminate Flow was terminated by application inspection.
Failover primary The standby unit in a failover pair deleted a connection because of a message
closed received from the active unit.
FIN Timeout Force termination after 10 minutes awaiting the last ACK or after half-closed
timeout.
Flow closed by Flow was terminated by the inspection feature.
inspection
Flow terminated by Flow was terminated by IPS.
IPS
Flow reset by IPS Flow was reset by IPS.
Flow terminated by Flow was terminated by TCP Intercept.
TCP Intercept
Flow timed out Flow has timed out.
Flow timed out with Flow has timed out, but was reset.
reset
Flow is a loopback Flow is a loopback.
Free the flow created The connection was built because the packet tracer feature sent a simulated
as result of packet packet through the ASA.
injection
Invalid SYN The SYN packet was not valid.
Idle Timeout The connection timed out because it was idle longer than the timeout value.
IPS fail-close Flow was terminated because the IPS card is down.
No valid adjacency This counter is incremented when the ASA tried to obtain an adjacency and
could not obtain the MAC address for the next hop. The packet is dropped.
Pinhole Timeout The counter is incremented to report that the ASA opened a secondary flow, but
no packets passed through this flow within the timeout interval, and so it was
removed. An example of a secondary flow is the FTP data channel that is
created after successful negotiation on the FTP control channel.
Route change When the ASA adds a lower cost (better metric) route, packets arriving that
match the new route cause their existing connection to be torn down after the
user-configured timeout (floating-conn) value. Subsequent packets rebuild the
connection out of the interface with the better metric. To prevent the addition
of lower cost routes from affecting active flows, you can set the floating-conn
configuration timeout value to 0:0:0.
SYN Control A back channel initiation occurred from the wrong side.
SYN Timeout Force termination after 30 seconds, awaiting three-way handshake completion.
TCP bad The connection was terminated because of a bad TCP retransmission.
retransmission
Reason Description
TCP FINs A normal close-down sequence occurred. The IP address follows the reason.
TCP Invalid SYN Invalid TCP SYN packet.
TCP Reset - The flow is closed when a TCP reset is generated by the ASA.
APPLIANCE
TCP Reset - I Reset was from the inside.
TCP Reset - O Reset was from the outside.
TCP segment partial A partially overlapping segment was detected.
overlap
TCP unexpected A connection was terminated due to variation in the TCP window size.
window size variation
Tunnel has been torn Flow was terminated because the tunnel is down.
down
Unauth Deny An authorization was denied by a URL filter.
Unknown An unknown error has occurred.
Xlate Clear A command line was removed.
302015
Explanation A UDP connection slot between two hosts was created. The following list describes the
message values:
• number—A unique identifier
• interface, real_address, real_port—The actual sockets
• mapped_address and mapped_port—The mapped sockets
• user—The AAA name of the user
• idfw_user—The name of the identity firewall user
If inbound is specified, then the original control connection is initiated from the outside. For
example, for UDP, all data transfer channels are inbound if the original control channel is inbound.
If outbound is specified, then the original control connection is initiated from the inside.
302016
Explanation A UDP connection slot between two hosts was deleted. The following list describes the
message values:
• number—A unique identifier
• interface, real_address, real_port—The actual sockets
• time—The lifetime of the connection
• bytes—The data transfer of the connection
• id—A unique identifier
• interface, real-address, real-port—The actual sockets
• duration—The lifetime of the connection
• bytes—The data transfer of the connection
• user—The AAA name of the user
• idfw_user—The name of the identity firewall user
302017
Explanation A GRE connection slot between two hosts was created. The id is an unique identifier.
The interface, real_address, real_cid tuple identifies the one of the two simplex PPTP GRE streams.
The parenthetical translated_address, translated_cid tuple identifies the translated value with NAT.
If inbound is indicated, then the connection can only be used inbound. If outbound is indicated, then
the connection can only be used for outbound. The following list describes the message values:
• id—Unique number identifying the connection
• inbound—Control connection is for inbound PPTP GRE flow
• outbound—Control connection is for outbound PPTP GRE flow
• interface_name—The interface name
• real_address—IP address of the actual host
• real_cid—Untranslated call ID for the connection
• translated_address—IP address after translation
• translated_cid—Translated call
• user—AAA user name
• idfw_user—The name of the identity firewall user
302018
Explanation A GRE connection slot between two hosts was deleted. The interface, real_address,
real_port tuples identify the actual sockets. Duration identifies the lifetime of the connection. The
following list describes the message values:
• id—Unique number identifying the connection
• interface—The interface name
• real_address—IP address of the actual host
• real_port—Port number of the actual host.
• hh:mm:ss—Time in hour:minute:second format
• bytes—Number of PPP bytes transferred in the GRE session
• reason—Reason why the connection was terminated
• user—AAA user name
• idfw_user—The name of the identity firewall user
302019
Explanation The specified ASN library that the ASA uses for decoding the H.323 messages failed to
initialize; the ASA cannot decode or inspect the arriving H.323 packet. The ASA allows the H.323
packet to pass through without any modification. When the next H.323 message arrives, the ASA
tries to initialize the library again.
Recommended Action If this message is generated consistently for a particular library, contact the
Cisco TAC and provide them with all log messages (preferably with timestamps).
302020
Error Message %ASA-6-302020: Built {in | out}bound ICMP connection for faddr {faddr
| icmp_seq_num} [(idfw_user)] gaddr {gaddr | cmp_type} laddr laddr [(idfw_user)]
Explanation An ICMP session was established in the fast-path when stateful ICMP was enabled
using the inspect icmp command.
302021
Explanation An ICMP session is removed in the fast-path when stateful ICMP is enabled using the
inspect icmp command.
302033
Explanation A GUP connection was started from the foreign address to the local address. The foreign
port (outside port) only appears on connections from outside the security device. The local port
value (inside port) only appears on connections started on an internal interface.
• interface—The interface name
• foreign-address—IP address of the foreign host
• foreign-port—Port number of the foreign host
• local-address—IP address of the local host
• local-port—Port number of the local host
302034
Error Message %ASA-4-302034: Unable to pre-allocate H323 GUP Connection for faddr
interface:foreign address/foreign-port to laddr
interface:local-address/local-port
Explanation The module failed to allocate RAM system memory while starting a connection or has
no more address translation slots available.
• interface—The interface name
• foreign-address—IP address of the foreign host
• foreign-port—Port number of the foreign host
• local-address—IP address of the local host
• local-port—Port number of the local host
Recommended Action If this message occurs periodically, it can be ignored. If it repeats frequently,
contact the Cisco TAC. You can check the size of the global pool compared to the number of inside
network clients. Alternatively, shorten the timeout interval of translations and connections. This
message may also be caused by insufficient memory; try reducing the amount of memory usage, or
purchasing additional memory.
302302
Explanation IPsec proxy mismatches have occurred. Proxy hosts for the negotiated SA correspond
to a deny access-list command policy.
Recommended Action Check the access-list command statement in the configuration. Contact the
administrator for the peer.
302303
Explanation A new TCP connection has been created, and this connection is a TCP-state-bypass
connection. This type of connection bypasses all the TCP state checks and additional security checks
and inspections.
Recommended Action If you need to secure TCP traffic with all the normal TCP state checks as well
as all other security checks and inspections, you can use the no set connection advanced-options
tcp-state-bypass command to disable this feature for TCP traffic.
302304
Explanation A new TCP connection has been torn down, and this connection is a TCP-state-bypass
connection. This type of connection bypasses all the TCP state checks and additional security checks
and inspections.
• duration—The duration of the TCP connection
• bytes—The total number of bytes transmitted over the TCP connection
• teardown reason—The reason for the teardown of the TCP connection
Recommended Action If you need to secure TCP traffic with all the normal TCP state checks as well
as all other security checks and inspections, you can use the no set connection advanced-options
tcp-state-bypass command to disable this feature for TCP traffic.
303002
Explanation A client has uploaded or downloaded a file from the FTP server.
• src_ifc—The interface where the client resides.
• src_ip—The IP address of the client.
• src_port—The client port.
• dst_ifc—The interface where the server resides.
• dst_ip—The IP address of the FTP server.
• dst_port—The server port.
• username—The FTP username.
• action—The stored or retrieved actions.
• filename—The file stored or retrieved.
303004
Explanation Strict FTP inspection on FTP traffic has been used, and an FTP request message
contains a command that is not recognized by the device.
303005
Explanation When FTP inspection matches any of the following configured values: filename, file
type, request command, server, or username, then the action specified by the action_string in this
message occurs.
• match_string—The match clause in the policy map
• policy-name—The policy map that matched
• action_string—The action to take; for example, Reset Connection
• src_ifc—The source interface name
• sip—The source IP address
• sport—The source port
• dest_ifc—The destination interface name
• dip—The destination IP address
• dport—The destination port
304001
304002
Error Message %ASA-5-304002: Access denied URL chars SRC IP_address [(idfw_user)]
DEST IP_address: chars
Explanation Access from the source address to the specified URL or FTP site was denied.
304003
Error Message %ASA-3-304003: URL Server IP_address timed out URL url
304004
Error Message %ASA-6-304004: URL Server IP_address request failed URL url
304005
Error Message %ASA-7-304005: URL Server IP_address request pending URL url
304006
Explanation The Websense server is unavailable for access, and the ASA attempts to either try to
access the same server if it is the only server installed, or another server if there is more than one.
304007
Error Message %ASA-2-304007: URL Server IP_address not responding, ENTERING ALLOW
mode.
Explanation You used the allow option of the filter command, and the Websense servers are not
responding. The ASA allows all web requests to continue without filtering while the servers are not
available.
304008
Explanation You used the allow option of the filter command, and the ASA receives a response
message from a Websense server that previously was not responding. With this response message,
the ASA exits the allow mode, which enables the URL filtering feature again.
304009
Error Message %ASA-7-304009: Ran out of buffer blocks specified by url-block command
Recommended Action Change the buffer block size by entering the url-block block block_size
command.
305005
Explanation A packet does not match any of the outbound nat command rules. If NAT is not
configured for the specified source and destination systems, the message will be generated
frequently.
Recommended Action This message indicates a configuration error. If dynamic NAT is desired for the
source host, ensure that the nat command matches the source IP address. If static NAT is desired for
the source host, ensure that the local IP address of the static command matches. If no NAT is desired
for the source host, check the ACL bound to the NAT 0 ACL.
305006
Explanation A protocol (UDP, TCP, or ICMP) failed to create a translation through the ASA. The
ASA does not allow packets through that are destined for network or broadcast addresses. The ASA
provides this checking for addresses that are explicitly identified with static commands. For
inbound traffic, the ASA denies translations for an IP address identified as a network or broadcast
address.
The ASA does not apply PAT to all ICMP message types; it only applies PAT ICMP echo and
echo-reply packets (types 8 and 0). Specifically, only ICMP echo or echo-reply packets create a PAT
translation. As a result, when the other ICMP messages types are dropped, this message is generated.
The ASA uses the global IP address and mask from configured static commands to differentiate
regular IP addresses from network or broadcast IP addresses. If the global IP address is a valid
network address with a matching network mask, then the ASA does not create a translation for
network or broadcast IP addresses with inbound packets.
For example:
static (inside,outside) 10.2.2.128 10.1.1.128 netmask 255.255.255.128
The ASA responds to global address 10.2.2.128 as a network address and to 10.2.2.255 as the
broadcast address. Without an existing translation, the ASA denies inbound packets destined for
10.2.2.128 or 10.2.2.255, and logs this message.
When the suspected IP address is a host IP address, configure a separate static command with a host
mask in front of the subnet static command (the first match rule for static commands). The
following static commands cause the ASA to respond to 10.2.2.128 as a host address:
static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.255
static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.128
The translation may be created by traffic started from the inside host with the IP address in question.
Because the ASA views a network or broadcast IP address as a host IP address with an overlapped
subnet static configuration, the network address translation for both static commands must be the
same.
305007
Explanation The ASA has attempted to translate an address that it cannot find in any of its global
pools. The ASA assumes that the address was deleted and drops the request.
305008
Explanation The ASA kernel detected an inconsistency condition when trying to free an unallocated
global IP address back to the address pool. This abnormal condition may occur if the ASA is running
a Stateful Failover setup, and some of the internal states are momentarily out of sync between the
active unit and the standby unit. This condition is not catastrophic, and the synchronization recovers
automatically.
305009
Explanation An address translation slot was created. The slot translates the source address from the
local side to the global side. In reverse, the slot translates the destination address from the global
side to the local side.
305010
305011
Explanation A TCP, UDP, or ICMP address translation slot was created. The slot translates the
source socket from the local side to the global side. In reverse, the slot translates the destination
socket from the global side to the local side.
305012
305013
Error Message %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse
flows; Connection protocol src interface_name:source_address/source_port
[(idfw_user)] dst interface_name:dst_address/dst_port [(idfw_user)] denied due to
NAT reverse path failure.
Explanation An attempt to connect to a mapped host using its actual address was rejected.
Recommended Action When not on the same interface as the host using NAT, use the mapped address
instead of the actual address to connect to the host. In addition, enable the inspect command if the
application embeds the IP address.
308001
Error Message %ASA-6-308001: console enable password incorrect for number tries
(from IP_address)
Explanation This is a ASA management message. This message appears after the specified number
of times a user incorrectly types the password to enter privileged mode. The maximum is three
attempts.
308002
Explanation The IP addresses in one or more static command statements overlap. global_address is
the global address, which is the address on the lower security interface, and inside_address is the
local address, which is the address on the higher security-level interface.
Recommended Action Use the show static command to view the static command statements in your
configuration and fix the commands that overlap. The most common overlap occurs if you specify
a network address such as 10.1.1.0, and in another static command you specify a host within that
range, such as 10.1.1.5.
311001
Explanation Stateful Failover update information was sent to the standby ASA when the standby
ASA is first to be online.
311002
Explanation Stateful Failover update information stopped sending to the standby ASA.
311003
311004
312001
Explanation The ASA received a RIP message with an operation code other than reply, the message
has a version number different from what is expected on this interface, and the routing domain entry
was nonzero. Another RIP device may not be configured correctly to communicate with the ASA.
313001
Explanation When using the icmp command with an access list, if the first matched entry is a permit
entry, the ICMP packet continues processing. If the first matched entry is a deny entry, or an entry
is not matched, the ASA discards the ICMP packet and generates this message. The icmp command
enables or disables pinging to an interface. With pinging disabled, the ASA cannot be detected on
the network. This feature is also referred to as configurable proxy pinging.
313004
Explanation ICMP packets were dropped by the ASA because of security checks added by the
stateful ICMP feature that are usually either ICMP echo replies without a valid echo request already
passed across the ASA or ICMP error messages not related to any TCP, UDP, or ICMP session
already established in the ASA.
313005
Explanation ICMP error packets were dropped by the ASA because the ICMP error messages are not
related to any session already established in the ASA.
Recommended Action If the cause is an attack, you can deny the host by using ACLs.
313008
Explanation When using the icmp command with an access list, if the first matched entry is a permit
entry, the ICMPv6 packet continues processing. If the first matched entry is a deny entry, or an entry
is not matched, the ASA discards the ICMPv6 packet and generates this message.
The icmp command enables or disables pinging to an interface. When pinging is disabled, the ASA
is undetectable on the network. This feature is also referred to as “configurable proxy pinging.”
313009
Explanation An ICMP echo request/reply packet was received with a malformed code(non-zero).
Recommended Action If it is an intermittent event, no action is required. If the cause is an attack, you
can deny the host using the ACLs.
314001
Explanation The ASA opened a UDP media channel for the RTSP client that was receiving data from
the server.
• src_intf—Source interface name
• src_IP—Source interface IP address
• dst_intf—Destination interface name
• dst_IP—Destination IP address
• dst_port—Destination port
314002
Error Message %ASA-6-314002: RTSP failed to allocate UDP media connection from
src_intf:src_IP to dst_intf:dst_IP/dst_port: reason_string.
Explanation The ASA cannot open a new pinhole for the media channel.
• src_intf—Source interface name
• src_IP—Source interface IP address
• dst_intf—Destination interface name
• dst_IP—Destination IP address
• dst_port—Destination port
• reason_string—Pinhole already exists/Unknown
Recommended Action If the reason is unknown, check the free memory available by running the show
memory command, or the number of connections used by running the show conn command,
because the ASA is low on memory.
314003
Error Message %ASA-6-314003: Dropped RTSP traffic from src_intf:src_ip due to: reason.
Explanation The RTSP message violated the user-configured RTSP security policy, either because it
contains a port from the reserve port range, or it contains a URL with a length greater than the
maximum limit allowed.
• src_intf—Source interface name
• src_IP—Source interface IP address
• reason—The reasons may be one of the following:
- Endpoint negotiating media ports in the reserved port range from 0 to 1024
- URL length of url length bytes exceeds the maximum url length limit bytes
Recommended Action Investigate why the RTSP client sends messages that violate the security
policy. If the requested URL is legitimate, you can relax the policy by specifying a longer URL
length limit in the RTSP policy map.
314004
Error Message %ASA-6-314004: RTSP client src_intf:src_IP accessed RTSP URL RTSP URL
314005
314006
Explanation A specific RTSP request message exceeded the configured rate limit of RTSP policy.
• src_intf—Source interface name
• src_IP—Source interface IP address
• rate—Configured rate limit
Recommended Action Investigate why the specific RTSP request message from the client exceeded
the rate limit.
315004
Error Message %ASA-3-315004: Fail to establish SSH session because RSA host key
retrieval failed.
Explanation The ASA cannot find the RSA host key, which is required for establishing an SSH
session. The ASA host key may be absent because it was not generated or because the license for
this ASA does not allow DES or 3DES encryption.
Recommended Action From the ASA console, enter the show crypto key mypubkey rsa command
to verify that the RSA host key is present. If the host key is not present, enter the show version
command to verify that DES or 3DES is allowed. If an RSA host key is present, restart the SSH
session. To generate the RSA host key, enter the crypto key mypubkey rsa command.
315011
Explanation An SSH session has ended. If a user enters quit or exit, the terminated normally
message appears. If the session disconnected for another reason, the text describes the reason.
Table 1-4 lists the possible reasons why a session disconnected.
316001
Error Message %ASA-3-316001: Denied new tunnel to IP_address. VPN peer limit
(platform_vpn_peer_limit) exceeded
Explanation If more VPN tunnels (ISAKMP/IPsec) are concurrently trying to be established than are
supported by the platform VPN peer limit, then the excess tunnels are aborted.
316002
Explanation The ASA cannot create a VPN handle, because the VPN handle already exists.
• protocol—The protocol of the VPN flow
• in_if_num—The ingress interface number of the VPN flow
• src_addr—The source IP address of the VPN flow
Recommended Action This message may occur during normal operation; however, if the message
occurs repeatedly and a major malfunction of VPN-based applications occurs, a software defect may
be the cause. Enter the following commands to collect more information and contact the Cisco TAC
to investigate the issue further:
capture name type asp-drop vpn-handle-error
show asp table classify crypto detail
show asp table vpn-context
317001
Recommended Action Reduce other system activity to ease memory demands. If conditions warrant,
upgrade to a larger memory configuration.
317002
Error Message %ASA-3-317002: Bad path index of number for IP_address, number max
317003
Explanation An internal software error occurred, which prevented the creation of a new IP routing
table.
Recommended Action Copy the message exactly as it appears, and report it to Cisco TAC.
317004
Explanation The number of routes in the named IP routing table has reached the configured warning
limit.
Recommended Action Reduce the number of routes in the table, or reconfigure the limit.
317005
Recommended Action Reduce the number of routes in the table, or reconfigure the limit.
317006
Recommended Action If the problem persists, copy the error message exactly as it appears on the
console or in the system log, contact the Cisco TAC, and provide the representative with the
collected information.
317007
317008
Explanation A new route has been deleted from the routing table.
Routing protocol type:
C – connected, S – static, I – IGRP, R – RIP, M – mobile
B – BGP, D – EIGRP, EX - EIGRP external, O - OSPF
IA - OSPF inter area, N1 - OSPF NSSA external type 1
N2 - OSPF NSSA external type 2, E1 - OSPF external type 1
E2 - OSPF external type 2, E – EGP, i - IS-IS, L1 - IS-IS level-1
L2 - IS-IS level-2, ia - IS-IS inter area
• dest_address—The destination network for this route
• netmask—The netmask for the destination network
• gateway_address—The address of the gateway by which the destination network is reached
• distance—Administrative distance for this route
• metric—Metric for this route
• interface_name—Network interface name through which the traffic is routed
318001
Explanation An internal software error occurred. This message occurs at five-second intervals.
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
318002
Explanation The router was flagged as an area border router without a backbone area configured in
the router. This message occurs at five-second intervals.
318003
Explanation An internal software error occurred. This message occurs at five-second intervals.
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
318004
Error Message %ASA-3-318004: area string lsid IP_address mask netmask adv IP_address
type number
Explanation The OSPF process had a problem locating the link state advertisement, which might
lead to a memory leak.
318005
Error Message %ASA-3-318005: lsid ip_address adv IP_address type number gateway
gateway_address metric number network IP_address mask netmask protocol hex attr
hex net-metric number
Explanation OSPF found an inconsistency between its database and the IP routing table.
318006
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
318007
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
318008
Explanation The OSPF process is being reset, and it is going to select a new router ID. This action
will bring down all virtual links.
Recommended Action Change the virtual link configuration on all of the virtual link neighbors to
reflect the new router ID.
318009
Explanation OSPF is running and has tried to reference some related data structures that have been
removed elsewhere. Clearing interface and router configurations may resolve the problem. However,
if this message appears, some sequence of steps caused premature deletion of data structures and
this needs to be investigated.
• function—The function that received the unexpected event
• line_num —Line number in the code
318101
318102
Explanation The router was flagged as an Area Border Router (ABR) without a backbone area in the
router.
318103
318104
Error Message %ASA-3-318104: DB already exist: area AREA_ID_STR lsid i adv i type 0x
x
Explanation OSPF has a problem locating the LSA, which could lead to a memory leak.
• AREA_ID_STR—A string representing the area
• i—An integer value
• x—A hexadecimal representation of an integer value
318105
Error Message %ASA-3-318105: lsid i adv i type 0x x gateway i metric d network i mask
i protocol #x attr #x net-metric d
Explanation OSPF found an inconsistency between its database and the IP routing table.
• i—An integer value
• x—A hexadecimal representation of an integer value
• d—A number
318106
318107
318108
Explanation The OSPF process is being reset, and it is going to select a new router ID, which brings
down all virtual links. To make them work again, you need to change the virtual link configuration
on all virtual link neighbors.
• d—A number representing the process ID
Recommended Action Change the virtual link configuration on all the virtual link neighbors to
include the new router ID.
318109
318110
Recommended Action Either specify a clear text key and enter the service password-encryption
command for encryption, or ensure that the specified encrypted key is valid. If the specified
encrypted key is not valid, an error message appears during system configuration.
318111
Explanation An attempt was made to use a SPI that has already been used.
• u—A number representing the SPI
• d—A number representing the process ID
318112
Error Message %ASA-3-318112: SPI u is already in use by a process other than ospf
process d.
Explanation An attempt was made to use a SPI that has already been used.
• u—A number representing the SPI
• d—A number representing the process ID
Recommended Action Choose a different SPI. Enter the show crypto ipv6 ipsec sa command to view
a list of SPIs that are already being used.
318113
Explanation An attempt was made to use a SPI that has already been used.
• s—A string representing an interface
• u—A number representing the SPI
318114
Error Message %ASA-3-318114: The key length used with SPI u is not valid
Recommended Action Choose a valid IPsec key. An IPsec authentication key must be 32 (MD5) or 40
(SHA-1) hexidecimal digits long.
318115
318116
Explanation An attempt was made to unconfigure a SPI that is not being used with OSPFv3.
• u—A number representing the SPI
• d—A number representing the process ID
Recommended Action Enter a show command to see which SPIs are used by OSPFv3.
318117
Error Message %ASA-3-318117: The policy for SPI u could not be removed because it is
in use.
Explanation An attempt was made to remove the policy for the indicated SPI, but the policy was still
being used by a secure socket.
• u—A number representing the SPI
318118
Error Message %ASA-3-318118: s error occured when attemtping to remove the IPsec
policy with SPI u
318119
Error Message %ASA-3-318119: Unable to close secure socket with SPI u on interface s
318120
318121
318122
Explanation An internal error has occurred. The system is trying to reopen the secure socket and to
recover.
• s—A string representing the specified message and specified interface
• d—A number representing the total number of recovery attempts
318123
Explanation An internal error has occurred. The maximum number of recovery attempts has been
exceeded.
• s—A string representing the specified message
• IF_NAME—The specified interface
318125
Explanation The interface initialization failed. Possible reasons include the following:
• The area to which the interface is being attached is being deleted.
• It was not possible to create the link scope database.
• It was not possible to create a neighbor datablock for the local router.
Recommended Action Remove the configuration command that initializes the interface and then try
it again.
318126
Error Message %ASA-3-318126: Interface IF_NAME is attached to more than one area
Explanation The interface is on the interface list for an area other than the one to which the interface
links.
• IF_NAME—The specified interface
318127
319001
Error Message %ASA-3-319001: Acknowledge for arp update for IP address dest_address
not received (number).
Explanation The ARP process in the ASA lost internal synchronization because the ASA was
overloaded.
Recommended Action None required. The failure is only temporary. Check the average load of the
ASA and make sure that it is not used beyond its capabilities.
319002
Explanation The routing module in the ASA lost internal synchronization because the ASA was
overloaded.
Recommended Action None required. The failure is only temporary. Check the average load of the
ASA and make sure that it is not used beyond its capabilities.
319003
Error Message %ASA-3-319003: Arp update for IP address address to NPn failed.
Explanation When an ARP entry has to be updated, a message is sent to the network processor (NP)
in order to update the internal ARP table. If the module is experiencing high utilization of memory
or if the internal table is full, the message to the NP may be rejected and this message generated.
Recommended Action Verify if the ARP table is full. If it is not full, check the load of the module by
reviewing the CPU utilization and connections per second. If CPU utilization is high and/or there is
a large number of connections per second, normal operations will resume when the load returns to
normal.
319004
Explanation The routing module in the ASA lost internal synchronization because the system was
overloaded.
Recommended Action None required. The failure is only temporary. Check the average load of the
system and make sure that it is not used beyond its capabilities.
320001
Error Message %ASA-3-320001: The subject name of the peer cert is not allowed for
connection
Explanation When the ASA is an easy VPN remote device or server, the peer certificate includes
asubject name that does not match the output of the ca verifycertdn command. A
man-in-the-middle attack might be occurring, where a device spoofs the peer IP address and tries to
intercept a VPN connection from the ASA.
321001
Explanation A configured resource usage or rate limit for the indicated resource was reached.
321002
Explanation A configured resource usage or rate limit for the indicated resource was reached.
321003
Explanation A configured resource usage or rate logging level for the indicated resource was
reached.
321004
Error Message %ASA-6-321004: Resource var1 rate log level of var2 reached
Explanation A configured resource usage or rate logging level for the indicated resource was
reached.
321005
Explanation The system CPU utilization has reached 95 percent or more and remains at this level for
five minutes.
• utilization %—The percentage of CPU being used
Recommended Action If this message occurs periodically, you can ignore it. If it repeats frequently,
check the output of the show cpu command and verify the CPU usage. If it is high, contact the Cisco
TAC.
321006
Explanation The system memory usage has reached 80 percent or more and remains at this level for
five minutes.
• utilization %—The percentage of CPU being used
Recommended Action If this message occurs periodically, you can ignore it. If it repeats frequently,
check the output of the show memory command and verify the memory usage. If it is high, contact
the Cisco TAC.
321007
Error Message %ASA-3-321007: System is low on free memory blocks of size block_size
(free_blocks CNT out of max_blocks MAX)
Explanation The system is low on free blocks of memory. Running out of blocks may result in traffic
disruption.
• block_size—The block size of memory (for example, 4, 1550, 8192)
• free_blocks—The number of free blocks, as shown in the CNT column after using the show
blocks command
• max_blocks—The maximum number of blocks that the system can allocate, as shown in the
MAX column after using the show blocks command
Recommended Action Use the show blocks command to monitor the amount of free blocks in the
CNT column of the output for the indicated block size. If the CNT column remains zero, or very
close to it for an extended period of time, then the ASA may be overloaded or running into another
issue that needs additional investigation.
321008
Error Message %ASA-3-321008: Maximum available memory fragment size fell below the
threshold of LOW_WATERMARK bytes. New through-the-box connections are denied until
the maximum available fragment size rises above HIGH_WATERMARK bytes.
Explanation The largest available contiguous block of memory has fallen below a certain threshold.
Incoming connections will not be allowed in an effort to reserve memory for manageability.
Recommended Action Try to make any changes that would free memory. If enough memory is freed
and coalesced, then the ASA will return to its normal level of functionality. If unable to do so, reboot
the ASA.
321009
Error Message %ASA-3-321009: Maximum available memory fragment size rose above the
threshold of HIGH_WATERMARK bytes. New through-the-box connections are now
allowed.
Explanation New connections through the ASA are allowed. This syslog message is always preceded
by syslog message 321008.
322001
Error Message %ASA-3-322001: Deny MAC address MAC_address, possible spoof attempt on
interface interface
Explanation The ASA received a packet from the offending MAC address on the specified interface,
but the source MAC address in the packet is statically bound to another interface in the
configuration. Either a MAC-spoofing attack or a misconfiguration may be the cause.
Recommended Action Check the configuration and take appropriate action by either finding the
offending host or correcting the configuration.
322002
Error Message %ASA-3-322002: ARP inspection check failed for arp {request|response}
received from host MAC_address on interface interface. This host is advertising
MAC Address MAC_address_1 for IP Address IP_address, which is
{statically|dynamically} bound to MAC Address MAC_address_2.
Explanation If the ARP inspection module is enabled, it checks whether a new ARP entry advertised
in the packet conforms to the statically configured or dynamically learned IP-MAC address binding
before forwarding ARP packets across the ASA. If this check fails, the ARP inspection module
drops the ARP packet and generates this message. This situation may be caused by either ARP
spoofing attacks in the network or an invalid configuration (IP-MAC binding).
Recommended Action If the cause is an attack, you can deny the host using the ACLs. If the cause is
an invalid configuration, correct the binding.
322003
Explanation If the ARP inspection module is enabled, it checks whether a new ARP entry advertised
in the packet conforms to the statically configured IP-MAC address binding before forwarding ARP
packets across the ASA. If this check fails, the ARP inspection module drops the ARP packet and
generates this message. This situation may be caused by either ARP spoofing attacks in the network
or an invalid configuration (IP-MAC binding).
Recommended Action If the cause is an attack, you can deny the host using the ACLs. If the cause is
an invalid configuration, correct the binding.
322004
Explanation The ASA dropped a packet because no management IP address was configured in the
transparent mode.
• protocol—Protocol string or value
• interface_in—Input interface name
• source_address—Source IP address of the packet
• source_port—Source port of the packet
• interface_out—Output interface name
• dest_address—Destination IP address of the packet
• dest_port—Destination port of the packet
Recommended Action Configure the device with the management IP address and mask values.
323001
Explanation The ASA is unable to communicate via control channel with the module installed (in
the specified slot).
• module_id—For a software services module, specifies the services module name.
• slot_num—For a hardware services module, specifies the slot in which the failure occurred. Slot
0 indicates the system main board, and slot 1 indicates the module installed in the expansion
slot.
323002
Error Message %ASA-3-323002: Module module_id is not able to shut down, shut down
request not answered.
Error Message %ASA-3-323002: Module in slot slot_num is not able to shut down, shut
down request not answered.
323003
Error Message %ASA-3-323003: Module module_id is not able to reload, reload request
not answered.
Error Message %ASA-3-323003: Module in slot slotnum is not able to reload, reload
request not answered.
• slot_num—For a hardware services module, specifies the slot in which the failure occurred. Slot
0 indicates the system main board, and slot 1 indicates the module installed in the expansion
slot.
323004
Error Message %ASA-3-323004: Module string one failed to write software newver
(currently ver), reason. Hw-module reset is required before further use.
Explanation The module failed to accept a software version, and will be transitioned to an
UNRESPONSIVE state. The module is not usable until the software is updated.
• string one—The text string that specifies the module
• newver—The new version number of software that was not successfully written to the module
(for example, 1.0(1)0)
• ver—The current version number of the software on the module (for example, 1.0(1)0)
• reason—The reason the new version cannot be written to the module. The possible values for
reason include the following:
- write failure
- failed to create a thread to write the image
Recommended Action If the module software cannot be updated, it will not be usable. If the problem
persists, contact the Cisco TAC.
323005
Error Message %ASA-3-323005: Module in slot slot_num can not be started completely
Explanation This message indicates that the module can not be started completely. The module will
remain in the UNRESPONSIVE state until this condition is corrected. A module that is not fully
seated in the slot is the most likely cause.
• module_id—For a software services module, specifies the service module name.
• slot_num—For a hardware services module, specifies the slot number that contains the module.
Recommended Action Verify that the module is fully seated and check to see if any status LEDs on
the module are on. It may take a minute after fully reseating the module for the ASA to recognize
that it is powered up. If this message appears after verifying that the module is seated and after
resetting the module using either the sw-module module service-module-name reset command or
the hw-module module slotnum reset command, contact the Cisco TAC.
323006
Explanation A data channel communication failure occurred and the ASA was unable to forward
traffic to the services module. This failure triggers a failover when the failure occurs on the active
ASA in an HA configuration. The failure also results in the configured fail open or fail closed policy
being enforced on traffic that would normally be sent to the services module. This message is
generated whenever a communication problem over the ASA dataplane occurs between the system
module and the services module, which can be caused when the services module stops, resets, is
removed or disabled.
Recommended Action For software services modules such as IPS, recover the module using the
sw-module module ips recover command. For hardware services modules, if this message is not
the result of the SSM reloading or resetting and the corresponding syslog message 505010 is not
seen after the SSM returns to an UP state, reset the module using the hw-module module 1 reset
command.
323007
Error Message %ASA-3-323007: Module in slot slot experienced a firware failure and
the recovery is in progress.
Explanation An ASA with a 4GE-SSM installed experienced a short power surge, then rebooted. As
a result, the 4GE-SSM may come online in an unresponsive state. The ASA has detected that the
4GE-SSM is unresponsive, and automatically restarts the 4GE-SSM.
324000
Explanation The packet being processed did not meet the filtering requirements as described in the
reason variable and is being dropped.
324001
Explanation There was an error processing the packet. The following are possible reasons:
• Mandatory IE is missing
• Mandatory IE incorrect
• IE out of sequence
• Invalid message format.
• Optional IE incorrect
• Invalid TEID
• Unknown IE
• Bad length field
• Unknown GTP message.
• Message too short
• Unexpected message seen
• Null TID
• Version not supported
Recommended Action If this message is seen periodically, it can be ignored. If it is seen frequently,
then the endpoint may be sending out bad packets as part of an attack.
324002
Explanation If this message was preceded by message 321100, memory allocation error, the message
indicates that there were not enough resources to create the PDP context. If not, it was not preceded
by message 321100. For version 0, it indicates that the corresponding PDP context cannot be found.
For version 1, if this message was preceded by message 324001, then a packet processing error
occurred, and the operation stopped.
Recommended Action If the problem persists, determine why the source is sending packets without a
valid PDP context.
324003
Explanation The response received does not have a matching request in the request queue and should
not be processed further.
Recommended Action If this message is seen periodically, it can be ignored. But if it is seen
frequently, then the endpoint may be sending out bad packets as part of an attack.
324004
Explanation The packet being processed has a version other than the currently supported version,
which is 0 or 1. If the version number printed out is an incorrect number and is seen frequently, then
the endpoint may be sending out bad packets as part of an attack.
324005
Explanation An error occurred while trying to create the tunnel for the transport protocol data units.
Recommended Action If this message occurs periodically, it can be ignored. If it repeats frequently,
contact the Cisco TAC.
324006
Explanation The GPRS support node sending the request has exceeded the maximum allowed
tunnels created, so no tunnel will be created.
Recommended Action Check to see whether the tunnel limit should be increased or if there is a
possible attack on the network.
324007
Error Message %ASA-3-324007: Unable to create GTP connection for response from
source_address/0 to dest_address/dest_port
Explanation An error occurred while trying to create the tunnel for the transport protocol data units
for a differentsServicing GPRS support node or gateway GPRS support node.
Recommended Action Check debugging messages to see why the connection was not created
correctly. If the problem persists, contact the Cisco TAC.
324008
Error Message %ASA-3-324008: No PDP exists to update the data sgsn [ggsn] PDPMCB Info
REID: teid_value, Request TEID; teid_value, Local GSN: IPaddress (VPIfNum), Remove
GSN: IPaddress (VPIfNum)
Explanation When a GTP HA message is received on the standby unit to update the PDP with data
sgsn/ggsn PDPMCB information, the PDP is not found because of a previous PDP update message
that was not successfully delivered or successfully processed on the standby unit.
Recommended Action If this message occurs periodically, you can ignore it. If it occurs frequently,
contact the Cisco TAC.
324300
Explanation When a shared secret is configured for a host, the request authenticator is verified with
that secret. If it fails, it is logged and packet processing stops.
• from_addr—The IP address of the host sending the RADIUS accounting request
Recommended Action Check to see that the correct shared secret was configured. If it is,
double-check the source of the packet to make sure that it was not spoofed.
324301
Error Message %ASA-3-324301: Radius Accounting Request has a bad header length
hdr_len, packet length pkt_len
Explanation The accounting request message has a header length that is not the same as the actual
packet length, so packet processing stops.
• hdr_len—The length indicated in the request header
Recommended Action Make sure the packet was not spoofed. If the packet is legitimate, then capture
the packet and make sure the header length is incorrect, as indicated by the message. If the header
length is correct, and if the problem persists, contact the Cisco TAC.
325001
Explanation Another router on the link sent router advertisements with conflicting parameters.
• ipv6_address—IPv6 address of the other router
• interface—Interface name of the link with the other router
Recommended Action Verify that all IPv6 routers on the link have the same parameters in the router
advertisement for hop_limit, managed_config_flag, other_config_flag, reachable_time and
ns_interval, and that preferred and valid lifetimes for the same prefix, advertised by several routers,
are the same. To list the parameters per interface, enter the show ipv6 interface command.
325002
Recommended Action Change the IPv6 address of one of the two systems.
325004
Explanation A user has configured one or multiple actions over the specified IPv6 header extension.
• hdr_type—Can be one of the following values:
ah—Configured action over the AH extension header
count—Configured action over the number of extension headers
destination-option—Configured action over the destination option extension header
Recommended Action If the configured action is not expected, under the policy-map command,
check the action in the match header extension_header_type command and the parameters
command, and make the correct changes. For example:
hostname (config)# policy-map type inspect ipv6 pname
hostname (config-pmap)# parameters
hostname (config-pmap-p)# no match header extension_header_type ! to remove the
configuration
hostname (config-pmap-p)# no drop ! so packets with the specified
extension_header_type are not dropped
hostname (config-pmap-p)# no log ! so packets with the specified extension_header_type
are not logged
hostname (config-pmap-p)# no drop log ! so packets with the specified
extension_header_type are not dropped or logged
325005
Error Message %ASA-4-325005: Invalid IPv6 Extension Header Content: string. detail
regarding protocol, ingress and egress interface
Explanation An IPv6 packet with a bad extension header has been detected.
• string—Can be one of the following values:
- wrong extension header order
- duplicate extension header
- routing extension header
Recommended Action Configure the capture command to record the dropped packet, then analyze the
cause of the dropped packet. If the validity check of the IPv6 extension header can be ignored,
disable the validity check in the IPv6 policy map by entering the following commands:
hostname (config)# policy-map type inspect ipv6 policy_name
hostname (config-pmap)# parameters
hostname (config-pmap-p)# no verify-header type
325006
Error Message %ASA-4-325006: IPv6 Extension Header not in order: Type hdr_type occurs
after Type hdr_type. TCP prot from inside src_int: src_ipv6_addr/src_port to
dst_interface:dst_ipv6_addr/dst_port
Explanation An IPv6 packet with out-of-order extension headers has been detected.
Recommended Action Configure the capture command to record the dropped packet, then analyze the
extension header order of the dropped packet. If out-of-order header extensions are allowed, disable
the out-of-order check in the IPv6 type policy map by entering the following commands:
hostname (config)# policy-map type inspect ipv6 policy_name
hostname (config-pmap)# parameters
hostname (config-pmap-p)# no verify-header order
326001
Explanation A managed timer event was received without a context or a correct type, or no handler
exists. Alternatively, if the number of events queued exceeds a system limit, an attempt to process
them will occur at a later time.
326002
Explanation The IGMP process failed to shut down upon request. Events that are performed in
preparation for this shutdown may be out-of-sync.
326004
326005
Explanation A packet triggering a data-driven event was received, and the attempt to notify the
MRIB failed.
326006
Explanation The MFIB received an entry update from the MRIB, but failed to create the entry related
to the addresses displayed. The probable cause is insufficient memory.
326007
Explanation The MFIB received an interface update from the MRIB, but failed to create the interface
related to the addresses displayed. The probable cause is insufficient memory.
326008
326009
326010
326011
Explanation The MFIB failed to retrieve the table that was supposed to be deleted.
326012
Explanation The initialization of a specified functionality failed. This component might still operate
without the functionality.
326013
326014
326015
326016
Explanation The PIM tunnel is not usable without a source address. This situation occurs because a
numbered interface cannot be found, or because of an internal error.
326017
326019
326020
326021
Explanation An error occurred while setting the SRC of a PIM tunnel interface.
326022
Explanation The PIM process failed to shut down upon request. Events that are performed in
preparation for this shutdown may be out-of-sync.
326023
326024
326025
Explanation An internal error occurred while trying to send a message. Events scheduled to occur on
the receipt of a message, such as deletion of the PIM tunnel IDB, may not occur.
326026
326027
326028
327001
Recommended Action Check the system memory. If memory is low, then this is probably the cause.
Try to reenter the commands when memory is available. If the problem persists, contact the Cisco
TAC.
327002
Explanation The IP SLA monitor failed to initialize. This condition is caused by either the timer
wheel function failing to initialize or a process not being created. Sufficient memory is probably not
available to complete the task.
Recommended Action Check the system memory. If memory is low, then this is probably the cause.
Try to reenter the commands when memory is available. If the problem persists, contact the Cisco
TAC.
327003
Error Message %ASA-3-327003: IP SLA Monitor: Generic Timer wheel timer functionality
failed to initialize
Recommended Action Check the system memory. If memory is low, then the timer wheel function did
not initialize. Try to reenter the commands when memory is available. If the problem persists,
contact the Cisco TAC.
328001
Error Message %ASA-3-328001: Attempt made to overwrite a set stub function in string.
Explanation A single function can be set as a callback for when a stub with a check registry is
invoked. An attempt to set a new callback failed because a callback function has already been set.
• string—The name of the function
329001
Error Message %ASA-3-329001: The string0 subblock named string1 was not removed
331001
Error Message ASA-3-331001: Dynamic DNS Update for 'fqdn_name' = ip_address failed
Explanation The dynamic DNS subsystem failed to update the resource records on the DNS server.
This failure might occur if the ASA is unable to contact the DNS server or the DNS service is not
running on the destination system.
• fqdn_name—The fully qualified domain name for which the DNS update was attempted
• ip_address—The IP address of the DNS update
Recommended Action Make sure that a DNS server is configured and reachable by the ASA. If the
problem persists, contact the Cisco TAC.
331002
332001
Error Message %ASA-3-332001: Unable to open cache discovery socket, WCCP V2 closing
down.
Explanation An internal error that indicates the WCCP process was unable to open the UDP socket
used to listen for protocol messages from caches.
Recommended Action Ensure that the IP configuration is correct and that at least one IP address has
been configured.
332002
Error Message %ASA-3-332002: Unable to allocate message buffer, WCCP V2 closing down.
Explanation An internal error that indicates the WCCP process was unable to allocate memory to
hold incoming protocol messages.
Recommended Action Ensure that enough memory is available for all processes.
332003
Explanation A service from the web cache of the ASA was acquired.
• IP_address—The IP address of the web cache
• service_ID—The WCCP service identifier
332004
Explanation A service from the web cache of the ASA was lost.
• IP_address—The IP address of the web cache
• service_ID—The WCCP service identifier
333001
333002
333003
Explanation The EAP association has been terminated with the remote host.
• EAP-context—A unique identifier for the EAP session displayed as an eight-digit hexadecimal
number (for example, 0x2D890AE0)
333004
333005
Explanation The EAP-Status Query response has one or more invalid TLVs.
• EAP-context—A unique identifier for the EAP session displayed as an eight-digit hexadecimal
number (for example, 0x2D890AE0)
333006
Explanation The EAP-Status Query response is missing one or more mandatory TLVs.
• EAP-context—A unique identifier for the EAP session displayed as an eight-digit hexadecimal
number (for example, 0x2D890AE0)
333007
Explanation The EAP-Status Query response includes a TLV with an invalid length.
• EAP-context—A unique identifier for the EAP session displayed as an eight-digit hexadecimal
number (for example, 0x2D890AE0)
333008
333009
Explanation The EAP-Status Query response includes a MAC that does not match the calculated
MAC.
• EAP-context—A unique identifier for the EAP session displayed as an eight-digit hexadecimal
number (for example, 0x2D890AE0)
333010
Explanation The EAP-Status Query response includes a validation flags TLV, which indicates that
the peer requested a full posture validation.
334001
334002
Explanation An EAPoUDP association has been successfully established with the host.
• host-address—The IP address of the host in dotted decimal format (for example, 10.86.7.101)
334003
Recommended Action Verify the configuration of the Cisco Secure Access Control Server.
334004
334005
Error Message %ASA-5-334005: Host put into NAC Hold state - host-address
Explanation The NAC session for the host was put into the Hold state.
• host-address—The IP address of the host in dotted decimal format (for example, 10.86.7.101)
334006
334007
334008
Error Message %ASA-6-334008: NAC EAP association initiated - host-address, EAP context:
EAP-context
334009
Error Message %ASA-6-334009: Audit request for NAC Clientless host - Assigned_IP.
Explanation An audit request is being sent for the specified assigned IP address.
• Assigned_IP—The IP address assigned to the client
335001
335002
Error Message %ASA-5-335002: Host is on the NAC Exception List - host-address, OS:
oper-sys
Explanation The client is on the NAC Exception List and is therefore not subject to posture
validation.
• host-address—The IP address of the host in dotted decimal format (for example, 10.1.1.1)
• oper-sys—The operating system (for example, Windows XP) of the host
335003
Explanation The NAC default ACL has been applied for the client.
• ACL-name—The name of the ACL being applied
• host-address—The IP address of the host in dotted decimal format (for example, 10.1.1.1)
335004
335004
335005
Recommended Action Verify the configuration of the Cisco Secure Access Control Server.
335006
Explanation The name of the ACL that is being applied as a result of NAC posture validation.
• ACL-name—The name of the ACL being applied
• host-address—The IP address of the host in dotted decimal format (for example, 10.1.1.1)
335007
335008
Error Message %ASA-5-335008: NAC IPsec terminate from dynamic ACL: ACL-name -
host-address
335009
335010
335011
335012
335013
335014
336001
Explanation The SIA state means that an EIGRP router has not received a reply to a query from one
or more neighbors within the time allotted (approximately three minutes). When this happens,
EIGRP clears the neighbors that did not send a reply and logs an error message for the route that
became active.
• destination_network—The route that became active
• ddb_name—IPv4
• as_num—The EIGRP router
Recommended Action Check to see why the router did not get a response from all of its neighbors and
why the route disappeared.
336002
Explanation The EIGRP router is unable to find the handle for the next hop.
• handle_id—The identity of the missing handle
336003
Explanation The DUAL software was unable to allocate a packet buffer. The ASA may be out of
memory.
• bytes—Number of bytes in the packet
Recommended Action Check to see if the ASA is out of memory by entering the show mem or show
tech command. If the problem persists, contact the Cisco TAC.
336004
336005
Explanation The interface is flow blocked for multicast. Qelm is the queue element, and in this case,
the last multicast packet on the queue for this particular interface.
• error—Error statement: Qelm on flow ready
• interface_name—Name of the interface on which the error occurred
336006
Explanation Peers still exist on a particular interface during or after cleanup of the IDB of the EIGRP.
• num—The number of peers
• interface_name—The interface name
336007
Explanation An error occurred and the count of the anchor became negative when it was released.
336008
Error Message %ASA-3-336008: Lingering DRDB deleting IIDB, dest network, nexthop
address (interface), origin origin_str
336009
336010
Recommended Action Check to see why the link on the neighbor is going down or is flapping. This
may be a sign of a problem, or a problem may occur because of this.
336011
Explanation A dual event occurred. The events can be one of the following:
• Redist rt change
• SIA Query while Active
337001
Error Message %ASA-3-337001: Phone Proxy SRTP: Encryption failed on packet from
in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port
Recommended Action If this message persists, call the Cisco TAC to debug the crypto hardware to
determine why SRTP encryption is failing.
337002
Error Message %ASA-3-337002: Phone Proxy SRTP: Decryption failed on packet from
in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port
Recommended Action If this message persists, call the Cisco TAC to debug the crypto hardware to
determine why SRTP decryption is failing.
337003
Error Message %ASA-3-337003: Phone Proxy SRTP: Authentication tag generation failed
on packet from in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port
Recommended Action If this message persists, call the Cisco TAC to debug the crypto hardware to
determine why SRTP generation of the authentication tag is failing.
337004
Error Message %ASA-3-337004: Phone Proxy SRTP: Authentication tag validation failed
on packet from in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port
Explanation The computed authentication tag is not the same as the authentication tag in the packet.
• in_ifc—The input interface
• src_ip—The source IP address of the packet
• src_port—The source port of the packet output interface
• dest_ip—The destination IP address of the packet
• dest_port—The destination port of the packet
337005
Error Message %ASA-4-337005: Phone Proxy SRTP: Media session not found for
media_term_ip/media_term_port for packet from in_ifc:src_ip/src_port to
out_ifc:dest_ip/dest_port
Explanation The ASA received an SRTP or RTP packet that was destined to go to the media
termination IP address and port, but the corresponding media session to process this packet was not
found.
• in_ifc—The input interface
• src_ip—The source IP address of the packet
• src_port—The source port of the packet
• out_ifc—The output interface
• dest_ip—The destination IP address of the packet
• dest_port—The destination port of the packet
Recommended Action If this message occurs at the end of the call, it is considered normal because the
signaling messages may have released the media session, but the endpoint is continuing to send a
few SRTP or RTP packets. If this message occurs for an odd-numbered media termination port, the
endpoint is sending RTCP, which must be disabled from the CUCM. If this message happens
continuously for a call, debug the signaling message transaction either using phone proxy debug
commands or capture commands to determine if the signaling messages are being modified with the
media termination IP address and port.
337006
Error Message %ASA-3-337006: Phone Proxy SRTP: Failed to sign file filename requested
by UDP client cifc:caddr/cport for sifc:saddr/sport
Explanation The crypto hardware was unable to perform encryption and create a signature for a file.
• filename—The name of the file
• sifc—The server interface
• saddr—The server IP address
• sport—The server port
• cifc—The client interface
• caddr—The client IP address
• cport—The client port
Recommended Action If this message persists, check associated messages for other errors related to
the crypto hardware engine.
337007
Error Message %ASA-3-337007: Phone Proxy SRTP: Failed to find configuration file
filename for UDP client cifc:caddr/cport by server sifc:saddr/sport
Explanation The CUCM returns the File Not Found error when a phone requests its configuration
file.
• filename—The name of the file
• sifc—The server interface
• saddr—The server IP address
• sport—The server port
• cifc—The client interface
• caddr—The client IP address
• cport—The client port
Recommended Action Check to make sure that this phone has been configured on the CUCM.
337008
Error Message %ASA-3-337008: Phone Proxy: Unable to allocate media port from
media-termination address phone_proxy_ifc:media_term_IP for
client_ifc:client_IP/client_port; call failed.
Explanation The ASA cannot find a port to allocate for media when creating a new media session.
This message may occur because the user has not provided a large enough range of ports for phone
proxy use, which is determined in the media-termination address command, or that all available
ports are already being used.
• media-termination address—The media termination address
• phone_proxy_ifc—The media termination interface name (identity)
• media_term_ip—The media termination IP address
• client_ifc—The client interface name
• client_ip—The client IP address
• client_port—The client port
Recommended Action Check the phone-proxy configuration to see the range of media ports specified
and allocate a larger range of media ports if the range was too small, provided the security policy
allows it. The default port range is 16384-32767.
337009
Explanation You tried to register the same secure phone with a different IP address. Because an entry
for the MAC address with the old IP address was already made, you cannot have multiple entries
with the same MAC address and different IP addresses.
• interface—The interface name from which the previous entry is registered
• ipaddr—The IP address of the existing secure phone entry
• mac_addr—The MAC address of the phone
Recommended Action Check the output of the show phone-proxy secure-phones command. Use the
clear command to clear the entry that is causing the issue, then register the phone with the new IP
address.
338001
Explanation Traffic from a blacklisted domain in the dynamic filter database has appeared. The
threat level is a string that shows one of the following values: none, very-low, low, moderate, high,
and very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
Recommended Action Access to a malicious site has been logged. Use the internal IP address to trace
the infected machine, or enter the dynamic-filter drop blacklist command to automatically drop
such traffic.
338002
Explanation Traffic to a blacklisted domain name in the dynamic filter database has appeared. The
threat level is a string that shows one of the following values: none, very-low, low, moderate, high,
and very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
Recommended Action Access to a malicious site has been logged. Use the internal IP address to trace
the infected machine, or enter the dynamic-filter drop blacklist command to automatically drop
such traffic.
338003
Explanation Traffic from a blacklisted IP address in the dynamic filter database has appeared. The
threat level is a string that shows one of the following values: none, very-low, low, moderate, high,
and very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
Recommended Action Access to a malicious site has been logged. Use the internal IP address to trace
the infected machine, or enter the dynamic-filter drop blacklist command to automatically drop
such traffic.
338004
Explanation Traffic to a blacklisted IP address in the dynamic filter database has appeared. The threat
level is a string that shows one of the following values: none, very-low, low, moderate, high, and
very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
Recommended Action Access to a malicious site has been logged. Use the internal IP address to trace
the infected machine, or enter the dynamic-filter drop blacklist command to automatically drop
such traffic.
338005
Explanation Traffic from a black-listed domain name in the dynamic filter database was denied. The
threat level is a string that shows one of the following values: none, very-low, low, moderate, high,
and very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
338006
Explanation Traffic to a blacklisted domain name in the dynamic filter database was denied. The
threat level is a string that shows one of the following values: none, very-low, low, moderate, high,
and very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
338007
Explanation Traffic from a blacklisted IP address in the dynamic filter database was denied. The
threat level is a string that shows one of the following values: none, very-low, low, moderate, high,
and very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
338008
Explanation Traffic to a blacklisted IP address in the dynamic filter database was denied. The threat
level is a string that shows one of the following values: none, very-low, low, moderate, high, and
very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
338101
Error Message %ASA-4-338101: Dynamic filter action whitelisted protocol traffic from
in_interface:src_ip_addr/src_port (mapped-ip/mapped-port) to
out_interface:dest_ip_addr/dest_port, (mapped-ip/mapped-port), source malicious
address resolved from local or dynamic list: domain name
Explanation Traffic from a whitelisted domain in the dynamic filter database has appeared.
338102
Error Message %ASA-4-338102: Dynamic filter action whitelisted protocol traffic from
in_interface:src_ip_addr/src_port (mapped-ip/mapped-port) to
out_interface:dest_ip_addr/dest_port (mapped-ip/mapped-port), destination
malicious address resolved from local or dynamic list: domain name
Explanation Traffic to a whitelisted domain name in the dynamic filter database has appeared.
338103
Error Message %ASA-4-338103: Dynamic filter action whitelisted protocol traffic from
in_interface:src_ip_addr/src_port (mapped-ip/mapped-port) to
out_interface:dest_ip_addr/dest_port, (mapped-ip/mapped-port), source malicious
address resolved from local or dynamic list: ip address/netmask
Explanation Traffic from a whitelisted IP address in the dynamic filter database has appeared.
338104
Error Message %ASA-4-338104: Dynamic filter action whitelisted protocol traffic from
in_interface:src_ip_addr/src_port (mapped-ip/mapped-port) to
out_interface:dest_ip_addr/dest_port (mapped-ip/mapped-port), destination
malicious address resolved from local or dynamic list: ip address/netmask
Explanation Traffic to a whitelisted IP address in the dynamic filter database has appeared.
338201
Explanation Traffic from a greylisted domain in the dynamic filter database has appeared. The threat
level is a string that shows one of the following values: none, very-low, low, moderate, high, and
very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
Recommended Action Access to a malicious site has been logged. Use the internal IP address to trace
the infected machine, or enter the dynamic-filter drop blacklist command and the dynamic-filter
ambiguous-is-black command to automatically drop such traffic.
338202
Explanation Traffic to a greylisted domain name in the dynamic filter database has appeared. The
threat level is a string that shows one of the following values: none, very-low, low, moderate, high,
and very-high. The category is a string that shows the reason why a domain name is blacklisted (for
example, botnet, Trojan, and spyware).
Recommended Action Access to a malicious site has been logged. Use the internal IP address to trace
the infected machine, or enter the dynamic-filter drop blacklist command and the dynamic-filter
ambiguous-is-black command to automatically drop such traffic.
338203
Error Message %ASA-4-338203: Dynamic filter dropped greylisted protocol traffic from
in_interface:src_ip_addr/src_port (mapped-ip/mapped-port) to
out_interface:dest_ip_addr/dest_port (mapped-ip/mapped-port), source malicious
address resolved from local or dynamic list: domain name, threat-level:
level_value, category: category_name
Explanation Traffic from a greylisted domain name in the dynamic filter database was denied;
however, the malicious IP address was also resolved to domain names that are unknown to the
dynamic filter database. The threat level is a string that shows one of the following values: none,
very-low, low, moderate, high, and very-high. The category is a string that shows the reason why a
domain name is blacklisted (for example, botnet, Trojan, and spyware).
Recommended Action Access to a malicious site was dropped. If you do not want to automatically
drop greylisted traffic whose IP address matches both blacklisted domain names and unknown
domain names, disable the dynamic-filter ambiguous-is-black command.
338204
Error Message %ASA-4-338204: Dynamic filter dropped greylisted protocol traffic from
in_interface:src_ip_addr/src_port (mapped-ip/mapped-port) to
out_interface:dest_ip_addr/dest_port (mapped-ip/mapped-port), destination
malicious address resolved from local or dynamic list: domain name, threat-level:
level_value, category: category_name
Explanation Traffic to a greylisted domain name in the dynamic filter database was denied; however,
the malicious IP address was also resolved to domain names that are unknown to the dynamic filter
database. The threat level is a string that shows one of the following values: none, very-low, low,
moderate, high, and very-high. The category is a string that shows the reason why a domain name
is blacklisted (for example, botnet, Trojan, and spyware).
Recommended Action Access to a malicious site was dropped. If you do not want to automatically
drop greylisted traffic whose IP address matches both blacklisted domain names and unknown
domain names, disable the dynamic-filter ambiguous-is-black command.
338301
Error Message %ASA-4-338301: Intercepted DNS reply for domain name from
in_interface:src_ip_addr/src_port to out_interface:dest_ip_addr/dest_port,
matched list
Explanation A DNS reply that was present in an administrator whitelist, blacklist, or IronPort list
was intercepted.
• name—The domain name
• list—The list that includes the domain name, administrator whitelist, blacklist, or IronPort list
338302
Error Message %ASA-5-338302: Address ipaddr discovered for domain name from list,
Adding rule
Explanation An IP address that was discovered from a DNS reply to the dynamic filter rule table was
added.
• ipaddr—The IP address from the DNS reply
• name—The domain name
• list—The list that includes the domain name, administrator blacklist, or IronPort list
338303
Error Message %ASA-5-338303: Address ipaddr (name) timed out, Removing rule
Explanation An IP address that was discovered from the dynamic filter rule table was removed.
• ipaddr—The IP address from the DNS reply
• name—The domain name
338304
Error Message %ASA-6-338304: Successfully downloaded dynamic filter data file from
updater server url
338305
Error Message %ASA-3-338305: Failed to download dynamic filter data file from updater
server url
Recommended Action Make sure that you have a DNS configuration on the ASA so that the updater
server URL can be resolved. If you cannot ping the server from the ASA, check with your network
administrator for the correct network connection and routing configuration. If you are still having
problems, contact the Cisco TAC.
338306
Explanation The ASA failed to authenticate with the dynamic filter updater server.
• url—The URL of the updater server
338307
338308
Error Message %ASA-5-338308: Dynamic filter updater server dynamically changed from
old_server_host: old_server_port to new_server_host: new_server_port
Explanation The ASA was directed to a new updater server host or port.
• old_server_host:old_server_port—The previous updater server host and port
• new_server_host:new_server_port—The new updater server host and port
338309
Error Message %ASA-3-338309: The license on this ASA does not support dynamic filter
updater feature.
Explanation The dynamic filter updater is a licensed feature; however, the license on the ASA does
not support this feature.
338310
Error Message %ASA-3-338310: Failed to update from dynamic filter updater server url,
reason: reason string
Explanation The ASA failed to receive an update from the dynamic filter updater server.
• url—The URL of the updater server
• reason string—The reason for the failure, which can be one of the following:
- Failed to connect to updater server
- Received invalid server response
- Received invalid server manifest
- Error in stored update file information
- Script error
- Function call error
- Out of memory
Recommended Action Check the network connection to the server. Try to ping the server URL, which
is shown in the output of the show dynamic-filter updater-client command. Make sure that the port
is allowed through your network. If the network connection is not the problem, contact your network
administrator.
339001
Error Message %ASA-3-339001: UC-IME-SIG: Ticket not found in SIP %s from %s:%A/%d to
%s:%A/%d, packet dropped
Explanation For UC-IME SIP signaling, all dialog-forming SIP messages received from the outside
must include the X-Cisco-ViPR-Ticket header. If this header is missing from the message, the
message will be dropped during SIP inspection. This header is only required when an existing SIP
session (as determined by current SIP inspection rules) cannot be found for the message being
inspected.
• %s—SIP message name (INVITE or REFER)
• %s—Source interface name (inside or outside)
• %A—Source IP address
• %d—Source port
• %s—Destination interface name (inside or outside)
• %A—Destination IP address
• %d—Destination port
339002
Explanation When UC-IME ticket inspection and validation are performed, several data checks for
timestamp validity and epoch matching, among others, are performed. If any of these checks fail,
the SIP message or packet will be dropped.
• %s—SIP message name (INVITE or REFER)
• %s—Source interface name (inside or outside)
• %A—Source IP address
• %d—Source port
• %s—Destination interface name (inside or outside)
• %A—Destination IP address
• %d—Destination port
• %s—Additional description or data about the error condition
Recommended Action Check to see if UC-IME calls are being spoofed. Turn on UC-IME debug
tracing to obtain more details about the error condition.
339003
Explanation When a SIP message is inspected by the UC-IME feature, checks are performed to see
if the message belongs to an existing SIP session. In a non-UC-IME scenario, a SIP request received
will create a SIP session (if permitted by a configured policy). However, for the UC-IME feature,
nondialog-creating SIP messages are not permitted to create a SIP session in the ASA and are
dropped.
• %s—SIP message name (INVITE or REFER)
• %s—Source interface name (inside or outside)
• %A—Source IP address
• %d—Source port
339004
Explanation When an outbound SIP message is inspected by the UC-IME feature, the domain name
included in the SIP route header is compared to the TLS certificate domain name. This comparison
allows the UC-IME feature on the ASA to determine whether or not the SIP message is actually
terminating at the intended enterprise. If a mismatch occurs, it implies that the remote end is not
serving that domain, and the SIP session should be terminated.
• %s—SIP message name (INVITE or REFER)
• %s—Source interface name (inside or outside)
• %A—Source IP address
• %d—Source port
• %s—Destination interface name (inside or outside)
• %A—Destination IP address
• %d—Destination port
• %s—Additional description or data about the error condition (for example, the domain names
received)
Recommended Action Check to see if the remote enterprise is attempting to hijack UC-IME calls.
339005
Explanation For UC-IME SIP signaling, SIP messages received that have media content from the
outside need to be SRTP. If this content is not SRTP, the message will be dropped during SIP
inspection.
• %s—Source interface name (inside or outside)
• %A—Source IP address
• %d—Source port
• %s—Destination interface name (inside or outside)
• %A—Destination IP address
• %d—Destination port
339006
Error Message %ASA-3-339006: UC-IME-Offpath: Failed to map remote UCM address %A:%d
on %s interface, request from local UCM %A:%d on %s interface, reason %s
Explanation For the UC-IME mapping service to work correctly, a correct configuration of global
NAT must be in place. If a misconfiguration is detected, a message will be generated to inform the
administrator. At the same time, all requests from UCM clients must conform to the mapping service
stun message format. All nonconforming requests will be dropped silently, and a message will be
generated to notify the administrator about this occurrence.
• %A—Remote UCM IP address
• %d—Remote UCM port
• %s—Interface for the remote UCM IP address or port address
• %A—Local UCM IP address (used for the mapping service connection)
• %d—Local UCM port (used for the mapping service connection)
• %s—Interface for the local UCM IP address or port address
• %s—Failure reason
Recommended Action Check to see if the UC-IME Offpath and the UCM Offpath are configured
correctly.
339007
Explanation UC-IME mapping service calls are tracked based on the mapping service client (UCM)
address (IP:port) and remote UCM address (IP:port). The administrator may use this information to
help debug an offpath UC-IME call.
• %A—Mapped IP address
• %d—Mapped port
• %s—Interface for the mapped IP address or port address
• %A—Remote UCM IP address
• %d—Remote UCM port
• %s—Interface for the remote UCM IP address or port address
• %A—Local UCM IP address (used for the mapping-service connection)
• %d—Local UCM port (used for the mapping-service connection)
339008
Explanation UC-IME media session termination is tracked based on the Call ID or Session ID. This
message is triggered at the end of a media session. The parameters returned by the RTP monitoring
algorithm are included so that an administrator can adjust sensitivity parameters to improve the
quality of service for a call.
• %s—Failover state, which can be one of the following:
- No error, for an active session
- No media at startup timer expired
- Error in received sequence numbering
- Both ITE and BLS thresholds exceeded
- BLS threshold exceeded within Burst Interval
- RBLR threshold exceeded within last 8 sec
- Combination (> 3/4 RBLR + > 3/4 BLS) failover
- No media since last received packet exceeded
- ITE threshold exceeded
• %s—Codec payload format:, which can be one of the following:
- UNKNOWN
- G722
- PCMU
- PCMA
- iLBC
- iSAC
339009
Error Message %ASA-6-339009: UC-IME: Ticket Password changed. Please update the same
on UC-IME server.
Explanation The ASA administrator is allowed to change the ticket password without knowing the
old password. This message is generated to ensure that the administrator is aware of this change.
The message also serves as a reminder to the administrator that if the UC-IME password is changed
on the ASA, it should also be changed on the UC-IME server for everything to function correctly.
Recommended Action Verify that the ticket password has been changed on the UC-IME server to
match the value configured on the ASA.
340001
Explanation Loopback proxy allows third-party applications running on the ASA to access the
network. The loopback proxy encountered an error.
• context_id—A unique, 32-bit context ID that is generated for each loopback client proxy request
• version—The protocol version
• request_type—The type of request, which can be one of the following: TC (TCP connection),
TB (TCP bind), or UA (UDP association)
• address_type—The types of addresses, which can be one of the following: IP4 (IPv4), IP6
(IPv6), or DNS (domain name service)
• client_address_internal/server_address_internal—The addresses that the loopback client and
the loopback server used for communication
• client_port_internal/server_port_internal—The ports that the loopback client and the loopback
server used for communication
• server_address_external/remote_address_external—The addresses that the loopback server
and the remote host used for communication
• server_port_external/remote_port_external—The ports that the loopback server and the remote
host used for communication
• error_string—The error string that may help troubleshoot the problem
Recommended Action Copy the syslog message and contact the Cisco TAC.
340002
Explanation Loopback proxy allows third-party applications running on the ASA to access the
network. The loopback proxy generated debugging information for use in troubleshooting.
• context_id—A unique, 32-bit context ID that is generated for each loopback client proxy request
• version—The protocol version
• request_type—The type of request, which can be one of the following: TC (TCP connection),
TB (TCP bind), or UA (UDP association)
• address_type—The types of addresses, which can be one of the following: IP4 (IPv4), IP6
(IPv6), or DNS (domain name service)
• client_address_internal/server_address_internal—The addresses that the loopback client and
the loopback server used for communication
• client_port_internal/server_port_internal—The ports that the loopback client and the loopback
server used for communication
• server_address_external/remote_address_external—The addresses that the loopback server
and the remote host used for communication
• server_port_external/remote_port_external—The ports that the loopback server and the remote
host used for communication
• error_string—The error string that may help troubleshoot the problem
Recommended Action Copy the syslog message and contact the Cisco TAC.
341001
Error Message %ASA-6-341001: Policy Agent started successfully for VNMC vnmc_ip_addr
Explanation The policy agent processes (DME, ducatiAG, and commonAG) started successfully.
• vnmc_ip_addr—-The IP address of the VNMC server
341002
Error Message %ASA-6-341002: Policy Agent stopped successfully for VNMC vnmc_ip_addr
Explanation The policy agent processes (DME, ducatiAG, and commonAG) were stopped.
• vnmc_ip_addr—-The IP address of the VNMC server
341003
Error Message %ASA-3-341003: Policy Agent failed to start for VNMC vnmc_ip_addr
Recommended Action Check for console history and the disk0:/pa/log/vnm_pa_error_status for error
messages. To retry starting the policy agent, issue the registration host command again.
341004
Explanation All SSDs have failed or been removed with the system in Up state. The system has
attempted to shut down the software module, but that attempt has failed.
• %s—The software module (for example, cxsc)
Recommended Action Replace the remved or failed drive and reload the ASA.
341005
Error Message %ASA-3-341005: Storage device not available. Shutdown issued for
module %s.
Explanation All SSDs have failed or been removed with the system in Up state. The system is
shutting down the software module.
• %s—The software module (for example, cxsc)
Recommended Action Replace the removed or failed drive and reload the software module.
341006
%ASA-3-341006: Storage device not available. Failed to stop recovery of module %s.
Explanation All SSDs have failed or been removed with the system in recorvery state. The system
attempted to stop the recover, but that attempt failed.
• %s—The software module (for example, cxsc)
Recommended Action Replace the removed or failed drive and reload the ASA.
341007
%ASA-3-341007: Storage device not available. Further recovery of module %s was stopped. This may
take several minutes to complete.
Explanation All SSDs have failed or been removed with the system in recorvery state. The system is
stopping the recovery of the softwaremodule.
• %s—The software module (for example, cxsc)
Recommended Action Replace the removed or failed drive and reload the software module.
341008
%ASA-3-341008: Storage device not found. Auto-boot of module %s cancelled. Install drive and reload
to try again.
Explanation After getting the system into Up state, all SSDs have failed or been removed before
reloading the system. Because the default action during boot is to auto-boot the software module,
that action is blocked because there is no storage device available.
Recommended Action Replace the removed or failed drive and reload the software module.
341010
Error Message %ASA-6-341010: Storage device with serial number ser_no [inserted into
| removed from] bay bay_no
Explanation The ASA has detected insertion or removal events and generates this syslog message
immediately.
341011
Error Message %ASA-3-341011: Storage device with serial number ser_no in bay bay_no
faulty.
Explanation The ASA polls the hard disk drive (HDD) health status every 10 minutes and generates
this syslog message if the HDD is in a failed state.
4000nn
Explanation Messages 400000 through 400051 are Cisco Intrusion Prevention Service signature
messages.
Recommended Action See the Cisco Intrusion Prevention Service User Guide on Cisco.com.
Not all signature messages are supported by the ASA in this release. IPS messages all start with
4-4000nn and have the following format:
number The signature number. For more information, see the Cisco Intrusion Prevention
Service User Guide on Cisco.com.
For example:
%ASA-4-400013 IPS:2003 ICMP redirect from 10.4.1.2 to 10.2.1.1 on interface dmz
%ASA-4-400032 IPS:4051 UDP Snork attack from 10.1.1.1 to 192.168.1.1 on interface outside
401001
Explanation The clear shun command was entered to remove existing shuns from memory. An
institution to keep a record of shunning activity was allowed.
401002
Explanation A shun command was entered, where the first IP address is the shunned host. The other
addresses and ports are optional and are used to terminate the connection if available. An institution
to keep a record of shunning activity was allowed.
401003
Explanation A single shunned host was removed from the shun database. An institution to keep a
record of shunning activity was allowed.
401004
Explanation A packet was dropped because the host defined by IP SRC is a host in the shun database.
A shunned host cannot pass traffic on the interface on which it is shunned. For example, an external
host on the Internet can be shunned on the outside interface. A record of the activity of shunned hosts
was provided. This message and message %ASA-4-401005 can be used to evaluate further risk
concerning this host.
401005
Error Message %ASA-4-401005: Shun add failed: unable to allocate resources for
IP_address IP_address port port
Recommended Action The Cisco IPS should continue to attempt to apply this rule. Try to reclaim
memory and reapply a shun manually, or wait for the Cisco IPS to do this.
402114
Explanation An IPsec packet was received that specifies an SPI that does not exist in the SA
database. This may be a temporary condition caused by slight differences in aging of SAs between
the IPsec peers, or it may be because the local SAs have been cleared. It may also indicate incorrect
packets sent by the IPsec peer, which may be part of an attack. This message is rate limited to no
more than one message every five seconds.
Recommended Action The peer may not acknowledge that the local SAs have been cleared. If a new
connection is established from the local router, the two peers may then reestablish connection
successfully. Otherwise, if the problem occurs for more than a brief period, either attempt to
establish a new connection or contact the peer administrator.
402115
Explanation An IPsec packet was received that is missing the expected ESP header. The peer is
sending packets that do not match the negotiated security policy, which may indicate an attack. This
message is rate limited to no more than one message every five seconds.
• remote_IP—IP address of the remote endpoint of the tunnel
• local_IP—IP address of the local endpoint of the tunnel
• act_prot—Received IPsec protocol
402116
Explanation A decapsulated IPsec packet does not match the negotiated identity. The peer is sending
other traffic through this security association, which may be caused by a security association
selection error by the peer, or it may be part of an attack. This message is rate limited to no more
than one message every five seconds.
• protocol—IPsec protocol
• spi—IPsec Security Parameter Index
• seq_num—IPsec sequence number
• remote_IP—IP address of the remote endpoint of the tunnel
• username—Username associated with the IPsec tunnel
• local_IP—IP address of the local endpoint of the tunnel
• pkt_daddr—Destination address from the decapsulated packet
• pkt_saddr—Source address from the decapsulated packet
• pkt_prot—Transport protocol from the decapsulated packet
• id_daddr—Local proxy IP address
• id_dmask—Local proxy IP subnet mask
• id_dprot—Local proxy transport protocol
• id_dport—Local proxy port
• id_saddr—Remote proxy IP address
• id_smask—Remote proxy IP subnet mask
• id_sprot—Remote proxy transport protocol
• id_sport—Remote proxy port
Recommended Action Contact the administrator of the peer and compare policy settings.
402117
Explanation The received packet matched the crypto map ACL, but it is not IPsec-encapsulated. The
IPsec peer is sending unencapsulated packets. This error can occur because of a policy setup error
on the peer. For example, the firewall may be configured to only accept encrypted Telnet traffic to
the outside interface port 23. If you attempt to use Telnet without IPsec encryption to access the
outside interface on port 23, this message appears, but not with Telnet or traffic to the outside
interface on ports other than 23. This error can also indicate an attack. This message is not generated
except under these conditions (for example, it is not generated for traffic to the ASA interfaces
themselves). See messages 710001, 710002, and 710003, which track TCP and UDP requests. This
message is rate limited to no more than one message every five seconds.
• protocol—IPsec protocol
• remote_IP—IP address of the remote endpoint of the tunnel
• local_IP—IP address of the local endpoint of the tunnel
Recommended Action Contact the administrator of the peer to compare policy settings.
402118
Explanation A decapsulatd IPsec packet included an IP fragment with an offset less than or equal to
128 bytes. The latest version of the security architecture for IP RFC recommends 128 bytes as the
minimum IP fragment offset to prevent reassembly attacks. This may be part of an attack. This
message is rate limited to no more than one message every five seconds.
• protocol—IPsec protocol
• spi—IPsec Security Parameter Index
• seq_num—IPsec sequence number
• remote_IP—IP address of the remote endpoint of the tunnel
• username—Username associated with the IPsec tunnel
• local_IP—IP address of the local endpoint of the tunnel
• frag_len—IP fragment length
• frag_offset—IP fragment offset in bytes
Recommended Action Contact the administrator of the remote peer to compare policy settings.
402119
Explanation An IPsec packet was received with an invalid sequence number. The peer is sending
packets including sequence numbers that may have been previously used. This message indicates
that an IPsec packet has been received with a sequence number outside of the acceptable window.
This packet will be dropped by IPsec as part of a possible attack. This message is rate limited to no
more than one message every five seconds.
• protocol—IPsec protocol
• spi—IPsec Security Parameter Index
• seq_num—IPsec sequence number
• remote_IP—IP address of the remote endpoint of the tunnel
• username—Username associated with the IPsec tunnel
• local_IP—IP address of the local endpoint of the tunnel
402120
Explanation An IPsec packet was received and failed authentication. The packet is dropped. The
packet may have been corrupted in transit, or the peer may be sending invalid IPsec packets, which
may indicate an attack if many of these packets were received from the same peer. This message is
rate limited to no more than one message every five seconds.
• protocol—IPsec protocol
• spi—IPsec Security Parameter Index
• seq_num—IPsec sequence number
• remote_IP—IP address of the remote endpoint of the tunnel
• username—Username associated with the IPsec tunnel
• local_IP—IP address of the local endpoint of the tunnel
Recommended Action Contact the administrator of the remote peer if many failed packets were
received.
402121
Explanation An IPsec packet to be decapsulated was received and subsequently dropped by the IPsec
subsystem. This may indicate a problem with the ASA configuration or with the ASA itself.
• protocol—IPsec protocol
• spi—IPsec Security Parameter Index
• seq_num—IPsec sequence number
• peer_addr—IP address of the remote endpoint of the tunnel
• username—Username associated with the IPsec tunnel
• lcl_addr—IP address of the local endpoint of the tunnel
• drop_reason—Reason that the packet was dropped
402122
Explanation A packet to be encapsulated in IPsec was received and subsequently dropped by the
IPsec subsystem. This may indicate a problem with the ASA configuration or with the ASA itself.
• src_addr—Source IP address
• dest_addr—Destination IP address
• drop_reason—Reason that the packet was dropped
402123
Explanation An error was detected while running a crypto command with a hardware accelerator,
which may indicate a problem with the accelerator. This type of error may occur for a variety of
reasons, and this message supplements the crypto accelerator counters to help determine the cause.
• accel_type—Hardware accelerator type
• error_string—Code indicating the type of error
402124
Explanation The crypto hardware chip has reported a fatal error, indicating that the chip is
inoperable. The information from this message captures the details to allow further analysis of the
problem. The crypto chip is reset when this condition is detected to unobtrusively allow the ASA to
continue functioning. Also, the crypto environment at the time this issue is detected is written to a
crypto archive directory on flash to provide further debugging information. Various parameters
related to the crypto hardware are included in this message, as follows:
• HWErrAddr—Hardware address (set by crypto chip)
• Core—Crypto core experiencing the error
• HwErrCode—Hardware error code (set by crypto chip)
• IstatReg—Interrupt status register (set by crypto chip)
• PciErrReg—PCI error register (set by crypto chip)
• CoreErrStat—Core error status (set by crypto chip)
• CoreErrAddr—Core error address (set by crypto chip)
• Doorbell Size—Maximum crypto commands allowed
• DoorBell Outstanding—Crypto commands outstanding
• SWReset—Number of crypto chip resets since boot
Recommended Action Forward the message information to the Cisco TAC for further analysis.
402125
Error Message %ASA-4-402125: The ASA hardware accelerator ring timed out
(parameters).
Explanation The crypto driver has detected that either the IPSEC descriptor ring or SSL/Admin
descriptor ring is no longer progressing, meaning the crypto chip no longer appears to be
functioning. The crypto chip is reset when this condition is detected to unobtrusively allow the ASA
to continue functioning. Also, the crypto environment at the time this issue was detected was written
to a crypto archive directory on flash to provide further debugging information.
• ring—IPSEC or Admin ring
• parameters—Include the following:
- Desc—Descriptor address
- CtrlStat—Control/status value
- ResultP—Success pointer
- ResultVal—Success value
- Cmd—Crypto command
- CmdSize—Command size
- Param—Command parameters
- Dlen—Data length
- DataP—Data pointer
- CtxtP—VPN context pointer
- SWReset—Number of crypto chip resets since boot
Recommended Action Forward the message information to the Cisco TAC for further analysis.
402126
Error Message %ASA-4-402126: CRYPTO: The ASA created Crypto Archive File
Archive Filename as a Soft Reset was necessary. Please forward this archived
information to Cisco.
Explanation A functional problem with the hardware crypto chip was detected (see syslog messages
402124 and 402125). To further debug the crypto problem, a crypto archive file was generated that
included the current crypto hardware environment (hardware registers and crypto description
entries). At boot time, a crypto_archive directory was automatically created on the flash file system
(if it did not exist previously). A maximum of two crypto archive files are allowed to exist in this
directory.
• Archive Filename—The name of the crypto archive file name. The crypto archive file names are
of the form, crypto_arch_x.bin, where x = (1 or 2).
Recommended Action Forward the crypto archive files to the Cisco TAC for further analysis.
402127
Error Message %ASA-4-402127: CRYPTO: The ASA is skipping the writing of latest Crypto
Archive File as the maximum # of files, max_number, allowed have been written to
archive_directory. Please archive & remove files from Archive Directory if you
want more Crypto Archive Files saved.
Explanation A functional problem with the hardware crypto chip was detected (see messages
4402124 and 4402125). This message indicates a crypto archive file was not written, because the
maximum number of crypto archive files already existed.
• max_number—Maximum number of files allowed in the archive directory; currently set to two
• archive_directory—Name of the archive directory
Recommended Action Forward previously generated crypto archive files to the Cisco TAC. Remove
the previously generated archive file(s) so that more can be written (if deemed necessary).
402128
Explanation An SSL connection is attempting to use more memory than allowed. The request has
been denied.
• size—The size of the memory block being allocated
• limit—The maximum size of allocated memory permitted
Recommended Action If this message persists, an SSL denial of service attack may be in progress.
Contact the remote peer administrator or upstream provider.
402129
Error Message %ASA-6-402129: CRYPTO: An attempt to release a DMA memory block failed,
location: address
402130
Explanation The ASA crypto hardware accelerator detected an IPsec packet with invalid padding.
The ATT VPN client sometimes pads IPsec packets incorrectly.
• SPI—The SPI associated with the packet
• sequence number—The sequence number associated with the packet
• user—Username string
• padding—Padding data from the packet
Recommended Action While this message is None required and does not indicate a problem with the
ASA, customers using the ATT VPN client may wish to upgrade their VPN client software.
402131
Explanation The hardware accelerator configuration has been changed on the ASA. Some ASA
platforms have multiple hardware accelerators. One syslog message is generated for each hardware
accelerator change.
• status—Indicates success or failure
• accel_instance—The instance of the hardware accelerator
• old_config_bias—The old configuration
• new_config_bias—The new configuration
Recommended Action If any of the accelerators fails when attempting to change its configuration,
collect logging information and contact the Cisco TAC. If a failure occurs, the software will retry
the configuration change multiple times. The software will fall back to the original configuration
bias if the retry attempts fail. If multiple attempts to reconfigure the hardware accelerator fail, it
may indicate a hardware failure.
402140
Error Message %ASA-3-402140: CRYPTO: RSA key generation error: modulus len len
402141
Error Message %ASA-3-402141: CRYPTO: Key zeroization error: key set type, reason
reason
402142
Error Message %ASA-3-402142: CRYPTO: Bulk data op error: algorithm alg, mode mode
402143
402144
402145
402146
Error Message %ASA-3-402146: CRYPTO: Keyed hash generation error: algorithm hash,
key len len
402147
402148
403101
Error Message %ASA-4-403101: PPTP session state not established, but received an XGRE
packet, tunnel_id=number, session_id=number
Explanation The ASA received a PPTP XGRE packet without a corresponding control connection
session.
403102
Error Message %ASA-4-403102: PPP virtual interface interface_name rcvd pkt with
invalid protocol: protocol, reason: reason.
Explanation The module received an XGRE encapsulated PPP packet with an invalid protocol field.
403103
Explanation The module cannot accept additional PPTP connections.Connections are allocated as
soon as they are available.
403104
Explanation The MPPE was configured, but MS-CHAP authentication was not.
Recommended Action Add MS-CHAP authentication with the vpdn group group_name ppp
authentication command.
403106
Explanation The MPPE was configured, but RADIUS authentication was not.
Recommended Action Add RADIUS authentication with the vpdn group group_name ppp
authentication command.
403107
Error Message %ASA-4-403107: PPP virtual interface interface_name missing aaa server
group info
Recommended Action Add the AAA server information with the vpdn group group_name client
authentication aaa aaa_server_group command.
403108
Recommended Action Add IP address pool information with the vpdn group group_name client
configuration address local address_pool_name command.
403109
Explanation The module received a spoofed PPTP packet, which may indicate a hostile event.
Recommended Action Contact the administrator of the peer to check the PPTP configuration settings.
403110
Explanation The AAA server was not returning the MPPE key attributes required to set up the MPPE
encryption policy.
Recommended Action Check the AAA server configuration. If the AAA server cannot return MPPE
key attributes, use local authentication instead by entering the vpdn group group_name client
authentication local command.
403500
Error Message %ASA-6-403500: PPPoE - Service name 'any' not received in PADO.
Intf:interface_name AC:ac_name.
Explanation The ASA requested the PPPoE service any from the access controller at the Internet
service provider. The response from the service provider includes other services, but does not
include the service any. This is a discrepancy in the implementation of the protocol. The PADO
packet is processed normally, and connection negotiations continue.
403501
Explanation The ASA sent an identifier called the host-unique value to the access controller. The
access controller responded with a different host-unique value. The ASA was unable to identify the
corresponding connection request for this response. The packet was dropped, and connection
negotiations were discontinued.
Recommended Action Contact the Internet service provider. Either the access controller at the service
provider is mishandling the host-unique value, or the PADO packet is being forged.
403502
Explanation The ASA sent an identifier called the host-unique value to the access controller. The
access controller responded with a different host-unique value. The ASA was unable to identify the
corresponding connection request for this response. The packet was dropped, and connection
negotiations were discontinued.
Recommended Action Contact the Internet service provider. Either the access controller at the service
provider is mishandling the host-unique value, or the PADO packet is being forged.
403503
Explanation The PPP link has gone down. There are many reasons why this can happen. The first
format will display a reason if PPP provides one.
Recommended Action Check the network link to ensure that the link is connected. The access
concentrator may be down. Make sure that your authentication protocol matches the access
concentrator and that your name and password are correct. Verify this information with your ISP or
network support person.
403504
Error Message %ASA-3-403504: PPPoE:No 'vpdn group group_name' for PPPoE is created
Explanation PPPoE requires a dial-out configuration before starting a PPPoE session. In general, the
configuration should specify a dialing policy, the PPP authentication, the username, and a password.
The following example configures the ASA for PPPoE dialout. The my-username and
my-password commands are used to authenticate the access concentrator, using PAP if necessary.
For example:
hostname# vpdn group my-pppoe request dialout pppoe
hostname# vpdn group my-pppoe ppp authentication pap
hostname# vpdn group my-pppoe localname my-username
hostname# vpdn username my-username password my-password
hostname# ip address outside pppoe setroute
403505
Explanation This message is usually followed by the message, default route already exists.
Recommended Action Remove the current default route or remove the setroute parameter so that there
is no conflict between PPPoE and the manually configured route.
403506
Explanation This message is followed by one of the followings messages: subnet is the same as
interface, or on failover channel.
Recommended Action In the first case, change the address causing the conflict. In the second case,
configure the PPPoE on an interface other than the failover interface.
403507
Explanation You can configure the PPPoE client on an interface to use a particular VPDN group by
entering the pppoe client vpdn group group_name command. If a PPPoE VPDN group of the
configured name was not located during system startup, this message is generated.
• interface—The interface on which the PPPoE client failed
• group_name —The VPDN group name of the PPPoe client on the interface
Note All changes take effect only after the PPPoE client on the interface is restarted by entering the
ip address pppoe command.
405001
Explanation The ASA received an ARP packet, and the MAC address in the packet differs from the
ARP cache entry.
Recommended Action This traffic might be legitimate, or it might indicate that an ARP poisoning
attack is in progress. Check the source MAC address to determine where the packets are coming
from and to see if they belong to a valid host.
405003
Explanation A client IP address in the network is the same as the ASA interface IP address.
405101
Explanation The module failed to allocate RAM system memory while starting a connection or has
no more address translation slots available.
Recommended Action If this message occurs periodically, it can be ignored. You can check the size
of the global pool compared to the number of inside network clients. A PAT address may be
necessary. Alternatively, shorten the timeout interval of translates and connections. This error
message may also be caused by insufficient memory; try reducing the amount of memory usage, or
purchasing additional memory. If the problem persists, contact the Cisco TAC.
405002
• You configured the vpnclient mac-exempt command on the ASA, and the ASA received a
packet with an exempt MAC address, but a different IP address from the corresponding uauth
entry.
Recommended Action This traffic might be legitimate, or it might indicate that a spoofing attack is in
progress. Check the source MAC address and IP address to determine where the packets are coming
from and if they belong to a valid host.
405101
Explanation The ASA failed to allocate RAM system memory while starting a connection or has no
more address translation slots available.
Recommended Action Check the size of the global pool compared to the number of inside network
clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of translations
and connections. Also, reduce the amount of memory usage, or purchase additional memory. If this
message occurs periodically, it can be ignored. If the problem persists, contact the Cisco TAC.
405102
Explanation The ASA failed to allocate RAM system memory while starting a connection or has no
more address translation slots available.
Recommended Action Check the size of the global pool compared to the number of inside network
clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of translations
and connections. In addition, reduce the amount of memory usage, or purchase additional memory.
If this message occurs periodically, it can be ignored. If the problem persists, contact the Cisco TAC.
405103
Explanation The ASA is expecting the protocol discriminator, 0x08, but it received something other
than 0x08. The endpoint may be sending a bad packet, or received a message segment other than the
first segment. The packet is allowed through.
405104
Explanation An H.225 message was received out of order, before the initial SETUP message, which
is not allowed. The ASA must receive an initial SETUP message for that H.225 call signalling
channel before accepting any other H.225 messages.
405105
Explanation A gatekeeper has sent an ACF, but the ASA did not send an ARQ to the gatekeeper.
Recommended Action Check the gatekeeper with the specified source_address to determine why it
sent an ACF without receiving an ARQ from the ASA.
405106
Error Message %ASA-4-405106: H323 num channel is not created from %I/%d to %I/%d %s
Explanation The ASA tried to create a match condition on the H.323 media-type channel. See the
match media-type command for more information.
405107
Error Message %ASA-4-405107: H245 Tunnel is detected and connection dropped from
%I/%d to %I/%d %s
Explanation An H.323 connection has been dropped because of an attempted H.245 tunnel control
during call setup. See the h245-tunnel-block command for more information.
405201
Explanation The embedded address in the ILS packet payload was not the same as the source IP
address of the IP packet header.
Recommended Action Check the host specified with the source_IP_address to determine why it sent
an ILS packet with an incorrect embedded IP address.
405300
Explanation The accounting request came from a host that was not configured in the policy map. The
message is logged and processing stops.
• from_addr—The IP address of the host sending the request
Recommended Action If the host was configured to send RADIUS accounting messages to the ASA,
make sure that it was configured in the correct policy map that was applied to the service policy. If
the host was not configured to send RADIUS accounting messages to the ASA, then check to see
why the messages are being sent. If the messages are illegitimate, then create the proper ACLs to
drop the packets.
405301
Error Message %ASA-4-405301: Attribute attribute_number does not match for user
user_ip
Explanation When the validate-attribute command was entered, the attribute values stored in the
accounting request start received do not match those stored in the entry, if it exists.
• attribute_number—The RADIUS attribute to be validated with RADIUS accounting. Values
range from 1 to 191. Vendor-specific attributes are not supported.
• user_ip—The IP address (framed IP attribute) of the user.
406001
Explanation A client entered an FTP port command and supplied a port less than 1024 (in the
well-known port range usually devoted to server ports). This is indicative of an attempt to avert the
site security policy. The ASA drops the packet, terminates the connection, and logs the event.
406002
Explanation A client entered an FTP port command and supplied an address other than the address
used in the connection. An attempt to avert the site security policy occurred. For example, an
attacker might attempt to hijack an FTP session by changing the packet on the way, and putting
different source information instead of the correct source information. The ASA drops the packet,
terminates the connection, and logs the event. The address in parentheses is the address from the
port command.
407001
Explanation The host limit was exceeded. An inside host is counted toward the limit when one of the
following conditions is true:
• The inside host has forwarded traffic through the ASA within the last five minutes.
• The inside host has reserved an xlate connection or user authentication at the ASA.
Recommended Action The host limit is enforced on the low-end platforms. Use the show version
command to view the host limit. Use the show local-host command to view the current active hosts
and the inside users that have sessions at the ASA. To forcefully disconnect one or more users, use
the clear local-host command. To expire the inside users more quickly from the limit, set the xlate,
connection, and uauth timeouts to the recommended values or lower. (See Table 1-6.)
407002
Explanation The number of connections from a specified foreign address over a specified global
address to the specified local address exceeded the maximum embryonic limit for that static. The
ASA tries to accept the connection if it can allocate memory for that connection. It proxies on behalf
of the local host and sends a SYN_ACK packet to the foreign host. The ASA retains pertinent state
information, drops the packet, and waits for the acknowledgment from the client. The message
might indicate legitimate traffic or that a DoS attack is in progress.
Recommended Action Check the source address to determine where the packets are coming from and
whether or not a valid host is sending them.
407003
Error Message %ASA-4-407003: Established limit for RPC services exceeded number
Explanation The ASA tried to open a new hole for a pair of RPC servers or services that have already
been configured after the maximum number of holes has been met.
Recommended Action Wait for other holes to be closed (through associated timeout expiration), or
limit the number of active pairs of servers or services.
408001
Explanation An attempt to decrement the IP route counter into a negative value failed.
Recommended Action Enter the clear ip route command to reset the route counter. If the problem
persists, contact the Cisco TAC.
408002
Error Message %ASA-4-408002: ospf process id route type update address1 netmask1
[distance1/metric1] via source IP:interface1 address2 netmask2
[distance2/metric2] interface2
Explanation A network update was received from a different interface with the same distance and a
better metric than the existing route. The new route overrides the existing route that was installed
through another interface. The new route is for redundancy purposes only and means that a path has
shifted in the network. This change must be controlled through topology and redistribution. Any
existing connections affected by this change are probably disabled and will time out. This path shift
only occurs if the network topology has been specifically designed to support path redundancy, in
which case it is expected.
408003
Explanation A component of the tracking system has encountered an object type that is not supported
by the component. A STATE object was expected.
• hex—A hexidecimal value(s) depicting variable value(s) or addresses in memory
409001
Explanation The software detected an unexpected condition. The router will take corrective action
and continue.
409002
409003
Explanation An invalid OSPF packet was received. Details are included in the error message. The
cause might be an incorrect OSPF configuration or an internal error in the sender.
Recommended Action Check the OSPF configuration of the receiver and the sender configuration for
inconsistency.
409004
Explanation The OSPF hello, database description, or database request packet was received, but the
router cannot identify the sender.
409005
Error Message %ASA-4-409005: Invalid length number in OSPF packet from IP_address
(ID IP_address), interface_name
Explanation The ASA received an OSPF packet with a field length of less than normal header size
or that was inconsistent with the size of the IP packet in which it arrived. This indicates a
configuration error in the sender of the packet.
Recommended Action From a neighboring address, locate the problem router and reboot it.
409006
Error Message %ASA-4-409006: Invalid lsa: reason Type number, LSID IP_address from
IP_address, IP_address, interface_name
Explanation The router received an LSA with an invalid LSA type. The cause is either memory
corruption or unexpected behavior on a router.
Recommended Action From a neighboring address, locate the problem router and reboot it. If the
problem persists, contact the Cisco TAC.
409007
Error Message %ASA-4-409007: Found LSA with the same host bit set but using different
mask LSA ID IP_address netmask New: Destination IP_address netmask
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
409008
Error Message %ASA-4-409008: Found generating default LSA with non-zero mask LSA
type: number Mask: netmask metric: number area: string
Explanation The router tried to generate a default LSA with an incorrect mask and possibly incorrect
metric because an internal software error occurred.
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
409009
Error Message %ASA-4-409009: OSPF process number cannot start. There must be at least
one up IP interface, for OSPF to use as router ID
Explanation OSPF failed while attempting to allocate a router ID from the IP address of one of its
interfaces.
Recommended Action Make sure that there is at least one interface that is up and has a valid IP
address. If there are multiple OSPF processes running on the router, each requires a unique router
ID. You must have enough interfaces up so that each of them can obtain a router ID.
409010
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
409011
Explanation OSPF received a hello packet from a neighbor that has the same router ID as this routing
process. A full adjacency cannot be established.
Recommended Action The OSPF router ID should be unique. Change the neighbor router ID.
409012
Explanation OSPF received a hello packet from a neighbor that has the same router ID as this routing
process. A full adjacency cannot be established.
Recommended Action The OSPF router ID should be unique. Change the neighbor router ID.
409013
Explanation OSPF received a hello packet from a neighbor that has the same router ID as this routing
process. A full adjacency cannot be established.
Recommended Action The OSPF router ID should be unique. Change the neighbor router ID.
409023
Explanation An authentication or authorization attempt to an external server has failed and will be
performed using the local user database.
• aaa_operation—Either authentication or authorization
• username—The user associated with the connection
• server_group—The name of the AAA server whose servers were unreachable
Recommended Action Investigate any connectivity problems with the AAA servers configured in the
first method. Ping the authentication servers from the ASA. Make sure that the daemons are running
on the AAA server.
409101
Explanation An invalid OSPF packet was received. Details are included in the error message. The
cause might be a misconfigured OSPF or an internal error in the sender.
Recommended Action Check the OSPF configuration of the receiver and the sender for
inconsistencies.
409102
Error Message %ASA-4-409102: Received packet with incorrect area from P, s, area
AREA_ID_STR, packet area AREA_ID_STR
Explanation An OSPF packet was received with an area ID in its header that does not match the area
of this interface.
Recommended Action Check the OSPF configuration of the receiver and the sender for
inconsistencies.
409103
Explanation An OSPF hello, database description, or database request packet was received, but the
router could not identify the sender.
409104
Error Message %ASA-4-409104: Invalid length d in OSPF packet type d from P (ID i), s
Explanation The system received an OSPF packet with a length field of less than normal header size
or inconsistent with the size of the IP packet in which it arrived. An error in the sender of the packet
has occurred.
409105
Explanation The router received an LSA with invalid data. The LSA includes an invalid LSA type,
incorrect checksum, or incorrect length, which is caused by either memory corruption or unexpected
behavior on a router.
Recommended Action From a neighboring address, locate the problem routerand do the following:
• Collect a running configuration of the router by entering the show running-config command.
• Enter the show ipv6 ospf database command to gather data that may help identify the nature
of the error.
• Enter the show ipv6 ospf database link-state-id command. The link-state-id argument is the IP
address of the invalid LSA.
• Enter the show logging command to gather data that may help identify the nature of the error.
• Reboot the router.
If you cannot determine the nature of the error from the collected information, contact the Cisco
TAC and provide the gathered information.
409106
Error Message %ASA-4-409106: Found generating default LSA with non-zero mask LSA
type: 0x x Mask: i metric: lu area: AREA_ID_STR
Explanation The router tried to generate the default LSA with the incorrect mask and possibly an
incorrect metric because of an internal software error.
409107
Error Message %ASA-4-409107: OSPFv3 process d could not pick a router-id, please
configure manually
Explanation OSPFv3 failed while attempting to allocate a router ID from the IP address of one of its
interfaces.
Recommended Action Make sure that there is at least one interface that is up and has a valid IP
address. If there are multiple OSPF processes running on the router, each requires a unique router
ID. You must have enough up interfaces so that each of them can obtain a router ID.
409108
409109
Explanation OSPF received a hello packet from a neighbor that has the same router ID as this routing
process. A full adjacency cannot be established. The OSPF router ID should be unique.
409110
Explanation OSPF received a hello packet from a neighbor that has the same router ID as this routing
process. A full adjacency cannot be established. The OSPF router ID should be unique.
409111
Explanation OSPFv3 enabled on multiple interfaces that are on the same link is not supported.
Recommended Action OSPFv3 should be disabled or made passive on all except one of the interfaces.
409112
409113
409114
409115
409116
409117
Error Message %ASA-4-409117: Can't find LSA database type x, area AREA_ID_STR,
interface x
409118
409119
409120
Explanation The ASA attempted to assign a router ID that is in use by another process.
409121
Error Message %ASA-4-409121: Router is currently an ASBR while having only one area
which is a stub area
Explanation An ASBR must be attached to an area that can carry AS External or NSSA LSAs.
Recommended Action Make the area to which the router is attached into an NSSA or regular area.
409122
Error Message %ASA-4-409122: Could not select a global IPv6 address. Virtual links
require at least one global IPv6 address.
Explanation A virtual link was configured. For the virtual link to function, a global IPv6 address
must be available. However, no global IPv6 address could be found on the router.
409123
Recommended Action Check the configuration options for the neighbor command, and correct the
options or the network type for the neighbor interface.
409125
Error Message %ASA-4-409125: Can not use configured neighbor: poll and priority
options are allowed only for a NBMA network
Explanation The configured neighbor was found on a point-to-multipoint network and either the poll
or priority option was configured. These options are only allowed on NBMA type networks.
Recommended Action Check the configuration options for the neighbor command, and correct the
options or the network type for the neighbor interface.
409128
Explanation The router indicated in this message has originated an LSA with an invalid metric. If
this is a router LSA and the link metric is zero, a risk of routing loops and traffic loss exists in the
network.
Recommended Action Configure a valid metric for the given LSA type and link type on the router that
originated the reported LSA.
410001
Explanation The domain-name length exceeds 255 bytes in a UDP DNS packet. See RFC 1035,
Section 3.1 for more information.
410002
Error Message %ASA-2-410002: Dropped num DNS responses with mis-matched id in the
past sec second(s): from src_ifc:sip/sport to dest_ifc:dip/dport
Explanation The ASA detects an excess number of DNS responses with a mismatched DNS
identifier. A high rate of mismatched DNS identifiers might indicate an attack on the cache. The
threshold is set by the id-mismatch DNS policy-map parameter submode command.
• num—The number of ID mismatch instances as configured by the id-mismatch command
• sec—The duration in seconds as configured by the id-mismatch command
• src_ifc—The source interface name at which the DNS message is received with a mismatched
DNS identifier
• sip—The source IP address
• sport—The source port
• dest_ifc—The destination interface name
• dip—The destination IP address
• dport—The destination port
Recommended Action Check the IP address and port in the message to trace the source of the attack.
You can configure ACLs to block traffic permanently from the source.
410003
Explanation A DNS classification was performed on a DNS message and the specified criteria were
satisfied. As a result, the configured action occurs.
• action_class—The DNS Classification action class
• action—The action taken: Dropped, Dropped (no TSIG), or Masked header flags for
• query_response—Either query or response
410004
Explanation A DNS classification was performed on a DNS message and the specified criteria were
satisfied.
• action_class—The DNS Classification action class
• action—The action taken: Received or Received (no TSIG)
• query_response—Either query or response
• src_ifc—The source interface name
• sip—The source IP address
• sport—The source port
• dest_ifc—The destination interface name
• dip—The destination IP address
• dport—The destination port
• further_info—One of the following: matched Class id: class_name, matched Class id:
match_command (for a standalone match command), or TSIG resource record not present (for
messages generated by the tsig enforced command)
411001
Explanation The status of the line protocol has changed from down to up. If interface_name is a
logical interface name such as inside and outside, this message indicates that the logical interface
line protocol has changed from down to up. If interface_name is a physical interface name such as
Ethernet0 and GigabitEthernet0/1, this message indicates that the physical interface line protocol
has changed from down to up.
411002
Explanation The status of the line protocol has changed from up to down. If interface_name is a
logical interface name such as inside and outside, this message indicates that the logical interface
line protocol has changed from up to down. In this case, the physical interface line protocol status
is not affected. If interface_name is a physical interface name such as Ethernet0 and
GigabitEthernet0/1, this message indicates that the physical interface line protocol has changed
from up to down.
Recommended Action If this is an unexpected event on the interface, check the physical line.
411003
Explanation The configuration status of the interface has changed from down to up.
411004
Explanation The configuration status of the interface has changed from down to up.
411005
Explanation The interface experienced a hardware transmit freeze that required a reset of the
Ethernet controller to restore the interface to full operation. This is a known issue with Gigabit
interfaces on ASA 5510, ASA 5520, ASA 5540, and ASA 5550 ASAs.
• variable 1—The interface name, such as GigabitEthernet0/0
412001
Explanation A host move was detected from one module interface to another. In a transparent ASA,
mapping between the host (MAC) and ASA port is maintained in a Layer 2 forwarding table. The
table dynamically binds packet source MAC addresses to an ASA port. In this process, whenever
movement of a host from one interface to another interface is detected, this message is generated.
Recommended Action The host move might be valid or might be an attempt to spoof host MACs on
other interfaces. If it is a MAC spoof attempt, you can either locate vulnerable hosts on your network
and remove them or configure static MAC entries, which will not allow MAC address and port
binding to change. If it is a genuine host move, no action is required.
412002
Explanation The bridge table was full and an attempt was made to add one more entry. The ASA
maintains a separate Layer 2 forwarding table per context and the message is generated whenever a
context exceeds its size limit. The MAC address will be added, but it will replace the oldest existing
dynamic entry (if available) in the table. This might be an attempted attack.
Recommended Action Make sure that the new bridge table entries are valid. In case of attack, use
EtherType ACLs to control access to vulnerable hosts.
413001
Error Message %ASA-4-413001: Module module_id is not able to shut down. Module
Error: errnum message
Explanation The module identified by module_id was not able to comply with a request from the
ASA system module to shut down. It may be performing a task that cannot be interrupted, such as
a software upgrade. The errnum and message text describes the reason why the module cannot shut
down, and the recommended corrective action.
Recommended Action Wait for the task on the module to complete before shutting down the module,
or use the session command to access the CLI on the module, and stop the task that is preventing
the module from shutting down.
413002
Error Message %ASA-4-413002: Module module_id is not able to reload. Module Error:
errnum message
Explanation The module identified by module_id was not able to comply with a request from the
ASA module to reload. It may be performing a task that cannot be interrupted, such as a software
upgrade. The errnum and message text describes the reason why the module cannot reload, and the
recommended corrective action.
Recommended Action Wait for the task on the module to complete before reloading the module, or
use the session command to access the CLI on the module and stop the task that is preventing the
module from reloading.
413003
Explanation A module was detected that is not recognized as a valid module type.
Recommended Action Upgrade to a version of ASA software that supports the module type installed.
413004
Error Message %ASA-4-413004: Module string one failed to write software newver
(currently ver), reason. Trying again.
Explanation The module failed to accept a software version, and will be transitioned to an
UNRESPONSIVE state. Another attempt will be made to update the module software.
• string one—The text string that specifies the module
• newver—The new version number of software that was not successfully written to the module
(for example, 1.0(1)0)
• ver—The current version number of the software on the module (for example, 1.0(1)0)
• reason—The reason the new version cannot be written to the module. The possible values for
reason include the following:
- write failure
- failed to create a thread to write the image
Recommended Action None required. Subsequent attempts will either generate a message indicating
a successful update or failure. You may verify the module transitions to UP after a subsequent update
attempt by using the show module command.
413005
Explanation The module installed in slot slot_num was running an unsupported application version
or type.
• module_id—The name of the software services module
• prod_id—Product ID string
• slot_num—The slot number in which the module is installed. Slot 0 indicates the system main
board, and slot 1 indicates the module installed in the expansion slot.
• app_name—Application name (string)
• app_vers—Application version (string)
• app_type—Application type (decimal)
413006
Error Message %ASA-4-413006: prod-id Module software version mismatch; slot slot is
prod-id version running-vers. Slot slot prod-id requires required-vers.
Explanation The version of software running on the module in slot slot was not the version required
by another module.
• slot—Slot 0 indicates the system main board. Slot 1 indicates the module installed in the
expansion slot.
• prod_id—Product ID string for the device installed in slot slot
• running_vers—Version of software currently running on the module installed in slot slot
• required_vers—Version of software required by the module in slot slot
413007
Explanation An unsupported ASA and IPS configuration has been detected during IPS SSP setup for
slot 1. The ASA should continue to function normally with an unsupported configuration.
• mpc_description—A description string for the ASA model, which can be one of the following:
ASA5585-SSP-10, ASA5585-SSP-20, ASA5585-SSP-40, ASA5585-SSP-60,
ASA5585-SSP-10-K7, ASA5585-SSP-20-K7, ASA5585-SSP-40-K7, ASA5585-SSP-60-K7.
• ips_description—A description string for the IPS SSP model, which can be one of the
following: ASA5585-SSP-IPS10, ASA5585-SSP-IPS20, ASA5585-SSP-IPS40,
ASA5585-SSP-IPS60, ASA5585-SSP-P10K7, ASA5585-SSP-P20K7, ASA5585-SSP-P40K7,
ASA5585-SSP-P60K7.
413008
Explanation Only one power supply and one fan module are inserted when an ASA 10G SSP and IPS
10G SSP are present.
Recommended Action When using an ASA 10G SSP and IPS 10G SSP, insert two power supplies
instead of one fan module and one power supply module.
414001
Error Message %ASA-3-414001: Failed to save logging buffer using file name filename
to FTP server ftp_server_address on interface interface_name: [fail_reason]
Explanation The logging module failed to save the logging buffer to an external FTP server.
414002
Explanation The logging module failed to save the logging buffer to system flash.
Recommended Action If the failed reason is caused by insufficient space, check the flash free space,
and make sure that the configured limits of the logging flash-size command are set correctly. If the
error is a flash file system I/O error, then contact the Cisco TAC for assistance.
414003
Error Message %ASA-3-414003: TCP Syslog Server intf: IP_Address/port not responding.
New connections are [permitted|denied] based on logging permit-hostdown policy.
Explanation The TCP syslog server for remote host logging was successful, is connected to the
server, and new connections are permitted or denied based on the logging permit-hostdown policy.
If the logging permit-hostdown policy is configured, a new connection is permitted. If not
configured, a new connection is denied.
• intf—Interface of the ASA to which the server is connected
• IP_Address—IP address of the remote TCP syslog server
• port—Port of the remote TCP syslog server
Recommended Action Validate that the configured TCP syslog server is up. To permit new
connections, configure the logging permit-hostdown policy. To deny new connections, do not
configure the logging permit-hostdown policy.
414004
Explanation A retry to the TCP syslog server has been successful, and the connection has been
established. This message is the first to reach the syslog server after a successful connection.
• intf—Interface of the ASA to which the server is connected
• IP_Address—IP address of the remote TCP syslog server
• port—Port of the remote TCP syslog server
414005
Error Message %ASA-3-414005: TCP Syslog Server intf: IP_Address/port connected, New
connections are permitted based on logging permit-hostdown policy
Explanation The TCP syslog server for remote host logging was successful, is connected to the
server, and new connections are permitted based on the logging permit-hostdown policy. If the
logging permit-hostdown policy is configured, a new connection is permitted.
• intf—Interface of the ASA to which the server is connected
• IP_Address—IP address of the remote TCP syslog server
• port—Port of the remote TCP syslog server
414006
Error Message %ASA-3-414006: TCP Syslog Server configured and logging queue is full.
New connections denied based on logging permit-hostdown policy.
Explanation The logging queue is close to reaching the configured limit, so there is a risk that syslog
messages will be discarded.
Recommended Action See the "Configuring the Logging Queue" section in the CLI configuration
guide for information about how to tune the queue size to avoid this situation. If you want to deny
new connections in this case, use the no logging permit-hostdown command. If you want to allow
new connections in this case, use the logging permit-hostdown command.
414007
Error Message %ASA-6-414007: TCP Syslog Server connection restored. New connections
are allowed.
Explanation The TCP syslog server for remote host logging was successfully connected and new
connections are permitted.
414008
Error Message %ASA-6-414008: New connections are now allowed due to change of logging
permit-hostdown policy.
Explanation An administrator changed the logging permit-hostdown policy by entering the logging
permit-hostdown command at a time when new connections are being denied. Due to this change
of policy, new connections will be allowed.
415001
Recommended Action Enter the match {request | response} header command to reconfigure the
HTTP header field value.
415002
Explanation The specified HTTP header field length exceeded the user-configured length.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping connection or Resetting connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
Recommended Action Enter the match {request | response} header header_name length gt num
command to change the HTTP header field length.
415003
Explanation The length of the message body exceeded the user-configured length.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
Recommended Action Enter the match {request | response} body length gt num command to change
the length of the message body.
415004
Explanation The magic number in the body of the HTTP message is not the correct magic number
for the MIME-type specified in the content-type field in the HTTP message header.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
Recommended Action Enter the match {request | response} header content-type violation
command to correct the error.
415005
Recommended Action Enter the match request uri length gt num command to change the length of
the URI.
415006
Explanation The URI matched the regular expression that the user configured. See the match
request uri regex {regex-name | class class-name} command for more information.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
415007
Explanation The message body matched the regular expression that the user configured. See the
match {request | response} body regex {regex-name | class class-name} command for more
information.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
415008
Explanation A value in a user-specified field in the message header matched the regular expression
that the user configured. See the match {request | response } header header-field-name
{regex-name | class class-name} command for more information.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
415009
Explanation The HTTP method matched the user-configured regular expression. See the match
request method {regex-name | class class-name} command for more information.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
415010
Explanation The value in the transfer encoding field matched the user-configured regular expression
or keyword. See the match {request | response} header transfer-encoding {{regex-name | class
class-name} | keyword} command for more information.
415011
Explanation The HTTP parser cannot detect a valid HTTP message in the first few bytes of an HTTP
message.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
Recommended Action Enter the protocol-violation action {drop | reset} log command to correct the
problem.
415012
Explanation The content-type field did not contain a MIME type that matches a built-in MIME type.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
Recommended Action Enter the match {request | response} header content-type unknown
command to correct the problem.
415013
Explanation A chunked encoding was malformed, and the HTTP message cannot be parsed. In
addition, logging for the protocol-violation command was configured.
• map-name— The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
Recommended Action Enter the protocol-violation action {drop | reset} log command to correct the
problem.
415014
Explanation The MIME type in an HTTP response was not in the accept field of the request.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
Recommended Action Enter the match req-resp content-type mismatch command to correct the
problem.
415015
Recommended Action Enter the match {request | response} header transfer-encoding empty
command to correct the problem.
415016
Explanation The number of unanswered HTTP requests exceeded the internal number of requests
allowed.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
Recommended Action Enter the protocol-violation action {drop | reset} log command to correct the
problem.
415017
Explanation A pattern in the arguments matches the user-configured regular expression or keyword.
See the match request args regex {regex-name | class class-name} command for more information.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
415018
Explanation The total header length exceeded the user-configured length for the header.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
Recommended Action Enter the match {request | response} header length gt num command to
reduce the length of the header.
415019
Explanation The status line in a response matched a user-configured regular expression. See the
match response status-line regex {regex-name | class class-name } command for more
information.
• matched_string—The matched string is one of the following:
- The class map ID, followed by the name of the class map. This string appears when the class
map is user configured.
- The actual match command that initiated the message. This string appears when the class map
is internal.
• map_name—The name of the policy map
• connection_action—Dropping the connection or resetting the connection
• interface_type—The type of interface (for example, DMZ or outside)
• IP_address—The IP address of the interface
• port_num—The port number
415020
Recommended Action Enter the match {request | response} header non-ascii command to correct
the problem.
416001
Explanation An SNMP packet was denied passage through the ASA because of a bad packet format
or because the prot_version is not allowed through the ASA. The prot_version parameter can be one
of the following values: 1, 2, 2c, or 3.
Recommended Action Change the settings for SNMP inspection using the snmp-map command,
which allows the user to permit or deny specific protocol versions.
417001
Explanation A process received a signal, but no handler was found for the event.
417004
Explanation A client tried to modify a route attribute that the client does not own.
417006
Explanation An operation failed because of low memory, but will be handled with another
mechanism.
418001
Explanation A packet from the specified source to the destination was dropped because it is
traversing the ASA to and from the management-only network.
• protocol_string—TCP, UDP, ICMP, or protocol ID as a number in decimal
• interface_name— Interface name
• IP_address—IP address
• port—Port number
• sg_info—Security group name or tag for the specified IP address
419001
Explanation The length of the TCP packet exceeded the MSS advertised in the three-way handshake.
• src_ifc—Input interface name
• src_IP—The source IP address of the packet
• src_port—The source port of the packet
• dest_ifc—The output interface name
• dest_IP—The destination IP address of the packet
• dest_port—The destination port of the packet
Recommended Action If there is a need to allow packets that exceed the MSS, create a TCP map using
the exceed-mss command, as in the following example:
hostname# access-list http-list permit tcp any host server_ip eq 80
419002
Explanation A duplicate TCP SYN was received during the three-way-handshake that has a different
initial sequence number from the SYN that opened the embryonic connection. This may indicate that
SYNs are being spoofed. This message occurs in Release 7.0.4.1 and later.
• in_interface—The input interface
• src_address—The source IP address of the packet
• src_port—The source port of the packet
• out_interface—The output interface
• dest_address—The destination IP address of the packet
• dest_port—The destination port of the packet
419003
Explanation A duplicate TCP SYN was received during the three-way-handshake that has a different
initial sequence number from the SYN that opened the embryonic connection. This may indicate that
SYNs are being spoofed. This message occurs in Release 7.0.4.1 and later.
• in_ifc—The input interface
• src_ip—The source IP address of the packet
• src_port—The source port of the packet
• out_ifc—The output interface
• dest_ip—The destination IP address of the packet
• dest_port—The destination port of the packet
Recommended Action If you need to keep the urgent flag in TCP headers, use the urgent-flag allow
command in TCP map configuration mode.
420001
Error Message %ASA-3-420001: IPS card not up and fail-close mode used, dropping ICMP
packet ifc_in:SIP to ifc_out:DIP (type ICMP_TYPE, code ICMP_CODE)
For example:
%ASA-3-420001: IPS card not up and fail-close mode used, dropping TCP packet
from ifc_in:SIP/SPORT to ifc_out:DIP/DPORT\n
%ASA-3-420001: IPS card not up and fail-close mode used, dropping UDP packet
from ifc_in:SIP/SPORT to ifc_out:DIP/DPORT\n
%ASA-3-420001: IPS card not up and fail-close mode used, dropping protocol
protocol packet from ifc_in:SIP to ifc_out:DIP\n
Explanation Packets are dropped when the IPS fail-close mode is used, and the IPS card is not up.
This message is rate limited.
• ifc_in—Input interface name
• ifc_out—Output interface name
• SIP—Source IP of the packet
• SPORT —Source port of the packet
• DIP—Destination IP of the packet
• DPORT —Destination port of the packet
• ICMP_TYPE—Type of the ICMP packet
• ICMP_CODE—Code of the ICMP packet
420002
420003
420004
Error Message %ASA-6-420004: Virtual Sensor sensor_name was added on the AIP SSM
420005
Error Message %ASA-6-420005: Virtual Sensor sensor_name was deleted from the AIP SSM
Explanation A virtual sensor was deleted from the AIP SSM card.
• n—Card number
420006
Error Message %ASA-3-420006: Virtual Sensor not present and fail-close mode used,
dropping protocol packet from ifc_in:SIP/SPORT to ifc_out:DIP/DPORT
Explanation Packets are dropped when the IPS fail-close mode is used, and the virtual sensor used
for the packet is not present.
• protocol—Protocol used to send the packet
• ifc_in—Input interface name
• ifc_out—Output interface name
• SIP—Source IP address of the packet
• SPORT—Source port of the packet
• DIP—Destination IP address of the packet
• DPORT—Destination port of the packet
420007
Explanation This message is generated by any new feature in the ASA that needs a corresponding
software version in the SSM or SSC hardware module. The message is sent each time that the ASA
module manager detects state changes in the SSM or SSC hardware module.
• application-string—The name of the application (for example, Promiscuous IDS)
• slot_id—The module identifier, which is 1 for the current ASA
• version_number—The version number of the message header between the ASA and the IPS
application
Recommended Action Load the SSM or SSC hardware module with the correct software images that
support the designated application.
420008
Error Message %ASA-3-420008: IPS module license disabled and fail-close mode used,
dropping packet.
Explanation The IPS module license has been disabled and when the fail-close mode is configured,
all traffic destined for the IPS module will be dropped. You can check the status of the license by
using the show activation-key command.
Recommended Action Use the activation-key command to apply an activation key that has the IPS
license enabled.
421001
Explanation A packet was dropped because the CSC SSM application failed. By default, this
message is rate limited to 1 message every 10 seconds.
• interface_name—The interface name
• IP_address—The IP address
• port—The port number
• application—The CSC SSM is the only application supported in the current release
421002
Explanation The connection bypassed service module security checking because the protocol that it
is using cannot be scanned by the service module. For example, the CSC SSM is not capable of
scanning Telnet traffic. If the user configures Telnet traffic to be scanned, the traffic will bypass the
scanning service. By default, this message is rate limited to 1 message every 10 seconds.
• IP_address—The IP address
• port—The port number
• interface_name—The name of the interface on which the policy is applied
• application—The CSC SSM is the only application supported in the current release
Recommended Action The configuration should be modified to only include protocols that are
supported by the service module.
421003
Explanation A packet injected by the service module did not have the correct data plane header.
Packets exchanged on the data backplane adhere to a Cisco proprietary protocol called ASDP. Any
packet that does not have the proper ASDP header is dropped.
Recommended Action Use the capture name type asp-drop [ssm-asdp-invalid-encap] command to
capture the offending packets and contact the Cisco TAC.
421004
Explanation The ASA has failed to inject a packet as instructed by the service module. This may
happen if the ASA tries to inject a packet into a flow that has already been released or when the ASA
maintains its connection table independently from the service module. Normally it will not cause
any problem.
• IP_address—The IP address
• port—The port number
Recommended Action If ASA performance is affected, or if the problem persists, contact the Cisco
TAC.
421005
Explanation A host has been counted toward the license limit. The specified host was counted as a
user of application. The total number of users in 24 hours is calculated at midnight for license
validation.
• interface_name—The interface name
• IP_address—The IP address
• application—The CSC SSM
Recommended Action None required. However, if the overall count exceeds the user license that you
have purchased, contact the Cisco TAC to upgrade your license.
421006
Error Message %ASA-6-421006: There are number users of application accounted during
the past 24 hours.
Explanation The total number of users who have used an application for the past 24 hours have been
identified. This message is generated every 24 hours to give the total number of hosts that have used
services provided by the service module.
• application—The CSC SSM
Recommended Action None required. However, if the overall count exceeds the user license that you
have purchased, contact the Cisco TAC to upgrade your license.
421007
Explanation A flow was skipped because the service module application has failed. By default, this
message is rate limited to 1 message every 10 seconds.
• IP_address—The IP address
• port—The port number
• interface_name—The name of the interface on which the policy is applied
• application—The CSC SSM
422004
Error Message %ASA-4-422004: IP SLA Monitor number0: Duplicate event received. Event
number number1
Explanation The IP SLA monitor process has received a duplicate event. Currently, this message
applies to destroy events. Only one destroy request will be applied. This is only a warning message.
• number0—The SLA operation number
• number1—The SLA operation event ID
Recommended Action If this recurs, enter the show sla monitor configuration SLA_operation_id
command and copy the output of the command. Copy the message as it appears on the console or in
the system log. Then contact the Cisco TAC and provide the representative with the information that
you have, along with information about the application that is configuring and polling the SLA
probes.
422005
Error Message %ASA-4-422005: IP SLA Monitor Probe(s) could not be scheduled because
clock is not set.
Explanation One or more IP SLA monitor probes cannot be scheduled because the system clock was
not set.
Recommended Action Make sure that the system clock is functional by using NTP or another
mechanism.
422006
Explanation The IP SLA monitor probe cannot be scheduled. Either the configured starting time has
already occurred or the starting time is invalid.
• number—The SLA operation ID
• string—A string describing the error
Recommended Action Reschedule the failed probe with a valid start time.
423001
423002
423003
423004
423005
424001
Explanation A packet was dropped because it was traversing the ASA to or from a redundant
interface. Interface functionality is limited on low-end platforms. The interface specified by the
backup interface command can only be a backup for the primary interface configured. If the default
route to the primary interface is up, any traffic through the ASA from the backup interface will be
denied. Conversely, if the default route to the primary interface is down, traffic through the ASA
from the primary interface will be denied.
• protocol_string—The protocol string; for example, TCP or protocol ID (a decimal number)
• intf_in—The input interface name
• src_ip—The source IP address of the packet
• src_port—The source port of the packet
• intf_out—The output interface name
• dst_ip—The destination IP address of the packet
• dst_port—The destination port of the packet
• sg_info—The security group name or tag for the specified IP address
424002
425001
425002
Explanation The specified redundant interface was removed from the configuration.
• redundant_interface_name—Redundant interface name
425003
Explanation The specified physical interface was added to the specified redundant interface as a
member interface.
• interface_name—An interface name
• redundant_interface_name—Redundant interface name
425004
Explanation The specified redundant interface was removed from the specified redundant interface.
• interface_name—An interface name
• redundant_interface_name—Redundant interface name
425005
Explanation Within a redundant interface, one member interface is the active member. Traffic only
passes through the active member interface. The specified physical interface became the active
member of the specified redundant interface. Member interface switchover occurs when one of the
following is true:
– The redundant-interface interface-name active-member interface-name command was
executed.
– The active member interface is down, while the standby member interface is up.
– The standby member interface comes up (from down), while the active member interface
remains down.
• interface_name—An interface name
• redundant_interface_name—Redundant interface name
425006
426001
Explanation The interface port-channel num or the channel-group num mode mode command has
been used on a nonexistent port channel.
• ifc_name—The EtherChannel interface name
• num—The port channel number
426002
426003
Explanation The channel-group num mode mode command has been used.
• ifc_name1—The EtherChannel interface name
• num—The port channel number
426004
Explanation The channel-group num mode mode command is executed on a physical interface and
there is a speed or duplex mismatch of this physical interface with that of the port channel.
• ifc_name—The interface that is being added to the port channel
• ifc_name1—The interface that is already in the port channel and in a bundled state
426101
426102
Explanation A port has been moved to hot-standby state in a span-cluster channel group.
426103
Explanation A standby port has been selected to move to bundled state in a span-cluster channel
group.
426104
Explanation A bundled port has been unbundled in a span-cluster channel group to obtain space for
other ports to be bundled.
428002
Explanation WAAS optimization was detected on a connection. All layer 7 inspection services,
including IPS, are bypassed on WAAS-optimized connections.
Recommended Action No action is required if the network includes WAE devices; otherwise, the
network administrator should investigate the use of the WAAS option on this connection.
429001
Error Message %ASA-3-429001: CXSC card not up and fail-close mode used. Dropping
protocol packet from interface_name:ip_address/port to
interface_name:ip_address/port
Explanation Data has been dropped because an SSP is down and a fail-close policy exists.
Recommended Action Check the status of the service module and contact the Cisco TAC for
assistance, if necessary.
429002
Error Message %ASA-4-429002: CXSC service card requested to drop protocol packet from
interface_name:ip_address/port to interface_name:ip_address/port
Explanation The CXSC SSP requested that the ASA drop a packet of a connection.
429003
Error Message %ASA-4-429003: CXSC service card requested to reset TCP connection from
interface_name:ip_addr/port to interface_name:ip_addr/port
Explanation The CXSC SSP requested that the ASA reset a TCP connection.
429004
Explanation The ASA could not set up to-the-box rules for authentication proxy with the CXSC
action because of some internal errors, such as insufficient memory.
Recommended Action This error should not occur. Contact the Cisco TAC.for assistance.
429005
Explanation The ASA successfully set up to-the-box rules for authentication proxy with the CXSC
action.
429006
Explanation The ASA successfully cleaned up to-the-box rules for authentication proxy with the
CXSC action.
429007
Error Message %ASA-4-429007: CXSC redirect will override Scansafe redirect for flow
from interface_name:ip_address/port to interface_name:ip_address/port with
username
Explanation A flow matches both CXSC and Scansafe redirects. The message indicates that the
CXSC redirect overrides the Scansafe redirect for the displayed flow.
Recommended Action If this is unwanted behavior, then reconfigure the policy to ensure that no
overlap of CXSC and Scansafe redirection occurs for the same flow.
429008
Error Message %ASA-4-429008: Unable to respond to VPN query from CX for session 0x%x.
Reason %s
Explanation The CX sent a VPN session query to the ASA, but it did not respond either because of
an invalid session ID or another reason. Valid reasons can be any of the following:
• TLV length is invalid
• TLV memory allocation failed
• VPN session query message enqueue failed
• VPN session ID is invalid
431001
Recommended Action Examine the dropped RTP packets to determine which field the RTP source is
setting incorrectly. Also examine the source to verify that it is legitimate and not an attacker trying
to misuse an opening in the ASA.
431002
Recommended Action Examine the dropped RTP packets to determine which field the RTP source is
setting incorrectly. Also examine the source to verify that it is legitimate and not an attacker trying
to misuse an opening in the ASA.
444004
Error Message %ASA-2-444004: Temporary license key key has expired. Applying
permanent license key permkey
Explanation The temporary license that was installed has expired. The features that the license
provided are no longer available.
• key—The temporary activation key
• permkey—The permanent activation key
444005
Explanation This message is generated every 24 hours, indicating that the temporary license will
expire in the number of days specified. After that date, the features that the license provided will no
longer be available.
• activation-key—The temporary activation key
Recommended Action If the amount of time remaining is less than 30 days, you should purchase
another time-based activation key before the temporary license runs out.
444007
Explanation The time-based activation key has expired. The specified features that the license
provided are no longer available.
• activation-key—The temporary activation key
• feature—The name of the licensed feature being affected
Recommended Action You must purchase another time-based activation key as soon as possible to
prevent service disruption for the features specified.
444008
Error Message %ASA-4-444008: %s license has expired, and the system is scheduled to
reload in x days. Apply a new activation key to enable %s license and prevent the
automatic reload.
Explanation The specific license has expired, which will cause the system to reload in x days. Apply
a new activation key to enable the specific license and prevent automatic reload.
Recommended Action Apply a new activation key to enable the specific license and prevent automatic
reload.
444009
Error Message %ASA-2-444009: %s license has expired 30 days ago. The system will now
reload.
Explanation The specific license expired 30 days ago. The system will reload.
444100
Explanation A shared license client request was unsuccessfully sent or processed by the server.
• request—Valid requests are:
- get AnyConnect Premium
- release AnyConnect Premium
- transfer AnyConnect Premium
• reason—The reason that the request failed. Valid reasons are:
- connection failed to server
- version not supported by server
- message signature invalid
- client ID unknown by server
- server is not active
- license capacity reached
444101
444102
Error Message %ASA-2-444102: Shared license service inactive. License server is not
responding.
Explanation The shared license service was inactive because the license server was not responding.
The ASA failed to register with the shared license server.
Recommended Action Verify that the license server address, secret, and port are configured correctly.
444103
Error Message %ASA-6-444103: Shared licensetype license usage is over 90% capacity.
Explanation The shared license usage on the network is over 90 percent capacity.
• licensetype—AnyConnect Premium
444104
444105
Explanation The shared license server has been unreachable for 24 hours, and all shared licenses that
have been acquired by the ASA have been released. The ASA failed to register with the license
server.
• licensetype—AnyConnect Premium
• value—The license availability
Recommended Action Verify the connectivity to the license server, and that the configuration has not
been changed on the license server.
444106
Error Message %ASA-4-444106: Shared license backup server address is not available.
Explanation The shared license backup server is not reachable. License server information is not
synchronized with the backup device.
• address—The IPv4 or IPv6 address of the backup license server
444107
Explanation The shared license service has been enabled or disabled on the specified interface.
• ifname—The interface name.
• status—The status of the license server. Valid values are enabled or disabled.
444108
Explanation The multi-site license client ID has registered or expired with the server.
• id—The ID of the client
• state—The state of the license server. Valid values are registered or expired.
444109
Error Message %ASA-4-444109: Shared license backup server role changed to state.
444110
Error Message %ASA-4-444110: Shared license server backup has days remaining as
active license server.
Explanation The shared backup license server is in an active role and remains active for a specified
number of days. The ASA failed to register with the license server, and needs to register with the
primary license server soon.
• days—The number of days left as the active license server
Recommended Action Verify that the license server is online and reachable by the ASA.
444111
Error Message %ASA-2-444111: Shared license backup service has been terminated due
to the primary license server address being unavailable for more than days days.
The license server needs to be brought back online to continue using shared
licensing.
Explanation The shared backup license server active time has expired. The primary server needs to
go online in order for the shared license service to continue.
• address—The IPv4 or IPv6 address of the license server
• days—The number of days that the license server has been unavailable
Recommended Action Register with the primary license server in order to continue using the shared
license service.
446001
Error Message %ASA-4-446001: Maximum TLS Proxy session limit of max_sess reached.
Explanation A configured maximum session limit for TLS proxy was reached. New sessions beyond
the limit were denied.
• max_sess—The currently effective maximum session limit
Recommended Action If more TLS sessions are needed, use the tls-proxy maximum-sessions
max_sess command to increase the limit. Alternatively, you can use the tls-proxy proxy_name and
tls-proxy maximum-sessions max_sess commands, and then reboot for the commands to take
effect.
446003
Explanation The UC-IME license is either on or off. Once enabled, UC-IME can use any number of
available TLS sessions, according to the ASA limit and the K8 export limit.
• src_int—The source interface name (inside or outside)
• src_ip—The source IP address
• src_port—The source port
• dst_int—The destination interface name (inside or outside)
• dst_ip—The destination IP address
• dst_port—The destination port
447001
Error Message %ASA-4-447001: ASP DP to CP queue_name was full. Queue length length,
limit limit
Explanation This message indicates a particular data path (DP) to control point (CP) event queue is
full, and one or more multiple enqueue actions have failed. If the event contains a packet block, such
as for CP application inspection, the packet will be dropped by the DP, and a counter from the show
asp drop command will increment. If the event is for punt to CP, a typical counter is the Punt no
memory ASP-drop counter.
• queue—The name of the DP-CP event queue.
• length—The current number of events on the queue.
• limit—The maximum number of events that are allowed on the queue.
Recommended Action The queue-full condition reflects the fact that the load on the CP has exceeded
the CP processing ability, which may or may not be a temporary condition. You should consider
reducing the feature load on the CP if this message appears repeatedly. Use the show asp event
dp-cp command to identify the features that contribute the most load on the event queue.
448001
Error Message %ASA-4-448001: Denied SRTP crypto session setup on flow from
src_int:src_ip/src_port to dst_int:dst_ip/dst_port, licensed K8 SRTP crypto
session of limit exceeded
Explanation For a K8 platform, the limit of 250 SRTP crypto sessions is enforced. Each pair of SRTP
encrypt or decrypt sessions is counted as one SRTP crypto session. A call is counted toward this
limit only when encryption or decryption is required for a medium, which means that if the
pass-through is set for the call, even if both legs use SRTP, they are not counted toward this limit.
• src_int—The source interface name (inside or outside)
• src_ip—The source IP address
• src_port—The source port
• dst_int—The destination interface name (inside or outside)
• dst_ip—The destination IP address
• dst_port—The destination port
• limit—The K8 limit of SRTP crypto sessions (250)
Recommended Action None required. You can set up new SRTP crypto sessions only when existing
SRTP crypto sessions have been released.
450001
Explanation The licensed host limit was exceeded. This message applies to the ASA 5505 ASA only.
• protocol_id—The protocol ID number
• interface_name—The interface associated with the sender or receiver of the packet
• IP_address—The IP address of the sender/receiver of the packet
• port—The port number of the packet transmitted
• num—The maximum host limit value
500001
Error Message %ASA-5-500001: ActiveX content modified src IP_address dest IP_address
on interface interface_name.
Explanation You have turned on the activex option using the filter command, and the ASA detected
an ActiveX object. The activex option allows the ASA to filter out ActiveX contents by modifying
it so that it no longer is tagged as an HTML object.
500002
Error Message %ASA-5-500002: Java content modified src IP_address dest IP_address on
interface interface_name.
Explanation You have turned on the java option using the filter command, and the ASA detected an
Java applet. The java option allows the ASA to filter out Java contents by modifying it so that it no
longer is tagged as an HTML object.
500003
Error Message %ASA-5-500003: Bad TCP hdr length (hdrlen=bytes, pktlen=bytes) from
source_address/source_port to dest_address/dest_port, flags: tcp_flags, on
interface interface_name
Explanation A header length in TCP was incorrect. Some operating systems do not handle TCP
resets (RSTs) correctly when responding to a connection request to a disabled socket. If a client tries
to connect to an FTP server outside the ASA and the FTP server is not listening, then it sends an
RST. Some operating systems send incorrect TCP header lengths, which causes this problem. UDP
uses ICMP port unreachable messages.
The TCP header length may indicate that it is larger than the packet length, which results in a
negative number of bytes being transferred. A negative number appears by a message as an unsigned
number, which makes it appear much larger than it would be normally; for example, it may show 4
GB transferred in one second. This message should occur infrequently.
500004
Explanation An invalid transport number was used, in which the source or destination port number
for a protocol is zero. The protocol value is 6 for TCP and 17 for UDP.
Recommended Action If these messages persist, contact the administrator of the peer.
500005
Explanation A connection matched with single or multiple inspection and/or single or multiple filter
features that are not allowed to be applied to the same connection.
• protocol—The protocol that the connection was using
• in_ifc_name—The input interface name
• src_address—The source IP address of the connection
• src_port—The source port of the connection
• out_ifc_name—The output interface name
• dest_address—The destination IP address of the connection
• dest_port—The destination port of the packet
Recommended Action Review the class-map, policy-map, service-policy, and/or filter command
configurations that are causing the referenced inspection and/or filter features that are matched for
the connection. The rules for inspection and filter feature combinations for a connection are as
follows:
– The inspect http [http-policy-map] and/or filter url and/or filter java and/or filter activex
commands are valid.
– The inspect ftp [ftp-policy-map] and/or filter ftp commands are valid.
– The filter https command with any other inspect command or filter command is not valid.
Besides these listed combinations, any other inspection and/or filter feature combinations are not
valid.
501101
502101
Error Message %ASA-5-502101: New user added to local dbase: Uname: user Priv:
privilege_level Encpass: string
Explanation A new username record was created, which included the username, privilege level, and
encrypted password.
502102
Error Message %ASA-5-502102: User deleted from local dbase: Uname: user Priv:
privilege_level Encpass: string
Explanation A username record was deleted, which included the username, privilege level, and
encrypted password.
502103
Error Message %ASA-5-502103: User priv level changed: Uname: user From:
privilege_level To: privilege_level
502111
Error Message %ASA-5-502111: New group policy added: name: policy_name Type:
policy_type
Explanation A group policy was configured using the group-policy CLI command.
• policy_name—The name of the group policy
• policy_type—Either internal or external
502112
Explanation A group policy has been removed using the group-policy CLI command.
• policy_name—The name of the group policy
• policy_type—Either internal or external
503001
Explanation An OSPFv2 neighbor has changed its state. The message describes the change and the
reason for it. This message appears only if the log-adjacency-changes command is configured for
the OSPF process.
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
503101
Explanation An OSPFv3 neighbor has changed its state. The message describes the change and the
reason for it. This message appears only if the log-adjacency-changes command is configured for
the OSPF process.
504001
Error Message %ASA-5-504001: Security context context_name was added to the system
504002
Error Message %ASA-5-504002: Security context context_name was removed from the
system
505001
Error Message %ASA-5-505001: Module string one is shutting down. Please wait...
505002
505003
505004
505005
Explanation An IPS module has been detected, and the ASA is initializing control channel
communication with it.
505006
Explanation A module has completed control channel initialization and is in the UP state.
505007
505008
Explanation The services module software is being upgraded. The update is proceeding normally.
• module_id—The name of the software services module
• slot_num—The slot number that contains the hardware services module
• newver—The new version number of software that was not successfully written to the module
(for example, 1.0(1)0)
• ver—The current version number of the software on the module (for example, 1.0(1)0)
505009
Error Message %ASA-5-505009: Module string one software was updated to newver
• ver—The current version number of the software on the module (for example, 1.0(1)0)
505010
505011
505012
Explanation An application was stopped or removed from a services module. This may occur when
the services module upgraded an application or when an application on the services module was
stopped or uninstalled.
• module_id—The name of the software services module
• prod_id—The product ID string for the device installed in the hardwre services module
• slot_num—The slot in which the application was stopped
• application—The name of the application stopped
• version—The application version stopped
Recommended Action If an upgrade was not occurring on the 4GE SSM or the application was not
intentionally stopped or uninstalled, review the logs from the 4GE SSM to determine why the
application stopped.
505013
Explanation An application version changed, such as after an upgrade. A software update for the
application on the services module is complete.
• module_id—The name of the software services module
• application—The name of the application that was upgraded
• version—The application version that was upgraded
• prod_id—The product ID string for the device installed in the hardware services module
• slot_num—The slot in which the application was upgraded
• application—The name of the application that was upgraded
• version—The application version that was upgraded
• newapplication—The new application name
• newversion—The new application version
Recommended Action Verify that the upgrade was expected and that the new version is correct.
505014
Error Message %ASA-1-505014: Module prod_id in slot slot_num, application down name,
version version reason
505015
Explanation The application running on the SSM in slot slot_num is up and running.
• module_id—The name of the software services module
• prod_id—The product ID string for the device installed in the hardware services module
• slot_num—The slot in which the application is running. Slot 0 indicates the system main board,
and slot 1 indicates the module installed in the expansion slot.
• application—The application name (string)
• version—The application version (string)
505016
Error Message %ASA-3-505016: Module module_id application changed from: name version
version state state to: name version state state.
Recommended Action Verify that the change was expected and that the new version is correct.
506001
Explanation The status of a file system has changed. The event and the source of the event that
caused a file system to become available or unavailable appear. Examples of sources and events that
can cause a file system status change are as follows:
• External CompactFlash removed
• External CompactFlash inserted
• External CompactFlash unknown event
507001
Explanation The assembly buffer limit was exceeded during TCP segment reassembly.
• source_address/source_port—The source IP address and the source port of the packet initiating
the connection
• dest_address/dest_port—The destination IP address and the destination port of the packet
initiating the connection
• interface_inside—The name of the interface on which the packet which initiated the connection
arrives
• interface_outside—The name of the interface on which the packet which initiated the
connection exits
• limit—The configured embryonic connection limit for the traffic class
507002
Error Message %ASA-4-507002: Data copy in proxy-mode exceeded the buffer limit
507003
Error Message %ASA-3-507003: The flow of type protocol from the originating
interface: src_ip/src_port to dest_if:dest_ip/dest_port terminated by inspection
engine, reason-
Explanation The TCP proxy or session API terminated a connection for various reasons, which are
provided in the message.
• protocol—The protocol for the flow
• src_ip—The source IP address for the flow
• src_port—The name of the source port for the flow
• dest_if—The destination interface for the flow
• dest_ip—The destination IP address for the flow
• dest_port—The destination port for the flow
• reason—The description of why the flow is being terminated by the inspection engine. Valid
reasons include:
- Failed to create flow
- Failed to initialize session API
- Filter rules installed/matched are incompatible
- Failed to consolidate new buffer data with original
- Reset unconditionally
- Reset based on “service reset inbound” configuration
- Disconnected, dropped packet
- Packet length changed
- Reset reflected back to sender
- Proxy inspector reset unconditionally
- Proxy inspector drop reset
- Proxy inspector received data after FIN
- Proxy inspector disconnected, dropped packet
- Inspector reset unconditionally
- Inspector drop reset
- Inspector received data after FIN
- Inspector disconnected, dropped packet
- Could not buffer unprocessed data
- Session API proxy forward failed
- Conversion of inspect data to session data failed
- SSL channel for TLS proxy is closed
508001
Explanation During DCERPC inspection, a message header included a nonstandard major or minor
version.
• message_type—The DCERPC message type
• version_type—The version type, which can be major or minor
• version_number—The nonstandard version in the message header
Recommended Action If this is a valid version, and the problem persists, contact the Cisco TAC.
508002
Error Message %ASA-5-508002: DCERPC response has low endpoint port port_number from
src_if:src_ip/src_port to dest_if:dest_ip/dest_port, terminating connection.
Explanation During DCERPC inspection, a response message included an endpoint port number less
than 1024 (in the range of well-known server ports).
509001
Explanation The no forward interface command was entered to block traffic from the source
interface to the destination interface given in the message. This command is required on low-end
platforms to allow the creation of interfaces beyond the licensed limit.
• src_intf—The name of the source interface to which the no forward interface command
restriction applies
• dst_intf—The name of the destination interface to which the no forward interface command
restriction applies
• sg_info—The security group name or tag for the specified IP address
Recommended Action Upgrade the license to remove the requirement of this command on low-end
platforms, then remove the command from the configuration.
602101
Error Message %ASA-6-602101: PMTU-D packet number bytes greater than effective mtu
number dest_addr=dest_address, src_addr=source_address, prot=protocol
Explanation The ASA sent an ICMP destination unreachable message and fragmentation is needed,
but the don’t-fragment bit has been set.
602103
Explanation The MTU of an SA was changed. When a packet is received for an IPsec tunnel, the
corresponding SA is located and the MTU is updated based on the MTU suggested in the ICMP
packet. If the suggested MTU is greater than 0 but less than 256, then the new MTU is set to 256. If
the suggested MTU is 0, the old MTU is reduced by 256 or it is set to 256—whichever value is
greater. If the suggested MTU is greater than 256, then the new MTU is set to the suggested value.
• src_addr—IP address of the PMTU sender
• rcvd_mtu—Suggested MTU received in the PMTU message
• peer_addr—IP address of the IPsec peer
• spi—IPsec Security Parameter Index
• username—Username associated with the IPsec tunnel
• old_mtu—Previous MTU associated with the IPsec tunnel
• new_mtu—New MTU associated with the IPsec tunnel
602104
Explanation An ICMP message was received indicating that a packet sent over an IPsec tunnel
exceeded the path MTU, and the suggested MTU was greater than or equal to the current MTU.
Because the MTU value is already correct, no MTU adjustment is made. This may happen when
multiple PMTU messages are received from different intermediate stations, and the MTU is adjusted
before the current PMTU message is processed.
• src_addr—IP address of the PMTU sender
• rcvd_mtu—Suggested MTU received in the PMTU message
• curr_mtu—Current MTU associated with the IPsec tunnel
• peer_addr—IP address of the IPsec peer
• spi—IPsec Security Parameter Index
• username—Username associated with the IPsec tunnel
602303
602304
602305
Recommended Action This is typically a transient error condition. If this message occurs
consistently, contact the Cisco TAC.
603101
Explanation The ASA received a PPTP packet that was out of sequence or duplicated.
Recommended Action If the packet count is high, contact the peer administrator to check the client
PPTP configuration.
603102
Error Message %ASA-6-603102: PPP virtual interface interface_name - user: user aaa
authentication started.
603103
Error Message %ASA-6-603103: PPP virtual interface interface_name - user: user aaa
authentication status
Explanation The ASA received an authentication response from the AAA server.
603104
603105
603106
603107
603108
603109
603110
Explanation An attempt to establish a second session was detected and denied. Cisco does not
support multiple L2TP sessions per tunnel.
• tunnel_id—The L2TP tunnel ID
• peer_ip—The peer IP address
• username—The name of the authenticated user
604101
Explanation The ASA DHCP client successfully obtained an IP address from a DHCP server. The
dhcpc command statement allows the ASA to obtain an IP address and network mask for a network
interface from a DHCP server, as well as a default route. The default route statement uses the
gateway address as the address of the default router.
604102
Explanation The ASA DHCP client released an allocated IP address back to the DHCP server.
604103
604104
Explanation An external client released an IP address back to the ASA DHCP server.
604105
Explanation An administrator can configure the DHCP options to return to the DHCP client.
Depending on the options that the DHCP client requests, the DHCP options for the offer could
exceed the message length limits. A DHCP offer cannot be sent, because it will not fit within the
message limits.
• hardware_address—The hardware address of the requesting client.
• interface_name—The interface to which server messages are being sent and received
• options_field_size—The maximum options field length. The default is 312 octets, which
includes 4 octets to terminate.
• number_of_octets—The number of exceeded octets.
605004
Explanation An incorrect login attempt or a failed login to the ASA occurred. For all logins, three
attempts are allowed per session, and the session is terminated after three incorrect attempts. For
SSH and Telnet logins, this message is generated after the third failed attempt or if the TCP session
is terminated after one or more failed attempts. For other types of management sessions, this
message is generated after every failed attempt.
• source-address—Source address of the login attempt
• source-port—Source port of the login attempt
• interface—Destination management interface
• destination—Destination IP address
• service—Destination service
• username —Destination management interface
Recommended Action If this message appears infrequently, no action is required. If this message
appears frequently, it may indicate an attack. Communicate with the user to verify the username and
password.
605005
606001
Error Message %ASA-6-606001: ASDM session number number from IP_address started
Explanation An administrator has been authenticated successfully, and an ASDM session started.
606002
Error Message %ASA-6-606002: ASDM session number number from IP_address ended
606003
Error Message %ASA-6-606003: ASDM logging session number id from IP_address started
id session ID assigned
606004
Error Message %ASA-6-606004: ASDM logging session number id from IP_address ended
607001
Explanation The fixup sip command preallocated a SIP connection after inspecting a SIP message.
The connection_type is one of the following strings:
• SIGNALLING UDP
• SIGNALLING TCP
• SUBSCRIBE UDP
• SUBSCRIBE TCP
• Via UDP
• Route
• RTP
• RTCP
607002
Explanation A SIP classification was performed on a SIP message, and the specified criteria were
satisfied. As a result, the configured action occurs.
• action_class—The class of the action: SIP Classification for SIP match commands or SIP
Parameter for parameter commands
• action—The action taken: Dropped, Dropped connection for, Reset connection for, or Masked
header flags for
• req_resp—Request or Response
• req_resp_info—The SIP method name if the type is Request: INVITE or CANCEL. The SIP
response code if the type is Response: 100, 183, 200.
• src_ifc—The source interface name
• sip—The source IP address
• sport—The source port
• dest_ifc—The destination interface name
• dip—The destination IP address
• dport—The destination port
• further_info—More information appears for SIP match and SIP parameter commands, as
follows:
For SIP match commands:
matched Class id: class-name
For example:
matched Class 1234: my_class
607003
Explanation A SIP classification was performed on a SIP message, and the specified criteria were
satisfied. As a result, the standalone log action occurs.
• action_class—SIP classification for SIP match commands or SIP parameter for parameter
commands
• req_resp—Request or Response
• req_resp_info—The SIP method name if the type is Request: INVITE or CANCEL. The SIP
response code if the type is Response: 100, 183, 200.
• src_ifc—The source interface name
• sip—The source IP address
• sport—The source port
• dest_ifc—The destination interface name
• dip—The destination IP address.
• dport—The destination port.
• further_info—More information appears for SIP match and SIP parameter commands, as
follows:
For SIP match commands:
matched Class id: class-name
For example:
matched Class 1234: my_class
608001
Explanation The inspect skinny command preallocated a Skinny connection after inspecting a
Skinny message. The connection_type is one of the following strings:
• SIGNALLING UDP
• SIGNALLING TCP
• SUBSCRIBE UDP
• SUBSCRIBE TCP
• Via UDP
• Route
• RTP
• RTCP
608002
Explanation A Skinny (SSCP) message was received with an SCCP prefix length less than the
minimum length configured.
• in_ifc—The input interface
• src_ip—The source IP address of the packet
• src_port—The source port of the packet
• out_ifc—The output interface
• dest_ip—The destination IP address of the packet
• dest_port—The destination port of the packet
• value—The SCCP prefix length of the packet
Recommended Action If the SCCP message is valid, then customize the Skinny policy map to increase
the minimum length value of the SSCP prefix.
608003
Explanation A Skinny (SSCP) message was received with an SCCP prefix length greater than the
maximum length configured.
• in_ifc—The input interface
• src_ip—The source IP address of the packet
• src_port—The source port of the packet
• out_ifc—The output interface
• dest_ip—The destination IP address of the packet
• dest_port—The destination port of the packet
Recommended Action If the SCCP message is valid, then customize the Skinny policy map to increase
the maximum length value of the SCCP prefix.
608004
Recommended Action If the SCCP messages should be allowed, then customize the Skinny policy
map to allow them.
608005
Explanation This SCCP message ID is not allowed, because the endpoint did not complete
registration.
• in_ifc—The input interface
• src_ip—The source IP address of the packet
• src_port—The source port of the packet
• out_ifc—The output interface
• dest_ip—The destination IP address of the packet
• dest_port—The destination port of the packet
• value—The SCCP prefix length of the packet
Recommended Action If the SCCP messages that are being dropped are valid, then customize the
Skinny policy map to disable registration enforcement.
609001
Explanation A network state container was reserved for host IP_address connected to interface
interface_name.
609002
Explanation A network state container for host IP_address connected to interface interface_name
was removed.
610001
Error Message %ASA-3-610001: NTP daemon interface interface_name: Packet denied from
IP_address
Explanation An NTP packet was received from a host that does not match one of the configured NTP
servers. The ASA is only an NTP client; it is not a time server and does not respond to NTP requests.
610002
Recommended Action Make sure that both the ASA and the NTP server are set to use authentication,
and the same key number and value.
610101
Explanation Command authorization failed for the specified command. The command_modifier is
one of the following strings:
– cmd (this string means the command has no modifier)
– clear
– no
– show
Explanation If the ASA encounters any other value other than the four command types listed, the
message “unknown command type” appears.
611101
611102
611103
611104
Explanation The configured idle timeout for the ASA serial console was exceeded because of no user
activity.
611301
Error Message %ASA-6-611301: VPNClient: NAT configured for Client Mode with no split
tunneling: NAT address: mapped_address
Explanation The VPN client policy for client mode with no split tunneling was installed.
611302
Explanation The VPN client policy for network extension mode with no split tunneling was
installed.
611303
Error Message %ASA-6-611303: VPNClient: NAT configured for Client Mode with split
tunneling: NAT address: mapped_address Split Tunnel Networks: IP_address/netmask
IP_address/netmask
Explanation The VPN client policy for client mode with split tunneling was installed.
611304
Explanation The VPN client policy for network extension mode with split tunneling was installed.
611305
611306
Explanation Perfect forward secrecy was configured as part of the VPN client download policy.
611307
611308
Error Message %ASA-6-611308: VPNClient: Split DNS Policy installed: List of domains:
string string
Explanation A split DNS policy was installed as part of the VPN client downloaded policy.
611309
Error Message %ASA-6-611309: VPNClient: Disconnecting from head end and uninstalling
previously downloaded policy: Head End: IP_address
611310
Explanation The VPN client Xauth succeeded with the specified headend.
611311
Explanation The VPN client Xauth failed with the specified headend.
611312
Explanation When the ASA is an Easy VPN remote device, the Easy VPN server downloaded a list
of backup servers to the ASA. This list overrides any backup servers that you have configured
locally. If the downloaded list is empty, then the ASA uses no backup servers. The reason is one of
the following messages:
• A list of backup server IP addresses
• Received NULL list. Deleting current backup servers
611313
Explanation When the ASA is an Easy VPN remote device, and the Easy VPN server downloads a
backup server list to the ASA, the list includes an invalid IP address or a hostname. The ASA does
not support DNS, and therefore does not support hostnames for servers, unless you manually map a
name to an IP address using the name command.
Recommended Action On the Easy VPN server, make sure that the server IP addresses are correct, and
configure the servers as IP addresses instead of hostnames. If you must use hostnames on the server,
use the name command on the Easy VPN remote device to map the IP addresses to names.
611314
Error Message %ASA-6-611314: VPNClient: Load Balancing Cluster with Virtual IP:
IP_address has redirected the to server IP_address
Explanation When the ASA is an Easy VPN remote device, the master server of the load balancing
cluster redirected the ASA to connect to a particular server.
611315
Explanation When the ASA is an Easy VPN remote device, it disconnected from a load balancing
cluster server.
611316
Explanation When the ASA is an Easy VPN remote device, the downloaded VPN policy enabled
SUA.
611317
Explanation When the ASA is an Easy VPN remote device, the downloaded VPN policy disabled
SUA.
611318
Error Message %ASA-6-611318: VPNClient: User Authentication Enabled: Auth Server IP:
IP_address Auth Server Port: port Idle Timeout: time
Explanation When the ASA is an Easy VPN remote device, the downloaded VPN policy enabled IUA
for users on the ASA inside network.
• IP_address—The server IP address to which the ASA sends authentication requests.
• port—The server port to which the ASA sends authentication requests
• time—The idle timeout value for authentication credentials
611319
Explanation When the ASA is an Easy VPN remote device, the downloaded VPN policy disabled
IUA for users on the ASA inside network.
611320
Explanation When the ASA is an Easy VPN remote device, the downloaded VPN policy enabled
device pass-through. The device pass-through feature allows devices that cannot perform
authentication (such as an IP phone) to be exempt from authentication when IUA is enabled. If the
Easy VPN server enabled this feature, you can specify the devices that should be exempt from
authentication (IUA) using the vpnclient mac-exempt command on the ASA.
611321
Explanation When the ASA is an Easy VPN remote device, the downloaded VPN policy disabled
device pass-through.
611322
Explanation When the ASA is an Easy VPN remote device and the downloaded VPN policy disabled
SUA, the Easy VPN server uses two-factor/SecurID/cryptocard-based authentication mechansims to
authenticate the ASA using XAUTH.
Recommended Action If you want the Easy VPN remote device to be authenticated using
two-factor/SecureID/cryptocard-based authentication mechanisms, enable SUA on the server.
611323
Explanation When the ASA is an Easy VPN remote device, the downloaded VPN policy included
duplicate split network entries. An entry is considered a duplicate if it matches both the network
address and the network mask.
Recommended Action Remove duplicate split network entries from the VPN policy on the Easy VPN
server.
612001
Explanation An update from an Auto Update server was successful. The filename variable is image,
ASDM file, or configuration. The version number variable is the version number of the update.
612002
Recommended Action Check the configuration of the Auto Update server. Check to see if the standby
unit is in the failed state. If the Auto Update server is configured correctly, and the standby unit is
not in the failed state, contact the Cisco TAC.
612003
Explanation The Auto Update daemon was unable to contact the specified URL url, which can be
the URL of the Auto Update server or one of the file server URLs returned by the Auto Update
server. The reason field describes why the contact failed. Possible reasons for the failure include no
response from the server, authentication failed, or a file was not found.
613001
Error Message %ASA-6-613001: Checksum Failure in database in area string Link State
Id IP_address Old Checksum number New Checksum number
Explanation OSPF has detected a checksum error in the database because of memory corruption.
613002
Recommended Action Copy the message exactly as it appears, and report it to the Cisco TAC.
613003
Error Message %ASA-6-613003: IP_address netmask changed from area string to area
string
Explanation An OSPF configuration change has caused a network range to change areas.
613101
Error Message %ASA-6-613101: Checksum Failure in database in area s\n Link State Id
i Old Checksum #x New Checksum #x\n
Explanation OSPF has detected a checksum error in the database because of memory corruption.
613102
613103
Explanation An OSPF configuration change has caused a network range to change areas.
613104
Explanation The virtual interface type was not recognized by OSPFv3, so it is treated as a loopback
interface stub route.
614001
Error Message %ASA-6-614001: Split DNS: request patched from server: IP_address to
server: IP_address
Explanation Split DNS is redirecting DNS queries from the original destination server to the primary
enterprise DNS server.
614002
Error Message %ASA-6-614002: Split DNS: reply from server:IP_address reverse patched
back to original server:IP_address
Explanation Split DNS is redirecting DNS queries from the enterprise DNS server to the original
destination server.
615001
Error Message %ASA-6-615001: vlan number not available for firewall interface
615002
616001
Explanation An MGCP data channel connection, RTP, or RTCP was preallocated. The message text
also specifies which message has triggered the connection preallocation.
617001
Explanation A request was not accepted by the peer, which is usually seen with a Create PDP Context
request.
617002
Error Message %ASA-6-617002: Removing v1 PDP Context with TID tid from GGSN IP_address and
SGSN IP_address, Reason: reason or Removing v1 primary|secondary PDP Context with
TID tid from GGSN IP_address and SGSN IP_address, Reason: reason
Explanation A PDP context was removed from the database either because it expired, a Delete PDP
Context Request/Response was exchanged, or a user removed it using the CLI.
617003
Explanation A GTP tunnel was created after receiving a Create PDP Context Response that accepted
the request.
617004
Explanation The SGSN or GGSN signaling address in the Create PDP Context Request or Response,
respectively, was different from the SGSN/GGSN sending it.
617100
Explanation The connections for this user were torn down because either a RADIUS accounting stop
or RADIUS accounting start was received, which includes attributes that were configured in the
policy map for a match. The attributes did not match those stored for the user entry, if the user entry
exists.
• num_conns—The number of connections torn down
• user_ip—The IP address (framed IP attribute) of the user
620001
Error Message %ASA-6-620001: Pre-allocate CTIQBE {RTP | RTCP} secondary channel for
interface_name:outside_address[/outside_port] to
interface_name:inside_address[/inside_port] from CTIQBE_message_name message
Explanation The ASA preallocated a connection object for the specified CTIQBE media traffic. This
message is rate limited to one message every 10 seconds.
620002
Explanation The ASA received a CTIQBE message with an unsupported version number, and
dropped the packet. This message is rate limited to one message every 10 seconds.
Recommended Action If the version number captured in the log message is unreasonably large
(greater than 10), the packet may be malformed, a non-CTIQBE packet, or corrupted before it
arrives at the ASA. We recommend that you determine the source of the packets. If the version
number is reasonably small (less than or equal to 10), then contact the Cisco TAC to see if a new
ASA image that supports this CTIQBE version is available.
621001
Explanation An attempt was made to enable PIM on an interface that does not support multicast.
621002
Explanation An attempt was made to enable IGMP on an interface that does not support multicast.
621003
Error Message %ASA-6-621003: The event queue size has exceeded number
Explanation The number of event managers created has exceeded the expected amount.
621006
Explanation A packet triggering a data-driven event was received, but the connection to the MRIB
was down. The notification was cancelled.
621007
Explanation A PIM router configured as a rendezvous point or with NAT has received a PIM register
packet from another PIM router. The data encapsulated in this packet is invalid.
Recommended Action The sending router is erroneously sending non-RFC registers. Upgrade the
sending router.
622001
Error Message %ASA-6-622001: string tracked route network mask address, distance
number, table string, on interface interface-name
Explanation A tracked route has been added to or removed from a routing table, which means that
the state of the tracked object has changed from up or down.
• string—Adding or Removing
• network—The network address
• mask—The network mask
• address—The gateway address
• number—The route administrative distance
• string—The routing table name
• interface-name—The interface name as specified by the nameif command
622101
622102
634001
Error Message %ASA-6-634001: DAP: User user, Addr ipaddr, Connection connection; The
following DAP records were selected for this connection: DAP Record names
701001
Explanation A AAA message that appears if the user authentication rate is too high for the module
to handle new AAA requests.
Recommended Action Enable Flood Defender with the floodguard enable command.
701002
Explanation A AAA message that appears if the user authentication rate is too high for the module
to handle new AAA requests.
Recommended Action Enable Flood Defender with the floodguard enable command.
702305
Explanation More than four billion packets have been received in the IPsec tunnel, and a new tunnel
is being negotiated.
• direction—SA direction (inbound or outbound)
• tunnel_type—SA type (remote access or L2L)
• spi—IPsec Security Parameter Index
• local_IP—IP address of the tunnel local endpoint
• remote_IP—IP address of the tunnel remote endpoint
Recommended Action Contact the peer administrator to compare the SA lifetime setting.
702307
Explanation An SA data life span expired. An IPsec SA is rekeying as a result of the amount of data
transmitted with that SA. This information is useful for debugging rekeying issues.
• direction—SA direction (inbound or outbound)
• tunnel_type—SA type (remote access or L2L)
• spi—IPsec Security Parameter Index
• local_IP—IP address of the tunnel local endpoint
• remote_IP—IP address of the tunnel remote endpoint
• username—Username associated with the IPsec tunnel
703001
Explanation The ASA received an H.323 packet with an unsupported version number. The ASA
might reencode the protocol version field of the packet to the highest supported version.
Recommended Action Use the version of H.323 that the ASA supports in the VoIP network.
703002
Explanation The ASA received the specified H.225 message, and the ASA opened a new signaling
connection object for the two specified H.323 endpoints.
709001, 709002
Explanation Failover messages that only appear during the development debugging and testing
phases.
709003
Explanation A failover message that appears when the active unit starts replicating its configuration
to the standby unit. Primary can also be listed as Secondary for the secondary unit.
709004
Explanation A failover message that appears when the active unit completes replication of its
configuration on the standby unit. Primary can also be listed as Secondary for the secondary unit.
709005
Explanation The standby ASA received the first part of the configuration replication from the active
ASA. Primary can also be listed as Secondary for the secondary unit.
709006
Explanation A failover message that appears when the standby unit completes replication of a
configuration sent by the active unit. Primary can also be listed as Secondary for the secondary unit.
709007
Explanation A failover message that appears when the standby unit is unable to complete replication
of a configuration sent by the active unit. The command that caused the failure appears at the end of
the message.
710001
Explanation The first TCP packet destined to the ASA requests to establish a TCP session. This
packet is the first SYN packet of the three-way handshake. This message appears when the
respective (Telnet, HTTP, or SSH) has permitted the packet. However, the SYN cookie verification
is not yet completed and no state is reserved.
710002
Explanation For a TCP connection, the second TCP packet destined for the ASA requested to
establish a TCP session. This packet is the final ACK of the three-way handshake. The respective
(Telnet, HTTP, or SSH) has permitted the packet. Also, the SYN cookie verification was successful
and the state is reserved for the TCP session.
For a UDP connection, the connection was permitted. For example, the module received an SNMP
request from an authorized SNMP management station, and the request has been processed. This
message is rate limited to one message every 10 seconds.
710003
Explanation The ASA denied an attempt to connect to the interface service. For example, the ASA
received an SNMP request from an unauthorized SNMP management station. If this message
appears frequently, it can indicate an attack.
For example:
%ASA-3-710003: UDP access denied by ACL from 95.1.1.14/5000 to outside:95.1.1.13/1005
Recommended Action Use the show run http, show run ssh, or show run telnet commands to verify
that the ASA is configured to permit the service access from the host or network.
710004
Explanation The maximum number of ASA management connections for the service was exceeded.
The ASA permits at most five concurrent management connections per management service.
Alternatively, an error may have occurred in the to-the-box connection counter.
• Src_ip—The source IP address of the packet
• Src_port—The source port of the packet
• In_ifc—The input interface
• Dest_ip—The destination IP address of the packet
• Dest_port—The destination port of the packet
• Curr_conn—The number of current to-the-box admin connections
• Conn_lmt—The connection limit
Recommended Action From the console, use the kill command to release the unwanted session. If the
message was generated because of an error in the to-the-box counter, run the show conn all
command to display connection details.
710005
Explanation The ASA does not have a UDP server that services the UDP request. Also, a TCP packet
that does not belong to any session on the ASA may have been discarded. In addition, this message
appears (with the SNMP service) when the ASA receives an SNMP request with an empty payload,
even if it is from an authorized host. When the service is SNMP, this message occurs a maximum of
once every 10 seconds so that the log receiver is not overwhelmed.
Recommended Action In networks that use broadcasting services such as DHCP, RIP, or NetBIOS
extensively, the frequency of this message can be high. If this message appears in excessive
numbers, it may indicate an attack.
710006
Explanation The ASA does not have an IP server that services the IP protocol request; for example,
the ASA receives IP packets that are not TCP or UDP, and the ASA cannot service the request.
Recommended Action In networks that use broadcasting services such as DHCP, RIP, or NetBIOS
extensively, the frequency of this message can be high. If this message appears in excessive
numbers, it may indicate an attack.
710007
711001
Explanation You have entered the logging debug-trace command for the logging feature. When the
logging debug-trace command is enabled, all debugging messages will be redirected to the message
for processing. For security reasons, the message output must be encrypted or sent over a secure
out-of-band network.
711002
Explanation A process used the CPU for more than 100 milliseconds. This message is used for
debugging CPU purposes, and can appear once every five seconds for each offending process.
• PC—Instruction pointer of the CPU hogging process
• traceback—Stack trace of the CPU hogging process, which can include up to 12 addresses
711003
Explanation An internal inconsistency that should not occur during normal operation has occurred.
However, this message is not harmful if it rarely occurs. If it occurs frequently, it might be
worthwhile debugging.
• vpifnum—The 32-bit value corresponding to the interface
711004
Error Message %ASA-4-711004: Task ran for msec msec, Process = process_name, PC =
pc, Call stack = call stack
Explanation A process used the CPU for more than 100 milliseconds. This message is used for
debugging CPU purposes, and can appear once every five seconds for each offending process.
• msec—Length of the detected CPU hog in milliseconds
• process_name—Name of the hogging process
• pc—Instruction pointer of the CPU hogging process
• call stack—Stack trace of the CPU hogging process, which can include up to 12 addresses
711005
Explanation An internal software error that should not occur has occurred. The device can usually
recover from this error, and no harmful effect to the device results.
• call_stack—The EIPs of the call stack
711006
Error Message %ASA-7-711006: CPU profiling has started for n-samples samples.
Reason: reason-string.
Recommended Action Collect CPU profiling results and provide them to Cisco TAC.
713004
Error Message %ASA-3-713004: device scheduled for reboot or shutdown, IKE key acquire
message on interface interface num, for Peer IP_address ignored
Explanation The ASA has received an IKE packet from a remote entity trying to initiate a tunnel.
Because the ASA is scheduled for a reboot or shutdown, it does not allow any more tunnels to be
established. The IKE packet is ignored and dropped.
713201
Explanation The ASA has received a duplicate of a previous Phase 1 or Phase 2 packet, and will
transmit the last message. A network performance or connectivity issue may have occurred, in which
the peer is not receiving sent packets in a timely manner.
• Phase—Phase 1 or 2
713202
Explanation The ASA has received a duplicate first packet for a tunnel that the ASA is already aware
of and negotiating, which indicates that the ASA probably received a retransmission of a packet
from the peer.
• IP_addr—The IP address of the peer from which the duplicate first packet was received
Recommended Action None required, unless the connection attempt is failing. If this is the case,
debug further and diagnose the problem.
713006
Explanation The ASA does not know about the received message ID. The message ID is used to
identify a specific IKE Phase 2 negotiation. An error condition on the ASA may have occurred, and
may indicate that the two IKE peers are out-of-sync.
713008
Error Message %ASA-3-713008: Key ID in ID payload too big for pre-shared IKE tunnel
Explanation A key ID value was received in the ID payload, which was longer than the maximum
allowed size of a group name for this IKE session using preshared keys authentication. This is an
invalid value, and the session is rejected. Note that the key ID specified would never work because
a group name of that size cannot be created in the ASA.
Recommended Action Make sure that the client peer (most likely an Altiga remote access client)
specifies a valid group name. Notify the user to change the incorrect group name on the client. The
current maximum length for a group name is 32 characters.
713009
Error Message %ASA-3-713009: OU in DN in ID payload too big for Certs IKE tunnel
Explanation An OU value in the DN was received in the ID payload, which was longer than the
maximum allowed size of a group name for this IKE session using Certs authentication. This OU is
skipped, and another OU or other criteria may find a matching group.
Recommended Action For the client to be able to use an OU to find a group in the ASA, the group
name must be a valid length. The current maximum length of a group name is 32 characters.
713010
Error Message %ASA-5-713010: IKE area: failed to find centry for message Id
message_number
Explanation An attempt was made to locate a conn_entry (IKE phase 2 structure that corresponds to
an IPsec SA) using the unique message ID, which failed. The internal structure was not found, which
may occur if a session was terminated in a nonstandard way, but it is more likely that an internal
error occurred.
713012
Explanation An illegal or unsupported IPsec protocol has been received from the peer.
Recommended Action Check the ISAKMP Phase 2 configuration on the peer(s) to make sure it is
compatible with the ASA.
713014
713016
Explanation The ID received from the peer is unknown. The ID can be an unfamiliar valid ID or an
invalid or corrupted ID.
713017
Explanation The Phase 1 or Phase 2 ID received from the peer is legal, but not supported.
713018
Error Message %ASA-3-713018: Unknown ID type during find of group name for certs,
Type ID_Type
713020
713022
Explanation No group exists in the group database with the same name as the value (key ID or IP
address) specified by the peer.
713024
Error Message %ASA-7-713024: Group group IP ip Received local Proxy Host data in ID
Payload: Address IP_address, Protocol protocol, Port port
Explanation The ASA has received the Phase 2 local proxy ID payload from the remote peer.
713025
Error Message %ASA-7-713025: Received remote Proxy Host data in ID Payload: Address
IP_address, Protocol protocol, Port port
Explanation The ASA has received the Phase 2 local proxy ID payload from the remote peer.
713028
Error Message %ASA-7-713028: Received local Proxy Range data in ID Payload: Addresses
IP_address - IP_address, Protocol protocol, Port port
Explanation The ASA has received the Phase 2 local proxy ID payload of the remote peer, which
includes an IP address range.
713029
Explanation The ASA has received the Phase 2 local proxy ID payload of the remote peer, which
includes an IP address range.
713032
Explanation The local ID payload included the range ID type, and the specified low address was not
less than the high address. A configuration problem may exist.
713033
Explanation The remote ID payload included the range ID type, and the specified low address was
not less than the high address. A configuration problem may exist.
713034
Explanation The local IP proxy subnet data has been received in the Phase 2 ID payload.
713035
Error Message %ASA-7-713035: Group group IP ip Received remote IP Proxy Subnet data
in ID Payload: Address IP_address, Mask netmask, Protocol protocol, Port port
Explanation The remote IP proxy subnet data has been received in the Phase 2 ID payload.
713039
Explanation An internal software error has occurred, and the ISAKMP packet cannot be transmitted.
713040
Error Message %ASA-7-713040: Could not find connection entry and can not encrypt:
msgid message_number
Explanation An internal software error has occurred, and a Phase 2 data structure cannot be found.
713041
713042
Explanation The IPsec fast path processed a packet that triggered IKE, but the IKE policy lookup
failed. This error may be timing related. The ACLs that triggered IKE might have been deleted
before IKE processed the initiation request. This problem will most likely correct itself.
Recommended Action If the condition persists, check the L2L configuration, paying special attention
to the type of ACL associated with crypto maps.
713043
Explanation IKE has been triggered again while the original tunnel is in progress.
713048
Explanation A packet has been received with a payload that cannot be processed.
Recommended Action If this problem persists, a misconfiguration may exist on the peer.
713049
713050
Explanation An IPsec tunnel has been terminated. Possible termination reasons include:
• IPsec SA Idle Timeout
• IPsec SA Max Time Exceeded
• Administrator Reset
• Administrator Reboot
• Administrator Shutdown
• Session Disconnected
• Session Error Terminated
• Peer Terminate
713052
713056
Error Message %ASA-3-713056: Tunnel rejected: SA (SA_name) not found for group
(group_name)!
Recommended Action If this is a remote access tunnel, check the group and user configuration, and
verify that a tunnel group and group policy have been configured for the specific user group. For
externally authenticated users and groups, check the returned authentication attributes.
713060
Error Message %ASA-3-713060: Tunnel Rejected: User (user) not member of group
(group_name), group-lock check failed.
Explanation The user is configured for a different group than what was sent in the IPsec negotiation.
Recommended Action If you are using the Cisco VPN client and preshared keys, make sure that the
group configured on the client is the same as the group associated with the user on the ASA. If you
are using digital certificates, the group is dictated either by the OU field of the certificate, or the user
automatically defaults to the remote access default group.
713061
Error Message %ASA-3-713061: Tunnel rejected: Crypto Map Policy not found for
Src:source_address, Dst: dest_address!
Explanation The ASA was not able to find security policy information for the private networks or
hosts indicated in the message. These networks or hosts were sent by the initiator and do not match
any crypto ACLs at the ASA. This is most likely a misconfiguration.
Recommended Action Check the protected network configuration in the crypto ACLs on both sides
and make sure that the local net on the initiator is the remote net on the responder and vice-versa.
Pay special attention to wildcard masks, and host addresses versus network addresses. Non-Cisco
implementations may have the private addresses labeled as proxy addresses or red networks.
713062
Error Message %ASA-3-713062: IKE Peer address same as our interface address
IP_address
Explanation The IP address configured as the IKE peer is the same as the IP address configured on
one of the ASA IP interfaces.
713063
Error Message %ASA-3-713063: IKE Peer address not configured for destination
IP_address
Explanation The IKE peer address is not configured for an L2L tunnel.
713065
Error Message %ASA-3-713065: IKE Remote Peer did not negotiate the following:
proposal attribute
713066
Error Message %ASA-7-713066: IKE Remote Peer configured for SA: SA_name
Explanation The crypto policy settings of the peer have been configured.
713068
Explanation Notification messages that caused this event are not explicitly handled in the notify
processing code.
Recommended Action Examine the specific reason to determine the action to take. Many notification
messages indicate a configuration mismatch between the IKE peers.
713072
Error Message %ASA-3-713072: Password for user (user) too long, truncating to number
characters
713073
Explanation Rekeying durations are always set to the lower of the values proposed by IKE peers. The
value of the initiator is the lower one.
713074
Explanation Rekeying durations are always set to the lower of the values proposed by IKE peers. The
value of the initiator is the lower one.
713075
Explanation Rekeying durations are always set to the lower of the values proposed by IKE peers. The
value of the responder is the lower one.
713076
Explanation Rekeying durations are always set to the lower of the values proposed by IKE peers. The
value of the responder is the lower one.
713078
Error Message %ASA-2-713078: Temp buffer for building mode config attributes
exceeded: bufsize available_size, used value
Explanation An internal software error has occurred while processing modecfg attributes.
Recommended Action Disable any unnecessary tunnel group attributes, or shorten any text messages
that are excessively long. If the problem persists, contact the Cisco TAC.
713081
Explanation One of the loaded certificates is unreadable, and may be an unsupported encoding
scheme.
713082
713083
713084
Error Message %ASA-3-713084: Received invalid phase 1 port value (port) in ID payload
Explanation The port value received in the IKE phase 1 ID payload was incorrect. Acceptable values
are 0 or 500 (ISAKMP is also known as IKE).
Recommended Action Make sure that a peer conforms to the IKE standards to avoid a network
problem resulting in corrupted packets.
713085
Explanation The protocol value received in the IKE phase 1 ID payload was incorrect. Acceptable
values are 0 or 17 (UDP).
Recommended Action Make sure that a peer conforms to the IKE standards to avoid a network
problem resulting in corrupted packets.
713086
Explanation A certificate payload was received, but our internal certificate handle indicates that we
do not have an identity certificate. The certificate handle was not obtained through a normal
enrollment method. One likely reason this can happen is that the authentication method is not made
through RSA or DSS signatures, although the IKE SA negotiation should fail if each side is
misconfigured.
Recommended Action Check the trustpoint and ISAKMP configuration settings on the ASA and its
peer.
713088
Explanation The tunnel group cannot be found, based on the digital certificate information.
Recommended Action Verify that the tunnel group is set up correctly to handle the certificate
information of the peer.
713092
Error Message %ASA-5-713092: Failure during phase 1 rekeying attempt due to collision
Explanation An internal software error has occurred. This is often a benign event.
713094
Recommended Action You may have to reenroll the trustpoint. If the problem persists, contact the
Cisco TAC.
713098
Explanation An attempt was made to establish a certificate-based IKE session, but no identity
certificate has been specified in the crypto policy.
Recommended Action Specify the identity certificate or trustpoint that you want to transmit to peers.
713099
Error Message %ASA-7-713099: Tunnel Rejected: Received NONCE length number is out of
range!
713102
Error Message %ASA-3-713102: Phase 1 ID Data length number too long - reject tunnel!
Explanation IKE has received an ID payload that includes an identification data field of 2 K or larger.
713103
Error Message %ASA-7-713103: Invalid (NULL) secret key detected while computing hash
713104
Error Message %ASA-7-713104: Attempt to get Phase 1 ID data failed while hash
computation
713105
Error Message %ASA-3-713105: Zero length data in ID payload received during phase 1
or 2 processing
Explanation A peer sent an ID payload without including any ID data, which is invalid.
713107
713109
Explanation The ASA was unable to process the certificate received from the remote peer, which can
occur if the certificate data was malformed (for example, if the public key size is larger than 4096
bits) or if the data in the certificate cannot be stored by the ASA.
Recommended Action Try to reestablish the connection using a different certificate on the remote
peer.
713112
Explanation The ASA was unable to successfully process the notification payload that included the
CONNECTED notify type. This may occur if the IKE phase 2 structure cannot be found using the
SPI to locate it, or the commit bit had not been set in the received ISAKMP header. The latter case
may indicate a nonconforming IKE peer.
Recommended Action If the problem persists, check the configuration of the peer and/or disable
commit bit processing.
713113
Explanation An IKE SA is being deleted with a nonzero tunnel count, which means that either the
IKE SA tunnel count has lost synchronization with the associated connection entries or the
associated connection cookie fields for the entries have lost synchronization with the cookie fields
of the IKE SA to which the connection entry points. If this occurs, the IKE SA and its associated
data structures will not be freed, so that the entries that may point to it will not have a stale pointer.
713114
Error Message %ASA-7-713114: Connection entry (conn entry internal address) points
to IKE SA (SA_internal_address) for peer IP_address, but cookies don't match
713115
Error Message %ASA-5-713115: Client rejected NAT enabled IPsec request, falling back
to standard IPsec
Explanation The client rejected an attempt by the ASA to use IPsec over UDP. IPsec over UDP is
used to allow multiple clients to establish simultaneous tunnels to the ASA through a NAT device.
The client may have rejected the request, either because it does not support this feature or because
it is configured not to use it.
713117
Explanation The IPsec SA identified by the SPI value is no longer active on the remote peer, which
might indicate that the remote peer has rebooted or been reset.
Recommended Action This problem should correct itself once DPDs recognize that the peer no longer
has the appropriate SAs established. If DPD is not enabled, this may require you to manually
reestablish the affected tunnel.
713118
Explanation The group_descriptor field included an unsupported value. Currently we support only
groups 1, 2, 5, and 7. In the case of a centry, the group_descriptor field may also be set to 0 to
indicate that perfect forward secrecy is disabled.
713119
713120
713121
Explanation The type of keepalive mechanism that is being used for this tunnel is specified.
713122
Explanation Keepalives were configured on or off for this device, but the IKE peer does or does not
support keepalives.
713123
Error Message %ASA-3-713123: IKE lost contact with remote peer, deleting connection
(keepalive type: keepalive_type)
Explanation The remote IKE peer did not respond to keepalives within the expected window of time,
so the connection to the IKE peer was terminated. The message includes the keepalive mechanism
used.
713124
Explanation The remote IKE peer sent a DPD with a sequence number that did not match the
expected sequence number. The packet is discarded. This might indicate a packet loss problem with
the network.
713127
Error Message %ASA-3-713127: Xauth required but selected Proposal does not support
xauth, Check priorities of ike xauth proposals in ike proposal list
Explanation The peer wanted to perform a XAUTH, but the ASA did not choose the XAUTH IKE
proposal.
Recommended Action Check the priorities of the IKE xauth proposals in the IKE proposal list.
713128
Explanation A connection attempt has been made to the VCPIP and has been redirected to a less
loaded peer using load balancing.
713129
Explanation An unexpected payload has been received during XAUTH or Mode Cfg, which may
indicate that the two peers are out-of-sync, that the XAUTH or Mode Cfg versions do not match, or
that the remote peer is not complying with the appropriate RFCs.
713130
Explanation The device received a request for a valid transaction mode attribute (XAUTH or Mode
Cfg) that is currently not supported. This is generally a benign condition.
713131
Explanation The ASA has received a request for a transaction mode attribute (XAUTH or Mode Cfg)
that is outside the range of known attributes. The attribute may be valid but only supported in later
versions of configuration mode, or the peer may be sending an illegal or proprietary value. This
should not cause connectivity problems, but may affect the functionality of the peer.
713132
Explanation A request for an IP address for a remote access client from the internal utility that
provides these addresses cannot be satisfied.
713133
Explanation The configured Phase 2 PFS Group differed from the DH group that was negotiated for
Phase 1.
713134
Explanation The configured LAN-to-LAN proposal is different from the one accepted for the
LAN-to-LAN connection. Depending on which side is the initiator, different proposals will be used.
713135
Explanation The tunnel is being redirected because of load balancing on the remote ASA. A
REDIRECT_CONNECTION notify packet was received.
713136
Explanation The Reaper has detected an ASA stuck in an inactive state. The Reaper will try to
remove the inactive ASA.
713137
713138
Error Message %ASA-3-713138: Group group_name not found and BASE GROUP default
preshared key not configured
Explanation No group exists in the group database with the same name as the IP address of the peer.
In Main Mode, the ASA will fall back and try to use the default preshared key configured in one of
the default groups. The default preshared key is not configured.
713139
Error Message %ASA-5-713139: group_name not found, using BASE GROUP default
preshared key
Explanation No tunnel group exists in the group database with the same name as the IP address of
the peer. In Main Mode, the ASA will fall back and use the default preshared key configured in the
default group.
713140
Error Message %ASA-3-713140: Split Tunneling Policy requires network list but none
configured
Explanation The split tunneling policy is set to either split tunneling or to allow local LAN access.
A split tunneling ACL must be defined to represent the information required by the VPN client.
713141
Explanation The ASA installed on the client does not match the configured required ASA. This
message lists the actual and expected values, and whether the tunnel is terminated or allowed.
Recommended Action You may need to install a different personal ASA on the client or change the
configuration on the ASA.
713142
Error Message %ASA-3-713142: Client did not report firewall in use, but there is a
configured firewall: action tunnel. Expected -- Vendor: vendor(id), Product
product(id), Caps: capability_value
Explanation The client did not report an ASA in use using ModeCfg, but one is required. The event
lists the expected values and whether the tunnel is terminated or allowed. Note that the number
following the product string is a bitmask of all of the allowed products.
Recommended Action You may need to install a different personal ASA on the client or change the
configuration on the ASA.
713143
Explanation Debugging information about the ASA installed on the client appears.
713144
Recommended Action Check the personal configuration on the client and the ASA.
713145
Explanation A tunnel with a hardware client in network extension mode has been negotiated, and a
static route is being added for the private network behind the hardware client. This configuration
enables the ASA to make the remote network known to all the routers on the private side of the
headend.
713146
Error Message %ASA-3-713146: Could not add route for Hardware Client in network
extension mode, address: IP_address, mask: netmask
Explanation An internal software error has occurred. A tunnel with a hardware client in network
extension mode has been negotiated, and an attempt to add the static route for the private network
behind the hardware client failed. The routing table may be full, or a possible addressing error has
occurred.
713147
Explanation A tunnel to a hardware client in network extension mode is being removed, and the static
route for the private network is being deleted behind the hardware client.
713148
Explanation While a tunnel to a hardware client in network extension mode was being removed, a
route to the private network behind the hardware client cannot be deleted. This might indicate an
addressing or software problem.
Recommended Action Check the routing table to ensure that the route is not there. If it is, it may have
to be removed manually, but only if the tunnel to the hardware client has been completely removed.
713149
Explanation The headend ASA has the specified hardware client security attribute enabled, but the
attribute was not requested by the VPN 3002 hardware client.
713152
Error Message %ASA-3-713152: Unable to obtain any rules from filter ACL_tag to send
to client for CPP, terminating connection.
Explanation The client is required to use CPP to provision its ASA, but the headend device was
unable to obtain any ACLs to send to the client. This is probably due to a misconfiguration.
Recommended Action Check the ACLs specified for CPP in the group policy for the client.
713154
Explanation This message appears when a DNS lookup for the specified server has not been
resolved.
Recommended Action Check the DNS server configuration on the ASA. Also check the DNS server
to ensure that it is operational and has hostname to IP address mapping.
713155
Error Message %ASA-5-713155: DNS lookup for Primary VPN Server [server_name]
successfully resolved after a previous failure. Resetting any Backup Server init.
Explanation A previous DNS lookup failure for the primary server might have caused the ASA to
initialize a backup peer. This message indicates that a later DNS lookup on the primary server finally
succeeded and is resetting any backup server initializations. A tunnel initiated after this point will
be aimed at the primary server.
713156
Explanation The client is failing over to a backup server, or a failed DNS lookup for the primary
server caused the ASA to initialize a backup server. A tunnel initiated after this point will be aimed
at the specified backup server.
713157
Explanation The client tried to initiate a tunnel by sending out IKE MSG1, but did not receive a
response from the ASA on the other end. If backup servers are available, the client will attempt to
connect to one of them.
713158
Error Message %ASA-5-713158: Client rejected NAT enabled IPsec Over UDP request,
falling back to IPsec Over TCP
Explanation The client is configured to use IPsec over TCP. The client rejected the attempt by the
ASA to use IPsec over UDP.
Recommended Action If TCP is desired, no action is required. Otherwise, check the client
configuration.
713159
Error Message %ASA-3-713159: TCP Connection to Firewall Server has been lost,
restricted tunnels are now allowed full network access
Explanation The TCP connection to the ASA server was lost for a certain reason, such as the server
has rebooted, a network problem has occurred, or an SSL mismatch has occurred.
Recommended Action If the server connection was lost after the initial connection was made, then the
server and network connections must be checked. If the initial connection is lost immediately, this
might indicate an SSL authentication problem.
713160
Error Message %ASA-7-713160: Remote user (session Id - id) has been granted access
by the Firewall Server
Explanation Normal authentication of the remote user to the ASA server has occurred.
713161
Error Message %ASA-3-713161: Remote user (session Id - id) network access has been
restricted by the Firewall Server
Explanation The ASA server has sent the ASA a message indicating that this user must be restricted.
There are several reasons for this, including ASA software upgrades or changes in permissions. The
ASA server will transition the user back into full access mode as soon as the operation has been
completed.
Recommended Action No action is required unless the user is never transitioned back into full access
state. If this does not happen, refer to the ASA server for more information on the operation that is
being performed and the state of the ASA software running on the remote machine.
713162
Error Message %ASA-3-713162: Remote user (session Id - id) has been rejected by the
Firewall Server
Recommended Action Check the policy information on the ASA server to make sure that the user is
configured correctly.
713163
Error Message %ASA-3-713163: Remote user (session Id - id) has been terminated by
the Firewall Server
Explanation The ASA server has terminated this user session, which can occur if the integrity agent
stops running on the client machine or if the security policy is modified by the remote user in any
way.
Recommended Action Verify that the ASA software on the client machine is still running and that the
policy is correct.
713164
Error Message %ASA-7-713164: The Firewall Server has requested a list of active user
sessions
Explanation The ASA server will request the session information if it detects that it has stale data or
if it loses the session data (because of a reboot).
713165
Error Message %ASA-3-713165: Client IKE Auth mode differs from the group's configured
Auth mode
Explanation The client negotiated with preshared keys while its tunnel group points to a policy that
is configured to use digital certificates.
713166
Error Message %ASA-3-713166: Headend security gateway has failed our user
authentication attempt - check configured username and password
Explanation The hardware client has failed extended authentication. This is most likely a username
and password problem or an authentication server issue.
Recommended Action Verify that the configured username and password values on each side match.
Also verify that the authentication server at the headend is operational.
713167
Error Message %ASA-3-713167: Remote peer has failed user authentication - check
configured username and password
Explanation The remote user has failed to extend authentication. This is most likely a username or
password problem, or an authentication server issue.
Recommended Action Verify that the configured username and password values on each side match.
Also verify that the authentication server being used to authenticate the remote user is operational.
713168
Explanation Reauthentication on rekeying has been enabled, but the tunnel authentication requires
manual intervention.
Recommended Action If manual intervention is desired, no action is required. Otherwise, check the
interactive authentication configuration.
713169
Error Message %ASA-7-713169: IKE Received delete for rekeyed SA IKE peer: IP_address,
SA address: internal_SA_address, tunnelCnt: tunnel_count
Explanation IKE has received a delete message from the remote peer to delete its old IKE SA after
a rekey has completed.
713170
Error Message %ASA-7-713170: Group group IP ip IKE Received delete for rekeyed centry
IKE peer: IP_address, centry address: internal_address, msgid: id
Explanation IKE has received a delete message from the remote peer to delete its old centry after
Phase 2 rekeying is completed.
713171
Explanation UDP-Encapsulated-Transport was either proposed or selected during Phase 2. Send this
payload for NAT-Traversal in this case.
713172
Error Message %ASA-6-713172: Automatic NAT Detection Status: Remote end is|is not
behind a NAT device This end is|is not behind a NAT device
713174
Explanation A hardware client is attempting to tunnel in using network extension mode, but network
extension mode is not allowed.
Recommended Action Verify the configuration of the network extension mode versus PAT mode.
713176
Error Message %ASA-2-713176: Device_type memory resources are critical, IKE key
acquire message on interface interface_number, for Peer IP_address ignored
Explanation The ASA is processing data intended to trigger an IPsec tunnel to the indicated peer.
Because memory resources are at a critical state, it is not initiating any more tunnels. The data
packet has been ignored and dropped.
Recommended Action If condition persists, verify that the ASA is efficiently configured. An ASA
with increased memory may be required for this application.
713177
Error Message %ASA-6-713177: Received remote Proxy Host FQDN in ID Payload: Host
Name: host_name Address IP_address, Protocol protocol, Port port
Explanation A Phase 2 ID payload containing an FQDN has been received from the peer.
713178
Error Message %ASA-5-713178: IKE Initiator received a packet from its peer without
a Responder cookie
713179
Error Message %ASA-5-713179: IKE AM Initiator received a packet from its peer without
a payload_type payload
713182
Error Message %ASA-3-713182: IKE could not recognize the version of the client! IPsec
Fragmentation Policy will be ignored for this connection!
713184
Explanation The client operating system and application version appear. If the information is not
available, then N/A will be indicated.
713185
Explanation The client returned an invalid length username, and the tunnel was torn down.
713186
Error Message %ASA-3-713186: Invalid secondary domain name list received from the
authentication server. List Received: list_text Character index (value) is illegal
Explanation An invalid secondary domain name list was received from an external RADIUS
authentication server. When split tunnelling is used, this list identifies the domains that the client
should resolve through the tunnel.
713187
Error Message %ASA-7-713187: Tunnel Rejected: IKE peer does not match remote peer as
defined in L2L policy IKE peer address: IP_address, Remote peer address:
IP_address
Explanation The IKE peer that is attempting to bring up this tunnel is not the one that is configured
in the ISAKMP configuration that is bound to the received remote subnet.
Recommended Action Verify that L2L settings are correct on the headend and peer.
713189
Explanation The IP address from the pool is either the network or broadcast address for this subnet.
This address will be marked as unavailable.
Recommended Action This error is generally benign, but the IP address pool configuration should be
checked.
713190
713191
Explanation To minimize CPU-intensive cryptographic calculations, the ASA limits the number of
connection negotiations in progress. When a new negotiation is requested and the ASA is already at
its limit, the new negotiation is rejected. When an existing connection negotiation completes, new
connection negotiation will again be permitted.
Recommended Action See the crypto ikev1 limit max-in-negotiation-sa command. Increasing the
limit can degrade performance..
713193
Error Message %ASA-3-713193: Received packet with missing payload, Expected payload:
payload_id
Explanation The ASA received an encrypted or unencrypted packet of the specified exchange type
that had one or more missing payloads. This usually indicates a problem on the peer.
Recommended Action Verify that the peer is sending valid IKE messages.
713194
713195
Explanation The originate-only peer can accept incoming connections only after it brings up the first
P2 tunnel. At that point, data from either direction can initiate additional Phase 2 tunnels.
713196
Error Message %ASA-5-713196: Remote L2L Peer IP_address initiated a tunnel with same
outer and inner addresses. Peer could be Originate Only - Possible
misconfiguration!
Explanation The remote L2L peer has initiated a public-public tunnel. The remote L2L peer expects
a response from the peer at the other end, but does not receive one, because of a possible
misconfiguration.
713197
Explanation The configured confidence interval in the group is outside of the valid range.
Recommended Action Check the confidence setting in the group to make sure it is within the valid
range.
713198
Explanation A reason string that states that a username cannot be found in the certificate appears.
713199
Error Message %ASA-5-713199: Reaper corrected an SA that has not decremented the
concurrent IKE negotiations counter (counter_value)!
713203
Explanation An error occurred while reading a received IKE packet. This is generally an internal
error and might indicate a software problem.
Recommended Action This problem is usually benign, and the system will correct itself. If the
problem persists, contact the Cisco TAC.
713204
Error Message %ASA-7-713204: Adding static route for client address: IP_address
Explanation This message indicates that a route to the peer-assigned address or to the networks
protected by a hardware client was added to the routing table.
713205
Error Message %ASA-3-713205: Could not add static route for client address:
IP_address
Explanation An attempt to add a route to the client-assigned address or to the networks protected by
a hardware client failed. This might indicate duplicate routes in the routing table or a corrupted
network address. The duplicate routes might be caused by routes that were not cleaned up correctly
or by having multiple clients sharing networks or addresses.
Recommended Action Check the IP local pool configuration as well as any other IP address-assigning
mechanism being used (for example, DHCP or RADIUS). Make sure that routes are being cleared
from the routing table. Also check the configuration of networks and/or addresses on the peer.
713206
Explanation A tunnel was dropped because the allowed tunnel specified in the group policy was
different from the allowed tunnel in the tunnel group configuration.
Recommended Action Check the tunnel group and group policy configuration.
713208
Error Message %ASA-3-713208: Cannot create dynamic rule for Backup L2L entry rule
rule_id
Explanation A failure occurred in creating the ACLs that trigger IKE and allow IPsec data to be
processed properly. The failure was specific to the backup L2L configuration, which may indicate a
configuration error, a capacity error, or an internal software error.
Recommended Action If the ASA is running the maximum number of connections and VPN tunnels,
there may be a memory issue. If not, check the backup L2L and crypto map configurations,
specifically the ACLs associated with the crypto maps.
713209
Error Message %ASA-3-713209: Cannot delete dynamic rule for Backup L2L entry rule id
Explanation A failure occurred in deleting the ACLs that trigger IKE and allow IPsec data to be
processed correctly. The failure was specific to the backup L2L configuration. This may indicate an
internal software error.
713210
Error Message %ASA-3-713210: Cannot create dynamic map for Backup L2L entry rule_id
Explanation A failure occurred in creating a run-time instance of the dynamic crypto map associated
with backup L2L configuration. This may indicate a configuration error, a capacity error, or an
internal software error.
Recommended Action If the ASA is running the maximum number of connections and VPN tunnels,
there may be a memory issue. If not, check the backup L2L and crypto map configurations, and
specifically the ACLs associated with the crypto maps.
713211
Error Message %ASA-6-713211: Adding static route for L2L peer coming in on a dynamic
map. address: IP_address, mask: netmask
Explanation The ASA is adding a route for the private address or networks of the peer. In this case,
the peer is either a client or a L2L peer with an unknown address. Both of these cases use dynamic
crypto maps to allow the tunnel.
713212
Error Message %ASA-3-713212: Could not add route for L2L peer coming in on a dynamic
map. address: IP_address, mask: netmask
Explanation The ASA failed while attempting to add a route for the private address or networks of
the peer. In this case, the peer is either a client or a L2L peer with an unknown address. Both of these
cases use dynamic crypto maps to allow the tunnel. This might indicate duplicate routes, a full
routing table, or a failure of the ASA to remove previously used routes.
Recommended Action Check the routing table to make sure there is room for additional routes and
that obsolete routes are not present. If the table is full or includes obsolete routes, remove the routes
and try again. If the problem persists, contact the Cisco TAC.
713213
Error Message %ASA-6-713213: Deleting static route for L2L peer that came in on a
dynamic map. address: IP_address, mask: netmask
Explanation The ASA is deleting a route for the private address or networks of the peer. In this case,
the peer is either a client or a L2L peer with an unknown address. Both of these cases use dynamic
crypto maps to allow the tunnel.
713214
Error Message %ASA-3-713214: Could not delete route for L2L peer that came in on a
dynamic map. address: IP_address, mask: netmask
Explanation The ASA experienced a failure while deleting a route for the private address or networks
of the peer. In this case, the peer is either a client or a L2L peer with an unknown address. Both of
these cases use dynamic crypto maps to allow the tunnel. The route may have already been
deleted,or an internal software error has occurred.
Recommended Action If the route has already been deleted, the condition is benign and the device will
function normally. If the problem persists or can be linked to routing issues over VPN tunnels, then
check the routing and addressing portions of the VPN L2L configuration. Check the reverse route
injection and the ACLs associated with the appropriate crypto map. If the problem persists, contact
the Cisco TAC.
713215
Error Message %ASA-6-713215: No match against Client Type and Version rules. Client:
type version is/is not allowed by default
Explanation The client type and the version of a client did not match any of the rules configured on
the ASA. The default action appears.
Recommended Action Determine what the default action and deployment requirements are, and make
the applicable changes.
713216
Error Message %ASA-5-713216: Rule: action [Client type]: version Client: type
version allowed/not allowed
Explanation The client type and the version of a client have matched one of the rules. The results of
the match and the rule are displayed.
Recommended Action Determine what the deployment requirements are, and make the appropriate
changes.
713217
Error Message %ASA-3-713217: Skipping unrecognized rule: action: action client type:
client_type client version: client_version
Explanation A malformed client type and version rule exist. The required format is action client type
| client version action. Either permit or deny client type and client version are displayed under
Session Management. Only one wildcard per parameter (*) is supported.
713218
Error Message %ASA-3-713218: Tunnel Rejected: Client Type or Version not allowed.
Explanation The client was denied access according to the configured rules.
713219
713220
Error Message %ASA-6-713220: De-queuing KEY-ACQUIRE messages that were left pending.
713221
Error Message %ASA-7-713221: Static Crypto Map check, checking map = crypto_map_tag,
seq = seq_number...
Explanation The ASA is iterating through the crypto maps looking for configuration information.
713222
Error Message %ASA-7-713222: Group group Username username IP ip Static Crypto Map
check, map = crypto_map_tag, seq = seq_number, ACL does not match proxy IDs
src:source_address dst:dest_address
Explanation While iterating through the configured crypto maps, the ASA cannot match any of the
associated ACLs. This generally means that an ACL was misconfigured.
Recommended Action Check the ACLs associated with this tunnel peer, and make sure that they
specify the appropriate private networks from both sides of the VPN tunnel.
713223
Error Message %ASA-7-713223: Static Crypto Map check, map = crypto_map_tag, seq =
seq_number, no ACL configured
Explanation The crypto map associated with this peer is not linked to an ACL.
Recommended Action Make sure an ACL associated with this crypto map exists, and that the ACL
includes the appropriate private addresses or network from both sides of the VPN tunnel.
713224
Error Message %ASA-7-713224: Static Crypto Map Check by-passed: Crypto map entry
incomplete!
Explanation The crypto map associated with this VPN tunnel is missing critical information.
Recommended Action Verify that the crypto map is configured correctly with both the VPN peer, a
transform set, and an associated ACL.
713225
Error Message %ASA-7-713225: [IKEv1], Static Crypto Map check, map map_name, seq =
sequence_number is a successful match
Explanation The ASA found a valid matching crypto map for this VPN tunnel.
713226
Explanation When the device is configured to use digital certificates, a trustpoint must be specified
in the configuration. When the trustpoint is missing from the configuration, this message is
generated to flag an error.
• IP_address—IP address of the peer
• tunnel_group—Tunnel group for which the trustpoint was missing in the configuration
Recommended Action The administrator of the device has to specify a trustpoint in the configuration.
713227
Explanation When establishing a Phase SA, the ASA will reject a new Phase 2 matching this proxy.
713228
Explanation IKE obtained a private IP address for the client from DHCP or from the address pool.
• group—The name of the group
• uname—The name of the user
• remote_IP_address—The IP address of the remote client
• assigned_private_IP—The client IP address assigned by DHCP or from the local address pool
713229
Explanation A VPN remote access client is notified that updated software is available for download.
The remote client user is responsible for choosing to update the client access software.
• client_ip—The IP address of the remote client
• message_string—The message text sent to the remote client
713230
Error Message %ASA-3-713230 Internal Error, ike_lock trying to lock bit that is
already locked for type type
Explanation An internal error occurred, which is reporting that the IKE subsystem is attempting to
lock memory that has already been locked. This indicates errors on semaphores that are used to
protect memory violations for IKE SAs. This message does not indicate that anything is seriously
wrong. However, an unexpected event has occurred, and steps are automatically being taken for
recovery.
• type—String that describes the type of semaphore that had a locking issue
713231
Error Message %ASA-3-713231 Internal Error, ike_lock trying to unlock bit that is
not locked for type type
Explanation An internal error has occurred, which is reporting that the IKE subsystem is attempting
to unlock memory that is not currently locked. This indicates errors on semaphores that are used to
protect memory violations for IKE SAs. This message does not indicate that anything is seriously
wrong. However, an unexpected event has occurred, and steps are automatically being taken for
recovery.
• type—String that describes the type of semaphore that had a locking issue
713232
Explanation All the IKE SA are locked, and a possible error has been detected. This message reports
errors on semaphores that are used to protect memory violations for IKE SAs.
• value—Decimal value
• hexvalue—Hexadecimal value
713233
Explanation The remote network received during the Phase 2 negotiation was validated. The
message indicates the results of the remote network check during Phase 2 negotiations for Network
Extension Mode clients. This is part of an existing feature that prevents users from misconfiguring
their hardware client network (for example, configuring overlapping networks or the same network
on multiple clients).
• remote network—Subnet address and subnet mask from Phase 2 proxy
713234
Error Message %ASA-7-713234: (VPN-unit) Remote network (remote network) from network
extension mode client mismatches AAA configuration (aaa network).
Explanation The remote network received during the Phase 2 negotiation does not match the
framed-ip-address and framed-subnet-mask that were returned from the AAA server for this session.
• remote network—Subnet address and subnet mask from Phase 2 proxy
• aaa network—Subnet address and subnet mask configured through AAA
713235
Error Message %ASA-6-713235: Attempt to send an IKE packet from standby unit.
Dropping the packet!
Explanation Normally, IKE packets should never be sent from the standby unit to the remote peer. If
such an attempt is made, an internal logic error may have occurred. The packet never leaves the
standby unit because of protective code. This message facilitates debugging.
713236
713237
Explanation The Phase 1 rekey of a remote access IPsec tunnel appears under the following
conditions:
• The tunnel is configured to reauthenticate the user when the tunnel is rekeyed.
• The RADIUS server returns an access list or a reference to a locally configured access list that
is different from the one that was returned when the tunnel was first established.
Under these conditions, the ASA ignores the new access list and this message is generated.
• access_list—Name associated with the static or dynamic access list, as displayed in the output
of the show access-list command
Recommended Action IPsec users must reconnect for new user-specific access lists to take effect.
713238
Error Message %ASA-3-713238: Invalid source proxy address: 0.0.0.0! Check private
address on remote client
Explanation The private side address of a network extension mode client came across as 0.0.0.0. This
usually indicates that no IP address was set on the private interface of the hardware client.
713239
Error Message %ASA-4-713239: IP_Address: Tunnel Rejected: The maximum tunnel count
allowed has been reached
Explanation An attempt to create a tunnel has occurred after the maximum number of tunnels
allowed has been reached.
• IP_Address—The IP address of the peer
713240
Explanation A Diffie-Hellman key with the incorrect length was received from the peer.
• rlength—The length of the DH key that was received
• elength—The expected length (based on the DH key size)
713241
Explanation An invalid proxy setting was found during ModeCfg processing. P1 negotiation will
fail.
Recommended Action Check the msie-proxy method command settings (a subcommand of the
group-policy command), which should conform to one of the following: [auto-detect | no-modify
| no-proxy | use-server]. Any other value or no value is incorrect. Try resetting the msie-proxy
method command settings. If the problem persists, contact the Cisco TAC.
713242
Explanation The ASA has detected a request to start an IKE rekey for a tunnel configured to use
Hybrid Xauth, but the rekey was not started. The ASA will wait for the client to detect and initiate
an IKE rekey.
713243
Explanation The IKE peer requested a certificate from the cert-req payload. However, no valid
identity certificate issued by the requested DN was found.
713244
Explanation The LAM attribute type received differs from the last type received. The type must be
consistent throughout the user authentication process. The user authentication process cannot
proceed, and the VPN connection will not be established.
• type—The LAM type
713245
Explanation An unsupported LAM type was received during the CRACK challenge or response user
authentication process. The user authentication process cannot proceed, and the VPN connection
will not be established.
• type—The LAM type
713246
Explanation The ASA received an unknown LAM attribute type, which should not cause
connectivity problems, but might affect the functionality of the peer.
• type—The LAM attribute type
713247
Error Message %ASA-4-713247: META-DATA Unexpected error: in Next Card Code mode while
not doing SDI.
713248
Explanation When an IKE SA is negotiated using the CRACK authentication method, the Phase 1
SA rekey timer at the headend expired before a successful rekey. Because the remote client is always
the initiator of the exchange when using the CRACK authentication method, the headend will not
initiate the rekey. Unless the remote peer initiates a successful rekey before the IKE SA expires, the
connection will come down upon IKE SA expiration.
713249
Explanation While negotiating an IKE SA using the CRACK authentication method, the IKE
subsystem received a result that is not supported during CRACK authentication from the
authentication subsystem. The user authentication fails, and the VPN connection is torn down.
• result—The result returned from the authentication subsystem
713250
Explanation The ASA received a request for an internal address attribute that is not recognizable.
The attribute might be valid, but not currently supported, or the peer might be sending an illegal
value. This should not cause connectivity problems, but might affect the functionality of the peer.
713251
Explanation The ASA received a notification message that indicated an authentication failure while
an IKE SA is negotiated using the CRACK authentication method. The connection is torn down.
713252
Explanation When the group policy is configured to require the client to authenticate with a Zonelab
Integrity Server, the server might need to be connected to the concentrator depending on the failure
policy configured. If the fail policy is to reject the client connection, this message is generated when
a Zonelab Integrity Server is not connected to the ASA at the time the client is connecting.
• group—The tunnel group to which the remote access user is connecting
• user—The remote access user
• ip—The IP address of the remote access user
Recommended Action Check that the configurations on the concentrator and the Zonelab Integrity
Server match. Then verify that communication exists between the concentrator and the Zonelab
Integrity Server.
713253
Explanation When the group policy is configured to require a client to authenticate with a Zonelab
Integrity Server, the server might need to be connected to the concentrator, depending on the failure
policy configured. If the failure policy is to accept the client connection, and provide unrestricted
network access, this message is generated when a Zonelab Integrity Server is not connected to the
ASA at the time the client is connecting.
• group—The tunnel group to which the remote access user is connecting
• user—The remote access user
• ip—The IP address of the remote access user
Recommended Action Check that the configurations on the ASA and the Zonelab Integrity Server
match, and verify that communication exists between the ASA and the Zonelab Integrity Server.
713254
Explanation You cannot use UDP port 4500 for IPsec/UDP connections, because it is reserved for
IPsec or NAT-T connections. The CLI does not allow this configuration for local groups. This
message should only occur for externally defined groups.
• groupname—The name of the user group
• username—The name of the user
• peerip—The IP address of the client
• portnum—The IPsec/UDP port number on the external server
• minport—The minimum valid port number for a user-configurable port, which is 4001
• maxport—The maximum valid port number for a user-configurable port, which is 49151
Recommended Action Change the IPsec or UDP port number on the external server to another port
number. Valid port numbers are 4001 to 49151.
713255
Explanation An unknown tunnel group was specified in ISAKMP Aggressive Mode message 1.
• peer-ip—The address of the peer
• group-name—The group name specified by the peer
Recommended Action Check the tunnel group and client configurations to make sure that they are
valid.
713256
Explanation When the peer specifies an invalid tunnel group, the ASA will still send message 2 to
prevent the peer from gleaning tunnel group information.
• peer-ip—The address of the peer
713257
Error Message %ASA-5-713257: Phase var1 failure: Mismatched attribute types for
class var2: Rcv'd: var3 Cfg'd: var4
Explanation An ASA has acted as the responder in a LAN-to-LAN connection. It indicates that the
ASA crypto configuration does not match the configuration of the initiator. The message specifies
during which phase the mismatch occurred, and which attributes both the responder and the initiator
had that were different.
• var1—The phase during which the mismatch occurred
• var2—The class to which the attributes that do not match belong
• var3—The attribute received from the initiator
• var4—The attribute configured
Recommended Action Check the crypto configuration on both of the LAN-to-LAN devices for
inconsistencies. In particular, if a mismatch between UDP-Tunnel (NAT-T) and something else is
reported, check the crypto maps. If one configuration has NAT-T disabled on the matched crypto
map and the other does not, this will cause a failure.
713258
Explanation The ASA tries to establish a Phase 2 tunnel on an interface, and a Phase 1 tunnel already
exists on a different interface. The existing Phase 1 tunnel is torn down to allow the establishment
of a new tunnel on the new interface.
• var1—The IP address of the peer
• var2—The interface on which the ASA is trying to establish a Phase 2 tunnel
• var3—The interface on which the Phase 1 tunnel exists
Recommended Action Check whether or not the route of the peer has changed. If the route has not
changed, a possible misconfiguration may exist.
713259
Explanation The termination reason for the ISAKMP session appears, which occurs when the session
is torn down through session management.
• groupname—The tunnel group of the session being terminated
• username—The username of the session being terminated
713260
Explanation When trying to create a Phase 1 SA, the interface database could not be found for the
interface ID.
713261
Error Message %ASA-3-713261: IPV6 address on output interface %d was not found
Explanation When trying to create a Phase 1 SA, no IPv6 address is specified on the local interface.
Recommended Action For information about how to set up an IPv6 address on a desired interface, see
the “Configuring IPv6 Addressing” section in the CLI configuration guide.
713262
Explanation When establishing a Phase SA, the ASA will reject a new Phase 2 SA matching this
proxy.
• Peer_address—The new address attempting to intiate Phase 2 with a proxy matching an existing
negotiation
• Local_address—The address of the previous local peer currently negotiating Phase 2
• Local_prefix_len—The length of the subnet prefix according to CIDR notation
• Remote_address—The address of the proxy
713263
Explanation The ASA is adding a route for the private address or networks of the peer. In this case,
the peer is either a client or a L2L peer with an unknown address. Both of these cases use dynamic
crypto maps to allow the tunnel.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
• protocol— The proxy protocol
• port—The proxy port
713264
Explanation The ASA is adding a route for the private address or networks of the peer. In this case,
the peer is either a client or a L2L peer with an unknown address. Both of these cases use dynamic
crypto maps to allow the tunnel.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
• protocol— The proxy protocol
• port—The proxy port
713265
Error Message %ASA-6-713265: Adding static route for L2L peer coming in on a dynamic
map. address: IP_address, mask: /prefix_len
Explanation The ASA is adding a route for the private address or networks of the peer. In this case,
the peer is either a client or a L2L peer with an unknown address. Both of these cases use dynamic
crypto maps to allow the tunnel.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
713266
Error Message %ASA-3-713266: Could not add route for L2L peer coming in on a dynamic
map. address: IP_address, mask: /prefix_len
Explanation The ASA failed while attempting to add a route for the private address or networks of
the peer. In this case, the peer is either a client or a L2L peer with an unknown address. Both of these
cases use dynamic crypto maps to allow the tunnel. This might indicate duplicate routes, a full IPv6
routing table, or a failure of the ASA to remove previously used routes.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
Recommended Action Check the IPv6 routing table to make sure there is room for additional routes,
and that obsolete routes are not present. If the table is full or includes obsolete routes, remove the
routes and try again. If the problem persists, contact the Cisco TAC.
713267
Error Message %ASA-6-713267: Deleting static route for L2L peer that came in on a
dynamic map. address: IP_address, mask: /prefix_len
Explanation The ASA failed while attempting to add a route for the private address or networks of
the peer. In this case, the peer is either a client or a L2L peer with an unknown address. Both of these
cases use dynamic crypto maps to allow the tunnel.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
713268
Error Message %ASA-3-713268: Could not delete route for L2L peer that came in on a
dynamic map. address: IP_address, mask: /prefix_len
Explanation The ASA experienced a failure while deleting a route for the private address or networks
of the peer. In this case, the peer is either a client or a L2L peer with an unknown address. Both of
these cases use dynamic crypto maps to allow the tunnel. The route may have already been deleted,
or an internal software error has occurred.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
Recommended Action If the route has already been deleted, the condition is benign and the device will
function normally. If the problem persists or can be linked to routing issues over VPN tunnels, then
check the routing and addressing portions of the VPN L2L configuration. Also check the reverse
route injection and the ACLs associated with the appropriate crypto map. If the problem persists,
contact the Cisco TAC.
713269
Explanation A tunnel with a hardware client in network extension mode has been negotiated, and a
static route is being added for the private network behind the hardware client. This configuration
enables the ASA to make the remote network known to all the routers on the private side of the
headend.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
713270
Error Message %ASA-3-713270: Could not add route for Hardware Client in network
extension mode, address: IP_address, mask: /prefix_len
Explanation An internal software error has occurred. A tunnel with a hardware client in network
extension mode has been negotiated, and an attempt to add the static route for the private network
behind the hardware client failed. The IPv6 routing table may be full, or a possible addressing error
has occurred.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
713271
Explanation A tunnel to a hardware client in network extension mode is being removed, and the static
route for the private network is being deleted behind the hardware client.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
713272
Explanation While a tunnel to a hardware client in network extension mode was being removed, a
route to the private network behind the hardware client cannot be deleted. This might indicate an
addressing or software problem.
• IP_address—The base IP address of the destination network of the peer
• prefix_len—The length of the subnet prefix according to CIDR notation
Recommended Action Check the IPv6 routing table to ensure that the route is not there. If it is, it may
have to be removed manually, but only if the tunnel to the hardware client has been completely
removed.
713273
Error Message %ASA-7-713273: Deleting static route for client address: IP_Address
IP_Address address of client whose route is being removed
Explanation A route to the peer-assigned address or the networks protected by a hardware client were
removed from the routing table.
713274
Error Message %ASA-3-713274: Could not delete static route for client address:
IP_Address IP_Address address of client whose route is being removed
Explanation While a tunnel to an IPsec client was being removed, its entry in the routing table could
not be removed. This condition may indicate a networking or software problem.
Recommended Action Check the routing table to make sure that the route does not exist. If it does, it
may need to be removed manually, but only if the tunnel has been closed successfully.
713900
Explanation A serious event or failure has occurred. For example, the ASA is trying to generate a
Phase 2 deletion, but the SPI did not match any of the existing Phase 2 SAs.
Recommended Action In the example described, both peers are deleting Phase 2 SAs at the same time.
In this case, it is a benign error and can be ignored. If the error is persistent and results in negative
side effects such as dropped tunnels or device reboots, it may reflect a software failure. In this case,
copy the error message exactly as it appears on the console or in the system log, and then contact
the Cisco TAC for further assistance.
713901
Explanation An error has occurred, which may be the result of a configuration error on the headend
or remote access client. The event string provides details about the error that occurred.
Recommended Action You may need to troubleshoot the message to determine what caused the error.
Check the ISAKMP and crypto map configuration on both peers.
713902
Explanation An error has occurred, which may be the result of a configuration error either on the
headend or remote access client.
Recommended Action It might be necessary to troubleshoot the configuration to determine the cause
of the error. Check the ISAKMP and crypto map configuration on both peers.
713903
Explanation A warning appears, which may be the result of unexpected behavior of a peer (such as
a loss of connectivity). For example:
%ASA-4-713903: Group = IPSecGroup. IP = 70.172.17.23, Error: Unable to remove
PeerTblEntry.
An IPsec connection attempt failed (for example, in an authentication failure) that was caused by an
incorrectly typed password or the inadvertent disconnection of an IPsec client during authentication.
713904
Explanation Notification status information appears, which is used to track events that have
occurred.
713905
Explanation Information status details appear, which are used to track events that have occurred.
713906
Explanation Debugging status information appears, which is used to track events that have occurred.
714001
714002
Explanation The ASA has sent the first packet of the Quick mode exchange as the Phase 2 initiator.
714003
Explanation The ASA has received the first packet of the Quick mode exchange as the Phase 2
responder.
714004
Explanation The protocol of the first Quick Mode packet was decoded.
714005
Explanation The protocol of the second Quick Mode packet was decoded.
714006
Explanation The protocol of the third Quick Mode packet was decoded.
714007
Explanation The ASA is building and sending the initial contact payload.
714011
Explanation The ASA received the displayed ID information during the negotiation.
715001
715004
Recommended Action This is often a benign condition. If the problem persists, contact the Cisco TAC.
715005
Error Message %ASA-7-715005: subroutine name() Bad message code: Code (message_code)
Recommended Action This is often a benign condition. If the problem persists, contact the Cisco TAC.
715006
Error Message %ASA-7-715006: IKE got SPI from key engine: SPI = SPI_value
715007
Error Message %ASA-7-715007: IKE got a KEY_ADD msg for SA: SPI = SPI_value
Explanation IKE has completed tunnel negotiation and has successfully loaded the appropriate
encryption and hashing keys for IPsec use.
715008
Error Message %ASA-7-715008: Could not delete SA SA_address, refCnt = number, caller
= calling_subroutine_address
Explanation The calling subroutine cannot delete the IPsec SA. This might indicate a reference count
problem.
Recommended Action If the number of stale SAs grows as a result of this event, contact the Cisco
TAC.
715009
Error Message %ASA-7-715009: IKE Deleting SA: Remote Proxy IP_address, Local Proxy
IP_address
715013
Explanation IKE is in the process of establishing a tunnel for this data. All packets to be protected
by this tunnel will be dropped until the tunnel is fully established.
715019
Explanation The modecfg attribute name and value pair being processed by the ASA appear.
715020
Explanation The modecfg attribute name and value pair being transmitted by the ASA appear.
715021
Error Message %ASA-7-715021: Delay Quick Mode processing, Cert/Trans Exch/RM DSID in
progress
Explanation Quick mode processing is being delayed until all Phase 1 processing has been
completed (for transaction mode).
715022
Error Message %ASA-7-715022: Resume Quick Mode processing, Cert/Trans Exch/RM DSID
completed
Explanation Phase 1 processing has completed, and quick mode is being resumed.
715027
Explanation The indicated IPsec SA proposal and transform were selected from the payloads that the
responder received. This data can be useful when attempting to debug IKE negotiation issues.
715028
Explanation The indicated IKE SA transform was selected from the payloads that the responder
received. This data can be useful when attempting to debug IKE negotiation issues.
715033
Explanation The ASA is processing a message containing a notify payload with the notify type
CONNECTED (16384). The CONNECTED notify type is used to complete the commit bit
processing and should be included in the fourth overall quick mode packet, which is sent from the
responder to the initiator.
715034
Error Message %ASA-7-715034: action IOS keep alive payload: proposal=time 1/time 2
sec.
Explanation Processing for sending or receiving a keepalive payload message is being performed.
715035
Explanation The keepalive timer will monitor for a variable number of seconds for keepalive
messages.
715036
715037
Explanation The capabilities of this version of the Cisco IOS are not known.
Recommended Action There may be interoperability issues with features such as IKE keepalives. If
the problem persists, contact the Cisco TAC.
715038
Explanation Processing for the Cisco IOS vendor ID payload has been performed. The action being
performed might be Altiga spoofing the Cisco IOS.
715039
Explanation An entry in the IKE tunnel table was never removed when the SA was freed. This
indicates a defect in the state machine.
715040
Error Message %ASA-7-715040: Deleting active auth handle during SA deletion: handle =
internal_authentication_handle
Explanation The authentication handle was still active during SA deletion. This is part of cleanup
recovery during the error condition.
715041
Explanation A keepalive of the type indicated in the message was received unexpectedly.
715042
Explanation A request for an IP address for a remote access client from the internal utility that
provides these addresses cannot be satisfied. Variable text in the message string indicates more
specifically what went wrong.
Recommended Action Check the IP address assignment configuration and adjust accordingly.
715044
Error Message %ASA-7-715044: Ignoring Keepalive payload from vendor not support
KeepAlive capability
Explanation A Cisco IOS keepalive payload from a vendor was received without keepalive
capabilities being set. The payload is ignored.
715045
Explanation A malformed keepalive payload has been received. The payload is ignored.
715046
Explanation An IP address from a remote client for a specific group and user shows details about the
IKE payload being constructed.
715047
Explanation Details of the IKE payload received and being processed appear.
715048
715049
715050
Explanation The vendor ID received looks like a Cisco IOS VID, but does not match hmac_sha.
Recommended Action Check the vendor ID configuration on both peers. If this issue affects
interoperability and the problem persists, contact the Cisco TAC.
715051
Error Message %ASA-7-715051: Received unexpected TLV type TLV_type while processing
FWTYPE ModeCfg Reply
Explanation An unknown TLV was received in an ASA record while an FWTYPE ModeCfg Reply
was being processed. The TLV will be discarded. This might occur either because of packet
corruption or because the connecting client supports a later version of the ASA protocol.
Recommended Action Check the personal FW installed on the Cisco VPN client and the personal
firewall configuration on the ASA. This may also indicate a version mismatch between the VPN
client and the ASA.
715052
Error Message %ASA-7-715052: Old P1 SA is being deleted but new SA is DEAD, cannot
transition centries
Explanation The old P1 SA is being deleted, but has no new SA to transition to because it was marked
for deletion as well. This generally indicates that the two IKE peers are out-of-sync with each other
and may be using different rekey times. The problem should correct itself, but there may be some
small amount of data loss until a fresh P1 SA is reestablished.
715053
Explanation The ASA received a mode configuration message requesting the specified attribute.
715054
Explanation The ASA received a mode configuration reply message from the remote peer.
715055
Explanation The ASA sent a mode configuration message to the remote peer.
715056
Explanation Because the remote end (client) is configured for IPsec over TCP, the headend ASA
must not negotiate IPsec over UDP or IPsec over NAT-T with the client.
Recommended Action The NAT transparency configuration may require adjustment of one of the
peers if the tunnel does not come up.
715057
715058
Explanation The remote end did not provide NAT-Discovery payloads required for NAT-Traversal
after exchanging NAT-Traversal VIDs. At least two NAT-Discovery payloads must be received.
Recommended Action This may indicate a nonconforming NAT-T implementation. If the offending
peer is a Cisco product and the problem persists, contact the Cisco TAC. If the offending peer is not
a Cisco product, then contact the manufacturer support team.
715059
Explanation You need to use these modes instead of the usual transport and tunnel modes defined in
the SA to successfully negotiate NAT-Traversal.
715060
Recommended Action The recommended action depends on the drop reason, but might indicate a
problem with an intervening NAT device or a nonconforming peer.
715061
Error Message %ASA-7-715061: Rcv'd fragment from a new fragmentation set. Deleting
any old fragments.
Explanation A resend of the same packet occurred, but fragmented to a different MTU, or another
packet altogether.
715062
Recommended Action This might indicate a network problem. If the condition persists and results in
dropped tunnels or prevents certain peers from negotiating with the ASA, contact the Cisco TAC.
715063
Explanation Assembly for a fragmented packet that was received was successful.
715064
Error Message %ASA-7-715064 -- IKE Peer included IKE fragmentation capability flags:
Main Mode: true/false Aggressive Mode: true/false
Explanation The peer supports IKE fragmentation based on the information provided in the message.
715065
Error Message %ASA-7-715065: IKE state_machine subtype FSM error history (struct
data_structure_address) state, event: state/event pairs
Explanation A Phase 1 error occurred and the state, event history pairs will be displayed in reverse
chronological order.
Recommended Action Most of these errors are benign. If the problem persists, contact the Cisco TAC.
715066
Error Message %ASA-7-715066: Can't load an IPsec SA! The corresponding IKE SA
contains an invalid logical ID.
Explanation The logical ID in the IKE SA is NULL. The Phase II negotiation will be torn down.
Recommended Action An internal error has occurred. If the problem persists, contact the Cisco TAC.
715067
Explanation The LAN-TO-LAN SA that is being established already exists, that is, an SA with the
same remote network, but is sourced from a different peer. This new SA will be deleted, because this
is not a legal configuration.
Recommended Action Check the LAN-TO-LAN configuration on all associated peers. Specifically,
multiple peers should not be sharing private networks.
715068
Explanation The remote access SA that is being established already exists, that is, an SA with the
same remote network, but is sourced from a different peer. The old SA will be deleted, because the
peer may have changed its IP address.
Recommended Action This may be a benign condition, especially if a client tunnel was terminated
abruptly. If the problem persists, contact the Cisco TAC.
715069
Explanation The ASA received an IPsec SA proposal with an invalid ESP SPI size. This proposal
will be skipped.
Recommended Action Generally, this is a benign condition but might indicate that a peer may be
nonconforming. If the problem persists, contact the Cisco TAC.
715070
Explanation The ASA received an IPsec SA proposal with an invalid IPComp SPI size. This proposal
will be skipped.
Recommended Action Generally, this is a benign condition but might indicate that a peer is
nonconforming. If the problem persists, contact the Cisco TAC.
715071
Explanation The IPsec AH proposal is not supported. This proposal will be skipped.
715072
Explanation The ASA received an IPsec SA proposal with an unknown protocol ID. This proposal
will be skipped.
Recommended Action Generally, this is a benign condition, but might indicate that a peer is
nonconforming. If the problem persists, contact the Cisco TAC.
715074
Error Message %ASA-7-715074: Could not retrieve authentication attributes for peer
IP_address
Explanation The ASA cannot get authorization information for the remote user.
Recommended Action Make sure that authentication and authorization settings have been configured
correctly. If the problem persists, contact the Cisco TAC.
715075
Explanation This message is paired with DPD R-U-THERE message 715036, which logs the DPD
sending messages.
• group_name—The VPN group name of the peer
• IP_address—IP address of the VPN peer
• message_type—The message type (DPD R-U-THERE or DPD R-U-THERE-ACK)
• number—The DPD sequence number
Two possible cases:
• Received peer sending DPD R-U-THERE message
• Received peer reply DPD R-U-THERE-ACK message
715076
715077
715080
716001
Error Message %ASA-6-716001: Group group User user IP ip WebVPN session started.
Explanation The WebVPN session has started for the user in this group at the specified IP address.
When the user logs in via the WebVPN login page, the WebVPN session starts.
716002
Explanation The WebVPN session has been terminated by a user request. Possible reasons include:
• Lost carrier
• Lost service
• Idle timeout
• Max time exceeded
• Administrator reset
• Administrator reboot
• Administrator shutdown
• Port error
• NAS error
• NAS request
• NAS reboot
• Port unneeded
• Port preempted. This reason indicates that the allowed number of simultaneous (same user)
logins has been exceeded. To resolve this problem, increase the number of simultaneous logins
or have users only log in once with a given username and password.
• Port suspended
• Service unavailable
• Callback
• User error
• Host requested
• Bandwidth management error
• ACL parse error
• VPN simultaneous logins limit specified in the group policy
• Unknown
Recommended Action Unless the reason indicates a problem, then no action is required.
716003
Error Message %ASA-6-716003: Group group User user IP ip WebVPN access “GRANTED: url”
Explanation The WebVPN user in this group at the specified IP address has been granted access to
this URL. The user access to various locations can be controlled using WebVPN-specific ACLs.
716004
Error Message %ASA-6-716004: Group group User user WebVPN access DENIED to specified
location: url
Explanation The WebVPN user in this group has been denied access to this URL. The WebVPN user
access to various locations can be controlled using WebVPN-specific ACLs. In this case, a particular
entry is denying access to this URL.
716005
Error Message %ASA-6-716005: Group group User user WebVPN ACL Parse Error: reason
Explanation The ACL for the WebVPN user in the specified group failed to parse correctly.
716006
Error Message %ASA-6-716006: Group name User user WebVPN session terminated. Idle
timeout.
Explanation The WebVPN session was not created for the user in the specified group because the
VPN tunnel protocol is not set to WebVPN.
716007
Error Message %ASA-4-716007: Group group User user WebVPN Unable to create session.
Explanation The WebVPN session was not created for the user in the specified group because of
resource issues. For example, the user may have reached the maximum login limit.
716008
Explanation The WebVPN ACL has begun performing an action (for example, begin parsing).
716009
Error Message %ASA-6-716009: Group group User user WebVPN session not allowed. WebVPN
ACL parse error.
Explanation The WebVPN session for the specified user in this group is not allowed because the
associated ACL did not parse. The user will not be allowed to log in via WebVPN until this error
has been corrected.
716010
Explanation The WebVPN user in the specified group browsed the network.
716011
Error Message %ASA-7-716011: Group group User user Browse domain domain.
Explanation The WebVPN specified user in this group browsed the specified domain.
716012
Error Message %ASA-7-716012: Group group User user Browse directory directory.
716013
Error Message %ASA-7-716013: Group group User user Close file filename.
716014
Error Message %ASA-7-716014: Group group User user View file filename.
716015
Error Message %ASA-7-716015: Group group User user Remove file filename.
Explanation The WebVPN user in the specified group removed the specified file.
716016
Error Message %ASA-7-716016: Group group User user Rename file old_filename to
new_filename.
716017
Error Message %ASA-7-716017: Group group User user Modify file filename.
716018
Error Message %ASA-7-716018: Group group User user Create file filename.
716019
Error Message %ASA-7-716019: Group group User user Create directory directory.
716020
Error Message %ASA-7-716020: Group group User user Remove directory directory.
716021
Explanation The specified WebVPN user was denied access to the specified file.
716022
Explanation The WebVPN HTTP/HTTPS redirect failed for the specified reason.
716023
Error Message %ASA-4-716023: Group name User user Session could not be established:
session limit of maximum_sessions reached.
Explanation The user session cannot be established because the current number of sessions exceeds
the maximum session load.
Recommended Action Increase the configured limit, if possible, to create a load-balanced cluster.
716024
Error Message %ASA-7-716024: Group name User user Unable to browse the network.Error:
description
Explanation The user was unable to browse the Windows network using the CIFS protocol, as
indicated by the description. For example, “Unable to contact necessary server” indicates that the
remote server is unavailable or unreachable. This might be a transient condition or may require
further troubleshooting.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA.
716025
Error Message %ASA-7-716025: Group name User user Unable to browse domain domain.
Error: description
Explanation The user was unable to browse the remote domain using the CIFS protocol.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Check the NetBIOS name server configuration on the ASA.
716026
Error Message %ASA-7-716026: Group name User user Unable to browse directory
directory. Error: description
Explanation The user was unable to browse the remote directory using the CIFS protocol.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA.
716027
Error Message %ASA-7-716027: Group name User user Unable to view file filename.
Error: description
Explanation The user was unable to view the remote file using the CIFS protocol.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA.
716028
Error Message %ASA-7-716028: Group name User user Unable to remove file filename.
Error: description
Explanation The user was unable to remove the remote file using the CIFS protocol, probably caused
by a lack of file permissions.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA and
the file permissions.
716029
Error Message %ASA-7-716029: Group name User user Unable to rename file filename.
Error: description
Explanation The user was unable to rename the remote file using the CIFS protocol, probably caused
by lack of file permissions.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA and
the file permissions.
716030
Error Message %ASA-7-716030: Group name User user Unable to modify file filename.
Error: description
Explanation A problem occurred when a user attempted to modify an existing file using the CIFS
protocol, probably caused by a lack of file permissions.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA and
the file permissions.
716031
Error Message %ASA-7-716031: Group name User user Unable to create file filename.
Error: description
Explanation A problem occurred when a user attempted to create a file using the CIFS protocol,
probably caused by a file permissions problem.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA and
the file permissions.
716032
Error Message %ASA-7-716032: Group name User user Unable to create folder folder.
Error: description
Explanation A problem occurred when a user attempted to create a folder using the CIFS protocol,
probably caused by a file permissions problem.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA and
the file permissions.
716033
Error Message %ASA-7-716033: Group name User user Unable to remove folder folder.
Error: description
Explanation A problem occurred when a user of the CIFS protocol attempted to remove a folder,
which probably occurred because of a permissions problem or a problem communicating with the
server on which the file resides.
Recommended Action Check the connectivity between the WebVPN device and the server being
accessed by the CIFS protocol. Also check the NetBIOS name server configuration on the ASA.
716034
Error Message %ASA-7-716034: Group name User user Unable to write to file filename.
Explanation A problem occurred when a user attempted to write to a file using the CIFS protocol,
probably caused by a permissions problem or a problem communicating with the server on which
the file resides.
716035
Error Message %ASA-7-716035: Group name User user Unable to read file filename.
Explanation A problem occurred when a user of the CIFS protocol tried to read a file, probably
caused by a file permissions problem.
716036
Error Message %ASA-7-716036: Group name User user File Access: User user logged into
the server server.
Explanation A user successfully logged into the server using the CIFS protocol
716037
Error Message %ASA-7-716037: Group name User user File Access: User user failed to
login into the server server.
Explanation A user attempted to log in to a server using the CIFS protocol, but was unsuccessful.
Recommended Action Verify that the user entered the correct username and password.
716038
Explanation Before a WebVPN session can start, the user must be authenticated successfully by a
local or remote server (for example, RADIUS or TACACS+).
716039
Explanation Before a WebVPN session starts, the user must be authenticated successfully by a local
or remote server (for example, RADIUS or TACACS+). In this case, the user credentials (username
and password) either did not match, or the user does not have permission to start a WebVPN session.
• %s—The session type, which can be either WebVPN or admin
Recommended Action Verify the user credentials on the local or remote server and that WebVPN is
configured for the user.
716040
Error Message %ASA-6-716040: Reboot pending, new sessions disabled. Denied user
login.
Explanation A user was unable to log in to WebVPN because the ASA is in the process of rebooting.
• user—The session user
716041
Error Message %ASA-6-716041: access-list acl_ID action url url hit_cnt count
Explanation The WebVPN URL named acl_ID has been hit count times for location url, whose
action is permitted or denied.
• acl_ID—The WebVPN URL ACL
• count—The number of times the URL was accessed
• url—The URL that was accessed
• action—The user action
716042
Explanation The WebVPN TCP named acl_ID has been hit count times for packet received on the
source interface source_interface/source_address and source port source_port forwarded to
dest_interface/dest_address destination dest_port, whose action is permitted or denied.
• count—The number of times the ACL was accessed
• source_interface—The source interface
• source_address—The source IP address
• source_port—The source port
• dest_interface—The destination interface
• dest_address—The destination IP address
• action—The user action
716043
Explanation The user has launched a TCP port-forwarding applet from a WebVPN session.
• group-name—Group name associated with the session
• user-name—Username associated with the session
• IP_address—Source IP address associated with the session
716044
Recommended Action Modify the configuration to correct the indicated parameter. If the parameter is
vlan or nac-settings, verify that it is correctly configured on the AAA server and the ASA.
716045
Explanation The given parameter has a bad value. The value is not shown because it might be very
long.
• group-name—The name of the group
• user-name—The name of the user
• IP_address—The IP address
• param-name—The name of the parameter
716046
Error Message %ASA-4-716046: Group group-name User user-name IP IP_address User ACL
access-list-name from AAA doesn't exist on the device, terminating connection.
Recommended Action Modify the configuration to add the specified ACL or to correct the ACL name.
716047
Error Message %ASA-4-716047: Group group-name User user-name IP IP_address User ACL
access-list-name from AAA ignored, AV-PAIR ACL used instead.
Explanation The specified ACL was not used because a Cisco AV-PAIR ACL was used.
• group-name—The name of the group
• user-name—The name of the user
• IP_address—The IP address
Recommended Action Determine the correct ACL to use and correct the configuration.
716048
Recommended Action Purchase more memory, upgrade the ASA, or reduce the load on it.
716049
Error Message %ASA-6-716049: Group group-name User user-name IP IP_address Empty SVC
ACL.
Recommended Action Determine the correct ACL to use and modify the configuration.
716050
716051
Recommended Action Purchase more memory, upgrade the ASA, or reduce the load on it.
716052
Explanation A user did not complete login and the pending session was terminated. This may be due
to an SVC that was unable to connect.
• group-name—The name of the group
• user-name—The name of the user
• IP_address—The IP address
716053
Error Message %ASA-5-716053: SSO Server added: name: name Type: type
Explanation The SSO server name of the specified type has been configured.
• name—The name of the server
• type—The type of the server (the only server type is SiteMinder)
716054
Error Message %ASA-5-716054: SSO Server deleted: name: name Type: type
Explanation The SSO server name of the specified type has been removed from the configuration.
• name—The name of the server
716055
Explanation The WebVPN user has been successfully authenticated to the SSO server.
• group-name—The group name
• user-name—The username
• IP_address—The IP address of the server
• name—The name of the server
• type—The type of server (the only server type is SiteMinder)
716056
Recommended Action Either the user or the ASA administrator needs to correct the problem,
depending on the reason for the failure.
716057
Error Message %ASA-3-716057: Group group User user IP ip Session terminated, no type
license available.
Explanation A user has attempted to connect to the ASA using a client that is not licensed. This
message may also occur if a temporary license has expired.
• group—The group policy that the user logged in with
Recommended Action A permanent license with the appropriate feature should be purchased and
installed.
716058
Error Message %ASA-6-716058: Group group User user IP ip AnyConnect session lost
connection. Waiting to resume.
Explanation The SSL tunnel was dropped and the AnyConnect session enters the inactive state,
which can be caused by a hibernating host, a standby host, or a loss of network connectivity.
• group—The tunnel group name associated with the AnyConnect session
• user—The name of the user associated with the session
• ip—The source IP address of the session
716059
Error Message %ASA-6-716059: Group group User user IP ip AnyConnect session resumed.
Connection from ip2.
716060
Explanation An AnyConnect session in the inactive state was logged out to allow a new incoming
SSL VPN (AnyConnect or clientless) connection.
• group—The tunnel group name associated with the AnyConnect session
• user—The name of the user associated with the session
• ip—The source IP address of the session
716061
Error Message %ASA-3-716061: Group DfltGrpPolicy User user IP ip addr IPv6 User
Filter tempipv6 configured for AnyConnect. This setting has been deprecated,
terminating connection
Explanation The IPv6 VPN filter has been deprecated and if it is configured instead of a unified filter
for IPv6 traffic access control, the connection will be terminated.
Recommended Action Configure a unified filter with IPv6 entries to control IPv6 traffic for the user.
716500
Error Message %ASA-2-716500: internal error in: function: Fiber library cannot
locate AK47 instance
Explanation The fiber library cannot locate the application kernel layer 4 to 7 instance.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716501
Error Message %ASA-2-716501: internal error in: function: Fiber library cannot
attach AK47 instance
Explanation The fiber library cannot attach the application kernel layer 4 to 7 instance.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716502
Error Message %ASA-2-716502: internal error in: function: Fiber library cannot
allocate default arena
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716503
Error Message %ASA-2-716503: internal error in: function: Fiber library cannot
allocate fiber descriptors pool
Explanation The fiber library cannot allocate the fiber descriptors pool.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716504
Error Message %ASA-2-716504: internal error in: function: Fiber library cannot
allocate fiber stacks pool
Explanation The fiber library cannot allocate the fiber stack pool.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716505
Error Message %ASA-2-716505: internal error in: function: Fiber has joined fiber in
unfinished state
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716506
716507
Error Message %ASA-1-716507: Fiber scheduler has reached unreachable code. Cannot
continue, terminating.
Explanation The ASA has experienced an unexpected error and has recovered.
Recommended Action Check for high CPU usage or CPU hogs, and potential memory leaks. If the
problem persists, contact the Cisco TAC.
716508
Explanation The fiber scheduler is scheduling rotten fiber, so it cannot continue terminating.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716509
Explanation The fiber scheduler is scheduling alien fiber, so it cannot continue terminating.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716510
Explanation The fiber scheduler is scheduling finished fiber, so it cannot continue terminating.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716512
Error Message %ASA-2-716512:internal error in: function: Fiber has joined fiber
waited upon by someone else
Explanation The fiber has joined fiber that is waited upon by someone else.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716513
Error Message %ASA-2-716513: internal error in: function: Fiber in callback blocked
on other channel
Explanation The fiber in the callback was blocked on the other channel.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716515
Explanation The OCCAM failed to allocate memory for the AK47 instance.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716516
Error Message %ASA-1-716516: internal error in: function: OCCAM has corrupted ROL
array. Cannot continue terminating
Explanation The OCCAM has a corrupted ROL array, so it cannot continue terminating.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716517
Error Message %ASA-2-716517: internal error in: function: OCCAM cached block has no
associated arena
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716518
Error Message %ASA-2-716518: internal error in: function: OCCAM pool has no
associated arena
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716519
Error Message %ASA-1-716519: internal error in: function: OCCAM has corrupted pool
list. Cannot continue terminating
Explanation The OCCAM has a corrupted pool list, so it cannot continue terminating.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716520
Error Message %ASA-2-716520:internal error in: function: OCCAM pool has no block list
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716521
Error Message %ASA-2-716521: internal error in: function: OCCAM no realloc allowed
in named pool
Explanation The OCCAM did not allow reallocation in the named pool.
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716522
Error Message %ASA-2-716522: internal error in: function: OCCAM corrupted standalone
block
Recommended Action To determine the cause of the problem, contact the Cisco TAC.
716525
716526
Explanation A failure in the mounting of the permanent storage server directory occurred.
716527
716528
Explanation The ASA has experienced an unexpected error and has recovered.
Recommended Action Check for high CPU usage or CPU hogs, and potential memory leaks. If the
problem persists, contact the Cisco TAC.
716600
Explanation When the size of the received Hostscan data exceeds the limit configured on the ASA,
the data is discarded.
• size-recv—Size of received Hostscan data in kilobytes
• src-ip—Source IP address
• default | configured—Keyword specifying whether the value of the Hostscan data limit is the
default or configured by the administrator
• size-conf—Configured upper limit on the size of the Hostscan data that the ASA accepts from
clients
Recommended Action Contact Cisco TAC to increase the upper limit on the size of Hostscan data that
the ASA accepts from clients.
716601
Explanation When the amount of Hostscan data stored on the ASA exceeds the limit, new Hostscan
results are rejected.
• size-recv—Size of received Hostscan data in kilobytes
• src-ip—Source IP address
• data-max—Limit on the amount of Hostscan results to be stored by the ASA in kilobytes
Recommended Action Contact Cisco TAC to change the limit on stored Hostscan data.
716602
Explanation An error occurred while memory was being allocated for Hostscan data.
• size-recv—Size of received Hostscan data in kilobytes
• src-ip—Source IP address
Recommended Action Set the Hostscan limit to the default value if it is configured. If the problem
persists, contact Cisco TAC.
716603
717001
Recommended Action Verify that a valid keypair exists in the trustpoint configuration, then resubmit
the enrollment request.
717002
717003
Explanation A certificate was successfully received from the CA for this trustpoint.
• trustpoint_name—Trustpoint name
717004
Error Message %ASA-6-717004: PKCS #12 export failed for trustpoint trustpoint_name.
Explanation The trustpoint failed to export, because of one of the following: only a CA certificate
exists, and an identity certificate does not exist for the trustpoint, or a required keypair is missing.
• trustpoint_name—Trustpoint name
Recommended Action Make sure that required certificates and keypairs are present for the given
trustpoint.
717005
717006
Error Message %ASA-6-717006: PKCS #12 import failed for trustpoint trustpoint_name.
Recommended Action Verify the integrity of the imported data. Then make sure that the entire pkcs12
record is correctly pasted, and reimport the data.
717007
717008
Explanation An internal error occurred while attempting to allocate memory for the process that
reqires memory. Other processes may experience problems allocating memory and prevent further
processing.
• process_requiring_memory—The specified process that requires memoryr
Recommended Action Collect memory statistics and logs for further debugging and reload the ASA.
717009
Recommended Action Make sure the configuration has a valid trustpoint configured for validation if
the reason indicates that no suitable trustpoints were found. Check the ASA time to ensure that it is
accurate relative to the certificate authority time. Check the reason for the failure and correct any
issues that are indicated.
717010
Explanation .CRL polling has failed and may cause connections to be denied if CRL checking is
required.
• trustpoint_name—The name of the trustpoint that requested the CRL
Recommended Action Verify that connectivity exists with the configured CRL distribution point and
make sure that manual CRL retrieval also functions correctly.
717011
Explanation An event that is not expected under normal conditions has occurred.
717012
Error Message %ASA-3-717012: Failed to refresh CRL cache entry from the server for
trustpoint trustpoint_name at time_of_failure
Explanation An attempt to refresh a cached CRL entry has failed for the specified trustpoint at the
indicated time of failure. This may result in obsolete CRLs on the ASA, which may cause
connections that require a valid CRL to be denied.
• trustpoint_name—The name of the trustpoint
Recommended Action Check connectivity issues to the server, such as a downed network or server.
Try to retrieve the CRL manually using the crypto ca crl retrieve command.
717013
Explanation When the device is configured to authenticate IPsec tunnels using digital certificates,
CRLs may be cached in memory to avoid requiring a CRL download during each connection. If the
cache fills to the point where an incoming CRL cannot be accommodated, older CRLs will be
removed until the required space is made available. This message is generated for each purged CRL.
• issuer—The name of the device that removes cached CRLs
717014
Error Message %ASA-5-717014: Unable to cache a CRL received from CDP due to size
limitations (CRL size = size, available cache space = space)
Explanation When the device is configured to authenticate IPsec tunnels using digital certificates,
CRLs may be cached in memory to avoid requiring a CRL download during each connection. This
message is generated if a received CRL is too large to fit in the cache. Large CRLs are still supported
even though they are not cached. This means that the CRL will be downloaded with each IPsec
connection, which may affect performance during IPsec connection bursts.
717015
Error Message %ASA-3-717015: CRL received from issuer is too large to process (CRL
size = crl_size, maximum CRL size = max_crl_size)
Explanation An IPsec connection caused a CRL that is larger than the maximum permitted CRL size
to be downloaded. This error condition causes the connection to fail. This message is rate limited to
one message every 10 seconds.
Recommended Action Scalability is perhaps the most significant drawback to the CRL method of
revocation checking. To solve this problem, the only options are to investigate a CA-based solution
to reduce the CRL size or configure the ASA not to require CRL validation.
717016
Error Message %ASA-6-717016: Removing expired CRL from the CRL cache. Issuer: issuer
Explanation When the ASA is configured to authenticate IPsec tunnels using digital certificates,
CRLs may be cached in memory to avoid requiring a CRL download during each connection. This
message is generated when either the CA specified expiration time or the configured cache time has
lapsed and the CRL is removed from the cache.
717017
Explanation An error occurred when an attempt was made to authenticate a trustpoint by requesting
a CA certificate from a certificate authority.
Recommended Action Make sure that an enrollment URL is configured with this trustpoint, ensure
connectivity with the CA server, then retry the request.
717018
Error Message %ASA-3-717018: CRL received from issuer has too many entries to process
(number of entries = number_of_entries, maximum number allowed = max_allowed)
Explanation An IPsec connection caused a CRL that includes more revocation entries than can be
supported to be downloaded. This is an error condition that will cause the connection to fail. This
message is rate limited to one message every 10 seconds.
• issuer—The X.500 name of the CRLs issuer
• number_of_entries—The number of revocation entries in the received CRL
• max_allowed—The maximum number of CRL entries that the ASA supports
Recommended Action Scalability is perhaps the most significant drawback to the CRL method of
revocation checking. The only options to solve this problem are to investigate a CA-based solution
to reduce the CRL size or configure the ASA not to require CRL validation.
717019
Explanation A CRL is retrieved, but found to be invalid and cannot be inserted into the cache because
of the failure_reason.
• trustpoint_name—The name of the trustpoint that requested the CRL
• failure_reason—The reason that the CRL failed to be inserted into cache
Recommended Action Make sure that the current ASA time is correct relative to the CA time. If the
NextUpdate field is missing, configure the trustpoint to ignore the NextUpdate field.
717020
Explanation A failure occurred while trying to enroll or import an enrolled certificate into a
trustpoint.
• label—Label of the trustpoint that failed to install the enrolled ASA certificate
• reason_string—The reason that the certificate cannot be verified
Recommended Action Use the failure reason to remedy the cause of failure and retry the enrollment.
Common failures are due to invalid certificates being imported into the ASA or a mismatch of the
public key included in the enrolled certificate with the keypair referenced in the trustpoint.
717021
Error Message %ASA-3-717021: Certificate data could not be verified. Locate Reason:
reason_string serial number: serial number, subject name: subject name, key length
key length bits.
Explanation An attempt to verify the certificate that is identified by the serial number and subject
name was unsuccessful for the specified reason. When verifying certificate data using the signature,
several errors can occur that should be logged, including invalid key types and unsupported key size.
• reason_string—The reason that the certificate cannot be verified
• serial number—Serial number of the certificate that is being verified
• subject name—Subject name included in the certificate that is being verified
• key length—The number of bits in the key used to sign this certificate
Recommended Action Check the specified certificate to ensure that it is valid, that it includes a valid
key type, and that it does not exceed the maximum supported key size.
717022
717023
Error Message %ASA-3-717023: SSL failed to set device certificate for trustpoint
trustpoint name. Reason: reason_string.
Explanation A failure occurred while trying to set an ASA certificate for the given trustpoint for
authenticating the SSL connection.
• trustpoint name—Name of the trustpoint for which SSL failed to set an ASA certificate
• reason_string—Reason indicating why the ASA certificate cannot be set
Recommended Action Resolve the issue indicated by the reason reported for the failure by doing the
following:
• Make sure that the specified trustpoint is enrolled and has an ASA certificate.
• Make sure the ASA certificate is valid.
• Reenroll the trustpoint, if required.
717024
Error Message %ASA-7-717024: Checking CRL from trustpoint: trustpoint name for
purpose
717025
717026
Error Message %ASA-4-717026: Name lookup failed for hostname hostname during PKI
operation.
Explanation The given hostname cannot be resolved while attempting a PKI operation.
• hostname—The hostname that failed to resolve
Recommended Action Check the configuration and the DNS server entries for the given hostname to
make sure that it can be resolved. Then retry the operation.
717027
Recommended Action Resolve the issue noted by the reason and retry the validation attempt by
performing any of the following actions:
• Make sure that connectivity to a CA is available if CRL checking is required.
• Make sure that a trustpoint is authenticated and available for validation.
• Make sure that the identity certificate within the chain is valid based on the validity dates.
• Make sure that the certificate is not revoked.
717028
717029
717030
Explanation A suitable or usable trustpoint is found that can be used to validate the certificate.
• trustpoint name—Trustpoint that will be used to validate the certificate
717031
Error Message %ASA-4-717031: Failed to find a suitable trustpoint for the issuer:
issuer Reason: reason_string
Explanation A usable trustpoint cannot be found. During certificate validation, a suitable trustpoint
must be available in order to validate a certificate.
• issuer —Issuer of the certificate that was being validated
Recommended Action Resolve the issue indicated in the reason by checking the configuration to make
sure that a trustpoint is configured, authenticated, and enrolled. Also make sure that the
configuration allows for specific types of certificates, such as identity certificates.
717033
717034
717035
Explanation The certificate for which an OCSP status check occurs is identified.
• certificate_identifier—Information that identifies the certificate being processed by the
certificate map rules
717036
Error Message ASA-7-717036: Looking for a tunnel group match based on certificate
maps for peer certificate with certificate_identifier.
Explanation The peer certificate identified by the certificate identifier is being processed through the
configured certificate maps to attempt a possible tunnel group match.
• certificate_identifier—Information that identifies the certificate being processed by the
certificate map rules
717037
Error Message %ASA-4-717037: Tunnel group search using certificate maps failed for
peer certificate: certificate_identifier.
Explanation The peer certificate identified by the certificate identifier was processed through the
configured certificate maps to attempt a possible tunnel group match, but no match can be found.
• certificate_identifier—Information that identifies the certificate being processed by the
certificate map rules
Recommended Action Make sure that the warning is expected based on the received peer certificate
and the configured crypto CA certificate map rules.
717038
Explanation The peer certificate identified by the certificate identifier was processed by the
configured certificate maps, and a match was found to the tunnel group.
• certificate_identifier—Information that identifies the certificate being processed by the
certificate map rules
• tunnel_group_name—The name of the tunnel group matched by the certificate map rules
717039
Explanation An internal processing error has occurred with the local CA server.
• error—Error string
Recommended Action Based on the error, take the necessary steps to resolve the issue. Currently, the
possible errors include:
• CA key does not exist—Make sure that the CA key is present, or restore the key from a backup,
if necessary.
• Failed to rollover expired CA certificate—Make sure that the clock is correct and that the CA
certificate is expired, then restart the CA server to try to reissue the certificate.
• Failed to generate self-signed certificate for Local CA Server certificate rollover upon
expiration—Make sure that the clock is correct and that the CA certificate is about to expire,
then restart the CA server to try to reissue the certificate.
• Failed to configure Local CA Server—Turn on debugging and try to configure the CA server
again to determine the cause of the failure.
• Invalid issuer name configured—Change the issuer name DN to a valid DN string.
717040
Error Message %ASA-2-717040: Local CA Server has failed and is being disabled.
Reason: reason.
Recommended Action Based on the reason, take the necessary steps to resolve the issue.
717041
Explanation Event details that have occurred on the CA server are reported to allow you to track or
debug the CA server health, including when the CA server is created, enabled, or disabled, or when
the CA server certificate is rolled over.
• event info—Details of the event that occurred
717042
Explanation Errors occurred when an attempt was made to enable the local CA server.
• reason—Reason that the local CA server failed to enable
Recommended Action Resolve the issue encountered that is reported in the reason string. Currently,
the possible reasons include:
• Failed to create server trustpoint
• Failed to create server keypair
• Time has not been set
• Failed to init storage
• Storage not accessible
• Failed to validate self-signed CA certificate
• Failed to generate self-signed CA certificate
• CA certificate has expired
• Failed to generate CRL
• Failed to archive CA key and certificate
• Failed to generate empty user or certificate database file
• Failed to load user or certificate database file
717043
Error Message %ASA-6-717043: Local CA Server certificate enrollment related info for
user: user. Info: info.
Explanation Enrollment-related activities for a user are being monitored. The username and specific
enrollment information are reported so that enrollments, e-mail invitation generation, and renewal
reminder generation can be monitored.
• user—Username about whom the enrollment information log is being generated
• info—Enrollment information string
717044
Explanation Errors that occur in the processing of certificate enrollment are reported, which may
include errors in notifying users via e-mail for renewal reminders, errors during issuance of a
certificate to complete enrollment, invalid username or OTP, and expired enrollment attempts.
• user—Username for whom the enrollment error log is being generated
• error—Enrollment error
Recommended Action If the error does not provide enough information to diagnose and resolve the
issue, turn on debugging and try enrollment again.
717045
717046
Explanation Errors that are encountered while trying to generate and reissue the local CA server CRL
file are reported.
• error—Error string
Recommended Action Take appropriate action to resolve the reported issue, which may include
verifying that storage is accessible, and that the CRL file is valid in storage and signed by the
existing local CA server.
717047
Explanation Any certificates issued by the local CA server that have been revoked are being
monitored.
• username—Username of the owner of the certificate that is being revoked
717048
Explanation Any certificates that were issued by the local CA server that were previously revoked,
and that are now being unrevoked and removed from the CRL are being monitored.
• username—Username of the owner of the certificate that is being unrevoked
• serial number—Serial number of the certificate that has been unrevoked
717049
Recommended Action To avoid certificate validation failures on any ASAs that require the local CA
server certificate, action should be taken before the actual expiration of the current local CA server
certificate, which is indicated by the number value. Note that the local CA server does not require
any action because the CA certificate will be replaced automatically. Use the show crypto ca server
certificate command to view the replacement or rollover local CA server certificate and copy it for
import into any ASA that will require the new certificate.
717050
Error Message %ASA-5-717050: SCEP Proxy: Processed request type type from IP client
ip address, User username, TunnelGroup tunnel_group name, GroupPolicy group-policy
name to CA IP ca ip address
Explanation The SCEP proxy received a message and relayed it to the CA. The response from the
CA is relayed back to the client.
• type—The request type string that is received by the SCEP proxy, which can be one of the
following SCEP message types: PKIOperation, GetCACaps, GetCACert, GetNextCACert, and
GetCACertChain.
• client ip address—The source IP address of the request received
• username—The username that is associated with the VPN session in which the SCEP request
is received
• tunnel-group name—The tunnel group that is associated with the VPN session in which the
SCEP request is received
• group-policy name—The group policy that is associated with the VPN session in which the
SCEP request is received
• ca ip address—The IP address of the CA that is configured in the group policy
717051
Error Message %ASA-3-717051: SCEP Proxy: Denied processing the request type type
received from IP client ip address, User username, TunnelGroup tunnel group name,
GroupPolicy group policy name to CA ca ip address. Reason: msg
Explanation The SCEP proxy denied processing of the request, which may be caused by a
misconfiguration, an error condition in the proxy, or an invalid request.
• type—The request type string that is received by the SCEP proxy, which can be one of the
following SCEP message types: PKIOperation, GetCACaps, GetCACert, GetNextCACert, and
GetCACertChain.
• client ip address—The source IP address of the request received
• username—The username that is associated with the VPN session in which the SCEP request
is received
• tunnel-group name—The tunnel group that is associated with the VPN session in which the
SCEP request is received
• group-policy name—The group policy that is associated with the VPN session in which the
SCEP request is received
• ca ip address—The IP address of the CA that is configured in the group policy
• msg—The reason string that explains the reason or error for why the request processing is
denied
Recommended Action Identify the cause from the reason printed. If the reason indicates that the
request is invalid, check the CA URL configuration. Otherwise, confirm that the tunnel group is
enabled for SCEP enrollment and debug further by using the debug crypto ca scep-proxy
command.
718001
Explanation An internal software error has occurred while attempting to enqueue a message on the
VPN load balancing queue.
Recommended Action This is generally a benign condition. If the problem persists, contact the Cisco
TAC.
718002
Explanation The maximum number of load-balancing peers has been exceeded. The new peer is
ignored.
Recommended Action Check your load balancing and network configuration to ensure that the
number of load-balancing peers does not exceed the maximum allowed.
718003
Explanation An unrecognized load-balancing message was received from one of the load-balancing
peers. This may indicate a version mismatch between peers, but is most likely caused by an internal
software error.
Recommended Action Verify that all load-balancing peers are compatible. If they are and this
condition persists or is linked to undesirable behavior, contact the Cisco TAC.
718004
Recommended Action This is generally a benign condition. If the problem persists, contact the Cisco
TAC.
718005
Explanation An internal software error occurred during packet transmission on the load-balancing
socket. This mght indicate a network problem.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718006
Explanation A state machine error has occurred. This might indicate an internal software error.
Recommended Action This is generally a benign condition. If the problem persists, contact the Cisco
TAC.
718007
Explanation An error occurred when the load-balancing socket tried to open. This might indicate a
network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718008
Explanation An error occurred when the ASA tried to bind to the load-balancing socket. This might
indicate a network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718009
Explanation An error occurred when the ASA tried to send a hello response message to one of the
load-balancing peers. This might indicate a network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718010
718011
Explanation An error occurred when the ASA tried to send a hello request message to one of the
load-balancing peers. This may indicate a network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718012
718013
Recommended Action Check the status of the load-balancing SSF peer and the network connections.
718014
Explanation The load balancing master peer is not answering the hello request message.
Recommended Action Check the status of the load balancing SSF master peer and the network
connections.
718015
Explanation The ASA received a hello request message from the load balancing peer.
718016
Explanation The ASA received a Hello Response packet from a load balancing peer.
718017
Error Message %ASA-7-718017: Got timeout for unknown peer IP_address msg type
message_type
Explanation The ASA processed a timeout for an unknown peer. The message was ignored because
the peer may have already been removed from the active list.
Recommended Action If the message persists or is linked to undesirable behavior, check the load
balancing peers and verify that all are configured correctly.
718018
Explanation An error has occurred while attempting to send a Keepalive Request message to one of
the load balancing peers. This t indicate a network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718019
Explanation The ASA transmitted a Keepalive Request message to a load balancing peer.
718020
Explanation An error has occurred while attempting to send a Keepalive Response message to one
of the load balancing peers. This may indicate a network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718021
Explanation The ASA transmitted a Keepalive Response message to a load balancing peer.
718022
Explanation The ASA received a Keepalive Request message from a load balancing peer.
718023
Explanation The ASA received a Keepalive Response message from a load balancing peer.
718024
Explanation An error has occurred while attempting to send a Configuration Update message to one
of the load balancing peers. This might indicate a network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718025
Explanation The ASA transmitted a Configuration Update message to a load balancing peer.
718026
Explanation The ASA received a Configuration Update message from a load balancing peer.
718027
Explanation The ASA received an unexpected Keepalive request message from a load balancing
peer.
Recommended Action If the problem persists or is linked with undesirable behavior, verify that all
load balancing peers are configured and discovered correctly.
718028
Explanation An error has occurred while attempting to send an OOS indicator message to one of the
load balancing peers. This might indicate a network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA and verify that interfaces
are active and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718029
Explanation The ASA transmitted an OOS indicator message to a load balancing peer.
718030
Explanation The ASA received a planned OOS message from a load balancing peer.
718031
Explanation The ASA received an OOS obituary message from a load balancing peer.
718032
Explanation The ASA received an OOS indicator message from a load balancing peer.
718033
Explanation An error has occurred while attempting to send a Topology indicator message to one of
the load balancing peers. This might indicate a network problem or an internal software error.
Recommended Action Check the network-based configuration on the ASA. and verify that interfaces
are active, and protocol data is flowing through the ASA. If the problem persists, contact the Cisco
TAC.
718034
Explanation The ASA sent a Topology indicator message to a load balancing peer.
718035
Explanation The ASA received a Topology indicator message from a load balancing peer.
718036
Recommended Action Verify that the peer should have been timed out. If not, check the load balancing
peer configuration and the network connection between the peer and the ASA.
718037
Explanation The ASA in the master role processed the specified number of peer timeouts.
Recommended Action Verify that the timeouts are legitimate. If not, check the peer load balancing
configuration and the network connection between the peer and the ASA.
718038
Explanation The ASA in the slave role processed the specified number of peer timeouts.
Recommended Action Verify that the timeouts are legitimate. If not, check the peer load balancing
configuration and the network connection between the peer and the ASA.
718039
Recommended Action Verify that the dead peer detection is legitimate. If not, check the peer load
balancing configuration and the network connection between the peer and the ASA.
718040
Explanation The ASA has detected a dead peer, but the exchange ID is not recognized.
718041
Explanation The ASA has detected a dead peer, but a call back was not used in the processing.
718042
Explanation The ASA experienced an ARP failure when attempting to contact a peer.
Recommended Action Verify that the network is operational and that all peers can communicate with
each other.
718043
718044
718045
718046
Explanation The ASA has created a group policy to securely communicate with the load balancing
peers.
718047
Explanation The ASA experienced a failure when attempting to create a group policy for securing
the communication between load balancing peers.
718048
Error Message %ASA-5-718048: Create of secure tunnel failure for peer IP_address
Explanation The ASA experienced a failure when attempting to establish an IPsec tunnel to a load
balancing peer.
Recommended Action Verify that the load balancing configuration is correct and that the network is
operational.
718049
Explanation The ASA successfully established an IPsec tunnel to a load balancing peer.
718050
Error Message %ASA-5-718050: Delete of secure tunnel failure for peer IP_address
Explanation The ASA experienced a failure when attempting to terminate an IPsec tunnel to a load
balancing peer.
Recommended Action Verify that the load balancing configuration is correct and that the network is
operational.
718051
Explanation The ASA successfully terminated an IPsec tunnel to a load balancing peer.
718052
Recommended Action Check the load balancing configuration and verify that the network is
operational.
718053
Recommended Action Check the load balancing configuration and verify that the network is
operational.
718054
Error Message %ASA-5-718054: Detected duplicate master MAC_address and going to SLAVE
Explanation The ASA detected a duplicate master and is switching to slave mode.
Recommended Action Check the load balancing configuration and verify that the network is
operational.
718055
Error Message %ASA-5-718055: Detected duplicate master MAC_address and staying MASTER
Explanation The ASA detected a duplicate master and is staying in slave mode.
Recommended Action Check the load balancing configuration and verify that the network is
operational.
718056
Explanation The ASA deleted the load balancing master from its internal tables.
718057
Error Message %ASA-5-718057: Queue send failure from ISR, msg type failure_code
Explanation An internal software error has occurred while attempting to enqueue a message on the
VPN load balancing queue from an Interrupt Service Routing.
Recommended Action This is generally a benign condition. If the problem persists, contact the Cisco
TAC.
718058
Explanation The return codes of action routines belonging to the load balancing finite state machine
are being traced.
718059
Explanation The events and states of the load balancing finite state machine are being traced.
718060
Explanation The socket select call returned an error and the socket cannot be read. This might
indicate an internal software error.
718061
Explanation The socket read failed after data was detected through the select call. This might
indicate an internal software error.
718062
718063
Recommended Action Check the interface configuration to make sure that the interface is operational.
718064
Explanation The load balancing process found the administrative interface down.
Recommended Action Check the administrative interface configuration to make sure that the interface
is operational.
718065
Explanation The load balancing process can not run because all prerequisite conditions have not
been met. The prerequisite conditions are two active interfaces and load balancing enabled.
Recommended Action Check the interface configuration to make sure at least two interfaces are
operational and load balancing is enabled.
718066
Explanation Load balancing requires a secondary address to be added to the outside interface. A
failure occurred in adding that secondary address.
Recommended Action Check the address being used as the secondary address and make sure that it is
valid and unique. Check the configuration of the outside interface.
718067
Explanation The deletion of the secondary address failed, which might indicate an addressing
problem or an internal software error.
Recommended Action Check the addressing information of the outside interface and make sure that
the secondary address is valid and unique. If the problem persists, contact the Cisco TAC.
718068
Explanation The load balancing process has been started and initialized.
718069
718070
718071
718072
718073
718074
Error Message %ASA-5-718074: Fail to create access list for peer context_ID.
Explanation ACLs are used to create secure tunnels over which the LB peers can communicate. The
ASA was unable to create one of these ACLs. This might indicate an addressing problem or an
internal software problem.
Recommended Action Check the addressing information of the inside interface on all peers and ensure
that all peers are discovered correctly. If the problem persists, contact the Cisco TAC.
718075
Explanation While removing a secure tunnel, the ASA detected a peer entry that did not have an
associated ACL.
718076
Error Message %ASA-5-718076: Fail to create tunnel group for peer IP_address.
Explanation The ASA experienced a failure when trying to create a tunnel group for securing the
communication between load balancing peers.
718077
Error Message %ASA-5-718077: Fail to delete tunnel group for peer IP_address.
Explanation The ASA experienced a failure when attempting to delete a tunnel group for securing
the communication between load balancing peers.
718078
Error Message %ASA-5-718078: Fail to create crypto map for peer IP_address.
Explanation The ASA experienced a failure when attempting to create a crypto map for securing the
communication between load balancing peers.
718079
Error Message %ASA-5-718079: Fail to delete crypto map for peer IP_address.
Explanation The ASA experienced a failure when attempting to delete a crypto map for securing the
communication between load balancing peers.
718080
Error Message %ASA-5-718080: Fail to create crypto policy for peer IP_address.
Explanation The ASA experienced a failure when attempting to create a transform set to be used in
securing the communication between load balancing peers. This might indicate an internal software
problem.
718081
Error Message %ASA-5-718081: Fail to delete crypto policy for peer IP_address.
Explanation The ASA experienced a failure when attempting to delete a transform set used in
securing the communication between load balancing peers.
718082
Error Message %ASA-5-718082: Fail to create crypto ipsec for peer IP_address.
Explanation When cluster encryption for VPN load balancing is enabled, the VPN load balancing
device creates a set of site-to-site tunnels for every other device in the load balancing cluster. For
each tunnel, a set of crypto parameters (access list, crypto maps, and transform set) is created
dynamically. One or more crypto parameters failed to be created or configured.
• IP_address—The IP address of the remote peer
Recommended Action Examine the message for other entries specific to the type of crypto parameters
that failed to be created.
718083
Error Message %ASA-5-718083: Fail to delete crypto ipsec for peer IP_address.
Explanation When the local VPN load balancing device is removed from the cluster, crypto
parameters are removed. One or more crypto parameters failed to be deleted.
• IP_address—The IP address of the remote peer
Recommended Action Examine the message for other entries specific to the type of crypto parameters
that failed to be deleted.
718084
Explanation The cluster IP address is not on the same network as the outside interface of the ASA.
Recommended Action Make sure that both the cluster (or virtual) IP address and the outside interface
address are on the same network.
718085
718086
Explanation The ASA experienced a failure when attempting to create a SoftNP ACL rule to be used
in securing the communication between load balancing peers. This may indicate an internal software
problem.
718087
Explanation The ASA experienced a failure when attempting to delete the SoftNP ACL rule used in
securing the communication between load balancing peers.
718088
Explanation The presence of a duplicate master indicates that one of the load balancing peers may
be misconfigured.
Recommended Action Check the load balancing configuration on all peers, but pay special attention
to the peer identified.
719001
Error Message %ASA-6-719001: Email Proxy session could not be established: session
limit of maximum_sessions has been reached.
Explanation The incoming e-mail proxy session cannot be established because the maximum session
limit has been reached.
• maximum_sessions—The maximum session number
719002
Error Message %ASA-3-719002: Email Proxy session pointer from source_address has
been terminated due to reason error.
Explanation The session has been terminated because of an error. The possible errors are failure to
add a session to the session database, failure to allocate memory, and failure to write data to a
channel.
• pointer—The session pointer
• source_address—The e-mail proxy client IP address
• reason—The error type
719003
Error Message %ASA-6-719003: Email Proxy session pointer resources have been freed
for source_address.
Explanation The dynamic allocated session structure has been freed and set to NULL after the
session terminated.
• pointer—The session pointer
719004
Error Message %ASA-6-719004: Email Proxy session pointer has been successfully
established for source_address.
719005
Error Message %ASA-7-719005: FSM NAME has been created using protocol for session
pointer from source_address.
Explanation The FSM has been created for an incoming new session.
• NAME—The FSM instance name for the session
• protocol—The e-mail protocol type (for example, POP3, IMAP, and SMTP)
• pointer—The session pointer
• source_address—The e-mail proxy client IP address
719006
Error Message %ASA-7-719006: Email Proxy session pointer has timed out for
source_address because of network congestion.
Explanation Network congestion is occurring, and data cannot be sent to either an e-mail client or
an e-mail server. This condition starts the block timer. After the block timer is timed out, the session
expires.
• pointer—The session pointer
• source_address—The e-mail proxy client IP address
719007
Error Message %ASA-7-719007: Email Proxy session pointer cannot be found for
source_address.
Explanation A matching session cannot be found in the session database. The session pointer is bad.
• pointer—The session pointer
• source_address—The e-mail proxy client IP address
719008
Explanation The e-mail proxy is disabled. All resources are cleaned up, and all threads are
terminated.
719009
719010
Explanation The e-mail proxy feature is disabled on a specific entry point, invoked from the CLI.
This is the main off switch for the user. When all protocols are turned off for all interfaces, the main
shut-down routine is invoked to clean up global resources and threads.
• protocol—The e-mail proxy protocol type (for example, POP3, IMAP, and SMTP)
• interface_name —The ASA interface name
719011
Explanation The e-mail proxy feature is enabled on a specific entry point, invoked from the CLI.
This is the main on switch for the user. When it is first used, the main startup routine is invoked to
allocate global resources and threads. Subsequent calls only need to start listening threads for the
particular protocol.
• protocol—The e-mail proxy protocol type (for example, POP3, IMAP, and SMTP)
• interface_name —The ASA interface name
719012
Error Message %ASA-6-719012: Email Proxy server listening on port port for mail
protocol protocol.
Explanation A listening channel is opened for a specific protocol on a configured port and has added
it to a TCP select group.
• port—The configured port number
• protocol—The e-mail proxy protocol type (for example, POP3, IMAP, and SMTP)
719013
Error Message %ASA-6-719013: Email Proxy server closing port port for mail protocol
protocol.
Explanation A listening channel is closed for a specific protocol on a configured port and has
removed it from the TCP select group.
• port—The configured port number
• protocol—The e-mail proxy protocol type (for example, POP3, IMAP, and SMTP)
719014
Error Message %ASA-5-719014: Email Proxy is changing listen port from old_port to
new_port for mail protocol protocol.
Explanation A change is signaled in the listening port for the specified protocol. All enabled
interfaces for that port have their listening channels closed and have restarted listening on the new
port. This action is invoked from the CLI.
• old_port—The previously configured port number
• new_port —The newly configured port number
• protocol—The e-mail proxy protocol type (for example, POP3, IMAP, and SMTP)
719015
Explanation The username string is received from the client in the format vpnuser (name delimiter)
mailuser (server delimiter) mailserver (for example: xxx:[email protected]). The name delimiter is
optional. When the delimiter is not there, the VPN username and mail username are the same. The
server delimiter is optional. When it is not present, the default configured mail server will be used.
• pointer—The session pointer
• source_address—The e-mail proxy client IP address
• mail_user—The e-mail account username
• VPN_user—The WebVPN username
• server—The e-mail server
719016
Explanation The password string is received from the client in the format, vpnpass (name delimiter)
mailpass (for example: xxx:yyy). The name delimiter is optional. When it is not present, the VPN
password and mail password are the same.
• pointer—The session pointer
• source_address—The e-mail proxy client IP address
719017
Explanation The WebVPN session is aborted because the ACL has failed to parse for this user. The
ACL determines what the user restrictions are on e-mail account access. The ACL is downloaded
from the AAA server. Because of this error, it is unsafe to proceed with login.
• vpnuser—The WebVPN username
Recommended Action Check the AAA server and fix the dynamic ACL for this user.
719018
Error Message %ASA-6-719018: WebVPN user: vpnuser ACL ID acl_ID not found
Explanation The ACL cannot be found at the local maintained ACL list. The ACL determines what
the user restrictions are on e-mail account access. The ACL is configured locally. Because of this
error, you cannot be authorized to proceed.
• vpnuser—The WebVPN username
• acl_ID—The local configured ACL identification string
719019
Explanation The ACL determines what the user restrictions are on e-mail account access. The user
cannot access the e-mail account because the authorization check fails.
• vpnuser—The WebVPN username
719020
Explanation The ACL determines what the user restrictions are on e-mail account access. The user
is authorized to access the e-mail account.
• vpnuser—The WebVPN username
719021
Error Message %ASA-6-719021: WebVPN user: vpnuser is not checked against ACL.
Explanation The ACL determines what the user restrictions are on e-mail account access. The
authorization checking using the ACL is not enabled.
• vpnuser—The WebVPN username
719022
719023
Error Message %ASA-6-719023: WebVPN user vpnuser has not been successfully
authenticated. Access denied.
Explanation The username is denied by the AAA server. The session will be aborted. The user is not
allowed to access the e-mail account.
• vpnuser—The WebVPN username
719024
Error Message %ASA-6-719024: Email Proxy piggyback auth fail: session = pointer
user=vpnuser addr=source_address
Explanation The Piggyback authentication is using an established WebVPN session to verify the
username and IP address matching in the WebVPN session database. This is based on the
assumption that the WebVPN session and e-mail proxy session are initiated by the same user, and a
WebVPN session is already established. Because the authentication has failed, the session will be
aborted. The user is not allowed to access the e-mail account.
• pointer—The session pointer
• vpnuser—The WebVPN username
719025
Error Message %ASA-6-719025: Email Proxy DNS name resolution failed for hostname.
Explanation The hostname cannot be resolved with the IP address because it is not valid, or no DNS
server is available.
• hostname—The hostname that needs to be resolved
Recommended Action Check DNS server availability and whether or not the configured mail server
name is valid.
719026
Error Message %ASA-6-719026: Email Proxy DNS name hostname resolved to IP_address.
Explanation The hostname has successfully been resolved with the IP address.
• hostname—The hostname that needs to be resolved
• IP_address—The IP address resolved from the configured mail server name
720001
Explanation The VPN failover subsystem fails to initialize with the memory buffer management
subsystem. A system-wide problem has occurred, and the VPN failover subsystem cannot be started.
• unit—Either Primary or Secondary
Recommended Action Examine the messages for any sign of system-level initialization problems.
720002
720003
720004
Explanation The VPN failover main processing thread is started at boot time.
• unit—Either Primary or Secondary
720005
Explanation The VPN failover timer processing thread is started at boot time.
• unit—Either Primary or Secondary
720006
Explanation The VPN failover bulk synchronization processing thread is started at boot time.
• unit—Either Primary or Secondary
720007
Error Message %ASA-4-720007: (VPN-unit) Failed to allocate chunk from Chunk Manager.
Explanation The set of preallocated memory buffers is running out. The ASA has a resource issue.
The ASA may be under heavy load when too many messages are being processed.
• unit—Either Primary or Secondary
Recommended Action This condition may be improved later when the VPN failover subsystem
processes outstanding messages and frees up previously allocated memory.
720008
Explanation The VPN failover subsystem failed to register to the core failover subsystem. The VPN
failover subsystem cannot be started, which may be caused by initialization problems of other
subsystems.
• unit—Either Primary or Secondary
Recommended Action Search the message for any sign of system-wide initialization problems.
720009
Explanation The VPN failover subsystem failed to create a version control block. This step is
required for the VPN failover subsystem to find out the backward compatible firmware versions for
the current release. The VPN failover subsystem cannot be started, which may be caused by
initialization problems of other subsystems.
• unit—Either Primary or Secondary
Recommended Action Search the message for any sign of system-wide initialization problems.
720010
Explanation An operator enabled failover without defining a failover key. In order to use a VPN
failover, a failover key must be defined.
• unit—Either Primary or Secondary
Recommended Action Use the failover key command to define a shared secret key between the active
and standby units.
720011
Explanation The VPN failover subsystem cannot allocate a memory buffer, which indicates a
system-wide resource problem. The ASA may be under heavy load.
• unit—Either Primary or Secondary
Recommended Action This condition may be improved later when you reduce the load on the ASA by
reducing incoming traffic. By reducing incoming traffic, memory allocated for processing the
existing work load will be available, and the ASA may return to normal operation.
720012
Error Message %ASA-6-720012: (VPN-unit) Failed to update IPsec failover runtime data
on the standby unit.
Explanation The VPN failover subsystem cannot update IPsec-related runtime data because the
corresponding IPsec tunnel has been deleted on the standby unit.
• unit—Either Primary or Secondary
720013
Explanation The VPN failover subsystem tried to insert a certificate in the trustpoint.
• unit—Either Primary or Secondary
• trustpoint_name—The name of the trustpoint
720014
720015
Explanation The corresponding Phase 1 security association for the given Phase 2 connection entry
cannot be found.
• unit—Either Primary or Secondary
• message_number—The message ID of the Phase 2 connection entry
• mine—The My Phase 1 cookie
• his—The peer Phase 1 cookie
720016
Explanation The VPN failover subsystem failed to initialize the given timer event. The VPN failover
subsystem cannot be started at boot time.
• unit—Either Primary or Secondary
• index—The internal index of the timer event
Recommended Action Search the message for any sign of system-wide initialization problems.
720017
Explanation The VPN failover subsystem failed to update the VPN load balancing runtime data.
• unit—Either Primary or Secondary
720018
Error Message %ASA-5-720018: (VPN-unit) Failed to get a buffer from the underlying
core high availability subsystem. Error code code.
Explanation The ASA may be under heavy load. The VPN failover subsystem failed to obtain a
failover buffer.
• unit—Either Primary or Secondary
• code—The error code returned by the high-availability subsystem
Recommended Action Decrease the amount of incoming traffic to improve the current load condition.
With decreased incoming traffic, the ASA will free up memory allocated for processing the
incoming load.
720019
Explanation The VPN failover subsystem failed to update the IPsec/cTCP-related statistics.
• unit—Either Primary or Secondary
Recommended Action None required. Updates are sent periodically, so the standby unit IPsec/cTCP
statistics should be updated with the next update message.
720020
Explanation The VPN failover subsystem failed to send a periodic timer message to the standby unit.
• unit—Either Primary or Secondary
• type—The type of timer message
Recommended Action None required. The periodic timer message will be resent during the next
timeout.
720021
Error Message %ASA-5-720021: (VPN-unit) HA non-block send failed for peer msg
message_number. HA error code.
Explanation The VPN failover subsystem failed to send a nonblock message. This is a temporary
condition caused by the ASA being under load or out of resources.
• unit—Either Primary or Secondary
• message_number—The ID number of the peer message
• code—The error return code
Recommended Action The condition will improve as more resources become available to the ASA.
720022
Explanation An error occurred when the VPN failover subsystem tried to look up a trustpoint by
name.
• unit—Either Primary or Secondary
• trustpoint—The name of the trustpoint.
720023
Explanation The VPN failover subsystem is notified by the core failover subsystem when the local
ASA detected that a peer is available or becomes unavailable.
• unit—Either Primary or Secondary
• not—Either “not” or left blank
720024
Explanation The failover control channel is either up or down. The failover control channel is
defined by the failover link and show failover commands, which indicate whether the failover link
channel is up or down.
• unit—Either Primary or Secondary
• status— Up or Down
720025
720026
Explanation An operator or other external condition has occurred and has caused the current failover
progression to abort before the failover peer agrees on the role (either active or standby). For
example, when the failover active command is entered on the standby unit during the negotiation,
or when the active unit is being rebooted.
• unit—Either Primary or Secondary
720027
720028
720029
Error Message %ASA-6-720029: (VPN-unit) HA status callback: Start VPN bulk sync
state.
Explanation The active unit is ready to send all the state information to the standby unit.
• unit—Either Primary or Secondary
720030
Error Message %ASA-6-720030: (VPN-unit) HA status callback: Stop bulk sync state.
Explanation The active unit finished sending all the state information to the standby unit.
• unit—Either Primary or Secondary
720031
Explanation The VPN failover subsystem received an invalid callback event from the underlying
failover subsystem.
• unit—Either Primary or Secondary
720032
Explanation The VPN failover subsystem indicated that a status update was notified by the
underlying failover subsystem.
• unit—Either Primary or Secondary
• ID—Client ID number
• sequence_#—Sequence number
• group—Group ID
• event—Current event
• operand—Current operand
• my_state—The system current state
• peer_state—The current state of the peer
720033
Explanation System resources may be running low. An error occurred when the VPN failover
subsystem tried to queue an internal message. This may be a temporary condition indicating that the
ASA is under heavy load, and the VPN failover subsystem cannot allocate resource to handle
incoming traffic.
• unit—Either Primary or Secondary
Recommended Action This error condition may disappear if the current load of the ASA is reduced,
and additional system resources become available for processing new messages again.
720034
Error Message %ASA-7-720034: (VPN-unit) Invalid type (type) for message handler.
Explanation An error occurred when the VPN failover subsystem tried to process an invalid message
type.
• unit—Either Primary or Secondary
• type—Message type
720035
Explanation The cTCP flow may be deleted on the standby unit before the VPN failover subsystem
tries to do a lookup.
• unit—Either Primary or Secondary
Recommended Action Look for any sign of cTCP flow deletion in the message to determine the reason
(for example, idle timeout) why the flow was deleted.
720036
Error Message %ASA-5-720036: (VPN-unit) Failed to process state update message from
the active peer.
Explanation An error occurred when the VPN failover subsystem tried to process a state update
message received by the standby unit.
• unit - Either Primary or Secondary
Recommended Action None required. This may be a temporary condition because of the current load
or low system resources.
720037
720038
Explanation The standby unit received a corrupted message from the active unit. Messages from the
active unit are corrupted, which may be caused by incompatible firmware running between the active
and standby units. The local unit has become the active unit of the failover pair.
• unit—Either Primary or Secondary
720039
Explanation The local unit has become the active unit of the failover pair.
• unit—Either Primary or Secondary
720040
Explanation The local unit has become the standby unit of the failover pair.
• unit—Either Primary or Secondary
720041
Explanation A message has been sent from the active unit to the standby unit.
• unit—Either Primary or Secondary
• type—Message type
720042
Error Message %ASA-7-720042: (VPN-unit) Receiving type message id from active unit
Explanation A message has been received from the active unit by the standby unit.
• unit—Either Primary or Secondary
• type—Message type
• id—Identifier for the message
720043
Explanation An error occurred when the VPN failover subsystem tried to send a message from the
active unit to the standby unit. The error may be caused by message 720018, in which the core
failover subsystem runs out of failover buffer or the failover LAN link is down.
• unit—Either Primary or Secondary
• type—Message type
• id—Identifier for the message
Recommended Action Use the show failover command to see if the failover pair is running correctly
and the failover LAN link is up.
720044
Error Message %ASA-4-720044: (VPN-unit) Failed to receive message from active unit
Explanation An error occurred when the VPN failover subsystem tried to receive a message on the
standby unit. The error may be caused by a corrupted message or an inadequate amount of memory
allocated for storing the incoming message.
• unit—Either Primary or Secondary
Recommended Action Use the show failover command and look for receive errors to determine if this
is a VPN failover-specific problem or a general failover issue. Corrupted messages may be caused
by incompatible firmware versions running on the active and standby units. Use the show memory
command to determine if a low memory condition exists.
720045
Explanation The standby unit has been notified to start receiving bulk synchronization information
from the active unit.
• unit—Either Primary or Secondary
720046
Explanation The standby unit has been notified that bulk synchronization from the active unit is
completed.
• unit—Either Primary or Secondary
720047
Error Message %ASA-4-720047: (VPN-unit) Failed to sync SDI node secret file for
server IP_address on the standby unit.
Explanation An error occurred when the VPN failover subsystem tried to synchronize a node secret
file for the SDI server on the standby unit. The SDI node secret file is stored in flash. The error may
indicate that the flash file system is full or corrupted.
• unit—Either Primary or Secondary
• IP_address—IP address of the server
Recommended Action Use the dir command to display the flash contents. The node secret file has the
filename, ip.sdi.
720048
Error Message %ASA-7-720048: (VPN-unit) FSM action trace begin: state=state, last
event=event, func=function.
Explanation A VPN failover subsystem finite state machine function has started.
• unit—Either Primary or Secondary
• state—Current state
• event—Last event
• function—Current executing function
720049
Error Message %ASA-7-720049: (VPN-unit) FSM action trace end: state=state, last
event=event, return=return, func=function.
Explanation A VPN failover subsystem finite state machine function has finished.
• unit—Either Primary or Secondary
• state—Current state
• event—Last event
• return—Return code
• function—Current executing function
720050
720051
Error Message %ASA-4-720051: (VPN-unit) Failed to add new SDI node secret file for
server id on the standby unit.
Explanation An error occurred when the VPN failover subsystem tried to add a node secret file for
the SDI server on the standby unit. The SDI node secret file is stored in flash. The error may indicate
that the flash file system is full or corrupted.
• unit—Either Primary or Secondary
Recommended Action Use the dir command to display the flash contents. The node secret file has the
filename, ip.sdi.
720052
Error Message %ASA-4-720052: (VPN-unit) Failed to delete SDI node secret file for
server id on the standby unit.
Explanation An error occurred when the VPN failover subsystem tried to delete a node secret file on
the active unit. The node secret file being deleted may not exist in the flash file system, or there was
problem reading the flash file system.
• unit—Either Primary or Secondary
• IP_address—IP address of the SDI server
Recommended Action Use the dir command to display the flash contents. The node secret file has the
filename, ip.sdi.
720053
Error Message %ASA-4-720053: (VPN-unit) Failed to add cTCP IKE rule during bulk sync,
peer=IP_address, port=port
Explanation An error occurred when the VPN failover subsystem tried to load a cTCP IKE rule on
the standby unit during bulk synchronization. The standby unit may be under heavy load, and the
new IKE rule request may time out before completion.
• unit—Either Primary or Secondary
• IP_address—Peer IP address
• port—Peer port number
720054
Explanation A cTCP record is replicated to the standby unit and cannot be updated. The
corresponding IPsec over cTCP tunnel may not be functioning after failover. The cTCP database
may be full, or a record with the same peer IP address and port number exists already.
• unit—Either Primary or Secondary
• IP_address—Peer IP address
Recommended Action This may be a temporary condition and may improve when the existing cTCP
tunnel is restored.
720055
Error Message %ASA-4-720055: (VPN-unit) VPN Stateful failover can only be run in
single/non-transparent mode.
Explanation The VPN subsystem does not start unless it is running in single (nontransparent) mode.
• unit—Either Primary or Secondary
Recommended Action Configure the ASA for the appropriate mode to support VPN failover and
restart the ASA.
720056
Explanation The VPN failover subsystem main message processing thread is disabled when you have
tried to enable failover, but a failover key is not defined. A failover key is required for VPN failover.
• unit—Either Primary or Secondary
720057
Explanation The VPN failover subsystem main message processing thread is enabled when failover
is enabled and a failover key is defined.
• unit—Either Primary or Secondary
720058
Explanation The VPN failover subsystem main timer processing thread is disabled when the failover
key is not defined and failover is enabled.
• unit—Either Primary or Secondary
720059
Explanation The VPN failover subsystem main timer processing thread is enabled when the failover
key is defined and failover is enabled.
• unit—Either Primary or Secondary
720060
Explanation The VPN failover subsystem main bulk synchronization processing thread is disabled
when failover is enabled, but the failover key is not defined.
• unit—Either Primary or Secondary.
720061
Explanation The VPN failover subsystem main bulk synchronization processing thread is enabled
when failover is enabled and the failover key is defined.
• unit—Either Primary or Secondary
720062
Error Message %ASA-6-720062: (VPN-unit) Active unit started bulk sync of state
information to standby unit.
Explanation The VPN failover subsystem active unit has started bulk synchronization of state
information to the standby unit.
• unit—Either Primary or Secondary
720063
Error Message %ASA-6-720063: (VPN-unit) Active unit completed bulk sync of state
information to standby.
Explanation The VPN failover subsystem active unit has completed bulk synchronization of state
information to the standby unit.
• unit—Either Primary or Secondary
720064
Error Message %ASA-4-720064: (VPN-unit) Failed to update cTCP database record for
peer=IP_address, port=port during bulk sync.
Explanation An error occurred while the VPN failover subsystem attempted to update an existing
cTCP record during bulk synchronization. The cTCP record may have been deleted from the cTCP
database on the standby unit and cannot be found.
• unit—Either Primary or Secondary
• IP_address—Peer IP address
• port—Peer port number
720065
Error Message %ASA-4-720065: (VPN-unit) Failed to add new cTCP IKE rule, peer=peer,
port=port.
Explanation An error occurred when the VPN failover subsystem tried to add a new IKE rule for the
cTCP database entry on the standby unit. The ASA may be under heavy load, and the request for
adding a cTCP IKE rule timed out and was never completed.
• unit—Either Primary or Secondary
• IP_address—Peer IP address
• port—Peer port number
720066
Explanation An error occurred when the VPN failover subsystem tried to activate the IKE security
association database while the standby unit was transitioning to the active state. There may be
resource-related issues on the standby unit that prevent the IKE security association database from
activating.
• unit—Either Primary or Secondary
Recommended Action Use the show failover command to see if the failover pair is still working
correctly and/or look for other IKE-related errors in the message.
720067
Explanation An error occurred when the VPN failover subsystem tried to deactivate the IKE security
association database while the active unit was transitioning to the standby state. There may be
resource-related issues on the active unit that prevent the IKE security association database from
deactivating.
• unit—Either Primary or Secondary
Recommended Action Use the show failover command to see if the failover pair is still working
correctly and/or look for IKE-related errors in the message.
720068
Explanation An error occurred when the VPN failover subsystem tried to parse a peer message
received on the standby unit. The peer message received on the standby unit cannot be parsed.
• unit—Either Primary or Secondary
Recommended Action Make sure that both active and standby units are running the same version of
firmware. Also, use the show failover command to ensure that the failover pair is still working
correctly.
720069
Explanation An error occurred when the VPN failover subsystem tried to activate the cTCP database
while the standby unit was transitioning to the active state. There may be resource-related issues on
the standby unit that prevent the cTCP database from activating.
• unit—Either Primary or Secondary
Recommended Action Use the show failover command to see if the failover pair is still working
correctly and/or look for other cTCP related errors in the message.
720070
Explanation An error occurred when the VPN failover subsystem tried to deactivate the cTCP
database while the active unit was transitioning to the standby state. There may be resource-related
issues on the active unit that prevent the cTCP database from deactivating.
• unit—Either Primary or Secondary.
Recommended Action Use the show failover command to see if the failover pair is still working
correctly and/or look for cTCP related errors in the message.
720071
Explanation An error occurred while the VPN failover subsystem tried to update cTCP dynamic data.
• unit—Either Primary or Secondary.
Recommended Action This may be a temporary condition. Because this is a periodic update, wait to
see if the same error recurs. Also, look for other failover-related messages in the message.
720072
Explanation The Zonelab Integrity Server cannot reestablish a connection before timeout. In an
active/standby failover setup, the SSL connection between a Zonelab Integrity Server and the ASA
needs to be reestablished after a failover.
• interface—The interface to which the Zonelab Integrity Server is connected
• ip—The IP address of the Zonelab Integrity Server
Recommended Action Check that the configuration on the ASA and the Zonelab Integrity Server
match, and verify communication between the ASA and the Zonelab Integrity Server.
720073
Explanation An error occurred when the VPN failover subsystem tried to insert a certificate in the
trustpoint. This error may be caused by invalid content of the certificate.
• unit—Either Primary or Secondary
• trustpoint—Name of the trustpoint
Recommended Action Use the write standby command on the active unit to replicate the certificate
to the standby unit manually. Search in the message to see if there are any failover or PKI-related
errors.
721001
Explanation The WebVPN failover subsystem in the current failover unit, either primary or
secondary, has been started successfully.
• (device)—Either the WebVPN primary or the WebVPN secondary device
721002
Explanation The WebVPN failover subsystem receives status notification from the core HA
component periodically. The incoming event, the new state of the local ASA, and the new state of
the failover peer are reported.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• event—New HA event
• my_state—The new state of the local ASA
• peer—The new state of the peer
721003
Explanation The WebVPN failover subsystem transitions from one state to another state based on the
event notified by the core HA component. The incoming event, the new state of the local ASA, and
the new state of the failover peer are being reported.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• event—New HA event
• my_state—The new state of the local ASA
• peer—The new state of the peer
721004
Error Message %ASA-6-721004: (device) Create access list list_name on standby unit.
Explanation A WebVPN-specific access list is replicated from the active unit to the standby unit. A
successful installation of the WebVPN access list on the standby unit has occurred.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• list_name—The access list name
721005
Error Message %ASA-6-721005: (device) Fail to create access list list_name on standby
unit.
Explanation When a WebVPN-specific access list is installed on the active unit, a copy is installed
on the standby unit. The access list failed to be installed on the standby unit. The access list may
have existed on the standby unit already.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• list_name—Name of the access list that failed to install on the standby unit
Recommended Action Use the show access-list command on both the active and standby units.
Compare the content of the output and determine whether there is any discrepancy. Resynchronize
the standby unit, if needed, by using the write standby command on the active unit.
721006
Error Message %ASA-6-721006: (device) Update access list list_name on standby unit.
Explanation The content of the access list has been updated on the standby unit.
• (device)—Either the WebVPN primary or the WebVPN- econdary ASA
• list_name—Name of the access list that was updated
721007
Error Message %ASA-4-721007: (device) Fail to update access list list_name on standby
unit.
Explanation An error occurred while the standby unit tried to update a WebVPN-specific access list.
The access list cannot be located on the standby unit.
• (device)—Either the WebVPN primary or the WebVPN-= secondary ASA
• list_name—Name of the access list that was not updated
Recommended Action Use a show access-list command on both the active and standby units.
Compare the content of the output and determine whether or not there is any discrepancy.
Resynchronize the standby unit, if needed, by using the write standby command on the active unit.
721008
Error Message %ASA-6-721008: (device) Delete access list list_name on standby unit.
Explanation When a WebVPN-specific access list is removed from the active unit, a message is sent
to the standby unit requesting that the same access list be removed. As a result, a WebVPN-specific
access list has been removed from the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• list_name—Name of the access list that was removed
721009
Error Message %ASA-6-721009: (device) Fail to delete access list list_name on standby
unit.
Explanation When a WebVPN-specific access list is removed on the active unit, a message is sent to
the standby unit requesting the same access list be removed. An error condition occurred when an
attempt was made to remove the corresponding access list on the standby unit. The access list did
not exist on the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• list_name—Name of the access list that was deleted
Recommended Action Use a show access-list command on both the active and standby units.
Compare the content of the output and determine whether there is any discrepancy. Resynchronize
the standby unit, if needed, by using the write standby command on the active unit.
721010
Error Message %ASA-6-721010: (device) Add access list rule list_name, line line_no
on standby unit.
Explanation When an access list rule is added to the active unit, the same rule is added on the standby
unit. A new access list rule was added successfully on the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• list_name—Name of the access list that was deleted
• line_no—Line number of the rule added to the access list
721011
Error Message %ASA-4-721011: (device) Fail to add access list rule list_name, line
line_no on standby unit.
Explanation When an access list rule is added to the active unit, an attempt is made to add the same
access list rule to the standby unit. An error occurred when an attempt is made to add a new access
list rule to the standby unit. The same access list rule may exist on the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• list_name—Name of the access list that was deleted
• line_no—Line number of the rule added to the access list
Recommended Action Use a show access-list command on both the active and standby units.
Compare the content of the output and determine if there is any discrepancy. Resynchronize the
standby unit, if needed, by using the write standby command on the active unit.
721012
Error Message %ASA-6-721012: (device) Enable APCF XML file file_name on the standby
unit.
Explanation When an APCF XML file is installed on the active unit, an attempt is made to install the
same file on the standby unit. An APCF XML file was installed successfully on the standby unit.
Use the dir command on the standby unit to show that the XML file exists in the flash file system.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• file_name—Name of the XML file on the flash file system
721013
Error Message %ASA-4-721013: (device) Fail to enable APCF XML file file_name on the
standby unit.
Explanation When an APCF XML file is installed on the active unit, an attempt is made to install the
same file on the standby unit. An APCF XML file failed to install on the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• file_name—Name of the XML file on the flash file system
Recommended Action Use a dir command on both the active and standby unit. Compare the directory
listing and determine if there is any discrepancy. Resynchronize the standby unit, if needed, by using
the write standby command on the active unit.
721014
Error Message %ASA-6-721014: (device) Disable APCF XML file file_name on the standby
unit.
Explanation When an APCF XML file is removed on the active unit, an attempt is made to remove
the same file on the standby unit. An APCF XML file was removed from the standby unit
successfully.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• file_name—Name of the XML file on the flash file system
721015
Error Message %ASA-4-721015: (device) Fail to disable APCF XML file file_name on the
standby unit.
Explanation When an APCF XML file is removed on the active unit, an attempt is made to remove
the same file on the standby unit. An error occurred when an attempt was made to remove an APCF
XML file from the standby unit. The file may not be installed on the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• file_name—Name of the XML file on the flash file system
Recommended Action Use a show running-config webvpn command to make sure the APCF XML
file of interest is not enabled. As long as it is not enabled, you may ignore this message. Otherwise,
try to disable the file by using the no apcf file_name command in the webvpn configuration
submode.
721016
Error Message %ASA-6-721016: (device) WebVPN session for client user user_name, IP
ip_address has been created.
Explanation A remote WebVPN user has logged in successfully and the login information has been
installed on the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• user_name—Name of the user
• ip_address—IP address of the remote user
721017
Error Message %ASA-4-721017: (device) Fail to create WebVPN session for user
user_name, IP ip_address.
Explanation When a WebVPN user logs in to the active unit, the login information is replicated to
the standby unit. An error occurred while replicating the login information to the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• user_name—Name of the user
• ip_address—IP address of the remote user
Recommended Action Use the show vpn-sessiondb detail webvpn command for a regular WebVPN
user, or the show vpn-sessiondb detail svc command for a WebVPN SVC user on both the active
and standby units. Compare the entries and determine whether the same user session record appears
on both ASAs. Resynchronize the standby unit, if needed, by using the write standby command on
the active unit.
721018
Error Message %ASA-6-721018: (device) WebVPN session for client user user_name, IP
ip_address has been deleted.
Explanation When a WebVPN user logs out on the active unit, a logout message is sent to the standby
unit to remove the user session from the standby unit. A WebVPN user record was removed from
the standby unit successfully.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• user_name—Name of the user
• ip_address—IP address of the remote user
721019
Error Message %ASA-4-721019: (device) Fail to delete WebVPN session for client user
user_name, IP ip_address.
Explanation When a WebVPN user logs out on the active unit, a logout message is sent to the standby
unit to remove the user session from the standby unit. An error occurred when an attempt was made
to remove a WebVPN user record from the standby unit.
• (device)—Either the WebVPN primary or the WebVPN secondary ASA
• user_name—Name of the user
• ip_address—IP address of the remote user
Recommended Action Use the show vpn-sessiondb detail webvpn command for a regular WebVPN
user, or the show vpn-sessiondb detail svc command for a WebVPN SVC user on both the active
and standby units. Check whether there is any discrepancy. Resynchronize the standby unit, if
needed, by using the write standby command on the active unit.
722001
Recommended Action Research as necessary to determine if this error was caused by a defect in the
SVC, an incompatible SVC version, or an attack against the device.
722002
Recommended Action Purchase more memory, upgrade the device, or reduce the load on the device.
722003
Recommended Action Increase the timeouts for session idle and maximum connect time.
722004
Recommended Action Purchase more memory, upgrade the device, or reduce the load on the device.
722005
Recommended Action Purchase more memory, upgrade the device, or reduce the load on the device.
722006
Error Message %ASA-5-722006: Group group User user-name IP IP_address Invalid address
IP_address assigned to SVC connection.
Recommended Action Verify and correct the address assignment, if possible. Otherwise, notify your
network administrator or escalate this issue according to your security policy. For additional
assistance, contact the Cisco TAC.
722007
Error Message %ASA-3-722007: Group group User user-name IP IP_address SVC Message:
type-num/ERROR: message
722008
Error Message %ASA-3-722008: Group group User user-name IP IP_address SVC Message:
type-num/ERROR: message
722009
Error Message %ASA-3-722009: Group group User user-name IP IP_address SVC Message:
type-num/ERROR: message
722010
Error Message %ASA-5-722010: Group group User user-name IP IP_address SVC Message:
type-num/NOTICE: message
722011
Error Message %ASA-5-722011: Group group User user-name IP IP_address SVC Message:
type-num/NOTICE: message
722012
Error Message %ASA-5-722012: Group group User user-name IP IP_address SVC Message:
type-num/INFO: message
722013
Error Message %ASA-6-722013: Group group User user-name IP IP_address SVC Message:
type-num/INFO: message
722014
Error Message %ASA-6-722014: Group group User user-name IP IP_address SVC Message:
type-num/INFO: message
722015
Error Message %ASA-4-722015: Group group User user-name IP IP_address Unknown SVC
frame type: type-num
Explanation The SVC sent an invalid frame type to the device, which might be caused by an SVC
version incompatibility.
• type-num—The number identifier of the frame type
722016
Error Message %ASA-4-722016: Group group User user-name IP IP_address Bad SVC frame
length: length expected: expected-length
Explanation The expected amount of data was not available from the SVC, which might be caused
by an SVC version incompatibility.
722017
Error Message %ASA-4-722017: Group group User user-name IP IP_address Bad SVC
framing: 525446, reserved: 0
Explanation The SVC sent a badly framed datagram, which might be caused by an SVC version
incompatibility.
722018
Error Message %ASA-4-722018: Group group User user-name IP IP_address Bad SVC
protocol version: version, expected: expected-version
Explanation The SVC sent a version unknown to the device, which might be caused by an SVC
version incompatibility.
722019
Error Message %ASA-4-722019: Group group User user-name IP IP_address Not enough data
for an SVC header: length
Explanation The expected amount of data was not available from the SVC, which might be caused
by an SVC version incompatibility.
722020
Explanation Address assignment failed for the AnyConnect session. No IP addresses are available.
• tunnel_group—The name of the tunnel group that the user was assigned to or used to log in
• group_policy—The name of the group policy that the user was assigned to
• user-name—The name of the user with which this message is associated
• IP_address—The public IP (Internet) address of the client machine
Recommended Action Check the configuration listed in the ip local ip command to see if enough
addresses exist in the pools that have been assigned to the tunnel group and the group policy. Check
the DHCP configuration and status. Check the address assignment configuration. Enable IPAA
syslog messages to determine why the AnyConnect client cannot obtain an IP address.
722021
Error Message %ASA-3-722021: Group group User user-name IP IP_address Unable to start
compression due to lack of memory resources
Recommended Action Purchase more memory, upgrade the device, or reduce the load on the device.
722022
Error Message %ASA-6-722022: Group group-name User user-name IP addr (TCP | UDP)
connection established (with | without) compression
Explanation The TCP or UDP connection was established with or without compression.
722023
Error Message %ASA-6-722023: Group group User user-name IP IP_address SVC connection
terminated {with|without} compression
722024
Explanation Subsequent SVC connections will be allowed to perform tunnel compression if SVC
compression is enabled in the corresponding user or group configuration.
722025
Explanation Subsequent SVC connections will not be allowed to perform tunnel compression.
722026
Error Message %ASA-6-722026: Group group User user-name IP IP_address SVC compression
history reset
Explanation A compression error occurred. The SVC and the ASA corrected it.
722027
Explanation A decompression error occurred. The SVC and the ASA corrected it.
722028
Error Message %ASA-5-722028: Group group User user-name IP IP_address Stale SVC
connection closed.
Recommended Action None required. However, the client may be having trouble connecting if
multiple connections are established. The SVC log should be examined.
722029
Error Message %ASA-7-722029: Group group User user-name IP IP_address SVC Session
Termination: Conns: connections, DPD Conns: DPD_conns, Comp resets:
compression_resets, Dcmp resets: decompression_resets
Explanation The number of connections, reconnections, and resets that have occurred are reported.
If connections is greater than 1 or the number of DPD_conns, compression_resets, or
decompression_resets is greater than 0, it may indicate network reliability problems, which may be
beyond the control of the ASA administrator. If there are many connections or DPD connections,
the user may be having problems connecting and may experience poor performance.
• connections—The total number of connections during this session (one is normal)
• DPD_conns—The number of reconnections due to DPD
• compression_resets—The number of compression history resets
• decompression_resets—The number of decompression history resets
Recommended Action The SVC log should be examined. You may want to research and take
appropriate action to resolve possible network reliability problems.
722030
Error Message %ASA-7-722030: Group group User user-name IP IP_address SVC Session
Termination: In: data_bytes (+ctrl_bytes) bytes, data_pkts (+ctrl_pkts) packets,
drop_pkts drops
722031
Error Message %ASA-7-722031: Group group User user-name IP IP_address SVC Session
Termination: Out: data_bytes (+ctrl_bytes) bytes, data_pkts (+ctrl_pkts) packets,
drop_pkts drops.
722032
Error Message %ASA-5-722032: Group group User user-name IP IP_address New SVC
connection replacing old connection.
Explanation A new SVC connection is replacing an existing one. You may be having trouble
connecting.
722033
Error Message %ASA-5-722033: Group group User user-name IP IP_address First SVC
connection established for SVC session.
Explanation The first SVC connection was established for the SVC session.
722034
Error Message %ASA-5-722034: Group group User user-name IP IP_address New SVC
connection, no existing connection.
722035
Explanation A large packet was sent to the client. The source of the packet may not be aware of the
MTU of the client.
• length—The length of the large packet
• +num—The threshold
722036
Error Message %ASA-3-722036: Group group User user-name IP IP_address Received large
packet length (threshold +num).
Explanation A large packet was sent to the client. The packets that were arriving on the ASA had the
DF bit set, and the ASA was unable to fragment it.
• length—The length of the large packet
• +num—The threshold
Recommended Action Enter the anyconnect ssl df-bit-ignore enable command under the group
policy to allow the ASA to fragment the packets arriving with the DF bit set.
722037
Error Message %ASA-5-722037: Group group User user-name IP IP_address SVC closing
connection: reason.
Explanation An SVC connection was terminated for the given reason. This behavior may be normal,
or you may be having trouble connecting.
• reason—The reason that the SVC connection was terminated
722038
Explanation An SVC session was terminated for the given reason. This behavior may be normal, or
you may be having trouble connecting.
• reason—The reason that the SVC session was terminated
Recommended Action Examine the SVC log if the reason for termination was unexpected.
722039
Error Message %ASA-4-722039: Group group, User user, IP ip, SVC vpn-filter acl is an
IPv6 ACL; ACL not applied.
Explanation The type of ACL to be applied is incorrect. An IPv6 ACL has been configured as an IPv4
ACL through the vpn-filter command.
• group—The group policy name of the user
• user—The username
• ip—The public (not assigned) IP address of the user
• acl—The name of the invalid ACL
Recommended Action Validate the VPN filter and IPv6 VPN filter configurations on the ASA, and the
filter parameters on the AAA (RADIUS) server. Make sure that the correct type of ACL is specified.
722040
Error Message %ASA-4-722040: Group group, User user, IP ip, SVC 'ipv6-vpn-filter acl'
is an IPv4 ACL; ACL not applied
Explanation The type of ACL to be applied is incorrect. An IPv4 ACL has been configured as an IPv6
ACL through the ipv6-vpn-filter command.
• group—The group policy name of the user
• user—The username
• ip—The public (not assigned) IP address of the user
• acl—The name of the invalid ACL
Recommended Action Validate the VPN filter and IPv6 VPN filter configurations on the ASA and the
filter parameters on the AAA (RADIUS) server. Make sure that the correct type of ACL is specified.
722041
Explanation An IPv6 address was not available for assignment to the remote SVC client.
• n—The SVC connection identifier
722042
Error Message %ASA-4-722042: Group group User user IP ip Invalid Cisco SSL Tunneling
Protocol version.
Recommended Action Validate that the SVC or AnyConnect client is compatible with the ASA.
722043
Error Message %ASA-5-722043: Group group User user IP ip DTLS disabled: unable to
negotiate cipher.
Explanation The DTLS (UDP transport) cannot be established. The SSL encryption configuration
was probably changed.
• group—The name of the group policy with which the user is trying to connect
• user—The name of the user who is trying to connect
• ip—The IP address of the user who is trying to connect
Recommended Action Revert the SSL encryption configuration. Make sure there is at least one block
cipher (AES, DES, or 3DES) in the SSL encryption configuration.
722044
Error Message %ASA-5-722044: Group group User user IP ip Unable to request ver
address for SSL tunnel.
Recommended Action Reduce the load on the ASA or add more memory.
722045
Explanation Data to establish a connection is missing. This is a defect in the ASA software.
722046
Error Message %ASA-3-722046: Group group User user IP ip Session terminated: unable
to establish tunnel.
Explanation The ASA cannot set up connection parameters. This is a defect in the ASA software.
• group—The name of the group policy with which the user is trying to connect
• user—The name of the user who is trying to connect
• ip—The IP address of the user who is trying to connect
722047
Error Message %ASA-4-722047: Group group User user IP ip Tunnel terminated: SVC not
enabled or invalid SVC image on the ASA.
Explanation The user logged in via the web browser and tried to start the SVC or AnyConnect client.
The SVC service is not enabled globally, or the SVC image is invalid or corrupted. The tunnel
connection has been terminated, but the clientless connection remains.
• group—The name of the group policy with which the user is trying to connect
• user—The name of the user who is trying to connect
• ip—The IP address of the user who is trying to connect
Recommended Action Enable the SVC globally using the svc enable command. Validate the integrity
of versions of the SVC images by reloading new images using the svc image command.
722048
Error Message %ASA-4-722048: Group group User user IP ip Tunnel terminated: SVC not
enabled for the user.
Explanation The user logged in via the web browser, and tried to start the SVC or AnyConnect client.
The SVC service is not enabled for this user. The tunnel connection has been terminated, but the
clientless connection remains.
• group—The name of the group policy with which the user is trying to connect
• user—The name of the user who is trying to connect
• ip—The IP address of the user who is trying to connect
Recommended Action Enable the service for this user using the group-policy and username
commands.
722049
Error Message %ASA-4-722049: Group group User user IP ip Session terminated: SVC not
enabled or invalid image on the ASA.
Explanation The user logged in via the AnyConnect client. The SVC service is not enabled globally,
or the SVC image is invalid or corrupted. The session connection has been terminated.
• group—The name of the group policy with which the user is trying to connect
• user—The name of the user who is trying to connect
• ip—The IP address of the user who is trying to connect
Recommended Action Enable the SVC globally using the svc-enable command. Validate the integrity
and versions of the SVC images by reloading new images using the svc image command.
722050
Error Message %ASA-4-722050: Group group User user IP ip Session terminated: SVC not
enabled for the user.
Explanation The user logged in through the AnyConnect client. The SVC service is not enabled for
this user. The session connection has been terminated.
• group—The name of the group policy with which the user is trying to connect
• user—The name of the user who is trying to connect
• ip—The IP address of the user who is trying to connect
Recommended Action Enable the service for this user using the group-policy and username
commands.
722051
Explanation The specified address has been assigned to the given user.
• group-policy—The group policy that allowed the user to gain access
• username—The name of the user
• public-ip—The public IP address of the connected client
• assigned-ip—The IPv4 or IPv6 address that is assigned to the client
722053
Explanation An unknown or unsupported SSL VPN client has connected to the ASA. Older clients
include the Cisco SVC and the Cisco AnyConnect client earlier than Version 2.3.1.
• g—The group policy under which the user logged in
• u—The name of the user
• ip—The IP address of the client
• user-agent—The user agent (usually includes the version) received from the client
723001
723002
Recommended Action No action is required when the Citrix ICA connection is terminated
intentionally by the client, the server, or the ASA administrator. However, if this is not the case,
verify that the WebVPN session in which the Citrix ICA connection is set up is still active. If it is
inactive, then receiving this message is normal. If the WebVPN session is still active, verify that the
ICA client and Citrix server both work correctly and that there is no error displayed. If not, bring
either or both up or respond to any error. If this message is still received, contact the Cisco TAC and
provide the following information:
• Network topology
• Delay and packet loss
• Citrix server configuration
• Citrix ICA client information
• Steps to reproduce the problem
• Complete text of all associated messages
723003
Error Message %ASA-7-723003: No memory for WebVPN Citrix ICA connection connection.
Explanation The ASA is running out of memory. The Citrix connection was rejected.
• connection—The Citrix connection identifier
Recommended Action Verify that the ASA is working correctly. Pay special attention to memory and
buffer usage. If the ASA is under heavy load, buy more memory and upgrade the ASA or reduce the
load on the ASA. If the problem persists, contact the Cisco TAC.
723004
Error Message %ASA-7-723004: WebVPN Citrix encountered bad flow control flow.
Explanation The ASA encountered an internal flow control mismatch, which can be caused by
massive data flow, such as might occur during stress testing or with a high volume of ICA
connections.
Recommended Action Reduce ICA connectivity to the ASA. If the problem persists, contact the Cisco
TAC.
723005
Explanation The ASA was unable to create a new channel for Citrix.
Recommended Action Verify that the Citrix ICA client and the Citrix server are still alive. If not, bring
them back up and retest. Check the ASA load, paying special attention to memory and buffer usage.
If the ASA is under heavy load, upgrade the ASA, add memory, or reduce the load. If the problem
persists, contact the Cisco TAC.
723006
Recommended Action Verify that the Citrix ICA client is working correctly. In addition, check the
network connection status between the Citrix ICA client and the ASA, paying attention to packet
loss. Resolve any abnormal network conditions. If the problem persists, contact the Cisco TAC.
723007
Error Message %ASA-7-723007: WebVPN Citrix ICA connection connection list is broken.
Recommended Action Verify that the ASA is working correctly, paying special attention to memory
and buffer usage. If the ASA is under heavy load, upgrade the ASA, add memory, or reduce the load.
If the problem persists, contact the Cisco TAC.
723008
Error Message %ASA-7-723008: WebVPN Citrix ICA SOCKS Server server is invalid.
Explanation An attempt was made to access a Citrix Socks server that does not exist.
• server—The Citrix server identifier
Recommended Action Verify that the ASA is working correctly. Note whether or not there is any
memory or buffer leakage. If this issue occurs frequently, capture information about memory usage,
network topology, and the conditions during which this message is received. Send this information
to the Cisco TAC for review. Make sure that the WebVPN session is still up while this message is
being received. If not, determine the reason that the WebVPN session is down. If the ASA is under
heavy load, upgrade the ASA, add memory, or reduce the load. If the problem persists, contact the
Cisco TAC.
723009
Explanation Data was received on a Citrix connection that does not exist.
• group-name—The name of the Citrix group
• user-name—The name of the Citrix user
• IP_address—The IP address of the Citrix user
• connection—The Citrix connection identifier
Recommended Action The original published Citrix application connection was probably terminated,
and the remaining active published applications lost connectivity. Restart all published applications
to generate a new Citrix ICA tunnel. If the ASA is under heavy load, upgrade the ASA, add memory,
or reduce the load. If the problem persists, contact the Cisco TAC.
723010
Explanation An abort was received on a nonexistent Citrix connection, which can be caused by
massive data flow (such as stress testing) or a high volume of ICA connections, especially during
network delay or packet loss.
• group-name—The name of the Citrix group
• user-name—The name of the Citrix user
• IP_address—The IP address of the Citrix user
• channel—The Citrix channel identifier
• connection—The Citrix connection identifier
Recommended Action Reduce the number of ICA connections to the ASA, obtain more memory for
the ASA, or resolve the network problems.
723011
Recommended Action Verify that the Citrix ICA client is working correctly. In addition, check the
network connection status between the ICA client and the ASA, paying attention to packet loss.
After resolving any abnormal network conditions, if the problem still exists, contact the Cisco TAC.
723012
Recommended Action Verify that the Citrix ICA client is working correctly. In addition, check the
network connection status between the ICA client and the ASA, paying attention to packet loss.
After resolving any abnormal network conditions, if the problem still exists, contact the Cisco TAC.
723013
Explanation The ASA internal Citrix timer has expired, and the Citrix connection is invalid.
• connection—The Citrix connection identifier
Recommended Action Check the network connection between the Citrix ICA client and the ASA, and
between the ASA and the Citrix server. Resolve any abnormal network conditions, especially delay
and packet loss. Verify that the ASA works correctly, paying special attention to memory or buffer
problems. If the ASA is under heavy load, obtain more memory, upgrade the ASA, or reduce the
load. If the problem persists, contact the Cisco TAC.
723014
Explanation The ASA internal Citrix Secure Gateway is connected to the Citrix server.
• group-name—The name of the Citrix group
• user-name—The name of the Citrix user
• IP_address—The IP address of the Citrix user
• connection—The connection name
• server—The Citrix server identifier
• channel—The Citrix channel identifier (hexadecimal)
724001
Explanation The session was not allowed because an error occurred during processing of the CSD
Host Integrity Check results on the ASA.
• group-name—The name of the group
Recommended Action Determine whether the client firewall is truncating long URLs. Uninstall CSD
from the client and reconnect to the ASA.
724002
Recommended Action Verify that the end user can install and run CSD on the client machine.
725001
Explanation The SSL handshake has started with the remote device.
• remote_device—Either the server or the client, depending on the device that initiated the
connection
• interface_name—The interface that the SSL session is using
• IP_address—The remote device IPv4 or IPv6 address
• port—The remote device IP port number
• SSL_version—The SSL version for the SSL handshake (SSLv3 or TLSv1)
725002
Explanation The SSL handshake has completed successfully with the remote device.
• remote_device—Either the server or the client, depending on the device that initiated the
connection
725003
725004
725005
Explanation The server has requested the certificate of the ASA for authentication.
• interface_name—The interface that the SSL session is using
• IP_address—The remote device IPv4 or IPv6 address
• port—The remote device IP port number
725006
Explanation The SSL handshake with the remote device has failed.
• remote_device—Either the server or the client, depending on the device that initiates the
connection
• interface_name—The interface that the SSL session is using
• IP_address—The remote device IPv4 or IPv6 address
• port—The remote device IP port number
Recommended Action Look for syslog message 725014, which indicates the reason for the failure.
725007
725008
Explanation The number of ciphers proposed by the remote SSL device are listed.
• interface_name—The interface that the SSL session is using
• IP_address—The remote device IP address
• port—The remote device IP port number
• number—The number of ciphers in the proposal
725009
Error Message %ASA-7-725009 Device proposes the following number cipher(s) to SSL
server interface_name: IP_address/port.
Explanation The number of ciphers proposed to the SSL server are listed.
• number—The number of ciphers in the proposal
• interface_name—The interface that the SSL session is using
• IP_address—The remote device IP address
• port—The remote device IP port number
725010
Explanation The number of ciphers supported by the ASA for an SSL session are listed.
• number—The number of supported ciphers
725011
Explanation Always following messages 725008, 725009, and 725010, this message indicates the
cipher name and its order of preference.
• order—The order of the cipher in the cipher list
• cipher_name—The name of the cipher from the cipher list
725012
Error Message %ASA-7-725012 Device chooses cipher: cipher_name for SSL session with
client interface_name:IP_address/port
Explanation The cipher that was chosen by the Cisco device for the SSL session is listed.
• cipher_name—The name of the cipher from the cipher list
• interface_name—The interface that the SSL session is using
725013
Explanation The cipher that was chosen by the server for the SSL session is identified.
• cipher_name—The name of the cipher from the cipher list
• interface_name—The interface that the SSL session is using
• IP_address—The remote device IP address
• port—The remote device IP port number
725014
Error Message %ASA-7-725014 SSL lib error. Function: function Reason: reason
Recommended Action Include this message when reporting any SSL-related issue to the Cisco TAC.
725015
Error Message %ASA-3-725015 Error verifying client certificate. Public key size in
client certificate exceeds the maximum supported key size.
Explanation The verification of an SSL client certificate failed because of an unsupported (large) key
size.
Recommended Action Use client certificates with key sizes that are less than or equal to 4096 bits.
726001
Explanation An IM inspection was performed on an IM message and the specified criteria were
satisfied. The configured action is taken.
• im_protocol—MSN IM or Yahoo IM
• im_service—The IM services, such as chat, conference, file transfer, voice, video, games, or
unknown
• im_client_1, im_client_2—The client peers that are using the IM service in the session:
client_login_name or “?”
• src_ifc—The source interface name
• sip—The source IP address
• sport—The source port
• dest_ifc—The destination interface name
• dip—The destination IP address
• dport—The destination port
• action—The action taken: reset connection, dropped connection, or received
• class_map_id—The matched class-map ID
• class_map_name—The matched class-map name
730001
Error Message %ASA-7-730001 Group groupname, User username, IP ipaddr: VLAN MAPPING
to VLAN vlanid
730002
Error Message %ASA-7-730002 Group groupname, User username, IP ipaddr: VLAN MAPPING
to VLAN vlanid failed
Recommended Action Verify that all the VLAN mapping-related configurations are correct, and that
the VLAN ID is valid.
730003
Explanation ASA receives an SNMP set message from NACApp to set the new VLAN ID for the
session.
• ipaddr—The IP address of this session
• vlanid— The VLAN ID that is used for the VLAN mapping session
730004
Error Message %ASA-6-730004: Group groupname User username IP ipaddr VLAN ID vlanid
from AAA ignored.
Explanation The VLAN ID received from AAA is different from the current one in use, and it is
ignored for the current session.
• groupname—The group name
• username—The username
• ipaddr—The IP address of this session
• vlanid— The VLAN ID that is used for the VLAN mapping session
Recommended Action If the newly received VLAN ID must be used, then the current session needs
to be torn down. Otherwise, no action is required.
730005
Error Message %ASA-6-730005: Group groupname User username IP ipaddr VLAN ID vlanid
from AAA is invalid.
Recommended Action Verify the VLAN ID configurations on the AAA server and ASA are both
correct.
730006
730007
Error Message %ASA-7-73007: Group groupname, User username, IP ipaddr: changed VLAN
to <%s> ID vlanid
Explanation NACApp (Cisco NAC appliance) posture assessment is done with the session, the
VLAN is changed from AUTH VLAN to a new VLAN.
• groupname—The group name
• username—The username
• ipaddr—The IP address of this session
• %s—A string
• vlanid— The VLAN ID that is used for the VLAN mapping session
730008
Error Message %ASA-6-730008: Group groupname, User username, IP ipaddr, VLAN MAPPING
timeout waiting NACApp.
Explanation NACApp (Cisco NAC appliance) posture assessment takes longer than the timeout
value configured.
• groupname—The group name
• username—The username
• ipaddr—The IP address of this session
730009
Error Message %ASA-5-730009: Group groupname, User username, IP ipaddr, CAS casaddr,
capacity exceeded, terminating connection.
Explanation The load capacity of the NACApp (Cisco NAC appliance) CAS is execeeded, the new
incoming session that uses it is terminating.
• groupname—The group name
• username—The username
• ipaddr—The IP address of this session
• casaddr—The IP Address of CAS (Clean Access Server)
Recommended Action Review and revise planning for how many groups, and which groups, are
associated with the CAS to ensure that its load capacity is not exceeded.
730010
Error Message %ASA-7-730010: Group groupname, User username, IP ipaddr, VLAN Mapping
is enabled on VLAN vlanid.
731001
Error Message %ASA-6-731001: NAC policy added: name: policyname Type: policytype.
731002
Error Message %ASA-6-731002: NAC policy deleted: name: policyname Type: policytype.
731003
Explanation The NAC policy is unused because there is an existing NAC policy with the same name,
but a different type.
• policyname—The NAC policy name
• policytype—The type of NAC policy
Recommended Action If the new NAC policy must be used, the existing NAC policy must be removed
first. Otherwise, no action is required.
732001
Error Message %ASA-6-732001: Group groupname, User username, IP ipaddr, Fail to parse
NAC-SETTINGS nac-settings-id, terminating connection.
Explanation The ASA cannot apply the NAC settings because no memory is available.
• groupname—The group name
• username—The username
• ipaddr—The IP address of this session
Recommended Action Upgrade the ASA memory. Resolve any errors in the log before this problem
occurs. If the problem persists, contact the Cisco TAC.
732002
Explanation The NAC settings ID cannot be applied because there is a different one for the session.
• groupname—The group name
• username—The username
• ipaddr—The IP address of this session
• settingsid— The settings ID, which should be a NAC policy name
• settingsid_inuse— The NAC settings ID that is currently in use
Recommended Action If the new NAC settings ID must be applied, then all the active sessions that
use it must be torn down first. Otherwise, no action is required.
732003
Recommended Action Verify that the NAC settings configurations on the AAA server and ASA are
both correct.
733100
Error Message %ASA-4-733100: Object drop rate rate_ID exceeded. Current burst rate
is rate_val per second, max configured rate is rate_val; Current average rate is
rate_val per second, max configured rate is rate_val; Cumulative total count is
total_cnt
Explanation The specified object in the message has exceeded the specified burst threshold rate or
average threshold rate. The object can be a drop activity of a host, TCP/UDP port, IP protocol, or
various drops caused by potential attacks. The ASA may be under attack.
• Object—The general or particular source of a drop rate count, which might include the
following:
- Firewall
- Bad pkts
- Rate limit
- DoS attck
- ACL drop
- Conn limit
- ICMP attk
- Scanning
- SYN attck
- Inspect
- Interface
(A citation of a particular interface object might take a number of forms. For example, you
might see 80/HTTP, which would signify port 80, with the well-known protocol HTTP.)
• rate_ID—The configured rate that is being exceeded. Most objects can be configured with up
to three different rates for different intervals.
• rate_val—A particular rate value.
• total_cnt—The total count since the object was created or cleared.
The following three examples show how these variables occur:
– For an interface drop caused by a CPU or bus limitation:
%ASA-4-733100: [Interface] drop rate 1 exceeded. Current burst rate is 1 per
second, max configured rate is 8000; Current average rate is 2030 per second, max
configured rate is 2000; Cumulative total count is 3930654.”
– Because of the scanning rate configured and the threat-detection rate scanning-rate 3600
average-rate 15 command:
%ASA-4-733100: [144.60.88.2] drop rate-2 exceeded. Current burst rate is 0 per
second, max configured rate is 8; Current average rate is 5 per second, max
configured rate is 4; Cumulative total count is 38086
Recommended Action Perform the following steps according to the specified object type that appears
in the message:
1. If the object in the message is one of the following:
– Firewall
– Bad pkts
– Rate limit
– DoS attck
– ACL drop
– Conn limit
– ICMP attck
– Scanning
– SYN attck
– Inspect
– Interface
Check whether the drop rate is acceptable for the running environment.
2. Adjust the threshold rate of the particular drop to an appropriate value by using the
threat-detection rate xxx command, where xxx is one of the following:
– acl-drop
– bad-packet-drop
– conn-limit-drop
– dos-drop
– fw-drop
– icmp-drop
– inspect-drop
– interface-drop
– scanning-threat
– syn-attack
3. If the object in the message is a TCP or UDP port, an IP address, or a host drop, check whether
or not the drop rate is acceptable for the running environment.
4. Adjust the threshold rate of the particular drop to an appropriate value by using the
threat-detection rate bad-packet-drop command.
Note If you do not want the drop rate exceed warning to appear, you can disable it by using
the no threat-detection basic-threat command.
733101
Explanation The ASA detected that a specific host (or several hosts in the same 1024-node subnet)
is either scanning the network (attacking), or is being scanned (targeted).
• object—Attacker or target (a specific host or several hosts in the same 1024-node subnet)
• objectIP—The IP address of the scanning attacker or scanned target
• rate_val—A particular rate value
• total_cnt—The total count
The following two examples show how these variables occur:
%ASA-4-733101: Subnet 100.0.0.0 is targeted. Current burst rate is 200 per second, max
configured rate is 0; Current average rate is 0 per second, max configured rate is 0;
Cumulative total count is 2028.
%ASA-4-733101: Host 175.0.0.1 is attacking. Current burst rate is 200 per second, max
configured rate is 0; Current average rate is 0 per second, max configured rate is 0;
Cumulative total count is 2024
Recommended Action For the specific host or subnet, use the show threat-detection statistics host
ip-address ip-mask command to check the overall situation and then adjust the threshold rate of the
scanning threat to the appropriate value. After the appropriate value is determined, an optional
action can be taken to shun those host attackers (not subnet attacker) by configuring the
threat-detection scanning-threat shun-host command. You may specify certain hosts or object
groups in the shun-host except list. For more information, see the CLI configuration guide. If
scanning detection is not desirable, you can disable this feature by using the no threat-detection
scanning command.
733102
Explanation A host has been shunned by the threat detection engine. When the threat-detection
scanning-threat shun command is configured, the attacking hosts will be shunned by the threat
detection engine.
• %I—A particular hostname
Recommended Action To investigate whether the shunned host is an actual attacker, use the
threat-detection statistics host ip-address command. If the shunned host is not an attacker, you
can remove the shunned host from the threat detection engine by using the clear threat-detection
shun ip address command. To remove all shunned hosts from the threat detection engine, use the
clear shun command.
If you receive this message because an inappropriate threshold rate has been set to trigger the threat
detection engine, then adjust the threshold rate by using the threat-detection rate scanning-threat
rate-interval x average-rate y burst-rate z command.
733103
Explanation A host has been shunned by the threat detection engine. When you use the
clear-threat-detection shun command, the specified host will be removed from the shunned list.
• %I—A particular hostname
The following message shows how this command is implemented:
%ASA-4-733103: Threat-detection removes host 11.1.1.40 from shun list
733104
Explanation The ASA is under Syn flood attack and protected by the TCP intercept mechanism, if
the average rate for intercepted attacks exceeds the configured threshold. The message is showing
which server is under attack and where the attacks are coming from.
733105
Explanation The ASA is under Syn flood attack and protected by the TCP intercept mechanism, if
the burst rate for intercepted attacks exceeds the configured threshold. The message is showing
which server is under attack and where the attacks are coming from.
734001
Error Message %ASA-6-734001: DAP: User user, Addr ipaddr, Connection connection: The
following DAP records were selected for this connection: DAP record names
Explanation The DAP records that were selected for the connection are listed.
• user—The authenticated username
• ipaddr—The IP address of the remote client
• connection—The type of client connection, which can be one of the following:
- IPsec
- AnyConnect
- Clientless (web browser)
- Cut-Through-Proxy
- L2TP
• DAP record names—The comma-separated list of the DAP record names
734002
Error Message %ASA-5-734002: DAP: User user, Addr ipaddr: Connection terrminated by
the following DAP records: DAP record names
Explanation The DAP records that terminated the connection are listed.
• user—The authenticated username
• ipaddr—The IP address of the remote client
• DAP record names—The comma-separated list of the DAP record names
734003
Error Message %ASA-7-734003: DAP: User name, Addr ipaddr: Session Attribute: attr
name/value
Explanation The AAA and endpoint session attributes that are associated with the connection are
listed.
• user—The authenticated username
• ipaddr—The IP address of the remote client
• attr/value—The AAA or endpoint attribute name and value
734004
Recommended Action Provide the Cisco TAC with the message and information about the conditions
that generated the error.
734005
Error Message %ASA-6-734005: DAP: User user, Addr ip: Administrative Message: custom
message
735001
735002
3. If the problem persists, record the message as it appears and contact the Cisco TAC.
735003
735004
Explanation AC power has been lost, or the power supply has failed.
• var1—The device number markings
735005
735006
Explanation A power supply failure occurred. Power supply unit redundancy has been lost, but the
ASA is functioning normally with minimum resources. Any further failures will result in an ASA
shutdown.
3. If the problem persists, record the message as it appears and contact the Cisco TAC.
735007
Error Message %ASA-1-735007 IPMI: CPU var1: Temp: var2 var3, Critical
Recommended Action Record the message as it appears and contact the Cisco TAC.
735008
Error Message %ASA-1-735008 IPMI: Chassis Ambient var1: Temp: var2 var3, Critical
Recommended Action Record the message as it appears and contact the Cisco TAC.
735009
Explanation Environment monitoring has experienced a fatal error during initialization and was
unable to continue.
Recommended Action Collect the output of the show environment and debug ipmi commands.
Record the message as it appears and contact the Cisco TAC.
735010
Error Message %ASA-3-735010: IPMI: Environment Monitoring has failed to update one
or more of its records.
Explanation Environment monitoring has experienced an error that temporarily prevented it from
updating one or more of its records.
Recommended Action If this message appears repeatedly, collect the output from the show
environment driver and debug ipmi commands. Record the message as it appears and contact the
Cisco TAC.
735011
Explanation The power supply fan has returned to a working operating state.
• var1— Fan number
735012
Recommended Action Contact Cisco TAC to troubleshoot the failure. Power down the unit until this
failure is resolved.
735013
735014
Recommended Action Contact Cisco TAC to troubleshoot the failure. Power down the unit until this
failure is resolved.
735015
Explanation The CPU temperature is warmer than the normal operating range.
• var1—CPU Number
• var2—Temperature Value
• var3—Units
Recommended Action Continue to monitor this component to ensure that it does not reach a critical
temperature.
735016
Error Message %ASA-4-735016: Chassis Ambient var1: Temp: var2 var3, Warm
Explanation The chassis temperature is warmer than the normal operating range.
• var1—Chassis Sensor Number
• var2—Temperature Value
• var3—Units
Recommended Action Continue to monitor this component to ensure that it does not reach a critical
temperature.
735017
Explanation The power supply temperature has returned to a normal operating temperature.
• var1—Power Supply Number
• var2—Temperature Value
• var3—Units
735018
Error Message %ASA-4-735018: Power Supply var1: Temp: var2 var3, Critical
Recommended Action Contact Cisco TAC to troubleshoot the failure. Power down the unit until this
failure is resolved.
735019
Error Message %ASA-4-735019: Power Supply var1: Temp: var2 var3, Warm
Explanation The power supply temperature is warmer than the normal operating range.
• var1—Power Supply Number
• var2—Temperature Value
• var3—Units
Recommended Action Continue to monitor this component to ensure that it does not reach a critical
temperature.
735020
Explanation The CPU temperature has returned to the normal operating temperature.
• var1—CPU Number
• var2—Temperature Value
• var3—Units
735021
Explanation The chassis temperature has returned to the normal operating temperature.
• var1—Chassis Sensor Number
• var2—Temperature Value
• var3—Units
735022
Error Message %ASA-1-735022: CPU# is running beyond the max thermal operating
temperature and the device will be shutting down immediately to prevent permanent
damage to the CPU.
Explanation The ASA has detected a CPU running beyond the maximum thermal operating
temperature, and will shut down immediately after detection.
Recommended Action The chassis and CPU need to be inspected immediately for ventilation issues.
735023
Error Message %ASA-2-735023: ASA was previously shutdown due to the CPU complex
running beyond the maximum thermal operating temperature. The chassis needs to be
inspected immediately for ventilation issues.
Explanation At boot time, the ASA detected a shutdown that occurred because a CPU was running
beyond the maximum safe operating temperature. Using the show environment command will
indicate that this event has occurred.
Recommended Action The chassis need to be inspected immediately for ventilation issues.
735024
Explanation The IO hub temperature has returned to the normal operating temperature.
• ar1 - IO hub number
• var2 - Temperature value
• var3 – Units
735025
Recommended Action Record the message as it appears and contact the Cisco TAC.
735026
Explanation The IO hub temperature is warmer than the normal operating range.
• ar1 - IO hub number
• var2 - Temperature value
• var3 – Units
Recommended Action Continue to monitor this component to ensure that it does not reach a critical
temperature.
735027
Error Message %ASA-1-735027: CPU cpu_num Voltage Regulator is running beyond the max
thermal operating temperature and the device will be shutting down immediately.
The chassis and CPU need to be inspected immediately for ventilation issues.
Explanation The ASA has detected a CPU voltage regulator running beyond the maximum thermal
operating temperature, and shuts down immediately after detection.
• cpu_num—The number to identify which CPU voltage regulator experienced the thermal event
Recommended Action The chassis and CPU need to be inspected immediately for ventilation issues.
735028
Error Message %ASA-2-735028: ASA was previously shutdown due to a CPU Voltage
Regulator running beyond the max thermal operating temperature. The chassis and
CPU need to be inspected immediately for ventilation issues.
Explanation At boot time, the ASA detected a shutdown that occurred because of a CPU voltage
regulator running beyond the maximum safe operating temperature. Enter the show environment
command to indicate that this event has occurred.
Recommended Action The chassis and CPU need to be inspected immediately for ventilation issues.
735029
Error Message %ASA-1-735029: IO Hub is running beyond the max thermal operating
temperature and the device will be shutting down immediately to prevent permanent
damage to the circuit.
Explanation The ASA has detected that the IO hub is running beyond the maximum thermal
operating temperature, and will shut down immediately after detection.
Recommended Action The chassis and IO hub need to be inspected immediately for ventilation issues.
736001
Error Message %ASA-2-736001: Unable to allocate enough memory at boot for jumbo-frame
reservation. Jumbo-frame support has been disabled.
Explanation Insufficient memory has been detected when jumbo frame support was being
configured. As a result, jumbo-frame support was disabled.
Recommended Action Try reenabling jumbo frame support using the jumbo-frame reservation
command. Save the running configuration and reboot the ASA. If the problem persists, contact the
Cisco TAC.
737001
737002
737003
Error Message %ASA-5-737003: IPAA: DHCP configured, no viable servers found for
tunnel-group tunnel-group
Explanation The DHCP server configuration for the given tunnel group is not valid.
• tunnel-group—The tunnel group that IP address assignment is using for configuration
Recommended Action Validate the DHCP configuration for the tunnel group. Make sure that the
DHCP server is online.
737004
Error Message %ASA-5-737004: IPAA: DHCP configured, request failed for tunnel-group
'tunnel-group'
Explanation The DHCP server configuration for the given tunnel group is not valid.
• tunnel-group—The tunnel group that IP address assignment is using for configuration
Recommended Action Validate the DHCP configuration for the tunnel group. Make sure that the
DHCP server is online.
737005
737006
Error Message %ASA-6-737006: IPAA: Local pool request succeeded for tunnel-group
tunnel-group
737007
Error Message %ASA-5-737007: IPAA: Local pool request failed for tunnel-group
tunnel-group
Explanation The local pool request has failed. The pool assigned to the tunnel group may be
exhausted.
• tunnel-group—The tunnel group that IP address assignment is using for configuration
Recommended Action Validate the IP local pool configuration by using the show ip local pool
command.
737008
Explanation The tunnel group was not found when trying to acquire an IP address for configuration.
A software defect may cause this message to be generated.
• tunnel-group—The tunnel group that IP address assignment is using for configuration
Recommended Action Check the tunnel group configuration. Contact the Cisco TAC and report the
issue.
737009
Error Message %ASA-6-737009: IPAA: AAA assigned address ip-address, request failed
Explanation The remote access client software requested the use of a particular address. The request
to the AAA server to use this address failed. The address may be in use.
• ip-address—The IPv4 or IPv6 address that the client requested
Recommended Action Check the AAA server status and the status of IP local pools.
737010
Explanation The remote access client software requested the use of a particular address and
successfully received this address.
• ip-address—The IPv4 or IPv6 address that the client requested
737011
Error Message %ASA-5-737011: IPAA: AAA assigned ip-address, not permitted, retrying
Explanation The remote access client software requested the use of a particular address. The
vpn-addr-assign aaa command is not configured. An alternatively configured address assignment
method will be used.
• ip-address—The IPv4 or IPv6 address that the client requested
Recommended Action If you want to permit clients to specify their own address, enable the
vpn-addr-assign aaa command.
737012
Explanation The remote access client software request of a particular address failed.
• ip-address—The IP address that the client requested
Recommended Action If using IP local pools, validate the local pool configuration. If using AAA,
validate the configuration and status of the AAA server. If using DHCP, validate the configuration
and status of the DHCP server. Increase the logging level (use notification or informational) to
obtain additional messages to identify the reason for the failure.
737013
Error Message %ASA-4-737013: IPAA: Error freeing address ip-address, not found
Explanation The ASA tried to free an address, but it was not on the allocated list because of a recent
configuration change.
• ip-address—The IPv4 or IPv6 address to be released
Recommended Action Validate your address assignment configuration. If this message recurs, it
might be due to a software defect. Contact the Cisco TAC and report the issue.
737014
Explanation The ASA successfully released the IP address assigned through AAA.
• ip-address—The IPv4 or IPv6 address to be released
737015
Explanation The ASA successfully released the IP address assigned through DHCP.
• ip-address—The IP address to be released
737016
Explanation The ASA successfully released the IP address assigned through local pools.
• ip-address—The IPv4 or IPv6 address to be released
737017
737018
Recommended Action Validate the DHCP configuration and connectivity to the DHCP server.
737019
Explanation The ASA failed to acquire an address from the local pools configured on the group
policy or tunnel group. The local pools may be exhausted.
Recommended Action Validate the local pool configuration and status. Validate the group policy and
tunnel group configuration of local pools.
737023
Error Message %ASA-5-737023: IPAA: Unable to allocate memory to store local pool
address ip-address
Recommended Action The ASA may be overloaded and need more memory, or there may be a
memory leak caused by a software defect. Contact the Cisco TAC and report the issue.
737024
Explanation The client requested an IP address that is already in use. The request will be tried using
a new IP address.
• ip-address—The IP address that the client requested
737025
Error Message %ASA-5-737025: IPAA: Duplicate local pool address found, ip-address in
quarantine
Explanation The IP address that was to be given to the client is already in use. The IP address has
been removed from the pool and will not be reused.
• ip-address—The IP address that was acquired
Recommended Action Validate the local pool configuration; there may be an overlap caused by a
software defect. Contact the Cisco TAC and report the issue.
737026
Error Message %ASA-6-737026: IPAA: Client assigned ip-address from local pool
Explanation The client has assigned the given address from a local pool.
• ip-address—The IP address that was assigned to the client
737027
Recommended Action Contact the Cisco TAC and report the issue.
737028
Explanation The active ASA was unable to communicate with the standby ASA. The failover pair
may be out-of-sync.
• ip-address—The IP address that was assigned to the client
737029
737030
Explanation The standby ASA has the given address already in use when the active ASA attempted
to acquire it. The failover pair may be out-of-sync.
• ip-address—The IP address that was assigned to the client
737031
737032
Error Message %ASA-4-737032: IPAA: Unable to remove ip-address from standby: address
not found
Explanation The standby ASA did not have an IP address in use when the active ASA attempted to
release it. The failover pair may be out-of-sync.
• ip-address—The IP address that was assigned to the client
737033
Recommended Action Validate the AAA/DHCP/local pool address configurations. Overlap may
occur.
741000
Explanation A core dump file system was successfully created. The file system is used to manage
core dumps by capping the amount of disk space that core dumps may use.
• variable 1—The file system on which the core dumps are placed (for example, disk0:, disk1:,
and flash:)
• variable 2—The size of the created core dump file system in MB
Recommended Action Make sure that you save your configuration after creating the core dump file
system.
741001
Explanation The core dump file system has been successfully resized.
• variable 1—The file system on which the core dumps are placed
• variable 2—The size of the previous core dump file system in MB
• variable 3—The size of the current, newly resized core dump file system in MB
Recommended Action Make sure that you save your configuration after resizing the core dump file
system. Resizing the core dump file system deletes the contents of the existing core dump file
system. As a result, make sure that you archive any information before you resize the core dump file
system.
741002
Explanation All core dumps have been deleted from the core dump file system, and the core dump
log has been cleared. The core dump file system and coredump log are always synchronized with
each other.
• variable 1—The file system on which the core dumps are placed (for example, disk0:,
disk1:,and flash:)
Recommended Action None required. You can clear the core dump file system to reset it to a known
state using the clear coredump command.
741003
Explanation The core dump file system and its contents have been removed, and the core dump
feature has been disabled.
• variable 1—The file system on which the core dumps are placed (for example, disk0:,
disk1:,and flash:)
Recommended Action Make sure that you save your configuration after the core dump feature has
been disabled.
741004
Explanation The core dump configuration has been reset to its default value, which is disabled.
Recommended Action Make sure that you save your configuration after the core dump feature has
been disabled.
741005
Recommended Action Make sure that the core dump feature is disabled in the configuration, and send
the message to the Cisco TAC for further analysis.
741006
Explanation An error occurred when writing to the coredump helper configuration file. This error
occurs only if disk0: is full. The configuration file is located in disk0:.coredumpinfo/coredump.cfg.
• variable 1—This variable includes a basic file system-related string that indicates why the
writing of the core dump helper configuration file failed.
Recommended Action Disable the core dump feature, remove unneeded items from disk0:, and then
reenable core dumps, if desired.
742001
Error Message %ASA-3-742001: failed to read master key for password encryption from
persistent store
Explanation An attempt to read the master password encryption key from the nonvolatile memory
after bootup failed. Encrypted passwords in the configuration are not decrypted unless the master
key is set to the correct value using the key config-key password encryption command.
Recommended Action If there are encrypted passwords in the configuration that must be used, set the
master key to the previous value used to encrypt the password using the key config-key password
encryption command. If there are no encrypted passwords or they can be discarded, set a new
master key. If password encryption is not used, no action is required.
742002
Error Message %ASA-3-742002: failed to set master key for password encryption
Explanation An attempt to read the key config-key password encryption command failed. The error
may be caused by the following reasons:
• Configuration from a nonsecure terminal (for example, over a Telnet connection) was made.
• Failover is enabled, but it does not use an encrypted link.
• Another user is setting the key at the same time.
• When trying to change the key, the old key is incorrect.
• The key is too small to be secure.
Other reasons for the error may be valid. In these cases, the actual error is printed in response to the
command.
742003
Error Message %ASA-3-742003: failed to save master key for password encryption,
reason reason_text
Explanation An attempt to save the master key to nonvolatile memory failed. The actual reason is
specified by the reason_text parameter. The reason can be an out-of-memory condition, or the
nonvolatile store can be inconsistent.
Recommended Action If the problem persists, reformat the nonvolatile store that is used to save the
key by using the write erase command. Before performing this step, make sure that you back up the
out-of-the-box configuration. Then reenter the write erase command.
742004
Error Message %ASA-3-742004: failed to sync master key for password encryption,
reason reason_text
Explanation An attempt to synchronize the master key to the peer failed. The actual reason is
specified by the reason_text parameter.
Recommended Action Try to correct the problem specified in the reason_text parameter.
742005
Error Message %ASA-3-742005: cipher text enc_pass is not compatible with the
configured master key or the cipher text has been tampered with
Explanation An attempt to decrypt a password failed. The password may have been encrypted using
a master key that is different from the current master key, or the encrypted password has been
changed from its original form.
Recommended Action If the correct master key is not being used, correct the problem. If the encrypted
password has been modified, reapply the configuration in question with a new password.
742006
Explanation An attempt to decrypt a password failed because no memory was available. Features
using this password will not work as desired.
742007
Explanation An attempt to encrypt a password failed because no memory was available. Passwords
may be left in clear text form in the configuration.
Recommended Action Correct the memory problem, and reapply the configuration that failed
password encryption.
742008
Explanation Password decryption failed because of decoding errors, which may occur if the
encrypted password has been modified after being encrypted.
Recommended Action Reapply the configuration in question with a clear text password.
742009
Explanation Password encryption failed because of decoding errors, which may be an internal
software error.
Recommended Action Reapply the configuration in question with a clear text password. If the
problem persists, contact the Cisco TAC.
742010
Explanation The encrypted password provided in the command is not well formed. The password
may not be a valid, encrypted password, or it may have been modified since it was encrypted.
• reason_text—A string that represents the actual cause of the failure
• enc_pass—The encrypted password that is related to the issue
Recommended Action Reapply the configuration in question with a clear text password.
743000
Error Message %ASA-1-743000: The PCI device with vendor ID: vendor_id device ID:
device_id located at bus:device.function bus_num:dev_num, func_num has a link
link_attr_name of actual_link_attr_val when it should have a link link_attr_name
of expected_link_attr_val.
Explanation A PCI device in the system is not configured correctly, which may result in the system
not performing at its optimum level.
Recommended Action Collect the output of the show controller pci detail command, and contact the
Cisco TAC.
743001
Explanation A hardware failure has probably occurred and has been detected on one of the links
between the ASA Services Module and the switch chassis.
743002
Explanation A link has been restored between the ASA Services Module and the switch chassis.
However, the failure and subsequent recovery probably indicates a hardware failure.
743004
Error Message %ASA-1-743004: System is not fully operational - PCI device with vendor
ID vendor_id (vendor_name), device ID device_id (device_name) not found
Explanation A PCI device in the system that is needed for it to be fully operational was not found.
• vendor_id—Hexadecimal value that identifies the device vendor
• vendor_name—Text string that identifies the vendor name
• device_id—Hexadecimal value that identifies the vendor device
• device_name—Text string that identifies the device name
Recommended Action Collect the output of the show controller pci detail command and contact the
Cisco TAC.
743010
Error Message %ASA-3-743010: EOBC RPC server failed to start for client module client
name.
Explanation The service failed to start for a particular client of the EOBC RPC service on the server.
743011
Error Message %ASA-3-743011: EOBC RPC call failed, return code code string.
Explanation The EOBC RPC client failed to make an RPC to the intended server.
746001
746002
746003
Explanation A database (user groups, hostnames, or IP addresses) download has failed because of a
timeout.
Recommended Action Check the off-box AD agent status. If the AD agent is down, resolve that issue
first. If the AD agent is up and running, try to download the database again. If the problem persists,
contact the Cisco TAC.
746004
Error Message %ASA-4-746004: user identity: Total number of activated user groups
exceeds the max_groups groups for this platform.
Explanation The total number of activated user groups exceeds the maximum number of 256 user
groups for this platform.
Recommended Action Too many user groups have been configured and activated. Reduce the number
of configured user groups. Run the clear user-identity user no-policy-activated command to
release user records that have not been activated in any policy. Run the show user-identity user all
command to check the total number of users in the database.
746005
Explanation The ASA cannot reach the AD agent. There has been no response from the AD agent,
or the RADIUS registration failed because the buffer was too small.
Recommended Action Check the network connection between the AD agent and the ASA. Try to
reach another AD agent, if one is configured and available. If the problem persists, contact the Cisco
TAC.
746006
Error Message %ASA-4-746006: user-identity: Out of sync with AD Agent, start bulk
download
Explanation The AD agent cannot update the IP-user mapping events on the ASA and the AD agent
event log overflows, which causes inconsistency between the AD agent and the ASA IP-user
database.
Recommended Action None required. If this message persists, check the connection between the AD
agent and the ASA.
746007
Explanation No NetBIOS response was received for the number of retries made.
746008
746009
746010
Explanation Entering the user-identity update import-user username command failed to update a
user element. Reasons for failure include the following: timeout, partial update, import aborted,
group does not exist, or no reason given.
Recommended Action If the reason for failure does not exist, verify that the group name is correct in
the policy. Otherwise, check the connectivity between the ASA and the AD server.
746011
Error Message %ASA-4-746011: Total number of users created exceeds the maximum number
of max_users for this platform.
Explanation The AD group has more than the hard-coded maximum number (64000) of levels. Too
many users have been configured in the activated policy.
Recommended Action Change your policies so that the number of configured users and users under
configured groups does not exceed the limit.
746012
Explanation A new user-IP mapping has been added to the user-to-IP address mapping database. The
status of the operation (success or failure) is indicated. The success reason is VPN user. The failure
reasons include the following: Maximum user limit reached and Duplicated address.
746013
Explanation A change has been made to the user-to-IP address mapping database. The status of the
operation (success or failure) is indicated. The success reasons include the following: Inactive
timeout, NetBIOS probing failed, PIP notification, VPN user logout, Cut-through-proxy user logout,
and MAC address mismatch. The failure reason is PIP notification.
746014
746015
746016
Explanation A DNS lookup has failed. Failure reasons include timeout, unresolvable, and no
memory.
Recommended Action Verify that the FQDN is valid, and that the DNS server is reachable from the
ASA. If the problem persists, contact the Cisco TAC.
746017
746018
Explanation The user-identity update import-user command has been issued, and the import has
been completed successfully.
746019
Explanation The ASA failed to update or remove an IP-user mapping on the AD agent.
Recommended Action Check the status of the AD agent and the connectivity between the ASA and
the AD agent. If the problem persists, contact the Cisco TAC.
747001
Error Message %ASA-3-747001: Clustering: Recovered from state machine event queue
depleted. Event (event-id, ptr-in-hex, ptr-in-hex) dropped. Current state
state-name, stack ptr-in-hex, ptr-in-hex, ptr-in-hex, ptr-in-hex, ptr-in-hex,
ptr-in-hex
Explanation The cluster FSM event queue is full, and a new event has been dropped.
747002
Error Message %ASA-5-747002: Clustering: Recovered from state machine dropped event
(event-id, ptr-in-hex, ptr-in-hex). Intended state: state-name. Current state:
state-name.
Explanation The cluster FSM received an event that is incompatible with the current state.
747003
Explanation The cluster FSM failed to process an event for all reasons given.
747004
Error Message %ASA-6-747004: Clustering: state machine changed from state state-name
to state-name.
747005
747006
Explanation The cluster FSM moved to a stable state; that is, Disabled, Slave, or Master.
747007
Error Message %ASA-5-747007: Clustering: Recovered from finding stray config sync
thread, stack ptr-in-hex, ptr-in-hex, ptr-in-hex, ptr-in-hex, ptr-in-hex,
ptr-in-hex.
747008
Error Message %ASA-4-747008: Clustering: New cluster member name with serial number
serial-number-A rejected due to name conflict with existing unit with serial
number serial-number-B.
Explanation The same unit name has been configured on multiple units.
747009
Error Message %ASA-2-747009: Clustering: Fatal error due to failure to create RPC
server for module module name.
Recommended Action Disable clustering on this unit and try to re-enable it. Contact the Cisco TAC if
the problem persists.
747010
Explanation An RPC call failure has occurred. The system tries to recover from the failure.
747011
Recommended Action Disable clustering on this unit and try to re-enable it. If the problem persists,
check the memory usage on the ASA.
747012
747013
747014
747015
Error Message %ASA-4-747015: Clustering: Forcing stray member unit-name to leave the
cluster.
747016
Error Message %ASA-4-747016: Clustering: Found a split cluster with both unit-name-A
and unit-name-B as master units. Master role retained by unit-name-A, unit-name-B
will leave, then join as a slave.
747017
Explanation The ASA failed to enroll a new unit because the maximum member limit has been
reached.
747018
747019
Error Message %ASA-4-747019: Clustering: New cluster member name rejected due to
Cluster Control Link IP subnet mismatch (ip-address/ip-mask on new unit,
ip-address/ip-mask on local unit).
Explanation The master unit found that a new joining unit has an incompatible cluster interface IP
address.
747020
Error Message %ASA-4-747020: Clustering: New cluster member unit-name rejected due
to encryption license mismatch.
Explanation The master unit found that a new joining unit has an incompatible encryption license.
747021
Explanation The master unit has disabled clustering because of an interface health check failure.
747022
Error Message %ASA-3-747022: Clustering: Asking slave unit unit-name to quit because
it failed interface health check x times, rejoin will be attempted after y min.
Failed interface: interface-name.
Explanation This syslog message occurs when the maximum number of rejoin attempts has not been
exceeded. A slave unit has disabled clustering because of an interface health check failure for the
specified amount of time. This unit will re-enable itself automatically after the specified amount of
time (ms).
747023
Explanation The master unit has disabled clustering because of a Security Service Card health check
failure.
747024
Error Message %ASA-3-747024: Clustering: Asking slave unit unit-name to quit due to
card name card health check failure, and its Security Service Card state is
state-name.
Explanation A slave unit has disabled clustering because of a Security Service Card health check
failure.
747025
Error Message %ASA-4-747025: Clustering: New cluster member unit-name rejected due
to firewall mode mismatch.
Explanation A master unit found a joining unit that has an incompatible firewall mode.
747026
Error Message %ASA-4-747026: Clustering: New cluster member unit-name rejected due
to cluster interface name mismatch (ifc-name on new unit, ifc-name on local unit).
Explanation A master unit found a joining unit that has an incompatible cluster control link interface
name.
747027
Explanation A master unit could not enroll a joining unit because of the size limit of the minimal
cluster pool configured.
747028
Error Message %ASA-4-747028: Clustering: New cluster member unit-name rejected due
to interface mode mismatch (mode-name on new unit, mode-name on local unit).
Explanation A master unit found a joining unit that has an incompatible interface-mode, either
spanned or individual.
747029
747030
Error Message %ASA-3-747030: Clustering: Asking slave unit unit-name to quit because
it failed interface health check x times (last failure on interface-name),
Clustering must be manually enabled on the unit to re-join.
Explanation An interface health check has failed and the maximum number of rejoin attempts has
been exceeded. A slave unit has disabled clustering because of an interface health check failure.
747031
Explanation The joining unit's platform type does not match with that of the cluster master.
• unit-name—Name of the unit in the cluster bootstrap
• platform-type—Type of ASA platform
Recommended Action Make sure that the joining unit has the same platform type as that of the cluster
master.
747032
Explanation The joining unit's external modules are not consistent (module type and order in which
they are installed) with those on the cluster master.
• module-name—Name of the external module
• unit-name—Name of the unit in the cluster bootstrap
• slot-number—The number of the slot in which the mismatch occurred
Recommended Action Make sure that the modules installed on the joining unit are of the same type
and are in the same order as they are in the cluster master.
747033
Explanation The joining unit's interfaces are not the same as those on the cluster master.
• unit-name—Name of the unit in the cluster bootstrap
Recommended Action Make sure that the interfaces available on the joining unit are the same as those
on the cluster master.
750001
Error Message %ASA-5-750001: Local:local IP:local port Remote:remote IP: remote port
Username: username Received request to request an IPsec tunnel; local traffic
selector = local selectors: range, protocol, port range; remote traffic selector
= remote selectors: range, protocol, port range
Explanation A request is being made for an operation on the IPsec tunnel such as a rekey, a request
to establish a connection, and so on.
• local IP:local port— Local IP address for this request. The ASA IP address and port number
used for this connection
• remote IP:remote port— Remote IP address for this request. Peer IP address and port number
that the connection is coming from
• username—Username of the requester for remote access, if known, or the tunnel group
• local selectors—Locally configured traffic selectors or proxies that are being used for this IPsec
tunnel
• remote selectors—Remote peers requested traffic selectors or proxies for this IPsec tunnel
750002
Error Message %ASA-5-750002: Local:local IP:local port Remote: remote IP: remote
port Username: username Received a IKE_INIT_SA request
Explanation An incoming tunnel or SA initiation request (IKE_INIT_SA request) has been received.
• local IP:local port— Local IP address for this request. The ASA IP address and port number
used for this connection
• remote IP:remote port— Remote IP address for this request. Peer IP address and port number
that the connection is coming from
• username—Username of the requester for remote access, if known, or the tunnel group
750003
Error Message %ASA-4-750003: Local: local IP:local port Remote: remote IP:remote
port Username: username Negotiation aborted due to ERROR: error
Explanation The negotiation of an SA was aborted because of the provided error reason.
• local IP:local port— Local IP address for this request. The ASA IP address and port number
used for this connection
• remote IP:remote port— Remote IP address for this request. Peer IP address and port number
that the connection is coming from
• username—Username of the requester for remote access, if known yet
• error—Error reason for aborting the negotiation
Recommended Action Review the syslog and follow the flow of the logs to determine if this syslog is
the final in the exchange and if it is the cause of a potential failure or a transient error that was
renegotiated through. For example, a peer may suggest a DH group via the KE payload that is not
configured that causes an initial request to fail, but the correct DH group is communicated so that
the peer can come back with the correct group in a new request.
750004
Error Message %ASA-5-750004: Local: local IP: local port Remote: remote IP: remote
port Username: username Sending COOKIE challenge to throttle possible DoS
Explanation An incoming connection request was challenged with a cookie based on the cookie
challenge thresholds that are configured to prevent a possible DoS attack.
• local IP:local port— Local IP address for this request. The ASA IP address and port number
used for this connection
• remote IP:remote port— Remote IP address for this request. Peer IP address and port number
that the connection is coming from
• username—Username of the requester for remote access, if known yet
750005
Error Message %ASA-5-750005: Local: local IP: local port Remote: remote IP: remote
port Username: username IPsec rekey collision detected. I am lowest nonce
initiator, deleting SA with inbound SPI SPI
Explanation A rekey collision was detected (both peers trying to initiate a rekey at the same time),
and it was resolved by keeping the one initiated by this ASA because it had the lowest nonce. This
action caused the indicated SA referenced by the SPI to be deleted.
• local IP:local port— Local IP address for this request. The ASA IP address and port number
used for this connection
• remote IP:remote port— Remote IP address for this request. Peer IP address and port number
that the connection is coming from
• username—Username of the requester for remote access, if known yet
• SPI—SPI handle of the SA being deleted by resolving the rekey collision that was detected
750006
Error Message %ASA-5-750006: Local: local IP: local port Remote: remote IP: remote
port Username: username SA UP. Reason: reason
Explanation An SA came up for the given reason, such as for a newly established connection or a
rekey.
• local IP:local port— Local IP address for this request. The ASA IP address and port number
used for this connection
• remote IP:remote port— Remote IP address for this request. Peer IP address and port number
that the connection is coming from
750007
Error Message %ASA-5-750007: Local: local IP: local port Remote: remote IP: remote
port Username: username SA DOWN. Reason: reason
Explanation An SA was torn down or deleted for the given reason, such as a request by the peer,
operator request (via an administrator action), rekey, and so on.
• local IP:local port— Local IP address for this request. The ASA IP address and port number
used for this connection
• remote IP:remote port— Remote IP address for this request. Peer IP address and port number
that the connection is coming from
• username—Username of the requester for remote access, if known yet
• reason—Reason that the SA came into the DOWN state
750008
Error Message %ASA-5-750008: Local: local IP: local port Remote: remote IP: remote
port Username: username SA rejected due to system resource low
Recommended Action Check CAC settings for IKEv2 to determine if this is expected behavior based
on configured thresholds; otherwise, if the condition persists, investigate further to alleviate the
issue.
750009
Error Message %ASA-5-750009: Local: local IP: local port Remote: remote IP: remote
port Username: username SA request rejected due to CAC limit reached: Rejection
reason: reason
Explanation A Connection Admission Control (CAC) limiting threshold was reached, which caused
the SA request to be rejected.
• local IP:local port— Local IP address for this request. The ASA IP address and port number
used for this connection
• remote IP:remote port— Remote IP address for this request. Peer IP address and port number
that the connection is coming from
• username—Username of the requester for remote access, if known yet
• reason—Reason that the SA was rejected
Recommended Action Check CAC settings for IKEv2 to determine if this is expected behavior based
on configured thresholds; otherwise, if the condition persists, investigate further to alleviate the
issue.
750010
Explanation The ASA overflowed its throttle request queue to the specified peer, indicating that the
peer is slow. The throttle request queue holds requests destined for the peer, which cannot be sent
immediately because the maximum number of requests allowed to be in-flight based on the IKEv2
window size were already in-flight. As in-flight requests are completed, requests are pulled off of
the throttle request queue and sent to the peer. If the peer is not processing these requests quickly,
the throttle queue backs up.
Recommended Action If possible, increase the IKEv2 window size on the remote peer to allow more
concurrent requests to be in-flight, which may improve performance.
Note The ASA does not currently support an increased IKEv2 window size setting.
750011
Explanation The tunnel was rejected because the selected IKEv2 encryption algorithm is not strong
enough to secure the proposed IPSEC encryption algorithm.
Recommended Action Configure a stronger IKEv2 encryption algorithm to match or exceed the
strength of the IPsec child SA encryption algorithm.
750012
Error Message %ASA-4-750012: Selected IKEv2 encryption algorithm (IKEV2 encry algo)
is not strong enough to secure proposed IPSEC encryption algorithm (IPSEC encry
algo).
Explanation The selected IKEv2 encryption algorithm is not strong enough to secure the proposed
IPSEC encryption algorithm.
Recommended Action Configure a stronger IKEv2 encryption algorithm to match or exceed the
strength of the IPsec child SA encryption algorithm.
751001
Recommended Action A low memory issue or other internal error that should be resolved has
occurred. If it persists, use the memory tracking tool to isolate the issue.
751002
Explanation The ASA was unable to find any type of authentication information in the tunnel group
that it could use to authenticate itself to the peer.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
• group—The name of the tunnel group
Recommended Action Check the tunnel group configuration, and configure a preshared key or
certificate for self-authentication in the indicated tunnel group.
751003
Explanation Dead peer detection needs to be performed for the specified peer to determine if it is
still alive. The ASA may have terminated a connection to the peer.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
751004
Explanation A method to authenticate the remote peer was not found in the configuration to allow
the connection.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
Recommended Action Check the configuration to make sure that a valid remote peer authentication
setting is present.
751005
Explanation A failure occurred during an AnyConnect client reconnection attempt using the session
token.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
• sessionID—The session ID used to try to reconnect
• error—The error string to indicate the specific error that occurred during the reconnection
attempt
Recommended Action Take action according to the error specified, if necessary. The error may
indicate that a session was removed instead of remaining in resume state because a client disconnect
was detected or sessions were cleared on the ASA. If necessary, also compare this message to the
event logs on the Anyconnect client.
751006
Recommended Action Take action according to the error specified, if necessary. Check the certificate
trustpoint configuration and make sure that the necessary CA certificate exists to be able to correctly
verify client certificate chains. Use the debug crypto ca commands to isolate the failure.
751007
Explanation A configured attribute could not be applied to the IKE version 2 connection because it
is not supported for IKE version 2 connections.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
• attribute—The attribute that is configured to be applied
Recommended Action None required, To eliminate this message from being generated, you can
remove the IKE version 2 configuration setting.
751008
Explanation IKE version 2 is not allowed based on the enabled protocols for the indicated group to
which a connection attempt was mapped, and the connection was rejected.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
• group—The tunnel group used for connection
Recommended Action Check the group policy VPN tunnel protocol setting and enable IKE version 2,
if desired.
751009
Recommended Action Check the configuration and tunnel group mapping rules, then configure them
to allow the peer to land on a configured group.
751010
Explanation A method for authenticating the ASA to the peer could not be found in either the tunnel
group or crypto map.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
Recommended Action Check the configuration, and configure a self-authentication method in the
crypto map for the initiator L2L or in the applicable tunnel group.
751011
Explanation A failure occured during user authentication within EAP for an IKE version 2 remote
access connection.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
• error—The error string that indicates the specific error
Recommended Action Make sure that the correct authentication credentials were provided and debug
further to determine the exact cause of failure, if necessary.
751012
Explanation A failure occurred during configuration mode processing while settings were being
applied to the connection.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
Recommended Action Take action based on the indicated error. Use the debug crypto ikev2
commands to determine the cause of the failure, or debug the indicated subsystem that is specified
by the error, if necessary.
751013
Explanation The Configuration Payload request failed to process and generate a Configuration
Payload response for an attribute that was requested by the peer.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
• attribute ID— The attribute ID on which the failure occurred
• error—The error string that indicates the specific error
Recommended Action A memory error, configuration error, or another type of error has occurred. Use
the debug crypto ikev2 commands to help isolate the cause of the failure.
751014
Recommended Action Take action based on the attribute indicated in the warning and the indicated
warning message. For example, a newer client is being used with an older ASA image, which does
not understand a new attribute that has been added to the client. An upgrade of the ASA image may
be necessary to allow the attribute to be processed.
751015
Explanation The connection was rejected by the call admission control to protect the ASA based on
configured thresholds or conditions indicated by the reason listed.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
• reason—The reason that the SA request was rejected
Recommended Action Check the reason and resolve the condition if a new connection should have
been accepted or change the configured thresholds.
751016
Explanation The peer may be configured for originate-only connections based on the received outer
and inner IP addresses for the tunnel.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
751017
Explanation An error in the configuration that prevented the connection has been detected.
• localIP:port—The local IP address and port number
• remoteIP:port—The remote IP address and port number
• username/group—The username or group associated with this connection attempt
• error description—A brief description of the configuration error
751018
Error Message %ASA-3-751018: Terminating the VPN connection attempt from attempted
group. Reason: This connection is group locked to locked group.
Explanation The tunnel group over which the connection is attempted is not the same as the tunnel
group set in the group lock.
• attempted group—The tunnel group over which the connection came in
• locked group—The tunnel group that the connection is locked or restricted to
Recommended Action Check the group-lock value in the group policy or the user attributes.
751019
Explanation A session creation failed because the maximum license limit was exceeded, which
caused a failure to either initiate or respond to a tunnel request.
• LocalAddr—Local address for this connection attempt
• RemoteAddr—Remote peer address for this connection attempt
• username—Username for the peer attempting the connection
• licenseType— License type that was exceeded (other VPN or AnyConnect Premium/Essentials)
• limit—Number of licenses allowed and was exceeded
Recommended Action Make sure that enough licenses are available for all allowed users and/or obtain
more licenses to allow the rejected connections. For multiple context mode, allow more licenses for
the context that reported the failure, if necessary.
751020
Explanation An IKEv2 remote access tunnel could not be created because of an NSA Suite B ASA
license restriction, or an AnyConnect Premium license was applied but explicitly disabled with the
anyconnect-essentials command in the webvpn configuration mode.
Recommended Action Make sure that either an AnyConnect Premium license is installed on the ASA
or that no NSA Suite B crypto algorithms are configured in the remote access IKEv2 policies or
IPsec proposals.
751021
Explanation An out-of-date AnyConnect client tried to connect to an ASA that has IKEv2 with
AES-GCM encryption policy configured.
• variable 1—Local IP address
• variable 2—Local port
• variable 3—Remote client IP address
• variable 4—Remote client port
• variable 5—Username of the AnyConnect client (may be unknown because this occurs before
the user enters a username)
• variable 6—Connection protocol type (IKEv1, IKEv2)
• variable 7—Combined mode encryption type (AES-GCM, AES-GCM 256)
Recommended Action Upgrade the AnyConnect client to the latest version to use IKEv2 with
AES-GCM encryption.
751022
Explanation The ASA was not able to find security policy information for the private networks or
hosts indicated in the message. These networks or hosts were sent by the initiator and do not match
any crypto ACLs at the ASA. This is most likely a misconfiguration.
• local-ip—Local peer IP address
• remote-ip—Remote peer IP address
• username—Username of the requester for remote access, if known yet
• rem-ts-start—Remote traffic selector start address
• rem-ts-end—Remote traffic selector end address
• rem-ts.startport—Remote traffic selector start port
• rem-ts.endport—Remote traffic selector end port
• rem-ts.protocol—Remote traffic selector protocol
• local-ts-start—Local traffic selector start address
• local-ts-end—Local traffic selector end address
• local-ts.startport—Local traffic selector start port
Recommended Action Check the protected network configuration in the crypto ACLs on both sides
and make sure that the local network on the initiator is the remote network on the responder and
vice-versa. Pay special attention to wildcard masks and host addresses as compared to network
addresses. Non-Cisco implementations may have the private addresses labeled as proxy addresses
or “red” networks.
751023
Error Message %ASA-6-751023: Local a:p Remote: a:p Username:n Unknown client
connection
751024
Explanation The IPv6 VPN filter has been deprecated and if it is configured instead of a unified filter
for IPv6 traffic access control, the connection will be terminated.
Recommended Action Configure a unified filter with IPv6 entries to control IPv6 traffic for the user.
752001
Explanation A failure to remove a record from the tunnel manager that might prevent future tunnels
to the same peer from initiating has occurred.
Recommended Action Reloading the device will remove the record, but if the error persists or recurs,
perform additional debugging of the specific tunnel attempt.
752002
Error Message %ASA-7-752002: Tunnel Manager Removed entry. Map Tag = mapTag. Map
Sequence Number = mapSeq.
752003
Explanation An attempt is being made to initiate an IKEv2 tunnel that was based on the crypto map
indicated.
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
752004
Explanation An attempt is being made to initiate an IKEv1 tunnel that was based on the crypto map
indicated.
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
752005
Explanation An attempt to dispatch a tunnel initiation attempt failed because of an internal error,
such as a memory allocation failure.
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
Recommended Action Use the memory tracking tools and additional debugging to isolate the issue.
752006
Explanation An attempt to dispatch a tunnel initiation attempt failed because of a configuration error
of the indicated crypto map or associated tunnel group.
• Tag—Name of the crypto map for which the initiation entry was removed
• num—Sequence number of the crypto map for which the initiation entry was removed
• address—The source IP address or destination IP address
• port—The source port number or destination port number
Recommended Action Check the configuration of the tunnel group and crypto map indicated to make
sure that it is complete.
752007
Explanation An attempt was made to re-add an existing entry into the tunnel manager.
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
Recommended Action If the issue persists, make sure that the configuration of the peer will allow the
tunnel, and debug further to make sure that the tunnel manager entries are being added and removed
correctly during tunnel initiation and successful or failed initiation attempts. Debug IKE version 2
or IKE version 1 connections further, because they may still be in the process of creating the tunnel.
752008
Explanation A duplicate request to initiate a tunnel was made, and the tunnel manager is already
attempting to initiate the tunnel.
Recommended Action None required. If the issue persists, either IKE version 1 or IKE version 2 may
have attempted a tunnel initiation and not have timed out yet. Debug further using the applicable
commands to make sure that the tunnel manager entry is removed after successful or failed initiation
attempts.
752009
Explanation An attempt to initiate a tunnel with IKE version 2 failed because the crypto map is
configured with multiple peers, which is not supported for IKE version 2. Only IKE version 1
supports multiple peers.
Recommended Action Check the configuration to make sure that multiple peers are not expected for
IKE version 2 site-to-site initiation.
752010
Explanation No IPsec proposal was found to be able to initiate an IKE version 2 tunnel .
Recommended Action Check the configuration, then configure an IKE version 2 proposal that can be
used to initiate the tunnel, if necessary.
752011
Explanation No IKE version 1 transform set was found to be able to initiate an IKE version 2 tunnel.
Recommended Action Check the configuration, then configure an IKE version 2 transform set that can
be used to initiate the tunnel, if necessary.
752012
Explanation The indicated protocol failed to initiate a tunnel using the configured crypto map.
• protocol—IKE version number 1 or 2 for IKEv1 or IKEv2
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
Recommended Action Check the configuration, then debug further within the indicated protocol to
determine the cause of the failed tunnel attempt.
752013
Explanation The tunnel manager is attempting to initiate the tunnel again after it failed.
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
Recommended Action Check the configuration, and make sure that the crypto maps are correctly
configured. Then determine if the tunnel is successfully created on the second attempt.
752014
Explanation The tunnel manager is falling back and attempting to initiate the tunnel using IKE
version 1 after the tunnel failed.
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
Recommended Action Check the configuration, and make sure that the crypto maps are correctly
configured. Then determine if the tunnel is successfully created on the second attempt.
752015
Error Message %ASA-3-752015: Tunnel Manager has failed to establish an L2L SA. All
configured IKE versions failed to establish the tunnel. Map Tag = mapTag. Map
Sequence Number = mapSeq.
Explanation An attempt to bring up an L2L tunnel to a peer failed after trying with all configured
protocols.
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
Recommended Action Check the configuration, and make sure that the crypto maps are correctly
configured. Debug the individual protocols to isolate the cause of the failure.
752016
Explanation The indicated protocol (IKE version 1 or IKE version 2) successfully created an L2L
tunnel.
• protocol—IKE version number 1 or 2 for IKEv1 or IKEv2
• mapTag—Name of the crypto map for which the initiation entry was removed
• mapSeq—Sequence number of the crypto map for which the initiation entry was removed
752017
Error Message %ASA-4-752017: IKEv2 Backup L2L tunnel initiation denied on interface
interface matching crypto map name, sequence number number. Unsupported
configuration.
Explanation The ASA uses IKEv1 to initiate the connection because IKEv2 does not support the
backup L2L feature.
Recommended Action None required if IKEv1 is enabled. You must enable IKEv1 to use the backup
L2L feature.
766001
Explanation An error occurred while using this configured source IP address to set up an SXP
connection.
• source ip—IPv4 or IPv6 source address
• error—Detailed message regarding what type of error occurs while using the configured
address to set up the SXP connection, which can be one of the following:
- Does not belong to this device.
- Does not match outbound interface IP address.
Recommended Action Reconfigure the SXP connection to have a valid source IP address.
Alternatively, unconfigure the source IP address and let the device select the correct source IP
address based on a route lookup.
766002
Error Message %ASA-3-766002: CTS SXP: Invalid message from peer peer IP: error
766003
Error Message %ASA-3-766003: CTS SXP: Connection with peer peer IP failed: error
Explanation An SXP configuration error occurred. The connection cannot be set up correctly.
• peer IP—IPv4 or IPv6 peer address
• error— Description of SXP configuration problem. The error can be one of the following
values:
- Mode mismatch with received one.
- Does not exist.
- With the same peer, but different source IP address exists.
- Version mismatch with received one.
- Received binding update while in speaker mode.
Recommended Action Make sure that the connection configurations on both ends have the correct
mode and IP addresses.
766004
Error Message %ASA-3-766004: CTS SXP: Fail to start listening socket after TCP
process restart.
Explanation The SXP on this device cannot accept SXP connection setup requests from remote
devices, because it cannot update the binding manager.
Recommended Action Disable and reenable the SXP feature to see if the listening socket can be
restarted.
766005
Error Message %ASA-3-766005: CTS SXP: Binding Binding IP - SGname(SGT) from peer IP
instance connection instance num error.
766006
766007
Error Message %ASA-3-766007: CTS SXP: Connection with peer peer IP (instance
connection instance num) state changed from original state to Off.
Explanation The CTS SXP system encountered an internal failure, because the SXP connection with
the specified instance number changed its state to off.
• peer IP—IPv4 or IPv6 peer address
• connection instance num—SXP connection instance number
• original state—Original connection state
766008
Error Message %ASA-6-766008: CTS SXP: Connection with peer IP (instance connection
instance num) state changed from original state to final state.
Explanation The SXP connection with the specified instance number changed state.
• peer IP—IPv4 or IPv6 peer address
• source IP—IPv4 or IPv6 source address
• connection instance num—SXP connection instance number
• original state—Original connection state
• final state—Final connection state, which can be any state except the Off state.
766009
766010
Error Message %ASA-5-766010: CTS SXP: SXP default source IP is changed original
source IP final source IP.
Explanation The SXP default source IP address has been changed on this device.
• original source IP—IPv4 or IPv6 original default source IP address
766011
Explanation The SXP feature has changed operational state and works only when the feature is
enabled.
• operational state—Flags the state whether CTS SXP is enabled or disabled.
766012
Error Message %ASA-7-766012: CTS SXP: timer name timer started for connection with
peer peer IP.
766013
Error Message %ASA-7-766013: CTS SXP: timer name timer stopped for connection with
peer peer IP.
766014
Error Message %ASA-7-766014: CTS SXP: SXP received binding forwarding request
(action) binding binding IP - SGname(SGT).
Explanation The SXP received a binding forwarding request. The request comes from the binding
manager when it wants SXP to broadcast the latest net binding changes within the binding manager.
• action—Add or delete operation
• binding IP—IPv4 or IPv6 binding address
• SGname (SGT)—Binding SGT information. Has the following format if SGname is available:
SGname (SGT) and the following format if SGname is unavailable: SGT.
766015
766016
Error Message %ASA-7-766016: CTS SXP: Binding binding IP - SGName(SGT) from peer peer
IP (instance binding's connection instance num) changed from old instance: old
instance num, old sgt: old SGName(SGT).
• old SGName (SGT)—Binding old SGT information. Has the following format if SGname is
available: SGname (SGT) and the following format if SGname is unavailable: SGT.
766017
Error Message %ASA-7-766017: CTS SXP: Binding binding IP - SGname(SGT) from peer peer
IP (instance connection instance num) deleted in SXP database.
766018
Error Message %ASA-7-766018: CTS SXP: Binding binding IP - SGname(SGT) from peer peer
IP (instance connection instance num) added in SXP database.
766019
Error Message %ASA-7-766019: CTS SXP: Binding binding IP - SGname(SGT) action taken.
Update binding manager.
Explanation The SXP updated the binding manager with the binding change.
• binding IP—IPv4 or IPv6 binding address
• SGname (SGT)—Binding SGT information. Has the following format if SGname is available:
SGname (SGT) and the following format if SGname is unavailable: SGT.
• action taken—Action taken, which can be one of the following: added, deleted, or changed.
766020
Error Message %ASA-3-766020: CTS SXP: Unable to locate egress interface to peer peer
IP.
Explanation The ASA cannot locate the egress interface to the SXP peer.
• binding IP—IPv4 or IPv6 address
Recommended Action Make sure that the SXP peer is routable from the device.
766201
Error Message %ASA-4-766201: CTS PAC: CTS PAC for Server IP_address, A-ID PAC issuer
name will expire in number days
766202
Error Message %ASA-3-766202: CTS PAC for Server IP_address, A-ID PAC issuer name has
expired
766203
Error Message %ASA-3-766203: Unable to retrieve CTS Environment data due to: reason
Explanation The ASA was unable to retrieve the CTS environment data and SGT name table for one
of the following reasons:
– PAC has expired
– PAC data not available
– Error response from ISE
– Unable to retrieve server secret from the PAC
– Database error
– Invalid SG info value received
– Unable to add SG tag to database
– Error closing database
– Database update aborted
Recommended Action If this message persists, contact the Cisco TAC for assistance.
766204
Explanation The CTS environmentThe CTS environment data and SGT name table have expired,
which is likely to occur after unresolved environment data retrieval failures have occurred.
Recommended Action If this message persists, contact the Cisco TAC for assistance.
766251
Explanation Binding from the specified source was added to the binding manager.
• binding IP—IPv4 or IPv6 binding address
• SGname (SGT)—Binding SGT information. Has the following format if SGname is available:
SGname (SGT) and the following format if SGname is unavailable: SGT.
• source name—Name of the contributing source. Currently, SXP is the only contributing source.
766252
Explanation Binding from the specified source was deleted from the binding manager.
Explanation Binding from the specified source was added to the binding manager.
• binding IP—IPv4 or IPv6 binding address
• SGname (SGT)—Binding SGT information. Has the following format if SGname is available:
SGname (SGT) and the following format if SGname is unavailable: SGT.
• source name—Name of the contributing source. Currently, SXP is the only contributing source.
766253
Error Message %ASA-6-766253: CTS SGT-MAP: Binding binding IP - new SGname(SGT) from
new source name changed from old sgt: old SGname(SGT) from old source old source
name.
766254
Error Message %ASA-3-766254: CTS SGT-MAP: Binding manager unable to action binding
binding IP - SGname(SGT) from source name.
Explanation The binding manager cannot insert, delete, or update the binding
• action—Binding manager operation. Either insert, delete or update.
• binding IP—IPv4 or IPv6 binding address
• SGname (SGT)—Binding SGT information. Has the following format if SGname is available:
SGname (SGT) and the following format if SGname is unavailable: SGT.
• source name—Name of the contributing source. Currently, SXP is the only contributing source.
766301
Explanation The security group tag referenced in the policy is known and the lookup in the security
group table is successful. As a result, the tag name mapping is derived.
• sgt—Security group tag referenced in the policy
• sgname—Security group name mapping derived from the table
766302
Error Message %ASA-7-766302: CTS Policy: Unknown security-group tag sgt referenced
in policies
Explanation The security group tag referenced in the policy was unknown and the lookup in the
security group table failed. However, the policy referencing the tag can still be enforced.
• sgt—Security group tag referenced in the policy
Recommended Action Check to see if the security group tag exists in the ISE. If the tag exists, it will
become known after the next refresh. If the tag does not exist in the ISE, consider removing all
associated policies on the ASA.
766303
Explanation The securitygroup name referenced in the policy was resolved and the lookup in the
security group table was successful. As a result, the tag derived from the table is used for policy
enforcement.
• sgname—Security group name referenced in the policy
• sgt—Security group tag mapping derived from the table
766304
Explanation The securitygroup name referenced in the policy cannot be resolved to a tag and the
lookup in the security group table failed. AS a result, the policy referencing the name is inactive, but
remains in the configuration.
• sgname—Security group name referenced in the policy
Recommended Action Check to see if the security group name exists in the ISE. If the name exists,
the table can be refreshed so the name gets resolved and policies can be enforced. If the name does
not exist in the ISE, consider removing all associated policies on the ASA.
766305
Error Message %ASA-4-766305: CTS Policy: Security-group table cleared, all polices
referencing security-group names will be deactivated
Explanation The security group table downloaded from the ISE is cleared on the ASA and policies
based on security group tags continue to be enforced. However, policies based on names become
inactive, but remain in the configuration.
Recommended Action Refresh the securitygroup table on the ASA so all policies based on security
group names can be enforced.
766307
Error Message %ASA-7-766307: CTS Policy: Security-group name for security-group tag
sgt renamed from old_sgname" to "new_sgname"
Explanation In the newly downloaded security group table on the ASA, a change in the security
group name for a security group tag was detected; however, there was no change in policy status.
• sgt—Security group tag referenced in the policy
• old_sgname—Old security group name
• new_sgname—New security group name
766308
Error Message %ASA-7-766308: CTS Policy: Previously unknown security-group tag sgt
is now mapped to security-group name "sgname"
Explanation In the newly downloaded security group table on the ASA, a previously unknown
security group tag was found in the table; however, there was no change in policy status.
• sgt—Security group tag referenced in the policy
• sgname—Security group name derived from the new security group table
766309
Error Message %ASA-5-766309: CTS Policy: Previously known security-group tag sgt is
now unknown
Explanation In the newly downloaded security group table on the ASA, a previously known security
group tag no longer exists. There is no change in policy status, and the policy can still be enforced.
• sgt—Security group tag referenced in the policy
Recommended Action If the security group tag does not exist in the new table, the security group has
been removed in the ISE. Consider removing all policies that reference the tag.
766310
Error Message %ASA-5-766310: CTS Policy: Security-group name "sgname" remapped from
security-group tag old_sgt to new_sgt
Explanation In the newly downloaded security group table on the ASA, a change in the security
group tag for a security group name was detected. All policies referencing the name are updated to
reflect the new tag, and policies are enforced based on the new tag.
• sgname—Security group name referenced in the policy
• old_sgt—Old security group tag
• new_sgt—New security group tag
Recommended Action Because of the change in tag value, make sure that the configured policies are
still accurate.
766311
Explanation In the newly downloaded security group table on the ASA, a previously unresolved
security group name was resolved to a tag, and the new tag can be used to enforce policies.
• sgname—Security group name referenced in the policy
• sgt—Security group tag derived from the new security group table
766312
Explanation In the newly downloaded security group table on the ASA, a previously resolved
security group name no longer exists. As a result, all policies based on this security group name
become inactive, but remain in the configuration.
• sgname—Security group name referenced in the policy
Recommended Action If the security group name does not exist in the new table, the security group
has been removed in the ISE. Check the policy configuration on the ASA, consider removing
policies referencing the name.
766313
Explanation An error was encountered in updating the policies. Policy enforcement will continue
based on old tag values and is no longer accurate.
• sgname—Security group name that has a change in tag value
• sgt—New security group tag value
Recommended Action To reflect the correct tag value, remove all policies referencing the security
group name and reapply them. If the error persists, contact the Cisco TAC for assistance.
767001
Explanation A fail-close option was set for a service policy, and a particular inspect received an IPv6,
IP64, or IP46 packet. Based on the fail-close option setting, this syslog message is generated and
the packet is dropped.
768001
Explanation A system resource allocation level has reached its warning threshold. In the case of a
management session, the resource is simultaneous administrative sessions.
• resource—The name of the system resource; in this case, it is a management session.
• req—The number requested; for a management session, it is always 1.
• curr—The current number allocated; equals level for a management session
• level—The warning threshold, which is 90 percent of the configured limit
768002
Error Message %ASA-3-768002: QUOTA: resource quota exceeded: requested req, current
curr, limit limit
Explanation A request for a system resource would have exceeded its configured limit and was
denied. In the case of a management session, the maximum number of simultaneous administrative
sessions on the system has been reached.
• resource—The name of the system resource; in this case, it is a management session.
• req—The number requested; for a management session, it is always 1.
• curr—The current number allocated; equals level for a management session
• limit—The configured resource limit
768003
769001
Error Message %ASA-5-769001: UPDATE: ASA image src was added to system boot list
Explanation The system image has been updated. The name of a file previously downloaded onto the
system has been added to the system boot list.
• src—The name or URL of the source image file
769002
Error Message %ASA-5-769002: UPDATE: ASA image src was copied to dest
Explanation The system image has been updated. An image file has been copied onto the system.
• src—The name or URL of the source image file
• dest—The name of the destination image file
769003
Error Message %ASA-5-769003: UPDATE: ASA image src was renamed to dest
Explanation The system image has been updated. An existing image file has been renamed to an
image file name in the system boot list.
• src—The name or URL of the source image file
• dest—The name of the destination image file
769004
Error Message %ASA-5-769004: UPDATE: ASA image checksum error copying src to dest
Explanation The image verification test failed during the copying of an image file.
• src—The file name or URL of the source image file
• dest—The file name of the destination image file
770001
Error Message %ASA-4-770001: Resource resource allocation is more than the permitted
list of limit for this platform. If this condition persists, the ASA will be
rebooted.
Explanation The CPU or memory resource allocation for the ASA virtual machine has exceeded the
allowed limit for this platform. This condition does not occur unless the setting for the ASA virtual
machine has been changed from that specified in the software downloaded from Cisco.
Recommended Action To continue ASA operation, change the CPU or memory resource allocation of
the virtual machine to what was specified with the software downloaded from Cisco or to the
resource limits specified in the Cisco ASA 1000V CLI Configuration Guide for this platform.
770002
Error Message %ASA-1-770002: Resource resource allocation is more than the permitted
limit for this platform. ASA will be rebooted.
Explanation The CPU or memory resource allocation for the ASA virtual machine has exceeded the
allowed limit for this platform. This condition does not occur unless the setting for the ASA virtual
machine has been changed from that specified in the software downloaded from Cisco. The ASA
will continue to reboot if the resource allocation is not changed.
Recommended Action Change the CPU or memory reosurce allocation to the virtual machine to what
was specified with the software downloaded from Cisco or to the resource limits specified in the
Cisco ASA 1000V CLI Configuration Guide for this platform.
770003
Error Message %ASA-4-770003: Resource resource allocation is less than the minimum
requirement of value for this platform. If this condition persists, performance
will be lower than normal.
Explanation The CPU or memory resource allocation to the ASA virtual machine is less than the
minimum requirement for this platform. If this condition persists, performance will be lower than
normal.
Recommended Action To continue ASA operation, change the CPU or memory reosurce allocation of
the virtual machine to what was specified with the software downloaded from Cisco or see the
memory limit and CPU reservation settings specified in the Cisco ASA 1000V CLI Configuration
Guide for this platform.
770001
Error Message %ASA-4-770001: Resource resource allocation is more than the permitted
list of limit for this platform. If this condition persists, the ASA will be
rebooted.
Explanation The CPU or memory resource allocation for the ASA virtual machine has exceeded the
allowed limit for this platform. This condition does not occur unless the setting for the ASA virtual
machine has been changed from that specified in the software downloaded from Cisco.
Recommended Action To continue ASA operation, change the CPU or memory resource allocation of
the virtual machine to what was specified with the software downloaded from Cisco or to the
resource limits specified in the Cisco ASA 1000V CLI Configuration Guide for this platform.
770002
Error Message %ASA-1-770002: Resource resource allocation is more than the permitted
limit for this platform. ASA will be rebooted.
Explanation The CPU or memory resource allocation for the ASA virtual machine has exceeded the
allowed limit for this platform. This condition does not occur unless the setting for the ASA virtual
machine has been changed from that specified in the software downloaded from Cisco. The ASA
will continue to reboot if the resource allocation is not changed.
Recommended Action Change the CPU or memory reosurce allocation to the virtual machine to what
was specified with the software downloaded from Cisco or to the resource limits specified in the
Cisco ASA 1000V CLI Configuration Guide for this platform.
770003
Error Message %ASA-4-770003: Resource resource allocation is less than the minimum
requirement of value for this platform. If this condition persists, performance
will be lower than normal.
Explanation The CPU or memory resource allocation to the ASA virtual machine is less than the
minimum requirement for this platform. If this condition persists, performance will be lower than
normal.
Recommended Action To continue ASA operation, change the CPU or memory reosurce allocation of
the virtual machine to what was specified with the software downloaded from Cisco or see the
memory limit and CPU reservation settings specified in the Cisco ASA 1000V CLI Configuration
Guide for this platform.
771001
Error Message %ASA-5-771001: CLOCK: System clock set, source: src, before: time,
after: time
771002
Error Message %ASA-5-771002: CLOCK: System clock set, source: src, IP ip, before:
time, after: time
772002
Error Message %ASA-3-772002: PASSWORD: console login warning, user username, cause:
password expired
Explanation A user logged into the system console with an expired password, which is permitted to
avoid system lockout.
• username—The name of the user
772003
Error Message %ASA-2-772003: PASSWORD: session login failed, user username, IP ip,
cause: password expired
Explanation A user logged tried to log into the system with an expired password and was denied
access.
• session—The session type, which can be SSH or Telnet
• username—The name of the user
• ip—The IP address of the user
Recommended Action If the user has authorized access, an administrator must change the password
for the user. Unauthorized access attempts should trigger an appropriate response, for example.
traffic from that IP address can be blocked.
772004
Error Message %ASA-3-772004: PASSWORD: session login failed, user username, IP ip,
cause: password expired
Explanation A user logged tried to log into the system with an expired password and was denied
access.
• session—The session type, which is ASDM
• username—The name of the user
• ip—The IP address of the user
Recommended Action If the user has authorized access, an administrator must change the password
for the user. Unauthorized access attempts should trigger an appropriate response, for example.
traffic from that IP address can be blocked.
772005
772006
Explanation The user entered the wrong password while trying to change it. As a result, the password
was not changed.
• username—The name of the user
Recommended Action The user should retry changing the password using the change-password
command.
774001
774002
Error Message %ASA-2-774002: POST: error err, func func, engine eng, algorithm alg,
mode mode, dir dir, key len len
775001
Explanation A ScanSafe server is configured, and traffic matches a policy that has been configured
to redirect the connection to the ScanSafe server for content scanning and other malware protection
services.
775002
Explanation If the source IP address and port of the new ScanSafe redirected connection matches the
existing connection, then the ASA drops the new connection and this syslog message is generated.
• Reason —Duplicate connection with same source address and port port
Note Configuring PAT and ScanSafe on a single connection are not recommended.
775003
Explanation The traffic has been matched and does not need to be redirected to the ScanSafe server
for content scanning, but can be sent directly to the intended web server.
775004
Explanation The primary ScanSafe server is not reachable on either of the configured HTTP or
HTTPS ports.
775005
Explanation The primary ScanSafe server is reachable on both of the configured HTTP and HTTPS
ports.
775006
Explanation If the primary ScanSafe server becomes unreachable, the ASA checks the connectivity
to the configured backup ScanSafe server; if the backup server is reachable, it becomes the active
server.
775007
Explanation Neither the primary nor backup ScanSafe server is reachable. Based on the configured
default action( fail_close or fail_open), traffic is getting dropped or sent to the web server without
being redirected.
Recommended Action If both the ScanSafe servers are not reachable, you can change the ScanSafe
configuration to fail_open to send traffic to the web server without having it redirected to the
ScanSafe server. This configuration changes the default action to permit.
Note The ASA does not send severity 0, emergency messages to the syslog server. These are analogous to a
UNIX panic message, and denote an unstable system.
• %ASA-1-716510: internal error in: function: Fiber scheduler is scheduling finished fiber. Cannot
continue terminating
• %ASA-1-716516: internal error in: function: OCCAM has corrupted ROL array. Cannot continue
terminating
• %ASA-1-716519: internal error in: function: OCCAM has corrupted pool list. Cannot continue
terminating
• %ASA-1-716528: Unexpected fiber scheduler error; possible out-of-memory condition
• %ASA-1-717049: Local CA Server certificate is due to expire in number days and a replacement
certificate is available for export.
• %ASA-1-735001 Cooling Fan var1: OK
• %ASA-1-735002 Cooling Fan var1: Failure Detected
• %ASA-1-735003 Power Supply var1: OK
• %ASA-1-735004 Power Supply var1: Failure Detected
• %ASA-1-735005 Power Supply Unit Redundancy OK
• %ASA-1-735006 Power Supply Unit Redundancy Lost
• %ASA-1-735007 CPU var1: Temp: var2 var3, Critical
• %ASA-1-735008 IPMI: Chassis Ambient var1: Temp: var2 var3, Critical
• %ASA-1-735011: Power Supply var1: Fan OK
• %ASA-1-735012: Power Supply var1: Fan Failure Detected
• %ASA-1-735013: Voltage Channel var1: Voltage OK
• %ASA-1-735014: Voltage Channel var1: Voltage Critical
• %ASA-1-735017: Power Supply var1: Temp: var2 var3, OK
• %ASA-1-735020: CPU var1: Temp: var2 var3 OK
• %ASA-1-735021: Chassis var1: Temp: var2 var3 OK
• %ASA-1-735022: CPU# is running beyond the max thermal operating temperature and the device
will be shutting down immediately to prevent permanent damage to the CPU.
• %ASA-1-735024: IO Hub var1: Temp: var2 var3, OK
• %ASA-1-735025: IO Hub var1: Temp: var2 var3, Critical
• %ASA-1-735027: CPU cpu_num Voltage Regulator is running beyond the max thermal operating
temperature and the device will be shutting down immediately. The chassis and CPU need to be
inspected immediately for ventilation issues.
• %ASA-1-735029: IO Hub is running beyond the max thermal operating temperature and the device
will be shutting down immediately to prevent permanent damage to the circuit.
• %ASA-1-743000: The PCI device with vendor ID: vendor_id device ID: device_id located at
bus:device.function bus_num:dev_num, func_num has a link link_attr_name of actual_link_attr_val
when it should have a link link_attr_name of expected_link_attr_val.
• %ASA-1-743001: Backplane health monitoring detected link failure
• %ASA-1-743002: Backplane health monitoring detected link OK
• %ASA-1-743004: System is not fully operational - PCI device with vendor ID vendor_id
(vendor_name), device ID device_id (device_name) not found
• %ASA-1-770002: Resource resource allocation is more than the permitted limit for this platform.
ASA will be rebooted.
• %ASA-2-716513: internal error in: function: Fiber in callback blocked on other channel
• %ASA-2-716515: internal error in: function: OCCAM failed to allocate memory for AK47 instance
• %ASA-2-716517: internal error in: function: OCCAM cached block has no associated arena
• %ASWA-2-716518: internal error in: function: OCCAM pool has no associated arena
• %ASA-2-716520: internal error in: function: OCCAM pool has no block list
• %ASA-2-716521: internal error in: function: OCCAM no realloc allowed in named pool
• %ASA-2-716522: internal error in: function: OCCAM corrupted standalone block
• %ASA-2-716525: UNICORN_SYSLOGID_SAL_CLOSE_PRIVDATA_CHANGED
• %ASA-2-716526: UNICORN_SYSLOGID_PERM_STORAGE_SERVER_LOAD_FAIL
• %ASA-2-716527: UNICORN_SYSLOGID_PERM_STORAGE_SERVER_STORE_FAI
• %ASA-2-717008: Insufficient memory to process_requiring_memory.
• %ASA-2-717011: Unexpected event event event_ID
• %ASA-2-717040: Local CA Server has failed and is being disabled. Reason: reason.
• %ASA-2-735009: IPMI: Environment Monitoring has failed initialization and configuration.
Environment Monitoring is not running.
• %ASA-2-735023: ASA was previously shutdown due to the CPU complex running beyond the
maximum thermal operating temperature. The chassis needs to be inspected immediately for
ventilation issues.
• %ASA-2-735028: ASA was previously shutdown due to a CPU Voltage Regulator running beyond
the max thermal operating temperature. The chassis and CPU need to be inspected immediately for
ventilation issues.
• %ASA-2-736001: Unable to allocate enough memory at boot for jumbo-frame reservation.
Jumbo-frame support has been disabled.
• %ASA-2-747009: Clustering: Fatal error due to failure to create RPC server for module module
name.
• %ASA-2-747011: Clustering: Memory allocation error.%ASA-2-752001: Tunnel Manager received
invalid parameter to remove record.
• %ASA-2-752001: Tunnel Manager received invalid parameter to remove record.
• %ASA-2-752005: Tunnel Manager failed to dispatch a KEY_ACQUIRE message. Memory may be
low. Map Tag = mapTag. Map Sequence Number = mapSeq.
• %ASA-2-772003: PASSWORD: session login failed, user username, IP ip, cause: password expired
• %ASA-2-772006: REAUTH: user username failed authentication
• %ASA-2-774001: POST: unspecified error
• %ASA-2-774002: POST: error err, func func, engine eng, algorithm alg, mode mode, dir dir, key len
len
• %ASA-2-775007: Scansafe: Primary server_interface_name:server_ip_address and backup
server_interface_name:server_ip_address servers are not reachable.
• %ASA-3-114010: Failed to set multicast hardware address in 4GE SSM I/O card (error
error_string).
• %ASA-3-114011: Failed to delete multicast address in 4GE SSM I/O card (error error_string).
• %ASA-3-114012: Failed to delete multicast hardware address in 4GE SSM I/O card (error
error_string).
• %ASA-3-114013: Failed to set mac address table in 4GE SSM I/O card (error error_string).
• %ASA-3-114014: Failed to set mac address in 4GE SSM I/O card (error error_string).
• %ASA-3-114015: Failed to set mode in 4GE SSM I/O card (error error_string).
• %ASA-3-114016: Failed to set multicast mode in 4GE SSM I/O card (error error_string).
• %ASA-3-114017: Failed to get link status in 4GE SSM I/O card (error error_string).
• %ASA-3-114018: Failed to set port speed in 4GE SSM I/O card (error error_string).
• %ASA-3-114019: Failed to set media type in 4GE SSM I/O card (error error_string).
• %ASA-3-114020: Port link speed is unknown in 4GE SSM I/O card.
• %ASA-3-114021: Failed to set multicast address table in 4GE SSM I/O card due to error.
• %ASA-3-114022: Failed to pass broadcast traffic in 4GE SSM I/O card due to error_string
• %ASA-3-114023: Failed to cache/flush mac table in 4GE SSM I/O card due to error_string.
• %ASA-3-115001: Error in process: process name fiber: fiber name, component: component name,
subcomponent: subcomponent name, file: filename, line: line number, cond: condition.
• %ASA-3-120010: Notify command command to SCH client client failed. Reason reason.
• %ASA-3-199015: syslog
• %ASA-3-201002: Too many TCP connections on {static|xlate} global_address! econns nconns
• %ASA-3-201004: Too many UDP connections on {static|xlate} global_address! udp connections
limit
• %ASA-3-201005: FTP data connection failed for IP_address IP_address
• %ASA-3-201006: RCMD backconnection failed for IP_address/port.
• %ASA-3-201008: Disallowing new connections.
• %ASA-3-201009: TCP connection limit of number for host IP_address on interface_name exceeded
• %ASA-3-201010: Embryonic connection limit exceeded econns/limit for dir packet from
source_address/source_port to dest_address/dest_port on interface interface_name
• %ASA-3-201011: Connection limit exceeded cnt/limit for dir packet from sip/sport to dip/dport on
interface if_name.
• %ASA-3-201013: Per-client connection limit exceeded curr num/limit for [input|output] packet
from ip/port to ip/port on interface interface_name
• %ASA-3-202001: Out of address translation slots!
• %ASA-3-202005: Non-embryonic in embryonic list outside_address/outside_port
inside_address/inside_port
• %ASA-3-202010: [NAT | PAT] pool exhausted for pool-name, port range [1-511 | 512-1023 |
1024-65535]. Unable to create protocol connection from in-interface:src-ip/src-port to
out-interface:dst-ip/dst-port
• %ASA-3-202011: Connection limit exceeded econns/limit for dir packet from
source_address/source_port to dest_address/dest_port on interface interface_name
• %ASA-3-322001: Deny MAC address MAC_address, possible spoof attempt on interface interface
• %ASA-3-322002: ARP inspection check failed for arp {request|response} received from host
MAC_address on interface interface. This host is advertising MAC Address MAC_address_1 for IP
Address IP_address, which is {statically|dynamically} bound to MAC Address MAC_address_2.
• %ASA-3-322003:ARP inspection check failed for arp {request|response} received from host
MAC_address on interface interface. This host is advertising MAC Address MAC_address_1 for IP
Address IP_address, which is not bound to any MAC Address.
• %ASA-3-323001: Module module_id experienced a control channel communications failure.
• %ASA-3-323002: Module module_id is not able to shut down, shut down request not answered.
• %ASA-3-323003: Module module_id is not able to reload, reload request not answered.
• %ASA-3-323004: Module module_id failed to write software vnewver (currently vver), reason.
Hw-module reset is required before further use.
• %ASA-3-323005: Module module_id can not be started completely
• %ASA-3-323007: Module in slot slot experienced a firware failure and the recovery is in progress.
• %ASA-3-324000: Drop GTPv version message msg_type from
source_interface:source_address/source_port to dest_interface:dest_address/dest_port Reason:
reason
• %ASA-3-324001: GTPv0 packet parsing error from source_interface:source_address/source_port
to dest_interface:dest_address/dest_port, TID: tid_value, Reason: reason
• %ASA-3-324002: No PDP[MCB] exists to process GTPv0 msg_type from
source_interface:source_address/source_port to dest_interface:dest_address/dest_port, TID:
tid_value
• %ASA-3-324003: No matching request to process GTPv version msg_type from
source_interface:source_address/source_port to source_interface:dest_address/dest_port
• %ASA-3-324004: GTP packet with version%d from source_interface:source_address/source_port
to dest_interface:dest_address/dest_port is not supported
• %ASA-3-324005: Unable to create tunnel from source_interface:source_address/source_port to
dest_interface:dest_address/dest_port
• %ASA-3-324006:GSN IP_address tunnel limit tunnel_limit exceeded, PDP Context TID tid failed
• %ASA-3-324007: Unable to create GTP connection for response from: source_address/0 to
dest_address/dest_port
• %ASA-3-324008: No PDP exists to update the data sgsn [ggsn] PDPMCB Info REID: teid_value,
Request TEID; teid_value, Local GSN: IPaddress (VPIfNum), Remove GSN: IPaddress (VPIfNum)
• %ASA-3-324300: Radius Accounting Request from from_addr has an incorrect request
authenticator
• %ASA-3-324301: Radius Accounting Request has a bad header length hdr_len, packet length
pkt_len
• %ASA-3-325001: Router ipv6_address on interface has conflicting ND (Neighbor Discovery)
settings
• %ASA-3-326001: Unexpected error in the timer library: error_message
• %ASA-3-326002: Error in error_message: error_message
• %ASA-3-326004: An internal error occurred while processing a packet queue
• %ASA-3-326005: Mrib notification failed for (IP_address, IP_address)
• %ASA-3-336008: Lingering DRDB deleting IIDB, dest network, nexthop address (interface), origin
origin_str
• %ASA-3-336009 ddb_name as_id: Internal Error
• %ASA-3-337001: Phone Proxy SRTP: Encryption failed on packet from in_ifc:src_ip/src_port to
out_ifc:dest_ip/dest_port
• %ASA-3-337002: Phone Proxy SRTP: Decryption failed on packet from in_ifc:src_ip/src_port to
out_ifc:dest_ip/dest_port
• %ASA-3-337003: Phone Proxy SRTP: Authentication tag generation failed on packet from
in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port
• %ASA-3-337004: Phone Proxy SRTP: Authentication tag validation failed on packet from
in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port
• %ASA-3-337006: Phone Proxy SRTP: Failed to sign file filename requested by UDP client
cifc:caddr/cport for sifc:saddr/sport
• %ASA-3-337007: Phone Proxy SRTP: Failed to find configuration file filename for UDP client
cifc:caddr/cport by server sifc:saddr/sport
• %ASA-3-337008: Phone Proxy: Unable to allocate media port from media-termination address
phone_proxy_ifc:media_term_IP for client_ifc:client_IP/client_port; call failed.
• %ASA-3-337009: Unable to create secure phone entry, interface:IPaddr is already configured for
the same MAC mac_addr.
• %ASA-3-338305: Failed to download dynamic filter data file from updater server url
• %ASA-3-338306: Failed to authenticate with dynamic filter updater server url
• %ASA-3-338307: Failed to decrypt downloaded dynamic filter database file
• %ASA-3-338309: The license on this ASA does not support dynamic filter updater feature.
• %ASA-3-338310: Failed to update from dynamic filter updater server url, reason: reason string
• %ASA-3-339001: UC-IME-SIG: Ticket not found in SIP %s from %s:%A/%d to %s:%A/%d,
packet dropped
• %ASA-3-339002: UC-IME-SIG: Invalid ticket in SIP %s from %s:%A/%d to %s:%A/%d, packet
dropped, %s
• %ASA-3-339003: UC-IME-SIG: Non-dialog forming SIP %s received from %s:%A/%d to
%s:%A/%d, packet dropped
• %ASA-3-339004: UC-IME-SIG: Dropping SIP %s received from %s:%A/%d to %s:%A/%d, route
header validation failed, %s
• %ASA-3-339005: UC-IME-SIG: Message received from %s:%A/%d to %s:%A/%d does not
contain SRTP, message dropped
• %ASA-3-339006: UC-IME-Offpath: Failed to map remote UCM address %A:%d on %s interface,
request from local UCM %A:%d on %s interface, reason %s
• %ASA-3-340001: Loopback-proxy info: error_string context id context_id, context type =
version/request_type/address_type client socket (internal)=
client_address_internal/client_port_internal server socket (internal)=
server_address_internal/server_port_internal server socket (external)=
server_address_external/server_port_external remote socket (external)=
remote_address_external/remote_port_external
• %ASA-3-341003: Policy Agent failed to start for VNMC vnmc_ip_addr
• %ASA-3-713127: Xauth required but selected Proposal does not support xauth, Check priorities of
ike xauth proposals in ike proposal list
• %ASA-3-713129: Received unexpected Transaction Exchange payload type: payload_id
• %ASA-3-713132: Cannot obtain an IP_address for remote peer
• %ASA-3-713133: Mismatch: Overriding phase 2 DH Group(DH group DH group_id) with phase 1
group(DH group DH group_number
• %ASA-3-713134: Mismatch: P1 Authentication algorithm in the crypto map entry different from
negotiated algorithm for the L2L connection
• %ASA-3-713138: Group group_name not found and BASE GROUP default preshared key not
configured
• %ASA-3-713140: Split Tunneling Policy requires network list but none configured
• %ASA-3-713141: Client-reported firewall does not match configured firewall: action tunnel.
Received -- Vendor: vendor(id), Product product(id), Caps: capability_value. Expected -- Vendor:
vendor(id), Product: product(id), Caps: capability_value
• %ASA-3-713142: Client did not report firewall in use, but there is a configured firewall: action
tunnel. Expected -- Vendor: vendor(id), Product product(id), Caps: capability_value
• %ASA-3-713146: Could not add route for Hardware Client in network extension mode, address:
IP_address, mask: netmask
• %ASA-3-713149: Hardware client security attribute attribute_name was enabled but not requested.
• %ASA-3-713152: Unable to obtain any rules from filter ACL_tag to send to client for CPP,
terminating connection.
• %ASA-3-713159: TCP Connection to Firewall Server has been lost, restricted tunnels are now
allowed full network access
• %ASA-3-713161: Remote user (session Id - id) network access has been restricted by the Firewall
Server
• %ASA-3-713162: Remote user (session Id - id) has been rejected by the Firewall Server
• %ASA-3-713163: Remote user (session Id - id) has been terminated by the Firewall Server
• %ASA-3-713165: Client IKE Auth mode differs from the group's configured Auth mode
• %ASA-3-713166: Headend security gateway has failed our user authentication attempt - check
configured username and password
• %ASA-3-713167: Remote peer has failed user authentication - check configured username and
password
• %ASA-3-713168: Re-auth enabled, but tunnel must be authenticated interactively!
• %ASA-3-713174: Hardware Client connection rejected! Network Extension Mode is not allowed
for this group!
• %ASA-3-713182: IKE could not recognize the version of the client! IPSec Fragmentation Policy
will be ignored for this connection!
• %ASA-3-713185: Error: Username too long - connection aborted
• %ASA-3-713186: Invalid secondary domain name list received from the authentication server. List
Received: list_text Character index (value) is illegal
• %ASA-3-713189: Attempted to assign network or broadcast IP_address, removing (IP_address)
from pool.
• %ASA-3-713191: Maximum concurrent IKE negotiations exceeded!
• %ASA-3-713270: Could not add route for Hardware Client in network extension mode, address:
IP_addres>, mask: /prefix_len
• %ASA-3-713272: Terminating tunnel to Hardware Client in network extension mode, unable to
delete static route for address: IP_address, mask: /prefix_len
• %ASA-3-713274: Could not delete static route for client address: IP_Address IP_Address address
of client whose route is being removed
• %ASA-3-713902: Descriptive_event_string.
• %ASA-3-716056: Group group-name User user-name IP IP_address Authentication to SSO server
name: name type type failed reason: reason
• %ASA-3-716057: Group group User user IP ip Session terminated, no type license available.
• %ASA-3-716061: Group DfltGrpPolicy User user IP ip addr IPv6 User Filter tempipv6 configured
for AnyConnect. This setting has been deprecated, terminating connection
• %ASA-3-716600: Rejected size-recv KB Hostscan data from IP src-ip. Hostscan results exceed
default | configured limit of size-conf KB.
• %ASA-3-716601: Rejected size-recv KB Hostscan data from IP src-ip. System-wide limit onthe
amount of Hostscan data stored on ASA exceeds the limit of data-max KB.
• %ASA-3-716602: Memory allocation error. Rejected size-recv KB Hostscan data from IP src-ip.
• %ASA-3-717001: Querying keypair failed.
• %ASA-3-717002: Certificate enrollment failed for trustpoint trustpoint_name. Reason:
reason_string.
• %ASA-3-717009: Certificate validation failed. Reason: reason_string.
• %ASA-3-717010: CRL polling failed for trustpoint trustpoint_name.
• %ASA-3-717012: Failed to refresh CRL cache entry from the server for trustpoint trustpoint_name
at time_of_failure
• %ASA-3-717015: CRL received from issuer is too large to process (CRL size = crl_size, maximum
CRL size = max_crl_size)
• %ASA-3-717017: Failed to query CA certificate for trustpoint trustpoint_name from enrollment_url
• %ASA-3-717018: CRL received from issuer has too many entries to process (number of entries =
number_of_entries, maximum number allowed = max_allowed)
• %ASA-3-717019: Failed to insert CRL for trustpoint trustpoint_name. Reason: failure_reason.
• %ASA-3-717020: Failed to install device certificate for trustpoint label. Reason: reason string.
• %ASA-3-717021: Certificate data could not be verified. Locate Reason: reason_string serial
number: serial number, subject name: subject name, key length key length bits.
• %ASA-3-717023: SSL failed to set device certificate for trustpoint trustpoint name. Reason:
reason_string.
• %ASA-3-717027: Certificate chain failed validation. reason_string.
• %ASA-3-717039: Local CA Server internal error detected: error.
• %ASA-3-717042: Failed to enable Local CA Server. Reason: reason.
• %ASA-3-717044: Local CA server certificate enrollment related error for user: user. Error: error.
• %ASA-3-717046: Local CA Server CRL error: error.
• %ASA-3-717051: SCEP Proxy: Denied processing the request type type received from IP client ip
address, User username, TunnelGroup tunnel group name, GroupPolicy group policy name to CA
ca ip address. Reason: msg
• %ASA-3-719002: Email Proxy session pointer from source_address has been terminated due to
reason error.
• %ASA-3-719008: Email Proxy service is shutting down.
• %ASA-3-722007: Group group User user-name IP IP_address SVC Message: type-num/ERROR:
message
• %ASA-3-722008: Group group User user-name IP IP_address SVC Message: type-num/ERROR:
message
• %ASA-3-722009: Group group User user-name IP IP_address SVC Message: type-num/ERROR:
message
• %ASA-3-722020: TunnelGroup tunnel_group GroupPolicy group_policy User user-name IP
IP_address No address available for SVC connection
• %ASA-3-722021: Group group User user-name IP IP_address Unable to start compression due to
lack of memory resources
• %ASA-3-722035: Group group User user-name IP IP_address Transmitting large packet length
threshold.).
• %ASA-3-722036: Group group User user-name IP IP_address Received large packet length
(threshold +num).
• %ASA-3-722045: Connection terminated: no SSL tunnel initialization data.
• %ASA-3-722046: Group group User user IP ip Session terminated: unable to establish tunnel.
• %ASA-3-725015 Error verifying client certificate. Public key size in client certificate exceeds the
maximum supported key size.
• %ASA-3-734004: DAP: Processing error: Code number
• %ASA-3-735010: IPMI: Environment Monitoring has failed to update one or more of its records.
• %ASA-3-737002: IPAA: Received unknown message 'num'
• %ASA-3-737027: IPAA: No data for address request
• %ASA-3-742001: failed to read master key for password encryption from persistent store
• %ASA-3-742002: failed to set master key for password encryption
• %ASA-3-742003: failed to save master key for password encryption, reason reason_text
• %ASA-3-742004: failed to sync master key for password encryption, reason reason_text
• %ASA-3-742005: cipher text enc_pass is not compatible with the configured master key or the
cipher text has been tampered with
• %ASA-3-742006: password decryption failed due to unavailable memory
• %ASA-3-742007: password encryption failed due to unavailable memory
• %ASA-3-742008: password enc_pass decryption failed due to decoding error
• %ASA-3-742009: password encryption failed due to decoding error
• %ASA-3-742010: encrypted password enc_pass is not well formed
• %ASA-3-743010: EOBC RPC server failed to start for client module client name.
• %ASA-3-743011: EOBC RPC call failed, return code code string.
• %ASA-3-746003: user-identity: activated import user groups | activated host names | user-to-IP
address databases download failed - reason
• %ASA-3-746005: user-identity: The AD Agent AD agent IP address cannot be reached - reason
[action]
• %ASA-3-746010: user-identity: update import-user domain_name\\group_name - Import Failed
[reason]
• %ASA-3-746016: user-identity: DNS lookup failed, reason: reason
• %ASA-3-746019: user-identity: Update|Remove AD Agent AD agent IP Address IP-user mapping
user_IP - domain_name\user_name failed
• %ASA-3-747001: Clustering: Recovered from state machine event queue depleted. Event (event-id,
ptr-in-hex, ptr-in-hex) dropped. Current state state-name, stack ptr-in-hex, ptr-in-hex, ptr-in-hex,
ptr-in-hex, ptr-in-hex, ptr-in-hex
• %ASA-3-747010: Clustering: RPC call failed, message message-name, return code code-value.
• %ASA-3-747012: Clustering: Failed to replicate global object id hex-id-value in domain
domain-name to peer unit-name, continuing operation.
• %ASA-3-747013: Clustering: Failed to remove global object id hex-id-value in domain
domain-name from peer unit-name, continuing operation.
• %ASA-3-747014: Clustering: Failed to install global object id hex-id-value in domain
domain-name, continuing operation.
• %ASA-3-747018: Clustering: State progression failed due to timeout in module module-name.
• %ASA-3-747021: Clustering: Master unit unit-name is quitting due to interface health check failure
on failed-interface.
• %ASA-3-747022: Clustering: Asking slave unit unit-name to quit because it failed interface health
check x times, rejoin will be attempted after y min. Failed interface: interface-name.
• %ASA-3-747023: Clustering: Master unit unit-name is quitting due to card name card health check
failure, and master Security Service Card state is state-name.
• %ASA-3-747024: Clustering: Asking slave unit unit-name to quit due to card name card health
check failure, and its Security Service Card state is state-name.
• %ASA-3-747030: Clustering: Asking slave unit unit-name to quit because it failed interface health
check x times (last failure on interface-name), Clustering must be manually enabled on the unit to
re-join.
• %ASA-3-747031: Clustering: Platform mismatch between cluster master (platform-type) and
joining unit unit-name (platform-type). unit-name aborting cluster join.
• %ASA-3-747032: Clustering: Service module mismatch between cluster master (module-name) and
joining unit unit-name (module-name) in slot slot-number. unit-name aborting cluster join.
• %ASA-3-747033: Clustering: Interface mismatch between cluster master and joining unit
unit-name. unit-name aborting cluster join.
• %ASA-3-750011: Tunnel Rejected: Selected IKEv2 encryption algorithm (IKEV2 encry algo) is not
strong enough to secure proposed IPSEC encryption algorithm (IPSEC encry algo).
• %ASA-3-751001: Local: localIP:port Remote:remoteIP:port Username: username/group Failed to
complete Diffie-Hellman operation. Error: error
• %ASA-3-766005: CTS SXP: Binding Binding IP - SGname(SGT) from peer IP instance connection
instance num error.
• %ASA-3-766006: CTS SXP: Internal error: error
• %ASA-3-766007: CTS SXP: Connection with peer peer IP (instance connection instance num) state
changed from original state to Off.
• %ASA-3-766020: CTS SXP: Unable to locate egress interface to peer peer IP.
• %ASA-3-766202: CTS PAC for Server IP_address, A-ID PAC issuer name has expired
• %ASA-3-766203: Unable to retrieve CTS Environment data due to: reason
• %ASA-3-766204: CTS Environment data has expired
• %ASA-3-766254: CTS SGT-MAP: Binding manager unable to action binding binding IP - SGname
(SGT) from source name.
• %ASA-3-766313: CTS Policy: Failure to update policies for security-group "sgname"-sgt
• %ASA-3-768001: QUOTA: resource utilization is high: requested req, current curr, warning level
level
• %ASA-3-768002: QUOTA: resource quota exceeded: requested req, current curr, limit limit
• %ASA-3-772002: PASSWORD: console login warning, user username, cause: password expired
• %ASA-3-772004: PASSWORD: session login failed, user username, IP ip, cause: password expired
• %ASA-4-109033: Authentication failed for admin user user from src_IP. Interactive challenge
processing is not supported for protocol connections
• %ASA-4-109034: Authentication failed for network user user from src_IP/port to dst_IP/port.
Interactive challenge processing is not supported for protocol connections
• %ASA-4-109102: Received CoA action-type from coa-source-ip, but cannot find named session
audit-session-id
• %ASA-4-113019: Group = group, Username = user, IP = peer_address, Session disconnected.
Session Type: type, Duration: duration, Bytes xmt: count, Bytes rcv: count, Reason: reason
• %ASA-4-113026: Error error while executing Lua script for group tunnel group
• %ASA-4-113029: Group group User user IP ipaddr Session could not be established: session limit
of num reached
• %ASA-4-113030: Group group User user IP ipaddr User ACL acl from AAA doesn't exist on the
device, terminating connection.
• %ASA-4-113031: Group group User user IP ipaddr AnyConnect vpn-filter filter is an IPv6 ACL;
ACL not applied.
• %ASA-4-113032: Group group User user IP ipaddr AnyConnect ipv6-vpn-filter filter is an IPv4
ACL; ACL not applied.
• %ASA-4-113034: Group group User user IP ipaddr User ACL acl from AAA ignored, AV-PAIR
ACL used instead.
• %ASA-4-113035: Group group User user IP ipaddr Session terminated: AnyConnect not enabled or
invalid AnyConnect image on the ASA.
• %ASA-4-113036: Group group User user IP ipaddr AAA parameter name value invalid.
• %ASA-4-113038: Group group User user IP ipaddr Unable to create AnyConnect p0arent session.
• %ASA-4-113040: Terminating the VPN connection attempt from attempted group. Reason: This
connection is group locked to locked group.
• %ASA-4-115002: Warning in process: process name fiber: fiber name, component: component
name, subcomponent: subcomponent name, file: filename, line: line number, cond: condition
• %ASA-4-120004: Event group title is dropped. Reason reason
• %ASA-4-120005: Message group to destination is dropped. Reason reason
• %ASA-4-120006: Delivering message group to destination failed. Reason reason
• %ASA-4-199016: syslog
• %ASA-4-209003: Fragment database limit of number exceeded: src = source_address, dest =
dest_address, proto = protocol, id = number
• %ASA-4-209004: Invalid IP fragment, size = bytes exceeds maximum size = bytes: src =
source_address, dest = dest_address, proto = protocol, id = number
• %ASA-4-209005: Discard IP fragment set with more than number elements: src = Too many
elements are in a fragment set.
• %ASA-4-216004: prevented: error in function at file(line) - stack trace
• %ASA-4-302034: Unable to pre-allocate H323 GUP Connection for faddr interface: foreign
address/foreign-port to laddr interface:local-address/local-port
• %ASA-4-308002: static global_address inside_address netmask netmask overlapped with
global_address inside_address
• %ASA-4-403102: PPP virtual interface interface_name rcvd pkt with invalid protocol: protocol,
reason: reason.
• %ASA-4-403103: PPP virtual interface max connections reached.
• %ASA-4-403104: PPP virtual interface interface_name requires mschap for MPPE.
• %ASA-4-403106: PPP virtual interface interface_name requires RADIUS for MPPE.
• %ASA-4-403107: PPP virtual interface interface_name missing aaa server group info
• %ASA-4-403108: PPP virtual interface interface_name missing client ip address option
• %ASA-4-403109: Rec'd packet not an PPTP packet. (ip) dest_address= dest_address, src_addr=
source_address, data: string.
• %ASA-4-403110: PPP virtual interface interface_name, user: user missing MPPE key from aaa
server.
• %ASA-4-403505: PPPoE:PPP - Unable to set default route to IP_address at interface_name
• %ASA-4-403506: PPPoE:failed to assign PPP IP_address netmask netmask at interface_name
• %ASA-4-405001: Received ARP {request | response} collision from IP_address/MAC_address on
interface interface_name to IP_address/MAC_address on interface interface_name
• %ASA-4-405002: Received mac mismatch collision from IP_address/MAC_address for
authenticated host
• %ASA-4-405003: IP address collision detected between host IP_address at MAC_address and
interface interface_name, MAC_address.
• %ASA-4-405101: Unable to Pre-allocate H225 Call Signalling Connection for foreign_address
outside_address[/outside_port] to local_address inside_address[/inside_port]
• %ASA-4-405102: Unable to Pre-allocate H245 Connection for foreign_address
outside_address[/outside_port] to local_address inside_address[/inside_port]
• %ASA-4-405103: H225 message from source_address/source_port to dest_address/dest_port
contains bad protocol discriminator hex
• %ASA-4-405104: H225 message received from outside_address/outside_port to
inside_address/inside_port before SETUP
• %ASA-4-405105: H323 RAS message AdmissionConfirm received from
source_address/source_port to dest_address/dest_port without an AdmissionRequest
• %ASA-4-405106: H323 num channel is not created from %I/%d to %I/%d %s
• %ASA-4-405107: H245 Tunnel is detected and connection dropped from %I/%d to %I/%d %s
• %ASA-4-405201: ILS ILS_message_type from inside_interface:source_IP_address to
outside_interface:/destination_IP_address has wrong embedded address embedded_IP_address
• %ASA-4-405300: Radius Accounting Request received from from_addr is not allowed
• %ASA-4-405301: Attribute attribute_number does not match for user user_ip
• %ASA-4-406001: FTP port command low port: IP_address/port to IP_address on interface
interface_name
• %ASA-4-406002: FTP port command different address: IP_address(IP_address) to IP_address on
interface interface_name
• %ASA-4-407001: Deny traffic for local-host interface_name:inside_address, license limit of
number exceeded
• %ASA-4-413006: prod-id Module software version mismatch; slot slot is prod-id version
running-vers. Slot slot prod-id requires required-vers.
• %ASA-4-415016: policy-map map_name:Maximum number of unanswered HTTP requests
exceeded connection_action from int_type:IP_address/port_num to int_type:IP_address/port_num
• %ASA-4-416001: Dropped UDP SNMP packet from source_interface:source_IP/source_port to
dest_interface:dest_address/dest_port; version (prot_version) is not allowed through the firewall
• %ASA-4-417001: Unexpected event received: number
• %ASA-4-417004: Filter violation error: conn number (string:string) in string
• %ASA-4-417006: No memory for string) in string. Handling: string
• %ASA-4-418001: Through-the-device packet to/from management-only network is denied:
protocol_string from interface_name IP_address (port) [([idfw_user|FQDN_string], sg_info)] to
interface_name IP_address (port) [(idfw_user|FQDN_string), sg_info]
• %ASA-4-419001: Dropping TCP packet from src_ifc:src_IP/src_port to dest_ifc:dest_IP/dest_port,
reason: MSS exceeded, MSS size, data size
• %ASA-4-419002: Received duplicate TCP SYN from in_interface:src_address/src_port to
out_interface:dest_address/dest_port with different initial sequence number.
• %ASA-4-419003: Cleared TCP urgent flag from out_ifc:src_ip/src_port to in_ifc:dest_ip/dest_port.
• %ASA-4-420002: IPS requested to drop ICMP packets ifc_in:SIP to ifc_out:DIP
(typeICMP_TYPE, code ICMP_CODE)
• %ASA-4-420003: IPS requested to reset TCP connection from ifc_in:SIP/SPORT to
ifc_out:DIP/DPORT
• %ASA-4-420007: application-string cannot be enabled for the module in slot slot_id. The module’s
current software version does not support this feature. Please upgrade the software on the module in
slot slot_id to support this feature. Received backplane header version version_number, required
backplane header version version_number or higher.
• %ASA-4-422004: IP SLA Monitor number0: Duplicate event received. Event number number1
• %ASA-4-422005: IP SLA Monitor Probe(s) could not be scheduled because clock is not set.
• %ASA-4-422006: IP SLA Monitor Probe number: string
• %ASA-4-423001: {Allowed | Dropped} invalid NBNS pkt_type_name with error_reason_str from
ifc_name:ip_address/port to ifc_name:ip_address/port.
• %ASA-4-423002: {Allowed | Dropped} mismatched NBNS pkt_type_name with error_reason_str
from ifc_name:ip_address/port to ifc_name:ip_address/port.
• %ASA-4-423003: {Allowed | Dropped} invalid NBDGM pkt_type_name with error_reason_str
from ifc_name:ip_address/port to ifc_name:ip_address/port.
• %ASA-4-423004: {Allowed | Dropped} mismatched NBDGM pkt_type_name with
error_reason_str from ifc_name:ip_address/port to ifc_name:ip_address/port.
• %ASA-4-423005: {Allowed | Dropped} NBDGM pkt_type_name fragment with error_reason_str
from ifc_name:ip_address/port to ifc_name:ip_address/port.
• %ASA-4-424001: Packet denied protocol_string intf_in:src_ip/src_port [([idfw_user |
FQDN_string], sg_info)] intf_out:dst_ip/dst_port[([idfw_user | FQDN_string], sg_info)].
[Ingress|Egress] interface is in a backup state.
• %ASA-4-424002: Connection to the backup interface is denied: protocol_string intf:src_ip/src_port
intf:dst_ip/dst_port
• %ASA-4-426004: PORT-CHANNEL: Interface ifc_name1 is not compatible with ifc_name and will
be suspended (speed of ifc_name1 is X Mbps, Y is 1000 Mbps).
• %ASA-4-429002: CXSC service card requested to drop protocol packet from
interface_name:ip_address/port to interface_name:ip_address/port
• %ASA-4-429003: CXSC service card requested to reset TCP connection from
interface_name:ip_addr/port to interface_name:ip_addr/port
• %ASA-4-429007: CXSC redirect will override Scansafe redirect for flow from
interface_name:ip_address/port to interface_name:ip_address/port with username
• %ASA-4-429008: Unable to respond to VPN query from CX for session 0x%x. Reason %s
• %ASA-4-431001: RTP conformance: Dropping RTP packet from in_ifc:src_ip/src_port to
out_ifc:dest_ip/dest_port, Drop reason: drop_reason value
• %ASA-4-431002: RTCP conformance: Dropping RTCP packet from in_ifc:src_ip/src_port to
out_ifc:dest_ip/dest_port, Drop reason: drop_reason value
• %ASA-4-444005: Timebased activation key activation-key will expire in num days.
• ASA-4-444008: %s license has expired, and the system is scheduled to reload in x days. Apply a
new activation key to enable %s license and prevent the automatic reload.
• %ASA-4-444106: Shared license backup server address is not available
• %ASA-4-444109: Shared license backup server role changed to state
• %ASA-4-444110: Shared license server backup has days remaining as active license server
• %ASA-4-446001: Maximum TLS Proxy session limit of max_sess reached.
• %ASA-4-446003: Denied TLS Proxy session from src_int:src_ip/src_port to
dst_int:dst_ip/dst_port, UC-IME license is disabled.
• %ASA-4-447001: ASP DP to CP queue_name was full. Queue length length, limit limit
• %ASA-4-448001: Denied SRTP crypto session setup on flow from src_int:src_ip/src_port to
dst_int:dst_ip/dst_port, licensed K8 SRTP crypto session of limit exceeded
• %ASA-4-450001: Deny traffic for protocol protocol_id src interface_name:IP_address/port dst
interface_name:IP_address/port, licensed host limit of num exceeded.
• %ASA-4-500004: Invalid transport field for protocol=protocol, from source_address/source_port to
dest_address/dest_port
• %ASA-4-507002: Data copy in proxy-mode exceeded the buffer limit
• %ASA-4-603110: Failed to establish L2TP session, tunnel_id = tunnel_id, remote_peer_ip =
peer_ip, user = username. Multiple sessions per tunnel are not supported
• %ASA-4-604105: DHCPD: Unable to send DHCP reply to client hardware_address on interface
interface_name. Reply exceeds options field size (options_field_size) by number_of_octets octets.
• %ASA-4-607002: action_class: action SIP req_resp req_resp_info from src_ifc:sip/sport to
dest_ifc:dip/dport; further_info
• %ASA-4-608002: Dropping Skinny message for in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port,
SCCPPrefix length value too small
• %ASA-4-608003: Dropping Skinny message for in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port,
SCCPPrefix length value too large
• %ASA-4-608004: Dropping Skinny message for in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port,
message id value not allowed
• %ASA-4-720073: (VPN-unit) Fail to insert certificate in trust point trustpoint on the standby unit.
• %ASA-4-721007: (device) Fail to update access list list_name on standby unit.
• %ASA-4-721011: (device) Fail to add access list rule list_name, line line_no on standby unit.
• %ASA-4-721013: (device) Fail to enable APCF XML file file_name on the standby unit.
• %ASA-4-721015: (device) Fail to disable APCF XML file file_name on the standby unit.
• %ASA-4-721017: (device) Fail to create WebVPN session for user user_name, IP ip_address.
• %ASA-4-721019: (device) Fail to delete WebVPN session for client user user_name, IP ip_address.
• %ASA-4-722001: IP IP_address Error parsing SVC connect request.
• %ASA-4-722002: IP IP_address Error consolidating SVC connect request.
• %ASA-4-722003: IP IP_address Error authenticating SVC connect request.
• %ASA-4-722004: Group group User user-name IP IP_address Error responding to SVC connect
request.
• %ASA-4-722015: Group group User user-name IP IP_address Unknown SVC frame type: type-num
• %ASA-4-722016: Group group User user-name IP IP_address Bad SVC frame length: length
expected: expected-length
• %ASA-4-722017: Group group User user-name IP IP_address Bad SVC framing: 525446, reserved:
0
• %ASA-4-722018: Group group User user-name IP IP_address Bad SVC protocol version: version,
expected: expected-version
• %ASA-4-722019: Group group User user-name IP IP_address Not enough data for an SVC header:
length
• %ASA-4-722039: Group group, User user, IP ip, SVC 'vpn-filter acl' is an IPv6 ACL; ACL not
applied.
• %ASA-4-722040: Group group, User user, IP ip, SVC 'ipv6-vpn-filter acl' is an IPv4 ACL; ACL not
applied
• %ASA-4-722041: TunnelGroup tunnel_group GroupPolicy group_policy User username IP
peer_address No IPv6 address available for SVC connection
• %ASA-4-722042: Group group User user IP ip Invalid Cisco SSL Tunneling Protocol version.
• %ASA-4-722047: Group group User user IP ip Tunnel terminated: SVC not enabled or invalid SVC
image on the ASA.
• %ASA-4-722048: Group group User user IP ip Tunnel terminated: SVC not enabled for the user.
• %ASA-4-722049: Group group User user IP ip Session terminated: SVC not enabled or invalid
image on the ASA.
• %ASA-4-722050: Group group User user IP ip Session terminated: SVC not enabled for the user.
• %ASA-4-724001: Group group-name User user-name IP IP_address WebVPN session not allowed.
Unable to determine if Cisco Secure Desktop was running on the client's workstation.
• %ASA-4-724002: Group group-name User user-name IP IP_address WebVPN session not
terminated. Cisco Secure Desktop was not running on the client's workstation.
• %ASA-4-733100: Object drop rate rate_ID exceeded. Current burst rate is rate_val per second, max
configured rate is rate_val; Current average rate is rate_val per second, max configured rate is
rate_val; Cumulative total count is total_cnt
• %ASA-4-733101: Object objectIP (is targeted|is attacking). Current burst rate is rate_val per
second, max configured rate is rate_val; Current average rate is rate_val per second, max configured
rate is rate_val; Cumulative total count is total_cnt.
• %ASA-4-733102: Threat-detection adds host %I to shun list
• %ASA-4-733103: Threat-detection removes host %I from shun list
• %ASA-4-733104: TD_SYSLOG_TCP_INTERCEPT_AVERAGE_RATE_EXCEED
• %ASA-4-733105: TD_SYSLOG_TCP_INTERCEPT_BURST_RATE_EXCEED
• %ASA-4-735015: CPU var1: Temp: var2 var3, Warm
• %ASA-4-735016: Chassis Ambient var1: Temp: var2 var3, Warm
• %ASA-4-735018: Power Supply var1: Temp: var2 var3, Critical
• %ASA-4-735019: Power Supply var1: Temp: var2 var3, Warm
• %ASA-4-735026: CPU cpu_num Voltage Regulator is running beyond the max thermal operating
temperature and the device will be shutting down immediately. The chassis and CPU need to be
inspected immediately for ventilation issues.
• %ASA-4-737012: IPAA: Address assignment failed
• %ASA-4-737013: IPAA: Error freeing address ip-address, not found
• %ASA-4-737019: IPAA: Unable to get address from group-policy or tunnel-group local pools
• %ASA-4-737028: IPAA: Adding ip-address to standby: failed
• %ASA-4-737030: IPAA: Adding %m to standby: address already in use
• %ASA-4-737032: IPAA: Removing ip-address from standby: not found
• %ASA-4-737033: IPAA: Unable to assign addr_allocator provided IP address ip_addr to client. This
IP address has already been assigned by previous_addr_allocator
• %ASA-4-741005: Coredump operation variable 1 failed with error variable 2 variable 3
• %ASA-4-741006: Unable to write Coredump Helper configuration, reason variable 1
• %ASA-4-746004: user identity: Total number of activated user groups exceeds the maximum
number of max_groups groups for this platform.
• %ASA-4-746006: user-identity: Out of sync with AD Agent, start bulk download
• %ASA-4-746011: Total number of users created exceeds the maximum number of max_users for
this platform.
• %ASA-4-747008: Clustering: New cluster member name with serial number serial-number-A
rejected due to name conflict with existing unit with serial number serial-number-B.
• %ASA-4-747015: Clustering: Forcing stray member unit-name to leave the cluster.
• %ASA-4-747016: Clustering: Found a split cluster with both unit-name-A and unit-name-B as
master units. Master role retained by unit-name-A, unit-name-B will leave, then join as a slave.
• %ASA-4-747017: Clustering: Failed to enroll unit unit-name due to maximum member limit
limit-value reached.
• %ASA-4-747019: Clustering: New cluster member name rejected due to Cluster Control Link IP
subnet mismatch (ip-address/ip-mask on new unit, ip-address/ip-mask on local unit).
• %ASA-4-747020: Clustering: New cluster member unit-name rejected due to encryption license
mismatch.
• %ASA-4-747025: Clustering: New cluster member unit-name rejected due to firewall mode
mismatch.
• %ASA-4-747026: Clustering: New cluster member unit-name rejected due to cluster interface name
mismatch (ifc-name on new unit, ifc-name on local unit).
• %ASA-4-747027: Clustering: Failed to enroll unit unit-name due to insufficient size of cluster pool
pool-name in context-name.
• %ASA-4-747028: Clustering: New cluster member unit-name rejected due to interface mode
mismatch (mode-name on new unit, mode-name on local unit).
• %ASA-4-747029: Clustering: Unit unit-name is quitting due to Cluster Control Link down.
• %ASA-4-750003: Local: local IP:local port Remote: remote IP:remote port Username: username
Negotiation aborted due to ERROR: error
• %ASA-4-750012: Selected IKEv2 encryption algorithm (IKEV2 encry algo) is not strong enough
to secure proposed IPSEC encryption algorithm (IPSEC encry algo).
• %ASA-4-751014: Local: localIP:port Remote remoteIP:port Username: username/group Warning
Configuration Payload request for attribute attribute ID could not be processed. Error: error
• %ASA-4-751015: Local: localIP:port Remote remoteIP:port Username: username/group SA
request rejected by CAC. Reason: reason
• %ASA-4-751016: Local: localIP:port Remote remoteIP:port Username: username/group L2L peer
initiated a tunnel with the same outer and inner addresses. Peer could be Originate only - Possible
misconfiguration!
• %ASA-4-751019: Local:LocalAddr Remote:RemoteAddr Username:username Failed to obtain an
licenseType license. Maximum license limit limit exceeded.
• %ASA-4-751021: Local:variable 1:variable 2 Remote:variable 3:variable 4 Username:variable 5
variable 6 with variable 7 encryption is not supported with this version of the AnyConnect Client.
Please upgrade to the latest Anyconnect Client.
• %ASA-4-752009: IKEv2 Doesn't support Multiple Peers
• %ASA-4-752010: IKEv2 Doesn't have a proposal specified
• %ASA-4-752011: IKEv1 Doesn't have a transform set specified
• %ASA-4-752012: IKEv protocol was unsuccessful at setting up a tunnel. Map Tag = mapTag. Map
Sequence Number = mapSeq.
• %ASA-4-752013: Tunnel Manager dispatching a KEY_ACQUIRE message to IKEv2 after a failed
attempt. Map Tag = mapTag. Map Sequence Number = mapSeq.
• %ASA-4-752014: Tunnel Manager dispatching a KEY_ACQUIRE message to IKEv1 after a failed
attempt. Map Tag = mapTag. Map Sequence Number = mapSeq.
• %ASA-4-752017: IKEv2 Backup L2L tunnel initiation denied on interface interface matching
crypto map name, sequence number number. Unsupported configuration.
• %ASA-4-766304: CTS Policy: Unresolved security-group name "sgname" referenced, policies
based on this name will be inactive
• %ASA-4-766305: CTS Policy: Security-group table cleared, all polices referencing security-group
names will be deactivated
• %ASA-4-766201: CTS PAC: CTS PAC for Server IP_address, A-ID PAC issuer name will expire in
number days
• %ASA-4-766312: CTS Policy: Previously resolved security-group name "sgname" is now
unresolved, policies based on this name will be deactivated
• %ASA-5-719014: Email Proxy is changing listen port from old_port to new_port for mail protocol
protocol.
• %ASA-5-720016: (VPN-unit) Failed to initialize default timer #index.
• %ASA-5-720017: (VPN-unit) Failed to update LB runtime data
• %ASA-5-720018: (VPN-unit) Failed to get a buffer from the underlying core high availability
subsystem. Error code code.
• %ASA-5-720019: (VPN-unit) Failed to update cTCP statistics.
• %ASA-5-720020: (VPN-unit) Failed to send type timer message.
• %ASA-5-720021: (VPN-unit) HA non-block send failed for peer msg message_number. HA error
code.
• %ASA-5-720035: (VPN-unit) Fail to look up CTCP flow handle
• %ASA-5-720036: (VPN-unit) Failed to process state update message from the active peer.
• %ASA-5-720071: (VPN-unit) Failed to update cTCP dynamic data.
• %ASA-5-720072: Timeout waiting for Integrity Firewall Server [interface,ip] to become available.
• %ASA-5-722037: Group group User user-name IP IP_address SVC closing connection: reason.
• %ASA-5-722038: Group group-name User user-name IP IP_address SVC terminating session:
reason.
• %ASA-5-722005: Group group User user-name IP IP_address Unable to update session information
for SVC connection.
• %ASA-5-722006: Group group User user-name IP IP_address Invalid address IP_address assigned
to SVC connection.
• %ASA-5-722010: Group group User user-name IP IP_address SVC Message: type-num/NOTICE:
message
• %ASA-5-722011: Group group User user-name IP IP_address SVC Message: type-num/NOTICE:
message
• %ASA-5-722012: Group group User user-name IP IP_address SVC Message: type-num/INFO:
message
• %ASA-5-722028: Group group User user-name IP IP_address Stale SVC connection closed.
• %ASA-5-722032: Group group User user-name IP IP_address New SVC connection replacing old
connection.
• %ASA-5-722033: Group group User user-name IP IP_address First SVC connection established for
SVC session.
• %ASA-5-722034: Group group User user-name IP IP_address New SVC connection, no existing
connection.
• %ASA-5-722037: Group group User user-name IP IP_address SVC closing connection: reason.
• %ASA-5-722038: Group group-name User user-name IP IP_address SVC terminating session:
reason.
• %ASA-5-722043: Group group User user IP ip DTLS disabled: unable to negotiate cipher.
• %ASA-5-722044: Group group User user IP ip Unable to request ver address for SSL tunnel.
• %ASA-5-730009: Group groupname, User username, IP ipaddr, CAS casaddr, capacity exceeded,
terminating connection.
• %ASA-5-734002: DAP: User user, Addr ipaddr: Connection terminated by the following DAP
records: DAP record names
• %ASA-5-737003: IPAA: DHCP configured, no viable servers found for tunnel-group 'tunnel-group'
• %ASA-5-737004: IPAA: DHCP configured, request failed for tunnel-group 'tunnel-group'
• %ASA-5-737007: IPAA: Local pool request failed for tunnel-group 'tunnel-group'
• %ASA-5-737008: IPAA: 'tunnel-group' not found
• %ASA-5-737011: IPAA: AAA assigned address ip-address, not permitted, retrying
• %ASA-5-737018: IPAA: DHCP request attempt num failed
• %ASA-5-737021: IPAA: Address from local pool (ip-address) duplicates address from DHCP
• %ASA-5-737022: IPAA: Address from local pool (ip-address) duplicates address from AAA
• %ASA-5-737023: IPAA: Unable to allocate memory to store local pool address ip-address
• %ASA-5-737024: IPAA: Local pool assignment failed for suggested IP ip-address, retrying
• %ASA-5-737025: IPAA: Not releasing local pool ip-address, due to local pool duplicate issue
• %ASA-5-746007: user-identity: NetBIOS response failed from User user_name at user_ip
• %ASA-5-746012: user-identity: Add IP-User mapping IP Address - domain_name\user_name result
- reason
• %ASA-5-746013: user-identity: Delete IP-User mapping IP Address - domain_name\user_name
result - reason
• %ASA-5-746014: user-identity: [FQDN] fqdn address IP Address obsolete
• %ASA-5-746015: user-identity: [FQDN] fqdn resolved IP address
• %ASA-5-747002: Clustering: Recovered from state machine dropped event (event-id, ptr-in-hex,
ptr-in-hex). Intended state: state-name. Current state: state-name.
• %ASA-5-747003: Clustering: Recovered from state machine failure to process event (event-id,
ptr-in-hex, ptr-in-hex) at state state-name.
• %ASA-5-747007: Clustering: Recovered from finding stray config sync thread, stack ptr-in-hex,
ptr-in-hex, ptr-in-hex, ptr-in-hex, ptr-in-hex, ptr-in-hex.
• %ASA-5-750001: Local:local IP:local port Remote:remote IP: remote port Username: username
Received request to request an IPsec tunnel; local traffic selector = local selectors: range, protocol,
port range; remote traffic selector = remote selectors: range, protocol, port range
• %ASA-5-750002: Local:local IP:local port Remote: remote IP: remote port Username: username
Received a IKE_INIT_SA request
• %ASA-5-750004: Local: local IP: local port Remote: remote IP: remote port Username: username
Sending COOKIE challenge to throttle possible DoS
• %ASA-5-750005: Local: local IP: local port Remote: remote IP: remote port Username: username
IPsec rekey collision detected. I am lowest nonce initiator, deleting SA with inbound SPI SPI
• %ASA-5-750006: Local: local IP: local port Remote: remote IP: remote port Username: username
SA UP. Reason: reason
• %ASA-5-750007: Local: local IP: local port Remote: remote IP: remote port Username: username
SA DOWN. Reason: reason
• %ASA-5-750008: Local: local IP: local port Remote: remote IP: remote port Username: username
SA rejected due to system resource low
• %ASA-5-750009: Local: local IP: local port Remote: remote IP: remote port Username: username
SA request rejected due to CAC limit reached: Rejection reason: reason
• %ASA-5-750010: Local: local-ip Remote: remote-ip Username:username IKEv2 local
throttle-request queue depth threshold of threshold reached; increase the window size on peer peer
for better performance
• %ASA-5-751007: Local: localIP:port Remote:remoteIP:port Username: username/group
Configured attribute not supported for IKEv2. Attribute: attribute
• %ASA-5-752003: Tunnel Manager dispatching a KEY_ACQUIRE message to IKEv2. Map Tag =
mapTag. Map Sequence Number = mapSeq.
• %ASA-5-752004: Tunnel Manager dispatching a KEY_ACQUIRE message to IKEv1. Map Tag =
mapTag. Map Sequence Number = mapSeq.
• %ASA-5-752016: IKEv protocol was successful at setting up a tunnel. Map Tag = mapTag. Map
Sequence Number = mapSeq.
• %ASA-5-766009: CTS SXP: password changed.
• %ASA-5-766010: CTS SXP: SXP default source IP is changed original source IP final source IP.
• %ASA-5-766011: CTS SXP: operational state.
• %ASA-5-766252: CTS SGT-MAP: CTS SGT-MAP: Binding binding IP - SGname(SGT) from
source name deleted from binding manager.
• %ASA-5-766309: CTS Policy: Previously known security-group tag sgt is now unknown
• %ASA-5-766310: CTS Policy: Security-group name "sgname" remapped from security-group tag
old_sgt to new_sgt
• %ASA-5-769001: UPDATE: ASA image src was added to system boot list
• %ASA-5-769002: UPDATE: ASA image src was copied to dest
• %ASA-5-769003: UPDATE: ASA image src was renamed to dest
• %ASA-5-769004: UPDATE: ASA image checksum error copying src to dest
• %ASA-5-771001: CLOCK: System clock set, source: src, before: time, after: time
• %ASA-5-771002: CLOCK: System clock set, source: src, IP ip, before: time, after: time
• %ASA-5-771002: CLOCK: System clock set, source: src, IP ip, before: time, after: time
• %ASA-6-713172: Automatic NAT Detection Status: Remote end is|is not behind a NAT device This
end is|is_not behind a NAT device
• %ASA-6-713177: Received remote Proxy Host FQDN in ID Payload: Host Name: host_name
Address IP_address, Protocol protocol, Port port
• %ASA-6-713184: Client Type: Client_type Client Application Version: Application_version_string
• %ASA-6-713202: Duplicate IP_addr packet detected.
• %ASA-6-713211: Adding static route for L2L peer coming in on a dynamic map. address:
IP_address, mask: netmask
• %ASA-6-713213: Deleting static route for L2L peer that came in on a dynamic map. address:
IP_address, mask: netmask
• %ASA-6-713215: No match against Client Type and Version rules. Client: type version is/is not
allowed by default
• %ASA-6-713219: Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.
• %ASA-6-713220: De-queuing KEY-ACQUIRE messages that were left pending.
• %ASA-6-713228: Assigned private IP address assigned_private_IP
• %ASA-6-713235: Attempt to send an IKE packet from standby unit. Dropping the packet!
• %ASA-6-713256: IP = peer-IP, Sending spoofed ISAKMP Aggressive Mode message 2 due to
receipt of unknown tunnel group. Aborting connection.
• %ASA-6-713265: Adding static route for L2L peer coming in on a dynamic map. address:
IP_address, mask: /prefix_len
• %ASA-6-713267: Deleting static route for L2L peer that came in on a dynamic map. address:
IP_address, mask: /prefix_len
• %ASA-6-713269: Detected Hardware Client in network extension mode, adding static route for
address: IP_address, mask: /prefix_len
• %ASA-6-713271: Terminating tunnel to Hardware Client in network extension mode, deleting
static route for address: IP_address, mask: /prefix_len
• %ASA-6-713905: Descriptive_event_string.
• %ASA-6-716001: Group group User user WebVPN session started.
• %ASA-6-716002: Group group User user WebVPN session terminated: reason.
• %ASA-6-716003: Group group User user WebVPN access GRANTED: url
• %ASA-6-716004: Group group User user WebVPN access DENIED to specified location: url
• %ASA-6-716005: Group group User user WebVPN ACL Parse Error: reason
• %ASA-6-716006: Group name User user WebVPN session terminated. Idle timeout.
• %ASA-6-716009: Group group User user WebVPN session not allowed. WebVPN ACL parse error.
• %ASA-6-717003: Certificate received from Certificate Authority for trustpoint trustpoint_name.
• %ASA-6-716038: Authentication: successful, group = name user = user, Session Type: WebVPN
• %ASA-6-716039: Authentication: rejected, group = name user = user, Session Type: %s
• %ASA-6-716040: Reboot pending, new sessions disabled. Denied user login.
• %ASA-6-716041: access-list acl_ID action url url hit_cnt count
• %ASA-6-716042: access-list acl_ID action tcp source_interface/source_address (source_port) -
dest_interface/dest_address(dest_port) hit-cnt count
• %ASA-6-719004: Email Proxy session pointer has been successfully established for
source_address.
• %ASA-6-719010: protocol Email Proxy feature is disabled on interface interface_name.
• %ASA-6-719011: Protocol Email Proxy feature is enabled on interface interface_name.
• %ASA-6-719012: Email Proxy server listening on port port for mail protocol protocol.
• %ASA-6-719013: Email Proxy server closing port port for mail protocol protocol.
• %ASA-6-719017: WebVPN user: vpnuser invalid dynamic ACL.
• %ASA-6-719018: WebVPN user: vpnuser ACL ID acl_ID not found
• %ASA-6-719019: WebVPN user: vpnuser authorization failed.
• %ASA-6-719020: WebVPN user vpnuser authorization completed successfully.
• %ASA-6-719021: WebVPN user: vpnuser is not checked against ACL.
• %ASA-6-719022: WebVPN user vpnuser has been authenticated.
• %ASA-6-719023: WebVPN user vpnuser has not been successfully authenticated. Access denied.
• %ASA-6-719024: Email Proxy piggyback auth fail: session = pointer user=vpnuser
addr=source_address
• %ASA-6-719025: Email Proxy DNS name resolution failed for hostname.
• %ASA-6-719026: Email Proxy DNS name hostname resolved to IP_address.
• %ASA-6-720002: (VPN-unit) Starting VPN Stateful Failover Subsystem...
• %ASA-6-720003: (VPN-unit) Initialization of VPN Stateful Failover Component completed
successfully
• %ASA-6-720004: (VPN-unit) VPN failover main thread started.
• %ASA-6-720005: (VPN-unit) VPN failover timer thread started.
• %ASA-6-720006: (VPN-unit) VPN failover sync thread started.
• %ASA-6-720010: (VPN-unit) VPN failover client is being disabled
• %ASA-6-720012: (VPN-unit) Failed to update IPSec failover runtime data on the standby unit.
• %ASA-6-722013: Group group User user-name IP IP_address SVC Message: type-num/INFO:
message
• %ASA-6-720014: (VPN-unit) Phase 2 connection entry (msg_id=message_number, my
cookie=mine, his cookie=his) contains no SA list.
• %ASA-6-720015: (VPN-unit) Cannot found Phase 1 SA for Phase 2 connection entry
(msg_id=message_number, my cookie=mine, his cookie=his).
• %ASA-6-720023: (VPN-unit) HA status callback: Peer is not present.
• %ASA-6-720024: (VPN-unit) HA status callback: Control channel is status.
• %ASA-6-720025: (VPN-unit) HA status callback: Data channel is status.
• %ASA-6-720026: (VPN-unit) HA status callback: Current progression is being aborted.
• %ASA-6-720027: (VPN-unit) HA status callback: My state state.
• %ASA-6-720028: (VPN-unit) HA status callback: Peer state state.
• %ASA-6-720029: (VPN-unit) HA status callback: Start VPN bulk sync state.
• %ASA-6-720030: (VPN-unit) HA status callback: Stop bulk sync state.
• %ASA-6-734005: DAP: User user, Addr ip: Administrative Message: custom message
• %ASA-6-737005: IPAA: DHCP configured, request succeeded for tunnel-group 'tunnel-group'
• %ASA-6-737006: IPAA: Local pool request succeeded for tunnel-group 'tunnel-group'
• %ASA-6-737009: IPAA: AAA assigned address ip-address, request failed
• %ASA-6-737010: IPAA: AAA assigned address ip-address, request succeeded
• %ASA-6-737014: IPAA: Freeing AAA address ip-address
• %ASA-6-737015: IPAA: Freeing DHCP address ip-address
• %ASA-6-737016: IPAA: Freeing local pool address ip-address
• %ASA-6-737017: IPAA: DHCP request attempt num succeeded
• %ASA-6-737026: IPAA: Client assigned ip-address from local pool
• %ASA-6-737029: IPAA: Adding ip-address to standby: succeeded
• %ASA-6-737031: IPAA: Removing %m from standby: succeeded
• %ASA-6-741000: Coredump filesystem image created on variable 1 -size variable 2 MB
• %ASA-6-741001: Coredump filesystem image on variable 1 - resized from variable 2 MB to
variable 3 MB
• %ASA-6-741002: Coredump log and filesystem contents cleared on variable 1
• %ASA-6-741003: Coredump filesystem and its contents removed on variable 1
• %ASA-6-741004: Coredump configuration reset to default values
• %ASA-6-746001: user-identity: activated import user groups | activated host names | user-to-IP
address databases download started
• %ASA-6-746002: user-identity: activated import user groups | activated host names | user-to-IP
address databases download complete
• %ASA-6-746008: user-identity: NetBIOS Probe Process started
• %ASA-6-746009: user-identity: NetBIOS Probe Process stopped
• %ASA-6-746017: user-identity: Update import-user domain_name\\group_name
• %ASA-6-746018: user-identity: Update import-user domain_name\\group_name done
• %ASA-6-747004: Clustering: state machine changed from state state-name to state-name.
• %ASA-6-751023: Local a:p Remote: a:p Username:n Unknown client connection
• %ASA-6-766008: CTS SXP: Connection with peer IP (instance connection instance num) state
changed from original state to final state.
• %ASA-6-766251: CTS SGT-MAP: Binding binding IP - SGname(SGT) from source name added to
binding manager.
• %ASA-6-766253: CTS SGT-MAP: Binding binding IP - new SGname(SGT) from new source name
changed from old sgt: old SGname(SGT) from old source old source name.
• %ASA-6-766303: CTS Policy: Security-group name "sgname" is resolved to security-group tag sgt
• %ASA-6-766311: CTS Policy: Previously unresolved security-group name "sgname" is now
resolved to security-group tag sgt
• %ASA-6-767001: Inspect-name: Dropping an unsupported IPv6/IP46/IP64 packet from interface:IP
Addr to interface:IP Addr (fail-close)
• %ASA-7-713160: Remote user (session Id - id) has been granted access by the Firewall Server
• %ASA-7-713164: The Firewall Server has requested a list of active user sessions
• %ASA-7-713169: IKE Received delete for rekeyed SA IKE peer: IP_address, SA address:
internal_SA_address, tunnelCnt: tunnel_count
• %ASA-7-713170: Group group IP ip IKE Received delete for rekeyed centry IKE peer: IP_address,
centry address: internal_address, msgid: id
• %ASA-7-713171: NAT-Traversal sending NAT-Original-Address payload
• %ASA-7-713187: Tunnel Rejected: IKE peer does not match remote peer as defined in L2L policy
IKE peer address: IP_address, Remote peer address: IP_address
• %ASA-7-713190: Got bad refCnt (ref_count_value) assigning IP_address (IP_address)
• %ASA-7-713204: Adding static route for client address: IP_address
• %ASA-7-713221: Static Crypto Map check, checking map = crypto_map_tag, seq = seq_number...
• %ASA-7-713222: Group group Username username IP ip Static Crypto Map check, map =
crypto_map_tag, seq = seq_number, ACL does not match proxy IDs src:source_address
dst:dest_address
• %ASA-7-713223: Static Crypto Map check, map = crypto_map_tag, seq = seq_number, no ACL
configured
• %ASA-7-713224: Static Crypto Map Check by-passed: Crypto map entry incomplete!
• %ASA-7-713225: [IKEv1], Static Crypto Map check, map map_name, seq = sequence_number is a
successful match
• %ASA-7-713233: (VPN-unit) Remote network (remote network) validated for network extension
mode.
• %ASA-7-713234: (VPN-unit) Remote network (remote network) from network extension mode
client mismatches AAA configuration (aaa network).
• %ASA-7-713236: IKE_DECODE tx/rx Message (msgid=msgid) with payloads:payload1
(payload1_len) + payload2 (payload2_len)...total length: tlen
• %ASA-7-713263: Received local IP Proxy Subnet data in ID Payload: Address IP_address, Mask
/prefix_len, Protocol protocol, Port port
• %ASA-7-713264: Received local IP Proxy Subnet data in ID Payload: Address IP_address, Mask
/prefix_len, Protocol protocol, Port port {“Received remote IP Proxy Subnet data in ID Payload:
Address %a, Mask/%d, Protocol %u, Port %u”}
• %ASA-7-713273: Deleting static route for client address: IP_Address IP_Address address of client
whose route is being removed
• %ASA-7-713906: Descriptive_event_string.
• %ASA-7-714001: description_of_event_or_packet
• %ASA-7-714002: IKE Initiator starting QM: msg id = message_number
• %ASA-7-714003: IKE Responder starting QM: msg id = message_number
• %ASA-7-714004: IKE Initiator sending 1st QM pkt: msg id = message_number
• %ASA-7-714005: IKE Responder sending 2nd QM pkt: msg id = message_number
• %ASA-7-714006: IKE Initiator sending 3rd QM pkt: msg id = message_number
• %ASA-7-714007: IKE Initiator sending Initial Contact
• %ASA-7-714011: Description of received ID values
• %ASA-7-715051: Received unexpected TLV type TLV_type while processing FWTYPE ModeCfg
Reply
• %ASA-7-715052: Old P1 SA is being deleted but new SA is DEAD, cannot transition centries
• %ASA-7-715053: MODE_CFG: Received request for attribute_info!
• %ASA-7-715054: MODE_CFG: Received attribute_name reply: value
• %ASA-7-715055: Send attribute_name
• %ASA-7-715056: Client is configured for TCP_transparency
• %ASA-7-715057: Auto-detected a NAT device with NAT-Traversal. Ignoring IPSec-over-UDP
configuration.
• %ASA-7-715058: NAT-Discovery payloads missing. Aborting NAT-Traversal.
• %ASA-7-715059: Proposing/Selecting only UDP-Encapsulated-Tunnel and
UDP-Encapsulated-Transport modes defined by NAT-Traversal
• %ASA-7-715060: Dropped received IKE fragment. Reason: reason
• %ASA-7-715061: Rcv'd fragment from a new fragmentation set. Deleting any old fragments.
• %ASA-7-715062: Error assembling fragments! Fragment numbers are non-continuous.
• %ASA-7-715063: Successfully assembled an encrypted pkt from rcv'd fragments!
• %ASA-7-715064 -- IKE Peer included IKE fragmentation capability flags: Main Mode: true/false
Aggressive Mode: true/false
• %ASA-7-715065: IKE state_machine subtype FSM error history (struct data_structure_address)
state, event: state/event pairs
• %ASA-7-715066: Can't load an IPSec SA! The corresponding IKE SA contains an invalid logical
ID.
• %ASA-7-715067: QM IsRekeyed: existing sa from different peer, rejecting new sa
• %ASA-7-715067: QM IsRekeyed: existing sa from different peer, rejecting new sa
• %ASA-7-715068: QM IsRekeyed: duplicate sa found by address, deleting old sa
• %ASA-7-715069: Invalid ESP SPI size of SPI_size
• %ASA-7-715070: Invalid IPComp SPI size of SPI_size
• %ASA-7-715071: AH proposal not supported
• %ASA-7-715072: Received proposal with unknown protocol ID protocol_ID
• %ASA-7-715074: Could not retrieve authentication attributes for peer IP_address
• %ASA-7-715075: Group = group_name, IP = IP_address Received keep-alive of type message_type
(seq number number)
• %ASA-7-715076: Computing hash for ISAKMP
• %ASA-7-715077: Pitcher: msg string, spi spi
• %ASA-7-715080: VPN: Starting P2 rekey timer: 28800 seconds.
• %ASA-7-716008: WebVPN ACL: action
• %ASA-7-716010: Group group User user Browse network.
• %ASA-7-716011: Group group User user Browse domain domain.
• %ASA-7-716012: Group group User user Browse directory directory.
• %ASA-7-716013: Group group User user Close file filename.
• %ASA-7-722029: Group group User user-name IP IP_address SVC Session Termination: Conns:
connections, DPD Conns: DPD_conns, Comp resets: compression_resets, Dcmp resets:
decompression_resets
• %ASA-7-722030: Group group User user-name IP IP_address SVC Session Termination: In:
data_bytes (+ctrl_bytes) bytes, data_pkts (+ctrl_pkts) packets, drop_pkts drops
• %ASA-7-722031: Group group User user-name IP IP_address SVC Session Termination: Out:
data_bytes (+ctrl_bytes) bytes, data_pkts (+ctrl_pkts) packets, drop_pkts drops.
• %ASA-7-723003: No memory for WebVPN Citrix ICA connection connection.
• %ASA-7-723004: WebVPN Citrix encountered bad flow control flow.
• %ASA-7-723005: No channel to set up WebVPN Citrix ICA connection.
• %ASA-7-723006: WebVPN Citrix SOCKS errors.
• %ASA-7-723007: WebVPN Citrix ICA connection connection list is broken.
• %ASA-7-723008: WebVPN Citrix ICA SOCKS Server server is invalid.
• %ASA-7-723009: Group group-name, User user-name, IP IP_address: WebVPN Citrix received
data on invalid connection connection.
• %ASA-7-723010: Group group-name, User user-name, IP IP_address: WebVPN Citrix received
closing channel channel for invalid connection connection.
• %ASA-7-723011: Group group-name, User user-name, IP IP_address: WebVPN Citrix receives bad
SOCKS socks message length msg-length. Expected length is exp-msg-length.
• %ASA-7-723012: Group group-name, User user-name, IP IP_address: WebVPN Citrix received bad
SOCKS socks message format.
• %ASA-7-723013: WebVPN Citrix encountered invalid connection connection during periodic
timeout.
• %ASA-7-723014: Group group-name, User user-name, IP IP_address: WebVPN Citrix TCP
connection connection to server server on channel channel initiated.
• %ASA-7-725008: SSL client interface_name:IP_address/port proposes the following number
cipher(s).
• %ASA-7-725009: Device proposes the following number cipher(s) to SSL server
interface_name:IP_address/port.
• %ASA-7-725010: Device supports the following number cipher(s).
• %ASA-7-725011: Cipher[order]: cipher_name
• %ASA-7-725012: Device chooses cipher: cipher_name for SSL session with client
interface_name:IP_address/port
• %ASA-7-725013: SSL Server interface_name:IP_address/port chooses cipher: cipher_name
• %ASA-7-725014: SSL lib error. Function: function Reason: reason
• %ASA-7-730001: Group groupname, User username, IP ipaddr: VLAN MAPPING to VLAN vlanid
• %ASA-7-730002: Group groupname, User username, IP ipaddr: VLAN MAPPING to VLAN vlanid
failed
• %ASA-7-730003: NACApp sets IP ipaddr VLAN to vlanid
• %ASA-7-730006: Group groupname, User username, IP ipaddr: is on NACApp AUTH VLAN
vlanid.
• %ASA-7-73007: Group groupname, User username, IP ipaddr: changed VLAN to <%s> ID vlanid
Variable Description
acl_ID An ACL name.
bytes The number of bytes.
code A decimal number returned by the syslog message to indicate the cause or source
of the error, according to the syslog message generated.
command A command name.
command_modifier The command_modifier is one of the following strings:
• cmd (this string means the command has no modifier)
• clear
• no
• show
connections The number of connections.
connection_type The connection type:
• SIGNALLING UDP
• SIGNALLING TCP
• SUBSCRIBE UDP
• SUBSCRIBE TCP
• Via UDP
• Route
• RTP
• RTCP
dec Decimal number.
dest_address The destination address of a packet.
dest_port The destination port number.
device The memory storage device. For example, the floppy disk, internal flash memory,
TFTP, the failover standby unit, or the console terminal.
econns Number of embryonic connections.
elimit Number of embryonic connections specified in the static or nat command.
filename A filename of the type ASAimage, ASDM file, or configuration.
ftp-server External FTP server name or IP address.
gateway_address The network gateway IP address.
global_address Global IP address, an address on a lower security level interface.
global_port The global port number.
Variable Description
hex Hexadecimal number.
inside_address Inside (or local) IP address, an address on a higher security level interface.
inside_port The inside port number.
interface_name The name of the interface.
IP_address IP address in the form n.n.n.n, where n is an integer from 1 to 255.
MAC_address The MAC address.
mapped_address The translated IP address.
mapped_port The translated port number.
message_class Category of syslog message associated with a functional area of the ASA.
message_list Name of a file you create containing a list of syslog message ID numbers, classes,
or severity levels.
message_number The syslog message ID.
nconns Number of connections permitted for the static or xlate table.
netmask The subnet mask.
number A number. The exact form depends on the syslog message.
octal Octal number.
outside_address Outside (or foreign) IP address, an address of a syslog server typically on a lower
security level interface in a network beyond the outside router.
outside_port The outside port number.
port The TCP or UDP port number.
privilege_level The user privilege level.
protocol The protocol of the packet, for example, ICMP, TCP, or UDP.
real_address The real IP address, before NAT.
real_port The real port number, before NAT.
reason A text string describing the reason for the syslog message.
service The service specified by the packet, for example, SNMP or Telnet.
severity_level The severity level of a syslog message.
source_address The source address of a packet.
source_port The source port number.
string Text string (for example, a username).
Variable Description
tcp_flags Flags in the TCP header such as:
• ACK
• FIN
• PSH
• RST
• SYN
• URG
time Duration, in the format hh:mm:ss.
url A URL.
user A username.
deny
inbound from outside 1-16
B
inbound ICMP 1-17
backup server list
SDI node secret file failed to synchronize 1-477 HTTPS process limit 1-30
standby unit received corrupted message from
active unit 1-475
state update message failure 1-474 I
timer error 1-468
ICMP
trustpoint certification failure 1-467
packet denied 1-16, 1-17
trustpoint name not found 1-470
translation creation failed 1-113
unable to add to message queue 1-473
IDB initializatrion 1-128
version control block failure 1-466
inbound TCP connection denied 1-14
failover command 1-7, 1-11
inspect ESMTP command 1-23
active option 1-6, 1-471
insufficient memory 1-82
failover messages 1-3, 1-4, 1-9, 1-318
error caused by 1-82, 1-211
filter allow command 1-112
interface
filter command
PPP virtual 1-94
activex option 1-274
virtual 1-94
allow option 1-112
zero bandwidth 1-309
filtering ActiveX objects 1-274
Internet phone, detecting use of 1-101
Flood Defender 1-316
invalid character replaced in e-mail address 1-23
floodguard command 1-27
invalid source addresses 1-17
flow control error 1-167
IP address
fragmented ICMP traffic attack 1-193
DHCP client 1-292
FTP
DHCP server 1-292
data connection failed 1-79
IP fragment attack 1-192
IP fragments overlap attack 1-192
SMTP 1-23
U
software version mismatch 1-233
split network entry duplicate 1-307 UDP
spoofing attack 1-17, 1-18, 1-19, 1-212 access permitted 1-319
SSH 1-123 bomb attack 1-193
SSM 4GE 1-57 to 1-67 chargen DoS attack 1-193
statd buffer overflow attack 1-193 connections 1-319
stateful failover 1-85, 1-86, 1-88 messages 1-113
SUA packet 1-15
disabled 1-306 request discarded 1-321
enabled 1-305 snork attack 1-193
SYN 1-17 translation creation failed 1-113
attack 1-78 unsupported application 1-233
flag 1-17 URL
system log messages buffer block space 1-112
classes 1-1 filtering, disabled 1-112
Server 1-111
user authentication
T disabled 1-306