Messages 400000 to 409023
This chapter includes messages from 400000 to 409023.
4000nn
Error Message
%ASA-4-4000nn: IPS:number string from
IP_address to
IP_address on
interface
interface_name
Explanation Messages 400000 through 400051 are Cisco Intrusion Prevention Service signature messages.
Recommended Action See the Cisco Intrusion Prevention Service User Guide on Cisco.com.
Not all signature messages are supported by the ASA in this release. IPS messages all start with 4-4000nn and have the following format:
|
number |
The signature number. For more information, see the Cisco Intrusion Prevention Service User Guide on Cisco.com. |
|
string |
The signature message—approximately the same as the NetRanger signature message. |
|
IP_address |
The local to remote address to which the signature applies. |
|
interface_name |
The name of the interface on which the signature originated. |
For example:
%ASA-4-400013 IPS:2003 ICMP redirect from 10.4.1.2 to 10.2.1.1 on interface dmz
%ASA-4-400032 IPS:4051 UDP Snork attack from 10.1.1.1 to 192.168.1.1 on interface outside
The following table lists the supported signature messages.
|
Message Number |
Signature ID |
Signature Title |
Signature Type |
|---|---|---|---|
|
400000 |
1000 |
IP options-Bad Option List |
Informational |
|
400001 |
1001 |
IP options-Record Packet Route |
Informational |
|
400002 |
1002 |
IP options-Timestamp |
Informational |
|
400003 |
1003 |
IP options-Security |
Informational |
|
400004 |
1004 |
IP options-Loose Source Route |
Informational |
|
400005 |
1005 |
IP options-SATNET ID |
Informational |
|
400006 |
1006 |
IP options-Strict Source Route |
Informational |
|
400007 |
1100 |
IP Fragment Attack |
Attack |
|
400008 |
1102 |
IP Impossible Packet |
Attack |
|
400009 |
1103 |
IP Fragments Overlap |
Attack |
|
400010 |
2000 |
ICMP Echo Reply |
Informational |
|
400011 |
2001 |
ICMP Host Unreachable |
Informational |
|
400012 |
2002 |
ICMP Source Quench |
Informational |
|
400013 |
2003 |
ICMP Redirect |
Informational |
|
400014 |
2004 |
ICMP Echo Request |
Informational |
|
400015 |
2005 |
ICMP Time Exceeded for a Datagram |
Informational |
|
400016 |
2006 |
ICMP Parameter Problem on Datagram |
Informational |
|
400017 |
2007 |
ICMP Timestamp Request |
Informational |
|
400018 |
2008 |
ICMP Timestamp Reply |
Informational |
|
400019 |
2009 |
ICMP Information Request |
Informational |
|
400020 |
2010 |
ICMP Information Reply |
Informational |
|
400021 |
2011 |
ICMP Address Mask Request |
Informational |
|
400022 |
2012 |
ICMP Address Mask Reply |
Informational |
|
400023 |
2150 |
Fragmented ICMP Traffic |
Attack |
|
400024 |
2151 |
Large ICMP Traffic |
Attack |
|
400025 |
2154 |
Ping of Death Attack |
Attack |
|
400026 |
3040 |
TCP NULL flags |
Attack |
|
400027 |
3041 |
TCP SYN+FIN flags |
Attack |
|
400028 |
3042 |
TCP FIN only flags |
Attack |
|
400029 |
3153 |
FTP Improper Address Specified |
Attack |
|
400030 |
3154 |
FTP Improper Port Specified |
Attack |
|
400031 |
4050 |
UDP Bomb attack |
Attack |
|
400032 |
4051 |
UDP Snork attack |
Attack |
|
400033 |
4052 |
UDP Chargen DoS attack |
Attack |
|
400034 |
6050 |
DNS HINFO Request |
Informational |
|
400035 |
6051 |
DNS Zone Transfer |
Informational |
|
400036 |
6052 |
DNS Zone Transfer from High Port |
Informational |
|
400037 |
6053 |
DNS Request for All Records |
Informational |
|
400038 |
6100 |
RPC Port Registration |
Informational |
|
400039 |
6101 |
RPC Port Unregistration |
Informational |
|
400040 |
6102 |
RPC Dump |
Informational |
|
400041 |
6103 |
Proxied RPC Request |
Attack |
|
400042 |
6150 |
ypserv (YP server daemon) Portmap Request |
Informational |
|
400043 |
6151 |
ypbind (YP bind daemon) Portmap Request |
Informational |
|
400044 |
6152 |
yppasswdd (YP password daemon) Portmap Request |
Informational |
|
400045 |
6153 |
ypupdated (YP update daemon) Portmap Request |
Informational |
|
400046 |
6154 |
ypxfrd (YP transfer daemon) Portmap Request |
Informational |
|
400047 |
6155 |
mountd (mount daemon) Portmap Request |
Informational |
|
400048 |
6175 |
rexd (remote execution daemon) Portmap Request |
Informational |
|
400049 |
6180 |
rexd (remote execution daemon) Attempt |
Informational |
|
400050 |
6190 |
statd Buffer Overflow |
Attack |
401001
Error Message
%ASA-4-401001: Shuns cleared
Explanation The clear shun command was entered to remove existing shuns from memory. An institution to keep a record of shunning activity was allowed.
Recommended Action None required.
401002
Error Message
%ASA-4-401002: Shun added: IP_address IP_address port port
Explanation A shun command was entered, where the first IP address is the shunned host. The other addresses and ports are optional and are used to terminate the connection if available. An institution to keep a record of shunning activity was allowed.
Recommended Action None required.
401003
Error Message
%ASA-4-401003: Shun deleted: IP_address
ExplanationA single shunned host was removed from the shun database. An institution to keep a record of shunning activity was allowed.
Recommended Action None required.
401004
Error Message
%ASA-4-401004: Shunned packet: IP_address ==> IP_address on interface interface_name
ExplanationA packet was dropped because the host defined by IP SRC is a host in the shun database. A shunned host cannot pass traffic on the interface on which it is shunned. For example, an external host on the Internet can be shunned on the outside interface. A record of the activity of shunned hosts was provided. This message and message %ASA-4-401005 can be used to evaluate further risk concerning this host.
Recommended Action None required.
401005
Error Message %ASA-4-401005: Shun add failed: unable to allocate resources for IP_address
IP_address
port
port
Explanation The Secure Firewall ASA is out of memory; a shun cannot be applied.
Recommended Action The Cisco IPS should continue to attempt to apply this rule. Try to reclaim memory and reapply a shun manually, or wait for the Cisco IPS to do this.
402114
Error Message %ASA-4-402114: IPSEC: Received an protocol packet (SPI= spi, sequence number= seq_num) from remote_IP to local_IP with an invalid SPI.
- >protocol— IPsec protocol
- >spi— IPsec Security Parameter Index
- seq_num>— IPsec sequence number
- remote_IP>— IP address of the remote endpoint of the tunnel
- >username— Username associated with the IPsec tunnel
- local_IP>— IP address of the local endpoint of the tunnel
ExplanationAn IPsec packet was received that specifies an SPI that does not exist in the SA database. This may be a temporary condition caused by slight differences in aging of SAs between the IPsec peers, or it may be because the local SAs have been cleared. It may also indicate incorrect packets sent by the IPsec peer, which may be part of an attack. This message is rate limited to no more than one message every five seconds.
Recommended ActionThe peer may not acknowledge that the local SAs have been cleared. If a new connection is established from the local router, the two peers may then reestablish connection successfully. Otherwise, if the problem occurs for more than a brief period, either attempt to establish a new connection or contact the peer administrator.
402115
Error Message %ASA-4-402115: IPSEC: Received a packet from remote_IP to local_IP containing act_prot data instead of exp_prot data.
Explanation An IPsec packet was received that is missing the expected ESP header. The peer is sending packets that do not match the negotiated security policy, which may indicate an attack. This message is rate limited to no more than one message every five seconds.
- remote_IP>— IP address of the remote endpoint of the tunnel
- local_IP>— IP address of the local endpoint of the tunnel
- >act_prot— Received IPsec protocol
- >exp_prot— Expected IPsec protocol
Recommended Action Contact the administrator of the peer.
402116
Error Message
%ASA-4-402116: IPSEC: Received an protocol packet (SPI= spi, sequence number= seq_num) from remote_ip (user= username) to local_ip. The decapsulated inner packet doesn't match the negotiated policy in the SA. The packet specifies its destination as pkt_daddr, its source as pkt_saddr, and its protocol as pkt_prot. The SA specifies its local proxy as id_daddr/id_dmask/id_dprot/id_dport and its remote_proxy as id_saddr/id_smask/id_sprot/id_sport.
Explanation: A decapsulated IPsec packet does not match the negotiated identity. The peer is sending other traffic through this security association, which may be caused by a security association selection error by the peer, or it may be part of an attack. This message is rate limited to no more than one message every five seconds.
- >protocol— IPsec protocol
- >spi— IPsec Security Parameter Index
- seq_num>— IPsec sequence number
- remote_ip>— IP address of the remote endpoint of the tunnel
- >username— Username associated with the IPsec tunnel
- local_ip>— IP address of the local endpoint of the tunnel
- pkt_daddr>— Destination address from the decapsulated packet
- pkt_saddr>— Source address from the decapsulated packet
- pkt_prot>— Transport protocol from the decapsulated packet
- id_daddr>— Local proxy IP address
- id_dmask>— Local proxy IP subnet mask
- id_dprot>— Local proxy transport protocol
- id_dport>— Local proxy port
- id_saddr>— Remote proxy IP address
- id_smask>— Remote proxy IP subnet mask
- id_sprot>— Remote proxy transport protocol
- id_sport>— Remote proxy port
Recommended ActionContact the administrator of the peer and compare policy settings.
402117
Error Message
%ASA-4-402117: IPSEC: Received a non-IPSec packet (protocol= protocol) from remote_IP to local_IP.
ExplanationThe received packet matched the crypto map ACL, but it is not IPsec-encapsulated. The IPsec peer is sending unencapsulated packets. This error can occur because of a policy setup error on the peer. For example, the firewall may be configured to only accept encrypted Telnet traffic to the outside interface port 23. If you attempt to use Telnet without IPsec encryption to access the outside interface on port 23, this message appears, but not with Telnet or traffic to the outside interface on ports other than 23. This error can also indicate an attack. This message is not generated except under these conditions (for example, it is not generated for traffic to the Secure Firewall ASA interfaces themselves). See messages 710001, 710002, and 710003, which track TCP and UDP requests. This message is rate limited to no more than one message every five seconds.
- >protocol— IPsec protocol
- remote_IP>— IP address of the remote endpoint of the tunnel
- local_IP>— IP address of the local endpoint of the tunnel
Recommended ActionContact the administrator of the peer to compare policy settings.
402118
Error Message %ASA-4-402118: IPSEC: Received an protocol packet (SPI= spi, sequence number= seq_num) from remote_IP (user= username) to local_IP containing an illegal IP fragment of length frag_len with offset frag_offset.
Explanation A decapsulatd IPsec packet included an IP fragment with an offset less than or equal to 128 bytes. The latest version of the security architecture for IP RFC recommends 128 bytes as the minimum IP fragment offset to prevent reassembly attacks. This may be part of an attack. This message is rate limited to no more than one message every five seconds.
- >protocol— IPsec protocol
- >spi— IPsec Security Parameter Index
- seq_num>— IPsec sequence number
- remote_IP>— IP address of the remote endpoint of the tunnel
- >username— Username associated with the IPsec tunnel
- local_IP>— IP address of the local endpoint of the tunnel
- frag_len>— IP fragment length
- frag_offset>— IP fragment offset in bytes
Recommended Action Contact the administrator of the remote peer to compare policy settings.
402119
Error Message %ASA-4-402119: IPSEC: Received an protocol packet (SPI= spi, sequence number= seq_num) from remote_IP (user= username) to local_IP that failed anti-replay checking.
ExplanationAn IPsec packet was received with an invalid sequence number. The peer is sending packets including sequence numbers that may have been previously used. This message indicates that an IPsec packet has been received with a sequence number outside of the acceptable window. This packet will be dropped by IPsec as part of a possible attack. This message is rate limited to no more than one message every five seconds.
- >protocol— IPsec protocol
- >spi— IPsec Security Parameter Index
- seq_num>— IPsec sequence number
- remote_IP>— IP address of the remote endpoint of the tunnel
- >username— Username associated with the IPsec tunnel
- local_IP>— IP address of the local endpoint of the tunnel
Recommended ActionContact the administrator of the peer.
402120
Error Message %ASA-4-402120: IPSEC: Received an protocol packet (SPI= spi, sequence number= seq_num) from remote_IP (user= username) to local_IP that failed authentication.
Explanation An IPsec packet was received and failed authentication. The packet is dropped. The packet may have been corrupted in transit, or the peer may be sending invalid IPsec packets, which may indicate an attack if many of these packets were received from the same peer. This message is rate limited to no more than one message every five seconds.
- >protocol— IPsec protocol
- >spi— IPsec Security Parameter Index
- seq_num>— IPsec sequence number
- remote_IP>— IP address of the remote endpoint of the tunnel
- >username— Username associated with the IPsec tunnel
- local_IP>— IP address of the local endpoint of the tunnel
Recommended Action Contact the administrator of the remote peer if many failed packets were received.
402121
Error Message %ASA-4-402121: IPSEC: Received an protocol packet (SPI= spi, sequence number= seq_num) from peer_addr (user= username) to lcl_addr that was dropped by IPSec (drop_reason).
Explanation An IPsec packet to be decapsulated was received and subsequently dropped by the IPsec subsystem. This may indicate a problem with the Secure Firewall ASA configuration or with the Secure Firewall ASA itself.
- >protocol— IPsec protocol
- >spi— IPsec Security Parameter Index
- seq_num>— IPsec sequence number
- peer_addr>— IP address of the remote endpoint of the tunnel
- >username— Username associated with the IPsec tunnel
- lcl_addr>— IP address of the local endpoint of the tunnel
- drop_reason>— Reason that the packet was dropped
Recommended Action If the problem persists, contact the Cisco TAC.
402122
Error Message %ASA-4-402122: IPSEC: Received a cleartext packet from src_addr to dest_addr that was to be encapsulated in IPSec that was dropped by IPSec (drop_reason).
Explanation A packet to be encapsulated in IPsec was received and subsequently dropped by the IPsec subsystem. This may indicate a problem with the Secure Firewall ASA configuration or with the Secure Firewall ASA itself.
- src_addr >— Source IP address
- dest_addr >— Destination> IP address
- drop_reason>— Reason that the packet was dropped
Recommended Action If the problem persists, contact the Cisco TAC.
402123
Error Message %ASA-4-402123: CRYPTO: The accel_type hardware accelerator encountered an error (eror_type, code= error_string) while executing the command command_name (command).
Explanation An error was detected while running a crypto command with a hardware accelerator, which may indicate a problem with the accelerator. This type of error may occur for a variety of reasons, and this message supplements the crypto accelerator counters to help determine the cause.
- accel_type—Hardware accelerator type
- >error_string— Code indicating the type of error
- command—Crypto command that generated the error
Recommended Action If the problem persists, contact the Cisco TAC.
402124
Error Message-1 %ASA-4-402124: CRYPTO: The platform hardware accelerator encountered an error (HWErrAddr= 0xerror_address, Core= error_core, HwErrCode= error_code, IstatReg= 0xIstat, PciErrReg= 0xPCI, CoreErrStat= 0xcore_error_stat, CoreErrAddr= 0xcore_err_address, Doorbell Size[0]= size, DoorBell Outstanding[0]= outstanding, Doorbell Size[1]= size, DoorBell Outstanding[1]= outstanding, SWReset= Reset_code)
Error Message-2 %ASA-4-402124: CRYPTO: The platform hardware accelerator encountered an error (HWErrAddr= 0xerror_address, Core= error_core, HwErrCode= error_code, Queue= queue_string (0), IstatReg= 0xIstat, Station= core_station, CoreRptr= 0xcore_pointer, CoreConfig= 0xcore_config_pointer, SWReset= Reset_code)
Explanation The crypto hardware chip has reported a fatal error, indicating that the chip is inoperable. The information from this message captures the details to allow further analysis of the problem. The crypto chip is reset when this condition is detected to unobtrusively allow the Secure Firewall ASA to continue functioning. Also, the crypto environment at the time this issue is detected is written to a crypto archive directory on flash to provide further debugging information. Various parameters related to the crypto hardware are included in this message, as follows:
- HWErrAddr>— Hardware address (set by crypto chip)
- Core>— Crypto core experiencing the error
- HwErrCode>— Hardware error code (set by crypto chip)
- IstatReg>— Interrupt status register (set by crypto chip)
- PciErrReg>— PCI error register (set by crypto chip)
- CoreErrStat>— Core error status (set by crypto chip)
- CoreErrAddr>— Core error address (set by crypto chip)
- Doorbell Size>— Maximum crypto commands allowed
- DoorBell Outstanding>— Crypto commands outstanding
- SWReset>— Number of crypto chip resets since boot
![]() Note |
The %ASA-vpn-4-402124: CRYPTO: The ASA hardware accelerator encountered an error (HWErrAddr= 0x40EE9800, Core= 0, HwErrCode= 23, IstatReg= 0x8, PciErrReg= 0x0, CoreErrStat= 0x41, CoreErrAddr= 0x844E9800, Doorbell Size[0]= 2048, DoorBell Outstanding[0]= 0, Doorbell Size[1]= 0, DoorBell Outstanding[1]= 0, SWReset= 99) error message indicates a AnyConnect problem and the workaround for this to upgrade to AnyConnect 3.1.x. |
Recommended Action Forward the message information to the Cisco TAC for further analysis.
402125
Error Message-1
%ASA-4-402125: CRYPTO: The platform hardware accelerator ring_string ring timed out (Desc= 0xdescriptor_address, CtrlStat= 0xcontrol_or_status value, ResultP= 0xsuccess_pointer, ResultVal= success_value, Cmd= 0xcrypto_command, CmdSize= command_size, Param= 0xcommand_parameters, Dlen= Data_length, DataP= 0xData_pointer, CtxtP= 0xVPN_context_pointer, SWReset= reset_number)
Explanation The crypto driver has detected that either the IPSEC descriptor ring or SSL/Admin descriptor ring is no longer progressing, meaning the crypto chip no longer appears to be functioning. The crypto chip is reset when this condition is detected to unobtrusively allow the Secure Firewall ASA to continue functioning. Also, the crypto environment at the time this issue was detected was written to a crypto archive directory on flash to provide further debugging information.
- >ring— IPSEC or Admin ring
- parameters >— Include the following:
- Desc>— Descriptor address
- CtrlStat>— Control/status value
- ResultP>— Success pointer
- ResultVal>— Success value
- Cmd>— Crypto command
- CmdSize>— Command size
- Param>— Command parameters
- Dlen>— Data length
- DataP>— Data pointer
- CtxtP>— VPN context pointer
- SWReset>— Number of crypto chip resets since boot
Recommended Action Forward the message information to the Cisco TAC for further analysis.
402126
Error Message %ASA-4-402126: CRYPTO: The platform created Crypto Archive File <Archive_Filename> as a Soft Reset was necessary. Please forward this archived information to Cisco
Explanation A functional problem with the hardware crypto chip was detected (see syslog messages 402124 and 402125). To further debug the crypto problem, a crypto archive file was generated that included the current crypto hardware environment (hardware registers and crypto description entries). At boot time, a crypto_archive directory was automatically created on the flash file system (if it did not exist previously). A maximum of two crypto archive files are allowed to exist in this directory.
- >Archive Filename— The name of the crypto archive file name. The crypto archive file names are of the form, crypto_arch_x.bin, where x = (1 or 2).
Recommended Action Forward the crypto archive files to the Cisco TAC for further analysis.
402127
Error Message
%ASA-4-402127: CRYPTO: The platform is skipping the writing of latest Crypto Archive File as the maximum # of files ( max_number ) allowed have been written to <archive_directory>. Please archive remove files from < Archive Directory > if you want more Crypto Archive Files saved
Explanation A functional problem with the hardware crypto chip was detected (see messages 4402124 and 4402125). This message indicates a crypto archive file was not written, because the maximum number of crypto archive files already existed.
- max_number >— Maximum number of files allowed in the archive directory; currently set to two
- >archive_directory— Name of the archive directory
Recommended Action Forward previously generated crypto archive files to the Cisco TAC. Remove the previously generated archive file(s) so that more can be written (if deemed necessary).
402128
Error Message
%ASA-5-402128: CRYPTO: An attempt to allocate a large memory block failed, size: size, limit: limit.
Explanation An SSL connection is attempting to use more memory than allowed. The request has been denied.
- size —The size of the memory block being allocated
- limit —The maximum size of allocated memory permitted
Recommended Action If this message persists, an SSL denial of service attack may be in progress. Contact the remote peer administrator or upstream provider.
402129
Error Message %ASA-6-402129: CRYPTO: An attempt to release a DMA memory block failed, location: address.
Explanation An internal software error has occurred.
- address —The address being freed
Recommended Action Contact the Cisco TAC for assistance.
402130
Error Message %ASA-6-402130: CRYPTO: Received an ESP packet (SPI = xxxxxxxxxx, sequence number=xxxx) from 172.16.0.1 (user=user) to 192.168.0.2
with incorrect IPsec padding.
Explanation The Secure Firewall ASA crypto hardware accelerator detected an IPsec packet with invalid padding. The ATT VPN client sometimes pads IPsec packets incorrectly.
-
SPI —The SPI associated with the packet
-
sequence number —The sequence number associated with the packet
-
user —Username string
-
padding —Padding data from the packet
Recommended Action While this message is None required and does not indicate a problem with the Secure Firewall ASA, customers using the ATT VPN client may wish to upgrade their VPN client software.
402131
Error Message %ASA-4-402131: CRYPTO: status changing the accel_instance hardware accelerator's configuration bias from old_config_bias to new_config_bias.
Explanation The hardware accelerator configuration has been changed on the Secure Firewall ASA. Some Secure Firewall ASA platforms have multiple hardware accelerators. One syslog message is generated for each hardware accelerator change.
- status —Indicates success or failure
- accel_instance —The instance of the hardware accelerator
- old_config_bias —The old configuration
- new_config_bias —The new configuration
Recommended Action If any of the accelerators fails when attempting to change its configuration, collect logging information and contact the Cisco TAC. If a failure occurs, the software will retry the configuration change multiple times. The software will fall back to the original configuration bias if the retry attempts fail. If multiple attempts to reconfigure the hardware accelerator fail, it may indicate a hardware failure.
402140
Error Message %ASA-3-402140: CRYPTO: RSA key generation error: modulus len len
Explanation An error occurred during an RSA public key pair generation.
- len —The prime modulus length in bits
Recommended Action Contact the Cisco TAC for assistance.
402141
Error Message %ASA-3-402141: CRYPTO: Key zeroization error: key set 'type', reason 'reason'
Explanation An error occurred during an RSA public key pair generation.
- type —The key set type, which can be any of the following: DH, RSA, DSA, or unknown
- reason —The unexpected crypto session type
Recommended Action Contact the Cisco TAC for assistance.
402142
Error Message
%ASA-3-402142: CRYPTO: Bulk data op error: algorithm 'alg', mode 'mode'
Explanation An error occurred during a symmetric key operation.
- op —The operation, which can be either encryption or decryption
- alg —The encryption algorithm, which can be any of the following: DES, 3DES, AES, or RC4
- mode —The mode, which can be any of the following: CBC, CTR, CFB, ECB, stateful-RC4, or stateless-RC4
Recommended Action Contact the Cisco TAC for assistance.
402143
Error Message %ASA-3-402143: CRYPTO: alg type key op error
Explanation An error occurred during an asymmetric key operation.
- alg —The encryption algorithm, which can be either RSA or DSA
- type —The key type, which can be either public or private
- op —The operation, which can be either encryption or decryption
Recommended Action Contact the Cisco TAC for assistance.
402144
Error Message
%ASA-3-402144: CRYPTO: Digital signature error: signature algorithm 'sig', hash algorithm 'hash'
Explanation An error occurred during digital signature generation.
- sig —The signature algorithm, which can be either RSA or DSA
- hash —The hash algorithm, which can be any of the following: MD5, SHA1, SHA256, SHA384, or SHA512
Recommended Action Contact the Cisco TAC for assistance.
402145
Error Message
%ASA-3-402145: CRYPTO: Hash generation error: algorithm 'hash'
Explanation A hash generation error occurred.
- hash —The hash algorithm, which can be any of the following: MD5, SHA1, SHA256, SHA384, or SHA512
Recommended Action Contact the Cisco TAC for assistance.
402146
Error Message
%ASA-3-402146: CRYPTO: Keyed hash generation error: algorithm 'hash', key len len
Explanation A keyed hash generation error occurred.
- hash —The hash algorithm, which can be any of the following: MD5, SHA1, SHA256, SHA384, or SHA512
- len —The key length in bits
Recommended Action Contact the Cisco TAC for assistance.
402147
Error Message
%ASA-3-402147: CRYPTO: HMAC generation error: algorithm 'alg'
Explanation An HMAC generation error occurred.
- alg —The HMAC algorithm, which can be any of the following: HMAC-MD5, HMAC-SHA1, HMAC-SHA2, or AES-XCBC
Recommended Action Contact the Cisco TAC for assistance.
402148
Error Message %ASA-3-402148: CRYPTO: Random Number Generator error
Explanation A random number generator error occurred.
Recommended Action Contact the Cisco TAC for assistance.
402149
Error Message %ASA-3-402149: CRYPTO: Weak encryption_type (length) provided. Operation disallowed. Not FIPS 140-2 compliant
Explanation The Secure Firewall ASA tried to use an RSA key that is less than 2048 bits or DH groups 1, 2, or 5.
- encryption type —The encryption type
- length —The RSA key length or DH group number
Recommended Action Configure the Secure Firewall ASA or external application to use an RSA key that is at least 2048 bits, or to configure a DH group that is not 1, 2, or 5.
402150
Error Message %ASA-3-402150: CRYPTO: Deprecated hash algorithm used for RSA operation (hash_alg). Operation disallowed. Not FIPS 140-2 compliant
Explanation An unacceptable hashing algorithm has been used for digital certificate signing or verification for FIPS 140-2 certification.
- operation —Sign or verify
- hash alg —The name of the unacceptable hashing algorithm
Recommended Action Make sure that you use the minimum acceptable hashing algorithm for digital certificate signing or verification for FIPS 140-2 certification. These include SHA-256, SHA-384, and SHA-512.
403101
Error Message
%ASA-4-403101: PPTP session state not established, but received an XGRE packet, tunnel_id=number, session_id=number
Explanation The ASA received a PPTP XGRE packet without a corresponding control connection session.
Recommended Action If the problem persists, contact the Cisco TAC.
403102
Error Message
%ASA-4-403102: PPP virtual interface interface_name rcvd pkt with invalid protocol: protocol, reason: reason
Explanation The module received an XGRE encapsulated PPP packet with an invalid protocol field.
Recommended Action If the problem persists, contact the Cisco TAC.
403103
Error Message
%ASA-4-403103: PPP virtual interface max connections reached
Explanation The module cannot accept additional PPTP connections.Connections are allocated as soon as they are available.
Recommended Action None required.
403104
Error Message
%ASA-4-403104: PPP virtual interface interface_name requires mschap for MPPE
Explanation The MPPE was configured, but MS-CHAP authentication was not.
Recommended Action Add MS-CHAP authentication with the vpdn group group_name ppp authentication command.
403106
Error Message
%ASA-4-403106: PPP virtual interface interface_name requires RADIUS aaa server for MPPE
Explanation The MPPE was configured, but RADIUS authentication was not.
Recommended Action Add RADIUS authentication with the vpdn group group_name ppp authentication command.
403107
Error Message
%ASA-4-403107: PPP virtual interface interface_name missing aaa server group info
Explanation The AAA server configuration information cannot be found.
Recommended Action Add the AAA server information with the vpdn group group_name client authentication aaa aaa_server_group command.
403108
Error Message
%ASA-4-403108: PPP virtual interface interface_name missing client ip address option
Explanation The client IP address pool information is missing.
Recommended Action Add IP address pool information with the vpdn group group_name client configuration address local address_pool_name command.
403109
Error Message
%ASA-4-403109: Rec'd packet not a PPTP packet.
(ip) dest_addr= ip, src_addr= dest_address, data: source_address
Explanation The module received a spoofed PPTP packet, which may indicate a hostile event.
Recommended Action Contact the administrator of the peer to check the PPTP configuration settings.
403110
Error Message
%ASA-4-403110: PPP virtual interface interface_name, user: user missing MPPE key from aaa server
Explanation The AAA server was not returning the MPPE key attributes required to set up the MPPE encryption policy.
Recommended Action Check the AAA server configuration. If the AAA server cannot return MPPE key attributes, use local authentication instead by entering the vpdn group group_name client authentication local command.
403500
Error Message
%ASA-6-403500: PPPoE - Service name 'any' not received in interface_name. AC:ac_name.
Explanation The Secure Firewall ASA requested the PPPoE service any from the access controller at the Internet service provider. The response from the service provider includes other services, but does not include the service any . This is a discrepancy in the implementation of the protocol. The PADO packet is processed normally, and connection negotiations continue.
Recommended Action None required.
403501
Error Message %ASA-3-403501: PPPoE - Bad host-unique in PADO - packet dropped. AC:interface_name.
Explanation The Secure Firewall ASA sent an identifier called the host-unique value to the access controller. The access controller responded with a different host-unique value. The Secure Firewall ASA was unable to identify the corresponding connection request for this response. The packet was dropped, and connection negotiations were discontinued.
Recommended Action Contact the Internet service provider. Either the access controller at the service provider is mishandling the host-unique value, or the PADO packet is being forged.
403502
Error Message
%ASA-3-403502: PPPoE - Bad host-unique in PADS - packet dropped. AC:interface_name.
Explanation The Secure Firewall ASA sent an identifier called the host-unique value to the access controller. The access controller responded with a different host-unique value. The Secure Firewall ASA was unable to identify the corresponding connection request for this response. The packet was dropped, and connection negotiations were discontinued.
Recommended Action Contact the Internet service provider. Either the access controller at the service provider is mishandling the host-unique value, or the PADO packet is being forged.
403503
Error Message %ASA-3-403503: Header_string:PPP link down[:reason string]
Explanation The PPP link has gone down. There are many reasons why this can happen. The first format will display a reason if PPP provides one.
Recommended Action Check the network link to ensure that the link is connected. The access concentrator may be down. Make sure that your authentication protocol matches the access concentrator and that your name and password are correct. Verify this information with your ISP or network support person.
403504
Error Message %ASA-3-403504: group_name:No 'vpdn group' for PPPoE has been created!
Explanation PPPoE requires a dial-out configuration before starting a PPPoE session. In general, the configuration should specify a dialing policy, the PPP authentication, the username, and a password. The following example configures the Secure Firewall ASA for PPPoE dialout. The my-username and my-password commands are used to authenticate the access concentrator, using PAP if necessary.
For example:
ciscoasa# vpdn group my-pppoe request dialout pppoe
ciscoasa# vpdn group my-pppoe ppp authentication pap
ciscoasa# vpdn group my-pppoe localname my-username
ciscoasa# vpdn username my-username password my-password
ciscoasa# ip address outside pppoe setroute
Recommended Action Configure a VPDN group for PPPoE.
403505
Error Message
%ASA-4-403505: PPPoE:PPP - Unable to set default route to IP_address at interface_name. interface
Explanation This message is usually followed by the message, default route already exists.
Recommended Action Remove the current default route or remove the setroute parameter so that there is no conflict between PPPoE and the manually configured route.
403506
Error Message
%ASA-4-403506: PPPoE: failed to assign PPP address IP_address netmask netmask at interface
interface_name
Explanation This message is followed by one of the followings messages: subnet is the same as interface, or on failover channel.
Recommended Action In the first case, change the address causing the conflict. In the second case, configure the PPPoE on an interface other than the failover interface.
403507
Error Message %ASA-3-403507: PPPoE:PPPoE client on interface interface failed to locate PPPoE vpdn group group_name
Explanation You can configure the PPPoE client on an interface to use a particular VPDN group by entering the pppoe client vpdn group group_name command. If a PPPoE VPDN group of the configured name was not located during system startup, this message is generated.
- interface —The interface on which the PPPoE client failed
- group_name —The VPDN group name of the PPPoe client on the interface
Recommended Action Perform the following steps:
- Add the required VPDN group by entering the vpdn group group_name command. Request dialout PPPoE in global configuration mode, and add all the group properties.
- Remove the pppoe client vpdn group group_name command from the interface indicated. In this case, the PPPoE client will attempt to use the first PPPoE VPDN group defined.
![]() Note |
All changes take effect only after the PPPoE client on the interface is restarted by entering the ip address pppoe command. |
405001
Error Message %ASA-4-405001: Received ARP {request | response} collision from ip_address/MAC_address on interface interface_name with existing ARP entry ip_address/MAC_address
Explanation The Secure Firewall ASA received an ARP packet, and the MAC address in the packet differs from the ARP cache entry.
Recommended Action This traffic might be legitimate, or it might indicate that an ARP poisoning attack is in progress. Check the source MAC address to determine where the packets are coming from and to see if they belong to a valid host.
405002
Error Message %ASA-4-405002: Received mac mismatch packet from IP_address/{MAC_bytes|MAC_address} for authenticated host
Explanation This packet appears for one of the following conditions:
- The Secure Firewall ASA received a packet with the same IP address, but a different MAC address from one of its uauth entries.
- You configured the vpnclient mac-exempt command on the Secure Firewall ASA, and the Secure Firewall ASA received a packet with an exempt MAC address, but a different IP address from the corresponding uauth entry.
Recommended Action This traffic might be legitimate, or it might indicate that a spoofing attack is in progress. Check the source MAC address and IP address to determine where the packets are coming from and if they belong to a valid host.
405003
Error Message %ASA-4-405003: IP address collision detected between host ip_address at MAC_address and interface interface_name, MAC_address
Explanation A client IP address in the network is the same as the Secure Firewall ASA interface IP address.
Recommended Action Change the IP address of the client.
405101
Error Message-1
%ASA-4-405101: Unable to Pre-allocate H225 Call Signalling Connection for faddr foreign_ip_address to laddr local_ip_address/local_port
Error Message-2
%ASA-4-405101: Unable to Pre-allocate H225 Call Signalling Connection for faddr foreign_ip_address/foreign_port to laddr local_ip_address
Explanation The module failed to allocate RAM system memory while starting a connection or has no more address translation slots available.
Recommended Action If this message occurs periodically, it can be ignored. You can check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of translates and connections. This error message may also be caused by insufficient memory; try reducing the amount of memory usage, or purchasing additional memory. If the problem persists, contact the Cisco TAC.
405102
Error Message-1 %ASA-4-405102: Unable to Pre-allocate H245 Connection for faddr foreign_ip_address to laddr local_ip_address/local_port
Error Message-2 %ASA-4-405102: Unable to Pre-allocate H245 Connection for faddr foreign_ip_address/foreign_port to laddr local_ip_address
Explanation The Secure Firewall ASA failed to allocate RAM system memory while starting a connection or has no more address translation slots available.
Recommended Action Check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of translations and connections. In addition, reduce the amount of memory usage, or purchase additional memory. If this message occurs periodically, it can be ignored. If the problem persists, contact the Cisco TAC.
405103
Error Message
%ASA-4-405103: H225 message from source_address/source_port to dest_address/dest_port contains bad protocol discriminator hex
Explanation The Secure Firewall ASA is expecting the protocol discriminator, 0x08, but it received something other than 0x08. The endpoint may be sending a bad packet, or received a message segment other than the first segment. The packet is allowed through.
Recommended Action None required.
405104
Error Message %ASA-4-405104: H225 message string received from outside_address/outside_port to inside_address/inside_port before SETUP
Explanation An H.225 message was received out of order, before the initial SETUP message, which is not allowed. The Secure Firewall ASA must receive an initial SETUP message for that H.225 call signalling channel before accepting any other H.225 messages.
Recommended Action None required.
405105
Error Message %ASA-4-405105: H323 RAS message AdmissionConfirm received from source_address/source_port to dest_address/dest_port without an AdmissionRequest
Explanation A gatekeeper has sent an ACF, but the Secure Firewall ASA did not send an ARQ to the gatekeeper.
Recommended Action Check the gatekeeper with the specified source_address to determine why it sent an ACF without receiving an ARQ from the Secure Firewall ASA.
405106
Error Message
%ASA-4-405106: H323
num channel is not created from %I/%d to %I/%d %s
Explanation The ASA tried to create a match condition on the H.323 media-type channel. See the match media-type command for more information.
Recommended Action None required.
405107
Error Message
%ASA-4-405107: H245 Tunnel is detected and connection dropped
from %I/%d to %I/%d %s
Explanation An H.323 connection has been dropped because of an attempted H.245 tunnel control during call setup. See the h245-tunnel-block command for more information.
Recommended Action None required.
405201
Error Message
%ASA-4-405201: ILS ILS_message_type from inside_interface:source_IP_address/port to outside_interface:destination_IP_address/port has wrong embedded address embedded_IP_address
Explanation The embedded address in the ILS packet payload was not the same as the source IP address of the IP packet header.
Recommended Action Check the host specified with the source_IP_address to determine why it sent an ILS packet with an incorrect embedded IP address.
405300
Error Message
%ASA-4-405300: Radius Accounting Request received from from_addr is not allowed
Explanation The accounting request came from a host that was not configured in the policy map. The message is logged and processing stops.
- from_addr —The IP address of the host sending the request
Recommended Action If the host was configured to send RADIUS accounting messages to the ASA, make sure that it was configured in the correct policy map that was applied to the service policy. If the host was not configured to send RADIUS accounting messages to the ASA, then check to see why the messages are being sent. If the messages are illegitimate, then create the proper ACLs to drop the packets.
405301
Error Message
%ASA-4-405301: Attribute attribute_number does not match for user user_ip
Explanation When the validate-attribute command was entered, the attribute values stored in the accounting request start received do not match those stored in the entry, if it exists.
- attribute_number —The RADIUS attribute to be validated with RADIUS accounting. Values range from 1 to 191. Vendor-specific attributes are not supported.
- user_ip —The IP address (framed IP attribute) of the user.
Recommended Action None required.
406001
Error Message %ASA-4-406001: FTP port command low port: IP_address/port to IP_address on interface interface_name
Explanation A client entered an FTP port command and supplied a port less than 1024 (in the well-known port range usually devoted to server ports). This is indicative of an attempt to avert the site security policy. The Secure Firewall ASA drops the packet, terminates the connection, and logs the event.
Recommended Action None required.
406002
Error Message
%ASA-4-406002: FTP port command different address: IP_address(IP_address) to IP_address on interface interface_name
Explanation A client entered an FTP port command and supplied an address other than the address used in the connection. An attempt to avert the site security policy occurred. For example, an attacker might attempt to hijack an FTP session by changing the packet on the way, and putting different source information instead of the correct source information. The Secure Firewall ASA drops the packet, terminates the connection, and logs the event. The address in parentheses is the address from the port command.
Recommended Action None required.
407001
Error Message %ASA-4-407001: Deny traffic for local-host interface_name:inside_address, license limit of number exceeded
Explanation The host limit was exceeded. An inside host is counted toward the limit when one of the following conditions is true:
- The inside host has forwarded traffic through the Secure Firewall ASA within the last five minutes.
- The inside host has reserved an xlate connection or user authentication at the Secure Firewall ASA.
Recommended Action The host limit is enforced on the low-end platforms. Use the show version command to view the host limit. Use the show local-host command to view the current active hosts and the inside users that have sessions at the Secure Firewall ASA. To forcefully disconnect one or more users, use the clear local-host command. To expire the inside users more quickly from the limit, set the xlate, connection, and uauth timeouts to the recommended values or lower as given in the table below:
|
Timeout |
Recommended Value |
|---|---|
|
xlate |
00:05:00 (five minutes) |
|
conn |
00:01:00 (one hour) |
|
uauth |
00:05:00 (five minutes) |
407002
Error Message %ASA-4-407002: Embryonic limit for through connections exceeded nconns/elimit. outside_address/outside_port to global_address(inside_address)/inside_port on interface interface_name
Explanation The number of connections from a specified foreign address over a specified global address to the specified local address exceeded the maximum embryonic limit for that static. The Secure Firewall ASA tries to accept the connection if it can allocate memory for that connection. It proxies on behalf of the local host and sends a SYN_ACK packet to the foreign host. The Secure Firewall ASA retains pertinent state information, drops the packet, and waits for the acknowledgment from the client. The message might indicate legitimate traffic or that a DoS attack is in progress.
Recommended Action Check the source address to determine where the packets are coming from and whether or not a valid host is sending them.
407003
Error Message
%ASA-4-407003: Established limit for RPC services exceeded
Explanation The Secure Firewall ASA tried to open a new hole for a pair of RPC servers or services that have already been configured after the maximum number of holes has been met.
Recommended Action Wait for other holes to be closed (through associated timeout expiration), or limit the number of active pairs of servers or services.
408001
Error Message %ASA-4-408001: IP route counter negative
Explanation An attempt to decrement the IP route counter into a negative value failed.
Recommended Action Enter the clear ip route command to reset the route counter. If the problem persists, contact the Cisco TAC.
408101
Error Message
%ASA-4-408101: KEYMAN : Type encrption_type encryption unknown. Interpreting keystring as literal.
Explanation The format type was not recognized by the system. A keystring format type value of 0 (unencrypted keystring) or 7 (hidden keystring), followed by a space, can precede the actual keystring to indicate its format. An unknown type value will be accepted, but the system will consider the keystring as being unencrypted.
Recommended Action Use the correct format for the value type or remove the space following the value type.
408102
Error Message
%ASA-4-408102: KEYMAN : Bad encrypted keystring for key id key_id.
Explanation The system could not successfully decrypt an encrypted keystring. The keystring may have been corrupted during system configuration.
Recommended Action Re-enter the key-string command, and reconfigure the key string.
409014
Error Message
%ASA-4-409014: No valid authentication send key is available on interface nameif.
Explanation The authentication key configured on the interface is not valid.
Recommended Action Configure a new key.
409015
Error Message
%ASA-4-409015: Key ID key-id
received on interface nameif.
Explanation The ID is not found in the configured key chain.
Recommended Action Configure a new security association with the Key ID.
409016
Error Message
%ASA-4-409016: Key chain name key-chain-name on nameif is invalid.
Explanation The key-chain name configured under OSPF interface does not match global key chain configuration.
Recommended ActionFix configuration. Either remove OSPF authentication command or configure key chain in global configuration mode.
409017
Error Message
%ASA-4-409017: Key ID key-id in key chain key-chain-name is invalid.
Explanation The Key ID configured in the key chain is out of range for OSPF. This may happen because the key chain allows Key ID values of the range which is not acceptable for OSPF.
Recommended Action Configure a new security association with a Key ID that is in the range 1-255.
409023
Error Message %ASA-4-409023: Attempting AAA Fallback method method_name for request_type request for user user : Auth-server group Auth-server unreachable
Explanation An authentication or authorization attempt to an external server has failed and will be performed using the local user database.
- aaa_operation—Either authentication or authorization
- username—The user associated with the connection
- server_group—The name of the AAA server whose servers were unreachable
Recommended Action Investigate any connectivity problems with the AAA servers configured in the first method. Ping the authentication servers from the Secure Firewall ASA. Make sure that the daemons are running on the AAA server.

Feedback