Messages 201002 to 210022
This chapter includes messages from 201002 to 210022.
201002
Error Message
%ASA-3-201002: Too many TCP connections on {static|xlate} global_address ! econns nconns
Explanation The maximum number of TCP connections to the specified global address was exceeded.
- econns—The maximum number of embryonic connections
- nconns—The maximum number of connections permitted for the static or xlate global address
Recommended Action Use the show static or show nat command to check the limit imposed on connections to a static address. The limit is configurable.
201003
Error Message
%ASA-2-201003: Embryonic limit exceeded nconns/elimit for outside_address/outside_port (global_address ) inside_address /inside_port on interface interface_name
Explanation The number of embryonic connections from the specified foreign address with the specified static global address to the specified local address exceeds the embryonic limit. When the limit on embryonic connections to the Secure Firewall ASA is reached, the Secure Firewall ASA attempts to accept them anyway, but puts a time limit on the connections. This situation allows some connections to succeed even if the Secure Firewall ASA is very busy. This message indicates a more serious overload than message 201002, which can be caused by a SYN attack, or by a very heavy load of legitimate traffic.
- nconns—The maximum number of embryonic connections received
- elimit —The maximum number of embryonic connections specified in the static or nat command
Recommended Action Use the show static command to check the limit imposed on embryonic connections to a static address.
201004
Error Message
%ASA-3-201004: Too many UDP connections on {static|xlate} global_address!udp connections limit
Explanation The maximum number of UDP connections to the specified global address was exceeded.
-
udp conn limit—The maximum number of UDP connections permitted for the static address or translation
Recommended Action Use the show static or show nat command to check the limit imposed on connections to a static address. You can configure the limit.
201005
Error Message
%ASA-3-201005: FTP data connection failed for IP_address IP_address
Explanation The Secure Firewall ASA cannot allocate a structure to track the data connection for FTP because of insufficient memory.
Recommended Action Reduce the amount of memory usage or purchase additional memory.
201006
Error Message
%ASA-3-201006: RCMD backconnection failed for IP_address/port.
Explanation The Secure Firewall ASA cannot preallocate connections for inbound standard output for rsh commands because of insufficient memory.
Recommended Action Check the rsh client version; the Secure Firewall ASA only supports the Berkeley rsh client version. You can also reduce the amount of memory usage, or purchase additional memory.
201008
Error Message
%ASA-3-201008: Disallowing new connections.
Explanation You have enabled TCP system log messaging and the syslog server cannot be reached, or when using the ASA syslog server (PFSS) and the disk on the Windows NT system is full, or when the auto-update timeout is configured and the auto-update server is not reachable.
Recommended Action Disable TCP syslog messaging. If using PFSS, free up space on the Windows NT system where PFSS resides. Also, make sure that the syslog server is up and you can ping the host from the ASA console. Then restart TCP system message logging to allow traffic. If the Auto Update Server has not been contacted for a certain period of time, enter the [no] auto-update timeout period command to have it stop sending packets.
201009
Error Message
%ASA-3-201009: TCP connection limit of number for host IP_address on interface_name exceeded
Explanation The maximum number of connections to the specified static address was exceeded.
- number—The maximum of connections permitted for the host
- IP_address—The host IP address
- interface_name— The name of the interface to which the host is connected
Recommended Action Use the show static and show nat commands to check the limit imposed on connections to an address. The limit is configurable.
201010
Error Message
%ASA-6-201010: Embryonic connection limit exceeded econns/limit for dir packet from source_address/source_port to dest_address/dest_port on interface interface_name
Explanation An attempt to establish a TCP connection failed because of an exceeded embryonic connection limit, which was configured with the set connection embryonic-conn-max MPC command for a traffic class.
To reduce the impact of anomalous incoming traffic on ASA's different management or data interfaces and protocols, the interfaces are configured with a default embryonic limit of 100. This syslog message appears when the embryonic connections to ASA interface exceeds 100. This default value cannot be modified or disabled.
- econns—The current count of embryonic connections associated to the configured traffic class
- limit—The configured embryonic connection limit for the traffic class
- dir—input: The first packet that initiates the connection is an input packet on the interface interface_name output: The first packet that initiates the connection is an output packet on the interface interface_name
- source_address/source_port —The source real IP address and the source port of the packet initiating the connection
- dest_address/dest_port —The destination real IP address and the destination port of the packet initiating the connection
- interface_name—The name of the interface on which the policy limit is enforced
Recommended Action None required.
201011
Error Message
%ASA-3-201011: Connection limit exceeded cnt /limit for dir packet from sip /sport to dip /dport on interface if_name .
Explanation A new connection through the Secure Firewall ASA resulted in exceeding at least one of the configured maximum connection limits. This message applies both to connection limits configured using a static command, or to those configured using Cisco Modular Policy Framework. The new connection will not be allowed through the Secure Firewall ASA until one of the existing connections is torn down, which brings the current connection count below the configured maximum.
- cnt —Current connection count
- limit —Configured connection limit
- dir —Direction of traffic, inbound or outbound
- sip —Source real IP address
- sport —Source port
- dip —Destination real IP address
- dpor t—Destination port
- if_name —Name of the interface on which the traffic was received
Recommended Action None required.
201012
Error Message
%ASA-6-201012: Per-client embryonic connection limit exceeded curr num /limit for [input|output] packet from IP_address / port to ip /port on interface interface_name
Explanation An attempt to establish a TCP connection failed because the per-client embryonic connection limit was exceeded. By default, this message is rate limited to 1 message every 10 seconds.
- curr num—The current number
- limit—The configured limit
- [input|output]—Input or output packet on interface interface_name
- IP_address—Real IP address
- port—TCP or UDP port
- interface_name—The name of the interface on which the policy is applied
Recommended Action When the limit is reached, any new connection request will be proxied by the Secure Firewall ASA to prevent a SYN flood attack. The Secure Firewall ASA will only connect to the server if the client is able to finish the three-way handshake. This usually does not affect the end user or the application. However, if this creates a problem for any application that has a legitimate need for a higher number of embryonic connections, you can adjust the setting by entering the set connection per-client-embryonic-max command.
201013
Error Message
%ASA-3-201013: Per-client connection limit exceeded curr num /limit for [input|output] packet from ip /port to ip /port on interface interface_name
Explanation A connection was rejected because the per-client connection limit was exceeded.
- curr num—The current number
- limit—The configured limit
- [input|output]—The input or output packet on interface interface_name
- ip—The real IP address
- port—The TCP or UDP port
- interface_name—The name of the interface on which the policy is applied
Recommended Action When the limit is reached, any new connection request will be silently dropped. Normally an application will retry the connection, which will cause a delay or even a timeout if all retries also fail. If an application has a legitimate need for a higher number of concurrent connections, you can adjust the setting by entering the set connection per-client-max command.
202001
Error Message
%ASA-3-202001: Out of address translation slots!
Explanation The ASA has no more address translation slots available.
Recommended Action Check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of translates and connections. This error message can also be caused by insufficient memory; reduce the amount of memory usage, or purchase additional memory, if possible.
202005
Error Message
%ASA-3-202005: Non-embryonic in embryonic list
outside_address/outside_port inside_address/inside_port
Explanation A connection object (xlate) is in the wrong list.
Recommended Action Contact the Cisco TAC.
202010
(With flow) Error Message
%ASA-3-202010: [NAT | PAT] pool exhausted in pool pool-name IP ip_address, port range [1-511 | 512-1023 | 1024-65535]. Unable to create protocol connection from in-interface :src-ip /src-port to out-interface :dst-ip /dst-port
(Without flow) Error Message
%ASA-3-202010: [NAT | PAT] pool exhausted in pool pool-name IP ip_address. Unable to create connection.
Explanation
- pool-name —The name of the NAT or PAT pool. If the interface PAT or mapped IP is a raw address, pool name is logged as empty string ("").
- protocol —The protocol used to create the connection
- in-interface —The ingress interface
- src-ip —The source IP address
- src-port —The source port
- out-interface —The egress interface
- dest-ip —The destination IP address
- dst-port —The destination port
The Secure Firewall ASA has no more address translation pools available.
Recommended Action Use the show nat pool and show nat detail commands to determine why all addresses and ports in the pool are used up. If this occurs under normal conditions, then add additional IP addresses to the NAT/PAT pool.
202016
Error Message
%ASA-3-202016: "%d: Unable to pre-allocate SIP %s secondary channel for message" \ "from %s:%A/%d to %s:%A/%d with PAT and missing
port information.\n"
Explanation
When SIP application generates an SDP payload with Media port set to 0, you cannot allocate a PAT xlate for such invalid port request and drop the packet with this syslog.
Recommended Action None. This is an application specific issue.
208005
Error Message
%ASA-3-208005: (function:line_num) clear command return code
Explanation The Secure Firewall ASA received a nonzero value (an internal error) when attempting to clear the configuration in flash memory. The message includes the reporting subroutine filename and line number.
Recommended Action For performance reasons, the end host should be configured not to inject IP fragments. This configuration change is probably because of NFS. Set the read and write size equal to the interface MTU for NFS.
209003
Error Message
%ASA-4-209003: Fragment database limit of number exceeded: src = source_address , dest = dest_address , proto = protocol , id = number
Explanation Too many IP fragments are currently awaiting reassembly. By default, the maximum number of fragments is 200 (to raise the maximum, see the fragment size command in the command reference guide). The Secure Firewall ASA limits the number of IP fragments that can be concurrently reassembled. This restriction prevents memory depletion at the Secure Firewall ASA under abnormal network conditions. In general, fragmented traffic should be a small percentage of the total traffic mix. An exception is in a network environment with NFS over UDP where a large percentage is fragmented traffic; if this type of traffic is relayed through the Secure Firewall ASA, consider using NFS over TCP instead. To prevent fragmentation, see the sysopt connection tcpmss bytes command in the command reference guide.
Recommended Action If this message persists, a denial of service (DoS) attack might be in progress. Contact the remote peer administrator or upstream provider.
209004
Error Message
%ASA-4-209004: Invalid IP fragment, size = bytes exceeds maximum size = bytes : src = source_address , dest = dest_address , proto = protocol , id = number
Explanation An IP fragment is malformed. The total size of the reassembled IP packet exceeds the maximum possible size of 65,535 bytes.
Recommended Action A possible intrusion event may be in progress. If this message persists, contact the remote peer administrator or upstream provider.
209005
Error Message
%ASA-4-209005: Discard IP fragment set with more than number elements: src = Too many elements are in a fragment set.
Explanation The Secure Firewall ASA disallows any IP packet that is fragmented into more than 24 fragments. For more information, see the fragment command in the command reference guide.
Recommended Action A possible intrusion event may be in progress. If the message persists, contact the remote peer administrator or upstream provider. You can change the number of fragments per packet by using the fragment chain xxx interface_name command.
209006
Error Message
%ASA-4-209006: Fragment queue threshold exceeded, dropped protocol fragment from IP address/port to IP address/port on outside interface.
Explanation The Secure Firewall ASA drops the fragmented packets when the fragment database threshold, that is 2/3 of the queue size per interface, has exceeded.
Recommended Action None required.
210001
Error Message
%ASA-3-210001: LU sw_module_name error = number
Explanation A Stateful Failover error occurred.
Recommended Action If this error persists after traffic lessens through the Secure Firewall ASA, report this error to the Cisco TAC.
210002
Error Message
%ASA-3-210002: LU allocate block (bytes ) failed.
Explanation Stateful Failover cannot allocate a block of memory to transmit stateful information to the standby Secure Firewall ASA.
Recommended Action Check the failover interface using the show interface command to make sure its transmit is normal. Also check the current block memory using the show block command. If current available count is 0 within any of the blocks of memory, then reload the Secure Firewall ASA software to recover the lost blocks of memory.
210003
Error Message
%ASA-3-210003: Unknown LU Object number
Explanation Stateful Failover received an unsupported Logical Update object and was unable to process it. This can be caused by corrupted memory, LAN transmissions, and other events.
Recommended Action If you see this error infrequently, then no action is required. If this error occurs frequently, check the Stateful Failover link LAN connection. If the error was not caused by a faulty failover link LAN connection, determine if an external user is trying to compromise the protected network. Also check for misconfigured clients.
210005
Error Message
%ASA-3-210005: LU allocate secondary (optional ) connection failed for protocol [TCP |UDP ] connection from ingress interface name :Real IP Address /Real Port to egress interface name :Real IP Address /Real Port
Explanation Stateful Failover cannot allocate a new connection on the standby unit. This may be caused by little or no RAM memory available within the Secure Firewall ASA. This could additionally be caused by flow creation failure due to resource limitation or reaching configured resource usage limits.
Note |
The secondary field in the syslog message is optional and appears only if the connection is a secondary connection. |
Recommended Action Check the available memory using the show memory command to make sure that the Secure Firewall ASA has free memory. If there is no available memory, add more physical memory to the Secure Firewall ASA. Check resource limitation using the show resource usage command and show asp drop to ensure that the device is not reaching the resource limitation.
210006
Error Message
%ASA-3-210006: LU look NAT for IP_address failed
Explanation Stateful Failover was unable to locate a NAT group for the IP address on the standby unit. The active and standby Secure Firewall ASAs may be out-of-sync with each other.
Recommended Action Use the write standby command on the active unit to synchronize system memory with the standby unit.
210007
Error Message
%ASA-3-210007: LU allocate xlate failed for type [static | dynamic ]-[NAT | PAT ] secondary(optional)
protocol translation from ingress interface name :Real IP Address /real port (Mapped IP Address /Mapped Port ) to egress interface name :Real IP Address /Real Port (Mapped IP Address /Mapped Port )
Explanation Stateful Failover failed to allocate a translation slot record.
Recommended Action Check the available memory by using the show memory command to make sure that the Secure Firewall ASA has free memory available. If no memory is available, add more memory.
210008
Error Message
%ASA-3-210008: LU no xlate for inside_address /inside_port
outside_address /outside_port
Explanation The Secure Firewall ASA cannot find a translation slot record for a Stateful Failover connection; as a result, the Secure Firewall ASA cannot process the connection information.
Recommended Action Use the write standby command on the active unit to synchronize system memory between the active and standby units.
210010
Error Message
%ASA-3-210010: LU make UDP connection for outside_address :outside_port
inside_address :inside_port failed
Explanation Stateful Failover was unable to allocate a new record for a UDP connection.
Recommended Action Check the available memory by using the show memory command to make sure that the Secure Firewall ASA has free memory available. If no memory is available, add more memory.
210020
Error Message
%ASA-3-210020: LU PAT port port reserve failed
Explanation Stateful Failover is unable to allocate a specific PAT address that is in use.
Recommended Action Use the write standby command on the active unit to synchronize system memory between the active and standby units.
210021
Error Message
%ASA-3-210021: LU create static xlate global_address ifc interface_name failed
Explanation Stateful Failover is unable to create a translation slot.
Recommended Action Enter the write standby command on the active unit to synchronize system memory between the active and standby units.
210022
Error Message
%ASA-6-210022: LU missed number updates
Explanation Stateful Failover assigns a sequence number for each record sent to the standby unit. When a received record sequence number is out of sequence with the last updated record, the information in between is assumed to be lost, and this error message is sent as a result.
Recommended Action Unless LAN interruptions occur, check the available memory on both Secure Firewall ASA units to ensure that enough memory is available to process the stateful information. Use the show failover command to monitor the quality of stateful information updates.