THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
22-May-17 |
Initial Release |
10.0 |
11-Oct-17 |
Migration to new field notice system |
10.1 |
15-Jul-20 |
Updated Terminology |
Affected OS Type | Affected Software Product | Affected Release | Affected Release Number | Comments |
---|---|---|---|---|
NON-IOS |
Adaptive Security Appliance (ASA) Software |
Interim |
9.1.7 Interim, 9.6.2 Interim, 9.7.1 Interim, 9.4.4 Interim, 9.4.3 Interim, 9.2.4 Interim, 9.5.3 Interim |
|
NON-IOS |
Adaptive Security Appliance (ASA) Software |
9 |
9.1.7,9.2.4,9.4.3,9.4.4,9.5.3,9.6.2,9.6.3,9.7.1 |
|
NON-IOS |
Firepower Threat Defense (FTD) Software |
6.1 |
6.1.0.1, 6.1.0.2 |
|
NON-IOS |
Firepower Threat Defense (FTD) Software |
6.2 |
6.2.0 |
Defect ID | Headline |
---|---|
CSCvd78303 | ARP functions fail after 213 days of uptime, drop with error 'punt-rate-limit-exceeded' |
All Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) devices that run the affected software versions do not pass network traffic after approximately 213 days 12 hours (~ 5,124 hours) of uptime.
In the near term, immediately reboot the deployed security appliances in order to prevent this issue.
On March 29, 2017 Cisco became aware of an issue that affects all Cisco ASA and Cisco FTD security appliances that run certain versions of software. The affected versions of software cause the security appliance to stop passing network traffic after approximately 213 days 12 hours (~ 5,124 hours) of uptime.
The issue detailed in this Field Notice is not a security vulnerability and there is no associated risk to the integrity of the security appliance.
The Cisco ASA and Cisco FTD security appliances stop passing all network traffic.
Entering the show asp drop command over the console port will indicate that packets are being dropped due to the reason Punt rate limit exceeded (punt-rate-limit).
In order to mitigate the risk and impact of the device not passing network traffic, Cisco urges customers to proactively reboot their Cisco ASA and Cisco FTD security appliances that run affected versions of the software.
For customers with failover configurations, it is recommended to reboot the standby devices first, make them active after they complete booting, and then reboot the formerly active devices. Customers with clustering configurations should remove one standby device at a time from the cluster, reboot them, and rejoin them until each standby device has been rebooted. Then, move the active device to one of the rebooted devices and then remove that device from the cluster, reboot it, and then have it rejoin.
The reboot of the security appliance must be performed prior to 213 days 12 hours of uptime. After the reboot, the security appliance avoids an encounter with this issue for another 213 days 12 hours.
Enter the show version | grep up command in order to display the uptime of the security appliance.
The output is shown here:
ciscoasa# show version | grep up Config file at boot was "startup-config" ciscoasa up 210 days 11 hours failover cluster up 210 days 11 hours
The device can be rebooted with one of these methods.
For ASA security appliances:
CLI - Enter the reload command in privileged mode.
ASDM GUI - Choose Tools > System Reload.
For FTD security appliances:
CLI - Enter the reboot command in privileged mode.
Firepower Management Center - Choose Devices > Device Management, double-click FTD, then choose the Device tab. In the System section, click the Restart Device icon.
For both ASA and FTD security appliances, a physical power-cycle can be used in order to perform a reboot.
Updated ASA and FTD software versions that address this issue are available from Cisco Software Central for customers with a valid service contract. The recommended upgrade paths are shown in the table below.
Impacted Software Version(s) | Fixed Software Version(s) |
---|---|
FTD 6.1(0)1, 6.1(0)2 | FTD 6.1(0)3 or later |
FTD 6.2(0) | FTD 6.2(0)1 or later |
ASA 9.1(7)9, 9.1(7)11, 9.1(7)12, 9.1.(7)13, 9.1(7)15 | ASA 9.1(7)16 or later |
ASA 9.2(4)15, 9.2(4)17, 9.2(4)18 | ASA 9.2(4)20 or later |
ASA 9.4(3)6, 9.4(3)8, 9.4(3)11, 9.4(3)12, 9.4(4), 9.4(4)2 | ASA 9.4(4)5 or later |
ASA 9.5(3), 9.5(3)1, 9.5(3)2, 9.5(3)6 | ASA 9.6(3)1 or later |
ASA 9.6(2)1, 9.6(2)2, 9.6(2)3, 9.6(2)4, 9.6(2)7, 9.6(2)11, 9.6(2)13, 9.6(3) | ASA 9.6(3)1 or later |
ASA 9.7(1), 9.7(1)2 | ASA 9.7(1)4 or later |
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
Cisco Notification Service—Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.
Unleash the Power of TAC's Virtual Assistance