Preview Tool

Cisco Bug: CSCvs47205 - ASA HA IKEv2 VTI spams CREATE CHILD SA and IKE INIT following a volume-based rekey

Last Modified

Dec 23, 2019

Products (1)

  • Cisco ASA 5500-X Series Firewalls

Known Affected Releases

9.8(2.50) 9.8(4)

Description (partial)

On an ASA in HA (active/standby) with a Virtual Tunnel Interface, if a volume based rekey occurs, then sometime later the ASA will begin to send large quantities of CREATE CHILD SA messages for the tunnel that had a volume based rekey.
When the tunnel goes down, the ASA will begin to send large quantities of IKE INIT messages to this same tunnel.

ASA in active/standby
Volume based rekey enabled (enabled by default)
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.