Customers with clustering configurations should remove one slave at a time from the cluster, reboot them, and rejoin them until each slave has been rebooted. In order to mitigate the risk and impact of the device not passing network traffic, Cisco urges customers to proactively reboot their Cisco ASA and Cisco FTD security appliances that run affected versions of the software.įor customers with failover configurations, it is recommended to reboot the standby devices first, make them active after they complete booting, and then reboot the formerly active devices. The Cisco ASA and Cisco FTD security appliances stop passing all network traffic.Įntering the show asp drop command over the console port will indicate that packets are being dropped due to the reason punt-rate-limit-exceeded.
The issue detailed in this Field Notice is not a security vulnerability and there is no associated risk to the integrity of the security appliance.
#HOW TO RESET CISCO 5505 ASA SOFTWARE#
The affected versions of software cause the security appliance to stop passing network traffic after approximately 213 days 12 hours (~ 5,124 hours) of uptime. On MaCisco became aware of an issue that affects all Cisco ASA and Cisco FTD security appliances that run certain versions of software.
In the near term, immediately reboot the deployed security appliances in order to prevent this issue. All Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) devices that run the affected software versions do not pass network traffic after approximately 213 days 12 hours (~ 5,124 hours) of uptime.