mayhem87 wrote: » Have you tried pinging out the ASA during the drop time? Can you confirm ARP entries on CORE, ASA, and IBR for the next hops compared to when its working? How long are the drops? Assuming short enough that the dead timer on BGP isn't hit < 3 mins. Have you tried taking packet captures from the ASA to confirm traffic? IE you see your pings hit inside asa vs actually exiting interface to IBR and never returning.
Edit - Just thinking about things, if the FW was completely blocking traffic, the BGP relationship between the core and IBR should go down. That timer should be 3 minutes though, and the outages are right around that time, so it's possible the ASA still causes issues but that BGP relationship stays up. I could potentially lower this timer to something to the tune of 20 60 so it could potentially make the problem more obvious and point some fingers at the ASA further? I assume this would take down BGP briefly, so I should probably hold off on that.
mayhem87 wrote: » This is what I was looking at. I believe your issue is between the CORE - ASA - IBR and that since your bgp relationship isn't dropping that somewhat suggests that the outage is less than 3 minutes. Honestly my first go to in a situation like this would be packet captures on the firewall and checking ARP entries. The packet capture would be definitive in telling you where the problem is. You could even do two at the same time. I would do a packet on your inside interface looking for your IP or some test machine ip that is running a continuous ping to a destination that wouldn't likely be used by your company. From there I would take a packet capture from the outside and then once the issue happens you can stop them and look at it. There might be some other things to look at but when it comes to weird intermittent issues my defacto standard is a packet capture. Personally I do cli for the ASA caps unless for some reason i need to get them off the box. An easy way would just be "cap capin interface <inside> match ip host <your ip or test box> host <destination>" "cap capout interface <outside> match ip any host <destination>" reason second is different is cause i dont know where you are natting and it would probably be easier to look at. Now you could limit these to just icmp but this is just a quick capture. To show captures: show cap capin show cap capout To turn off: no cap capin no cap capout Also I don't think that the ASA is rejecting all connections. This could be some PAT exhaustion as well or something else. I still question the ARP as well.