<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Odd looking %ASA-6-106015: Deny TCP (no connection) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/odd-looking-asa-6-106015-deny-tcp-no-connection/m-p/3189366#M1065859</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; The information provided is a bit vague, but, this is for sure some security mechanism being handled by Firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let´s see one possibility here:&lt;/P&gt;&lt;H3&gt;302304&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Error Message&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;%ASA-6-302304: Teardown TCP state-bypass connection&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;conn_id&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from&lt;EM&gt;initiator_interface&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;:ip/port to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;responder_interface&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;:ip/port&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;duration&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;bytes&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;teardown reason&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Explanation&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;A new TCP connection has been torn down, and this connection is a TCP-state-bypass connection. This type of connection bypasses all the TCP state checks and additional security checks and inspections.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;duration&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;—The duration of the TCP connection&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;bytes&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;—The total number of bytes transmitted over the TCP connection&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;teardown reason&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;—The reason for the teardown of the TCP connection&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Recommended Action&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If you need to secure TCP traffic with all the normal TCP state checks as well as all other security checks and inspections, you can use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;no set connection advanced-options tcp-state-bypass&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command to disable this feature for TCP traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;If you provide in more detail where this torn down comes from, we may find the preciselly reason.&lt;/P&gt;</description>
    <pubDate>Tue, 26 Sep 2017 02:27:06 GMT</pubDate>
    <dc:creator>Flavio Miranda</dc:creator>
    <dc:date>2017-09-26T02:27:06Z</dc:date>
    <item>
      <title>Odd looking %ASA-6-106015: Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/odd-looking-asa-6-106015-deny-tcp-no-connection/m-p/3189304#M1065858</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hoping someone can explain what's happening here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's what I see in the&amp;nbsp;3 events below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Connection is built between src:10.102.0.40/52845 and dest:10.102.89.80/8089.&lt;/P&gt;&lt;P&gt;2. Firewall immediately denies the connection because there is no existing connection between src:10.102.89.80/8089 and dest:10.102.0.40:52845.&lt;/P&gt;&lt;P&gt;3. Connection between&amp;nbsp;&lt;SPAN&gt;src:10.102.89.80/8089 and dest:10.102.0.40:52845 is torn down.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's puzzling to me is why are the source and dest IP's swapped in the built and teardown events? Could this have anything to do with why the connection is immediately torn down?&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/1274i37BFF003E8A76FAF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cisco.jpg" alt="Cisco.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco2.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/1275iE53FDF088D5B41BC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cisco2.jpg" alt="Cisco2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco3.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/1276i4DAC5BD434C539BE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cisco3.jpg" alt="Cisco3.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco4.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/1277i36C860C13737F705/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cisco4.JPG" alt="Cisco4.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:21:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-looking-asa-6-106015-deny-tcp-no-connection/m-p/3189304#M1065858</guid>
      <dc:creator>Cheerio</dc:creator>
      <dc:date>2020-02-21T14:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: Odd looking %ASA-6-106015: Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/odd-looking-asa-6-106015-deny-tcp-no-connection/m-p/3189366#M1065859</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; The information provided is a bit vague, but, this is for sure some security mechanism being handled by Firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let´s see one possibility here:&lt;/P&gt;&lt;H3&gt;302304&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Error Message&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;%ASA-6-302304: Teardown TCP state-bypass connection&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;conn_id&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from&lt;EM&gt;initiator_interface&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;:ip/port to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;responder_interface&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;:ip/port&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;duration&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;bytes&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;teardown reason&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Explanation&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;A new TCP connection has been torn down, and this connection is a TCP-state-bypass connection. This type of connection bypasses all the TCP state checks and additional security checks and inspections.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;duration&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;—The duration of the TCP connection&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;bytes&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;—The total number of bytes transmitted over the TCP connection&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;teardown reason&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;—The reason for the teardown of the TCP connection&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Recommended Action&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If you need to secure TCP traffic with all the normal TCP state checks as well as all other security checks and inspections, you can use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;no set connection advanced-options tcp-state-bypass&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command to disable this feature for TCP traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;If you provide in more detail where this torn down comes from, we may find the preciselly reason.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2017 02:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-looking-asa-6-106015-deny-tcp-no-connection/m-p/3189366#M1065859</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-09-26T02:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: Odd looking %ASA-6-106015: Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/odd-looking-asa-6-106015-deny-tcp-no-connection/m-p/3189909#M1065860</link>
      <description>&lt;P&gt;Hello and thanks for responding.&lt;/P&gt;&lt;P&gt;There is no&amp;nbsp;302304&amp;nbsp;in my events. Did you mean to lookup 302014?&lt;/P&gt;&lt;P&gt;As far as the teardown, I assume it's due to the 106015.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2017 22:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-looking-asa-6-106015-deny-tcp-no-connection/m-p/3189909#M1065860</guid>
      <dc:creator>Cheerio</dc:creator>
      <dc:date>2017-09-26T22:08:22Z</dc:date>
    </item>
  </channel>
</rss>

