<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic %FTD Duplicate TCP SYN from inside  to outside with different initial in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057411#M1110644</link>
    <description>&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;I'm receiving hundreds of warning messages i am getting in our syslog from our Cisco ASA 5516-x. The warning message is:&lt;/P&gt;&lt;P&gt;Message: %FTD-4-419002: Duplicate TCP SYN from it-client-ap:10.245.xx.1x/54557 to outside:5x.1xx.1x9.x/443 with different initial sequence number&lt;BR /&gt;Message: %FTD-4-419002: Duplicate TCP SYN from it-client-ap:10.245.xx.1x/50650 to outside:5x.1xx.1x9.x/443 with different initial sequence number&lt;BR /&gt;Message: %FTD-4-419002: Duplicate TCP SYN from it-client-ap:10.245.xx.1x/50650 to outside:5x.1xx.1x9.x/443 with different initial sequence number&lt;/P&gt;&lt;P&gt;This messages appears during working hours when users connected to WIFI office VLAN using the inside ASA port (it-client-ap) and maybe on other vlans like LAN but what im facing now is big numbers of warning massages coming through that interface above&lt;/P&gt;&lt;P&gt;im not sure if this is kind of flooding attack of kid of DoS attacks but how can i resolve this issue and what kind of show commands that i can use to troubleshoot and try to solve ,&lt;/P&gt;&lt;P&gt;Note: Also i have no problems with any services on my private network, like internet connection and VPN S2S works fine, though I'm still concerned about what's going on because there's large amount of those logs per day&lt;/P&gt;&lt;P&gt;Current ASA version is : Cisco ASA5516-X Threat Defense (75) Version 7.0.1 (Build 84)&lt;BR /&gt;Also no routing configured on ASA and ASA is directly connected to L3 core switch&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_1-1712331470872.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214986iB3A3FB66C723C733/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_1-1712331470872.png" alt="amralrazzaz_1-1712331470872.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_0-1712331612135.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214987i4336423384F2BC60/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_0-1712331612135.png" alt="amralrazzaz_0-1712331612135.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Apr 2024 15:40:42 GMT</pubDate>
    <dc:creator>amralrazzaz</dc:creator>
    <dc:date>2024-04-05T15:40:42Z</dc:date>
    <item>
      <title>%FTD Duplicate TCP SYN from inside  to outside with different initial</title>
      <link>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057411#M1110644</link>
      <description>&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;I'm receiving hundreds of warning messages i am getting in our syslog from our Cisco ASA 5516-x. The warning message is:&lt;/P&gt;&lt;P&gt;Message: %FTD-4-419002: Duplicate TCP SYN from it-client-ap:10.245.xx.1x/54557 to outside:5x.1xx.1x9.x/443 with different initial sequence number&lt;BR /&gt;Message: %FTD-4-419002: Duplicate TCP SYN from it-client-ap:10.245.xx.1x/50650 to outside:5x.1xx.1x9.x/443 with different initial sequence number&lt;BR /&gt;Message: %FTD-4-419002: Duplicate TCP SYN from it-client-ap:10.245.xx.1x/50650 to outside:5x.1xx.1x9.x/443 with different initial sequence number&lt;/P&gt;&lt;P&gt;This messages appears during working hours when users connected to WIFI office VLAN using the inside ASA port (it-client-ap) and maybe on other vlans like LAN but what im facing now is big numbers of warning massages coming through that interface above&lt;/P&gt;&lt;P&gt;im not sure if this is kind of flooding attack of kid of DoS attacks but how can i resolve this issue and what kind of show commands that i can use to troubleshoot and try to solve ,&lt;/P&gt;&lt;P&gt;Note: Also i have no problems with any services on my private network, like internet connection and VPN S2S works fine, though I'm still concerned about what's going on because there's large amount of those logs per day&lt;/P&gt;&lt;P&gt;Current ASA version is : Cisco ASA5516-X Threat Defense (75) Version 7.0.1 (Build 84)&lt;BR /&gt;Also no routing configured on ASA and ASA is directly connected to L3 core switch&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_1-1712331470872.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214986iB3A3FB66C723C733/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_1-1712331470872.png" alt="amralrazzaz_1-1712331470872.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_0-1712331612135.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214987i4336423384F2BC60/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_0-1712331612135.png" alt="amralrazzaz_0-1712331612135.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2024 15:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057411#M1110644</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-05T15:40:42Z</dc:date>
    </item>
    <item>
      <title>Re: %FTD Duplicate TCP SYN from inside  to outside with different init</title>
      <link>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057420#M1110645</link>
      <description>&lt;P&gt;check is there is any asymmetric in routing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2024 15:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057420#M1110645</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-05T15:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: %FTD Duplicate TCP SYN from inside  to outside with different init</title>
      <link>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057423#M1110646</link>
      <description>&lt;P&gt;Can you please share with me more details and how to check !?&amp;nbsp;&lt;/P&gt;&lt;P&gt;No routing configured on the&amp;nbsp; ASA its just&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP---ASA---L3 CORE SWITCH&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_0-1712331821796.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214988iDF4618E98BAC967A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_0-1712331821796.png" alt="amralrazzaz_0-1712331821796.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2024 15:44:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057423#M1110646</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-05T15:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: %FTD Duplicate TCP SYN from inside  to outside with different init</title>
      <link>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057517#M1110651</link>
      <description>&lt;P&gt;It clear there is no need routing all subnet direct connect (except defualt route for internet it needed...)&lt;/P&gt;
&lt;P&gt;Check this link&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100830-asa-pix-netattacks.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100830-asa-pix-netattacks.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It can DDoS so shun the IP or add ACL drop connect from this IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 18:17:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057517#M1110651</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-06T18:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: %FTD Duplicate TCP SYN from inside  to outside with different init</title>
      <link>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057541#M1110656</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361173"&gt;@amralrazzaz&lt;/a&gt; if this traffic is from source inside to outside, then a device on the inside of the network is either spoofing traffic or misbehaving.&lt;/P&gt;
&lt;SECTION class="body conbody"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Error Message &lt;/STRONG&gt;&lt;CODE class="ph codeph"&gt;%&lt;SPAN class="ph"&gt;FTD&lt;/SPAN&gt;-4-419002: Received duplicate TCP SYN from &lt;EM class="ph i"&gt;in_interface&lt;/EM&gt; :&lt;EM class="ph i"&gt;src_address&lt;/EM&gt; /&lt;EM class="ph i"&gt;src_port&lt;/EM&gt; to &lt;EM class="ph i"&gt;out_interface&lt;/EM&gt; :&lt;EM class="ph i"&gt;dest_address&lt;/EM&gt; /&lt;EM class="ph i"&gt;dest_port&lt;/EM&gt; with different initial sequence number.&lt;/CODE&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Explanation &lt;/STRONG&gt; A duplicate TCP SYN was received during the three-way-handshake that has a different initial sequence number from the SYN that opened the embryonic connection. &lt;U&gt;This may indicate that SYNs are being spoofed.&lt;/U&gt; This message occurs in Release 7.0.4.1 and later.&lt;/P&gt;
&lt;P class="p"&gt;Is it just the one device (10.245.xx.1x) or multiple devices generating these alerts?&lt;/P&gt;
&lt;P class="p"&gt;I would physically find the device(s) that is generating these events and see if its a rogue device or there is an issue with it and if needs be remove it from the network.&lt;/P&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Fri, 05 Apr 2024 18:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057541#M1110656</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-05T18:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: %FTD Duplicate TCP SYN from inside  to outside with different init</title>
      <link>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057581#M1110661</link>
      <description>&lt;P&gt;Dear its coming from multiple devices , i thin whenever there is client connected to wifi office it keep sending these kind of waring massages from them to our syslog system not only one device and once all these client disconnected from the wifi office network this massage disappeared&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2024 18:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5057581#M1110661</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-05T18:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: %FTD Duplicate TCP SYN from inside  to outside with different init</title>
      <link>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5058343#M1110678</link>
      <description>&lt;P&gt;Can show me how to shun the IP addresses which appears on logsys and what does shun do to that ip , is it blocking that ip totally from accessing the network or just block the huge traffic coming from that device ! because i have more devices with same massages coming from them!&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 12:02:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-duplicate-tcp-syn-from-inside-to-outside-with-different/m-p/5058343#M1110678</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-06T12:02:21Z</dc:date>
    </item>
  </channel>
</rss>

