<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MY logs from Firepower 5516-x  are filled with error and warning m in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5075054#M1111508</link>
    <description>&lt;P&gt;Dear its not by data interface its only by management interface ! but its not stable and the webserver GUI like 60% of the time is down and then coming up again! which means something like DDoS attack or hundreds of massages coming to syslog from outside as requests to access and denied for sure ! But im not sure if this is reason of down time the https GUI ! i can reach to ASA via putty SSH normally anytime but GUI no coz always not stable between up and down !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One Note:&lt;/P&gt;&lt;P&gt;i think when i applied the below command the GUI connectivity back to stability but on other hands the users at office complain of no internet connection because its shunned all ip addresses which cause TCP SYN ACK issue !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat-Detection-Scanning-shun&lt;/STRONG&gt;&lt;SPAN&gt;: :-&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;threat-detection scanning-threat&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;threat-detection rate scanning-threat rate-interval 1200 average-rate 250 burst-rate 550&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;threat-detection scanning-threat shun&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;threat-detection scanning-threat shun duration 1000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Then i removed it again to return back the internet connection to users !!&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Apr 2024 08:49:07 GMT</pubDate>
    <dc:creator>amralrazzaz</dc:creator>
    <dc:date>2024-04-22T08:49:07Z</dc:date>
    <item>
      <title>MY logs from Firepower 5516-x  are filled with error and warning msg</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058362#M1110679</link>
      <description>&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;I'm receiving hundreds of warning messages i am getting in our syslog from our Cisco ASA 5516-x. The warning message are on below same as screenshots and dunt know how to act with these kind of massages as its huge numbers of massages coming and dunt know how to stop or its kind of attack or what ?&lt;/P&gt;&lt;P&gt;Note: im using free syslog system called visual syslog server app and its an open source app and ASA version is&amp;nbsp;&lt;SPAN&gt;Cisco ASA5516-X Threat Defense (75) Version 7.0.1 (Build 84) ,&lt;/SPAN&gt;&lt;SPAN&gt;Also no routing configured on ASA and ASA is directly connected to L3 core switch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_0-1712406556457.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215063i03B3C0AC51291720/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_0-1712406556457.png" alt="amralrazzaz_0-1712406556457.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_1-1712406591979.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215064i8B5AFCCADAE7F7E9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_1-1712406591979.png" alt="amralrazzaz_1-1712406591979.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;who are these IPs coming from ! i think attackers trying to access outside IF of ASA which directly connected to ISP router and how to stop this ? its huge number of massages coming and cannot stop !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to block the incoming weak ports such as ping/telnet/ssh also traffic from internet to ASA OUTSIDE interface with ip 192.168.1.73 ?? i think something running trying to access ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Apr 2024 15:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058362#M1110679</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-21T15:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058437#M1110680</link>
      <description>&lt;P&gt;I will assume that this continue of your previous unsolved issue&amp;nbsp;&lt;BR /&gt;the solution as I and other mention is&amp;nbsp;&lt;BR /&gt;deny IP or shun it (if it single IP)&lt;BR /&gt;set the embryonic TCP connection per client&amp;nbsp;&lt;BR /&gt;if Not help you&amp;nbsp;&lt;BR /&gt;use Thread Detection in ASA, this check the TCP failed 3-way handshake and shun the IP for specific duration&amp;nbsp; (configurable)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html" target="_blank"&gt;Ascertain ASA Threat Detection Functionality and Configuration - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 13:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058437#M1110680</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-06T13:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058440#M1110681</link>
      <description>&lt;P&gt;shall i collect all these unknow IP addresses and shun them all !? these IP addresses coming from outside to inside or trying to access my system some how if im right according to the massages on syslog !? if yes so how to shun them all from ASA FTD GUI ? shall i use flexconnect option ! can u share with me please how ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;outside:&lt;BR /&gt;received (in 1984295.120 secs):&lt;BR /&gt;231191595 packets 186672209093 bytes&lt;BR /&gt;1 pkts/sec 94001 bytes/sec&lt;BR /&gt;transmitted (in 1984295.120 secs):&lt;BR /&gt;144647652 packets 62228603626 bytes&lt;BR /&gt;1 pkts/sec 31001 bytes/sec&lt;BR /&gt;1 minute input rate 16 pkts/sec, 4230 bytes/sec&lt;BR /&gt;1 minute output rate 13 pkts/sec, 5582 bytes/sec&lt;BR /&gt;1 minute drop rate, 0 pkts/sec&lt;BR /&gt;5 minute input rate 13 pkts/sec, 3383 bytes/sec&lt;BR /&gt;5 minute output rate 11 pkts/sec, 4858 bytes/sec&lt;BR /&gt;5 minute drop rate, 0 pkts/sec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also regarding the Duplicate TCP SYN massages forming from internet clients who are connecting to wifi office !! shall i shun them also ? and what is shun doing exactly ?&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 13:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058440#M1110681</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-06T13:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058504#M1110682</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361173"&gt;@amralrazzaz&lt;/a&gt; the error in your log - 710003 does indicate an attack. Multiple IP addresses tried connecting to 192.168.1.73 using SSH, this was denied as you do not allow connections from those source IP addresses. No need to shun as the FTD has already denied those connections, as per the message.&lt;/P&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Error Message &lt;/STRONG&gt;&lt;CODE class="ph codeph"&gt; %&lt;SPAN class="ph"&gt;FTD&lt;/SPAN&gt;-3-710003: {TCP|UDP} access denied by ACL from &lt;EM class="ph i"&gt;source_IP/source_port&lt;/EM&gt; to &lt;EM class="ph i"&gt;interface_name&lt;/EM&gt; :&lt;EM class="ph i"&gt;dest_IP/service&lt;/EM&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Explanation &lt;/STRONG&gt;The &lt;SPAN class="ph"&gt;Secure Firewall Threat Defense device&lt;/SPAN&gt; denied an attempt to connect to the interface service. For example, the &lt;SPAN class="ph"&gt;Secure Firewall Threat Defense device&lt;/SPAN&gt; received an SNMP request from an unauthorized SNMP management station. If this message appears frequently, it can indicate an attack.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 13:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058504#M1110682</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-06T13:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058554#M1110683</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Thanks dear and i have &lt;EM&gt;&lt;STRONG&gt;1st question&lt;/STRONG&gt;&lt;/EM&gt; , so these hundreds of massages coming to syslog i can ignore as all these connections denied already form outside to 192.168.1.73 (outside ASA i/f)?&amp;nbsp; and this is the part of accessing from internet or outside to my ASA using outside I/F ! so shall i ignore ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;2nd question&lt;/EM&gt; is for&amp;nbsp;%FTD Duplicate TCP SYN from inside to outside with different initial !!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This messages appears during working hours when users connected to WIFI office VLAN using the inside ASA port (it-client-ap)&amp;nbsp; and its disappearing when users leave office ! so i have just apply the below action using flexconnect but actually I'm not sure if this will do something or i have to remove ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_0-1712413984107.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215084i1CF65EF1A842D7B8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_0-1712413984107.png" alt="amralrazzaz_0-1712413984107.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_1-1712414002299.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215085i8455132551E259CD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_1-1712414002299.png" alt="amralrazzaz_1-1712414002299.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;ASAFTD# show running-config all threat-detection&lt;BR /&gt;threat-detection rate dos-drop rate-interval 600 average-rate 100 burst-rate 400&lt;BR /&gt;threat-detection rate dos-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;BR /&gt;threat-detection rate bad-packet-drop rate-interval 600 average-rate 100 burst-rate 400&lt;BR /&gt;threat-detection rate bad-packet-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;BR /&gt;threat-detection rate acl-drop rate-interval 600 average-rate 400 burst-rate 800&lt;BR /&gt;threat-detection rate acl-drop rate-interval 3600 average-rate 320 burst-rate 640&lt;BR /&gt;threat-detection rate conn-limit-drop rate-interval 600 average-rate 100 burst-rate 400&lt;BR /&gt;threat-detection rate conn-limit-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;BR /&gt;threat-detection rate icmp-drop rate-interval 600 average-rate 100 burst-rate 400&lt;BR /&gt;threat-detection rate icmp-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;BR /&gt;threat-detection rate scanning-threat rate-interval 600 average-rate 5 burst-rate 10&lt;BR /&gt;threat-detection rate scanning-threat rate-interval 3600 average-rate 4 burst-rate 8&lt;BR /&gt;threat-detection rate syn-attack rate-interval 600 average-rate 100 burst-rate 200&lt;BR /&gt;threat-detection rate syn-attack rate-interval 3600 average-rate 80 burst-rate 160&lt;BR /&gt;threat-detection rate fw-drop rate-interval 600 average-rate 400 burst-rate 1600&lt;BR /&gt;threat-detection rate fw-drop rate-interval 3600 average-rate 320 burst-rate 1280&lt;BR /&gt;threat-detection rate inspect-drop rate-interval 600 average-rate 400 burst-rate 1600&lt;BR /&gt;threat-detection rate inspect-drop rate-interval 3600 average-rate 320 burst-rate 1280&lt;BR /&gt;threat-detection rate interface-drop rate-interval 600 average-rate 2000 burst-rate 8000&lt;BR /&gt;threat-detection rate interface-drop rate-interval 3600 average-rate 1600 burst-rate 6400&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun duration 1800&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 14:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058554#M1110683</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-06T14:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058692#M1110713</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361173"&gt;@amralrazzaz&lt;/a&gt; anything in the logs matching the syslog event id - 710003 are denied, so can be ignored.&lt;/P&gt;
&lt;P&gt;In regard to the duplicate SYN, if you shun the traffic from the legitimate wireless users, that will block them from any communication through the Firewall. You'd be better investigating these devices and determine if it's a misbehaving client or a problem with the destination website (the logs indicate its the same destination IP).&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 16:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058692#M1110713</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-06T16:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058717#M1110714</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361173"&gt;@amralrazzaz&lt;/a&gt;, you need to figure out WHY 419002 messages are produced BEFORE trying to apply any commands like "set connection" and "threat-detection".&lt;/P&gt;&lt;P&gt;First, does 419002 always complain about 52.123.128.14 or it can contain other Internet IPs as well? (We understood that source IPs vary, but how about destination IPs)?&lt;/P&gt;&lt;P&gt;Second, "no routing configured" is not true. You should at least have a default route to the Internet, right? I believe your firewall runs in routed mode since you mentioned L2L VPN, right?&lt;/P&gt;&lt;P&gt;Third, 419002 messages are almost always produced when there is a routing loop in the network. When TCP segment goes through the firewall, the firewall randomizes its SEQ#. In case of a routing loop, if the same packet is again received by the firewall, it prints 419002 and drops the packet. You need to carefully examine your physical topology (L1) and logical topology (L2) and configuration (of the switch) and then collect captures on the firewall interfaces to find out why the firewall sees same packet few times. E.g. in the past such issues could be caused by Windows computers bridging between wireless and wired interfaces, although it's hard to believe that you're facing with this issue today.&lt;/P&gt;&lt;P&gt;106023 messages are produced when the packet is dropped by the interface ACL. Usually they're useless and hence it's typically recommended to add "log" option to ACL lines (to optimize and convert them to 106100) or "log disable" (to get rid of them completely). This should be possible in the GUI too.&lt;/P&gt;&lt;P&gt;711004 pertains to CPU utilization which can increase significantly if traffic rate is high (again, a loop?). You can increase logging level for them to 2 and pay attention to "show cpu detail".&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 17:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058717#M1110714</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-06T17:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058817#M1110715</link>
      <description>&lt;P&gt;I know your issue is urgently but for me I need some time to check points ypu share' sorry for late reply.&lt;/P&gt;
&lt;P&gt;Now' I real your reply and other comment&lt;/P&gt;
&lt;P&gt;And I retrun to point that there is asymmetric or loop routing'&lt;/P&gt;
&lt;P&gt;You mention that this direct connect L3SW and ISP'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need defualt route but I think you use pppoe to ISP abd you auto get defualt route' please confirm this point?&lt;/P&gt;
&lt;P&gt;To make sure that this is not loop&lt;/P&gt;
&lt;P&gt;Select any IP appear in log&lt;/P&gt;
&lt;P&gt;Do packet-tracer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And see the ingress and egress of packet is it same or not.&lt;/P&gt;
&lt;P&gt;Waiting your reply&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 18:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5058817#M1110715</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-06T18:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5059076#M1110770</link>
      <description>&lt;P&gt;simple lab and wrong routing generate LOOP&amp;nbsp;&lt;BR /&gt;as you can see same log you get.&lt;BR /&gt;so one Q&lt;BR /&gt;are you connect two port of FTD to same SW ? or is ISP have any connection to L3SW?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (310).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215145i78F87D8371707800/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (310).png" alt="Screenshot (310).png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (309).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215146i73D59A07459DADD1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (309).png" alt="Screenshot (309).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2024 11:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5059076#M1110770</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-07T11:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5059140#M1110802</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;&amp;nbsp;Dear i have configured the below and not sure if it will impact or not &amp;amp; also i HYG the CPU details on below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Basic-rate-Threat-Detection :&lt;/STRONG&gt;-&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection rate acl-drop rate-interval 1200 average-rate 250 burst-rate 550&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat-Detection-statistics&lt;/STRONG&gt; :-&lt;BR /&gt;threat-detection statistics host number-of-rate 2&lt;BR /&gt;threat-detection statistics tcp-intercept&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 45 burst-rate 400 average-rate 100&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat-Detection-Scanning-shun&lt;/STRONG&gt;: :-&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection rate scanning-threat rate-interval 1200 average-rate 250 burst-rate 550&lt;BR /&gt;threat-detection scanning-threat shun&lt;BR /&gt;threat-detection scanning-threat shun duration 1000&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Embryonic-connections-limitation:-&lt;/STRONG&gt;&lt;BR /&gt;class-map tcp_syn&lt;BR /&gt;match port tcp eq 80&lt;BR /&gt;match port tcp eq 443&lt;BR /&gt;match port tcp eq 23&lt;BR /&gt;match port tcp eq 22&lt;BR /&gt;match port tcp eq 21&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class tcp_syn&lt;BR /&gt;set connection conn-max 100&lt;BR /&gt;set connection embryonic-conn-max 200&lt;BR /&gt;set connection per-client-embryonic-max 10&lt;BR /&gt;set connection per-client-max 5&lt;BR /&gt;set connection random-sequence-number enable&lt;BR /&gt;set connection timeout embryonic 0:0:45&lt;BR /&gt;set connection timeout half-closed 0:25:0&lt;BR /&gt;set connection timeout tcp 2:0:0&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;ProtectingAgainst-IP-Spoofing-Attacks:-&lt;/STRONG&gt;&lt;BR /&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; show cpu usage&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;CPU utilization for 5 seconds = 3%; 1 minute: 2%; 5 minutes: 1%&lt;BR /&gt;&amp;gt; show cpu core&lt;BR /&gt;Core 5 sec 1 min 5 min&lt;BR /&gt;Core 0 1.0% 1.0% 0.7%&lt;BR /&gt;Core 1 0.8% 0.7% 0.6%&lt;BR /&gt;&amp;gt; show cpu profile&lt;BR /&gt;No profiling data.&lt;BR /&gt;&lt;STRONG&gt;&amp;gt; show cpu detailed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Break down of per-core data path versus control point cpu usage:&lt;BR /&gt;Core 5 sec 1 min 5 min&lt;BR /&gt;Core 0 0.4 (0.4 + 0.0) 0.9 (0.7 + 0.1) 0.6 (0.5 + 0.0)&lt;BR /&gt;Core 1 0.4 (0.4 + 0.0) 0.8 (0.6 + 0.1) 0.7 (0.5 + 0.0)&lt;/P&gt;&lt;P&gt;Current control point elapsed versus the data and control point elapsed for:&lt;BR /&gt;5 seconds = 18.3%; 1 minute: 18.1%; 5 minutes: 18.1%&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CPU utilization of external processes for:&lt;BR /&gt;5 seconds = 0.4%; 1 minute: 0.9%; 5 minutes: 0.5%&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Total System CPU utilization for:&lt;BR /&gt;5 seconds = 1.0%; 1 minute: 1.9%; 5 minutes: 1.4%&amp;gt; show cpu usage &amp;gt; show cpu core&amp;gt; show cpu profile &amp;gt; show cpu detailed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;New massages came to syslog after apply the above configuration and its users at office complain of no internet connection !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_1-1712574092697.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215283iCA18AEFCABC52DB3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_1-1712574092697.png" alt="amralrazzaz_1-1712574092697.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 13:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5059140#M1110802</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-08T13:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5074698#M1111494</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;lets me focus on this now and if there is any actions to apply to avoid or mitigate this because i think its impacting the connectivity to ASA FTD via WEB HTTPS ! Most times showing down and coming up again , but connecting to the device via ssh is stable anytime !&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Error Message %ASA-4-106023:&lt;/STRONG&gt; Deny protocol src [interface_name:source_address/source_port] [(idfw_user|FQDN_string)] dst interface_name:dest_address/dest_port [(idfw_user|FQDN_string)] [type {string}, code {code}] by access_group acl_ID [0x8ed66b60, 0xf8852875]&lt;/P&gt;&lt;P&gt;Error Message Explanation: A real IP packet was denied by the ACL. This message appears even if you do not have the log option enabled for an ACL. The IP address is the real IP address instead of the values that display through NAT. Both user identity information and FQDN information are provided for the IP addresses if a matched one is found. The ASA logs either identity information (domain\user) or the FQDN (if the username is not available). If the identity information or FQDN is available, the ASA logs this information for both the source and destination.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;Message: %FTD-3-710003:&lt;/STRONG&gt; {TCP|UDP} access denied by ACL from source_IP/source_port to interface_name:dest_IP/service&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;Error Message&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;%&lt;SPAN class=""&gt;FTD&lt;/SPAN&gt;-3-&lt;SPAN class=""&gt;710003&lt;/SPAN&gt;: {TCP|UDP} access denied by ACL from&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;source_IP/source_port&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;interface_name&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;:&lt;EM&gt;dest_IP/service&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;Explanation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Secure Firewall Threat Defense device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;denied an attempt to connect to the interface service. For example, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Secure Firewall Threat Defense device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;received an SNMP request from an unauthorized SNMP management station. If this message appears frequently, it can indicate an attack.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;Message: %FTD-5-199017:&lt;/STRONG&gt; sudo: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/pgrep -x snort&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;Message: %FTD-5-199017&lt;/STRONG&gt;:&amp;nbsp;&lt;SPAN&gt;syslog&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Apr 2024 17:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5074698#M1111494</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-21T17:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5074750#M1111495</link>
      <description>&lt;P&gt;By default FTD / ASA running FTD software does not accept management connections to data interfaces.&amp;nbsp; Are you by chance managing the FTD via a data interface?&lt;/P&gt;</description>
      <pubDate>Sun, 21 Apr 2024 20:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5074750#M1111495</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-21T20:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: MY logs from Firepower 5516-x  are filled with error and warning m</title>
      <link>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5075054#M1111508</link>
      <description>&lt;P&gt;Dear its not by data interface its only by management interface ! but its not stable and the webserver GUI like 60% of the time is down and then coming up again! which means something like DDoS attack or hundreds of massages coming to syslog from outside as requests to access and denied for sure ! But im not sure if this is reason of down time the https GUI ! i can reach to ASA via putty SSH normally anytime but GUI no coz always not stable between up and down !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One Note:&lt;/P&gt;&lt;P&gt;i think when i applied the below command the GUI connectivity back to stability but on other hands the users at office complain of no internet connection because its shunned all ip addresses which cause TCP SYN ACK issue !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat-Detection-Scanning-shun&lt;/STRONG&gt;&lt;SPAN&gt;: :-&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;threat-detection scanning-threat&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;threat-detection rate scanning-threat rate-interval 1200 average-rate 250 burst-rate 550&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;threat-detection scanning-threat shun&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;threat-detection scanning-threat shun duration 1000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Then i removed it again to return back the internet connection to users !!&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 08:49:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/my-logs-from-firepower-5516-x-are-filled-with-error-and-warning/m-p/5075054#M1111508</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-04-22T08:49:07Z</dc:date>
    </item>
  </channel>
</rss>

