<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: dupplicate tcp syn anyconnect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163504#M1115228</link>
    <description>&lt;P&gt;&lt;SPAN&gt;the problem is, that internet is also used by client VPN through tunnel. So all official IPs need to be routed to internal (which goes to transparent proxy) &amp;lt;&amp;lt;- then it return to FTD to forward to internet ?&lt;BR /&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2024 07:11:02 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-08-21T07:11:02Z</dc:date>
    <item>
      <title>dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163149#M1115221</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I'm getting dupplicate syn from our Firepower FTD. The setup is that VPN clients connect via outside (Internet) to access internal stuff. The VPN Clients get an IP from pool 10.1.1.x (for example) to access internal 10.2.2.x.&lt;BR /&gt;Internet also needs to be routed to the tunnel that a transparent proxy is able to check the surfing, so the default route also needs to be routed for the client VPN.&lt;BR /&gt;The routing on FTD is as following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Gateway of last resort is 3.3.3.30 to network 0.0.0.0
S* 0.0.0.0 0.0.0.0
[1/0] via 3.3.3.30, int-outside
V        10.1.1.1 255.255.255.255
           connected by VPN (advertised), int-outside
V        10.1.1.2 255.255.255.255
           connected by VPN (advertised), int-outside
S        10.1.1.0 255.255.255.0 [1/0] is directly connected, Null0
S        0.0.0.0 0.0.0.0 [255/0] via 4.4.4.99, int-inside tunneled&lt;/LI-CODE&gt;&lt;P&gt;Hundreds of users generate this dup syn in syslog that FTD thinks it's a syn attack:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;%FTD-4-419002: Duplicate TCP SYN from int-outside:10.1.1.2/54931 to int-inside:10.2.2.1/443 with different initial sequence number
%FTD-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 83 per second, max configured rate is 10; Current average rate is 191 per second, max configured rate is 5; Cumulative total count is 115037
%FTD-4-733100: [ SYN attack] drop rate-1 exceeded. Current burst rate is 71 per second, max configured rate is 200; Current average rate is 162 per second, max configured rate is 100; Cumulative total count is 97341
%FTD-4-419002: Duplicate TCP SYN from int-outside:10.1.1.1/54462 to int-inside:10.2.2.2/443 with different initial sequence number&lt;/LI-CODE&gt;&lt;P&gt;So I tried to use this null route to avoid creating dupplicate syn:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;S 10.1.1.0 255.255.255.0 [1/0] is directly connected, Null0&lt;/LI-CODE&gt;&lt;P&gt;but it doesn't help.&lt;BR /&gt;Do you have an idea how to solve this issue?&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 11:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163149#M1115221</guid>
      <dc:creator>D Le Wando</dc:creator>
      <dc:date>2024-08-20T11:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163154#M1115222</link>
      <description>&lt;P&gt;Sure issue is this defualt route tunneled' remove it and config static route for 10.2.2.x (internal route)&lt;/P&gt;
&lt;PRE class="lia-code-sample  language-markup"&gt;&lt;CODE&gt;S        0.0.0.0 0.0.0.0 [255/0] via 4.4.4.99, int-inside tunneled&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;And issue will solved.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 11:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163154#M1115222</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-20T11:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163203#M1115223</link>
      <description>&lt;P&gt;the problem is, that internet is also used by client VPN through tunnel. So all official IPs need to be routed to internal (which goes to transparent proxy)&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 12:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163203#M1115223</guid>
      <dc:creator>D Le Wando</dc:creator>
      <dc:date>2024-08-20T12:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163504#M1115228</link>
      <description>&lt;P&gt;&lt;SPAN&gt;the problem is, that internet is also used by client VPN through tunnel. So all official IPs need to be routed to internal (which goes to transparent proxy) &amp;lt;&amp;lt;- then it return to FTD to forward to internet ?&lt;BR /&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 07:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163504#M1115228</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-21T07:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163651#M1115236</link>
      <description>&lt;P&gt;Scenario 1 Internet access:&lt;BR /&gt;Anyconnect Client - Internet - FTD - Transp.Proxy - Internet&lt;/P&gt;&lt;P&gt;Scenario 2 access to internal:&lt;BR /&gt;Anyconnect Client - Internet - FTD - internal&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 06:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163651#M1115236</guid>
      <dc:creator>D Le Wando</dc:creator>
      <dc:date>2024-08-21T06:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163663#M1115238</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Scenario 2 access to internal:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Anyconnect Client - Internet - FTD - internal &amp;lt;&amp;lt;- this scenario if you add static route to 10.2.2.x instead of default route tunneled I think there is no problem at all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Scenario 1 Internet access:&lt;BR /&gt;Anyconnect Client - Internet - FTD - Transp.Proxy - Internet&amp;lt;&amp;lt;- how transp proxy connect to internet via FTD' i.e. the traffic retrun to FTD to access internet ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 07:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163663#M1115238</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-21T07:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163670#M1115239</link>
      <description>&lt;P&gt;Scenario 1 Internet access:&lt;BR /&gt;Anyconnect Client - Internet - FTD - Transp.Proxy - Internet&amp;lt;&amp;lt;- how transp proxy connect to internet via FTD' i.e. the traffic retrun to FTD to access internet ?&lt;BR /&gt;--&amp;gt; No. The Transp.Proxy has it's own Internet access&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 21 Aug 2024 07:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5163670#M1115239</guid>
      <dc:creator>D Le Wando</dc:creator>
      <dc:date>2024-08-21T07:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164216#M1115250</link>
      <description>&lt;P&gt;Does the proxy have a public IP configured directly on an interface or is it an IP NAT'ed through the FTD?&lt;/P&gt;
&lt;P&gt;Or perhaps is the proxy just a "bump in the wire" meaning just forwarding traffic without changing source or destination IP?&lt;/P&gt;
&lt;P&gt;I think the issue might be the second scenario.&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The traffic from AnyConnect reaches the FTD and the FTD creates a connection for this session and sends the traffic to the proxy server.&lt;/LI&gt;
&lt;LI&gt;proxy server inspects traffic and forwards the traffic back to the FTD without changing any source IPs&lt;/LI&gt;
&lt;LI&gt;FTD sees a second connection attempt with the same source and destination IP and flags as duplicate syn.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Solutions to this would be to have the proxy perform NAT for the source addresses, or install another internet gateway firewall / virtual firewall / context / multi instance / whatever.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 06:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164216#M1115250</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-22T06:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164368#M1115254</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/211628-FTD-How-to-enable-TCP-State-Bypass-Conf.html" target="_blank"&gt;FTD: How to enable TCP State Bypass Configuration using FlexConfig Policy - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If the egress different than ingress then try use tcp bypass for traffic from VPN Pool to ANY &amp;lt;&amp;lt;- dont config it ANY to ANY&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 10:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164368#M1115254</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-22T10:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164381#M1115255</link>
      <description>&lt;P&gt;TCP bypass should be a last resort, and I would suggest not using it.&amp;nbsp; The issue is most likely that the proxy is just inspecting traffic and passing it back to the FTD.&amp;nbsp; Solve that issue rather than&amp;nbsp; using TCP bypass in my opinion.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 10:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164381#M1115255</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-22T10:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164397#M1115256</link>
      <description>&lt;P&gt;He have duplicate Sny so this appear when there is asymmetric routing and he confirm that.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 11:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164397#M1115256</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-22T11:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164871#M1115285</link>
      <description>&lt;P&gt;In real, there are 2 FTDs:&lt;BR /&gt;Scenario 1 Internet access:&lt;BR /&gt;Anyconnect Client - Internet - FTD1 (used for anyconnect) - FTD2 (used for firewalling) - Transp.Proxy - Internet&lt;/P&gt;&lt;P&gt;So the 2nd FTD also see the dup syn which were created by the 1st FTD:&lt;BR /&gt;FTD2: Duplicate TCP SYN from int-from-FTD1:10.1.1.1/54131 to int-to-transparent-proxy:193.99.144.85/443 with different initial sequence number&lt;BR /&gt;&lt;BR /&gt;1st time I thought that it's dropped by ASP, but it's not. It seems that all this dup syn are forwarded to next hop &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Btw, there's no NAT by FTD2 (to answer the question from &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt; )&lt;BR /&gt;The real technique of transparent proxy is not known by me, but I think it doesn't matter to the dup dync issue, because the issue is created by FTD1&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 23 Aug 2024 07:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5164871#M1115285</guid>
      <dc:creator>D Le Wando</dc:creator>
      <dc:date>2024-08-23T07:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5165746#M1115357</link>
      <description>&lt;P&gt;if this is easily reproducible, then you should take packet captures with trace detail&amp;nbsp; option.. also provide logs of the initial connection and duplicate one.&lt;/P&gt;
&lt;P&gt;there is a option include-decrypted.. use that for the outside interface... I feel like there is a potential loop or your last diagram is not accurate... when it goes to the internet which firewall is doing the NATing ?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ccieexpert_0-1724637106774.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227036i3D001B13B6A1C4D0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ccieexpert_0-1724637106774.png" alt="ccieexpert_0-1724637106774.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 01:53:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5165746#M1115357</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-26T01:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5165853#M1115359</link>
      <description>&lt;P&gt;Thx for the capture hint. Now I see that NOT all packets are duplicated. I tried with my own client and see NO dup. So it seems that there's something special that causes dup packets ... I will troubleshoot this deeper...&lt;BR /&gt;BTW, the NAT is done from transparent Proxy or behind. There's no NAT on FTD1/FTD2&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 09:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5165853#M1115359</guid>
      <dc:creator>D Le Wando</dc:creator>
      <dc:date>2024-08-26T09:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5166007#M1115372</link>
      <description>&lt;P&gt;I picked 1 syslog message "%FTD-4-419002: Duplicate TCP SYN from int-outside:10.x.x.x/56521 to int-inside:10.y.y.y/443 with different initial sequence number"&lt;BR /&gt;and checked outside + inside capture. Both captures show me that there's no duplicate packet at all regarding this syslog message. So in real, the FTD1 is NOT creating any additional packet or whatever. All packets which are in the tunnel (from outside) are the same as routed to internal.&lt;BR /&gt;So all seems good for me now. It's very annoing that my syslog is flooded with this messages (if severity is set to "warning" instead of "error", but I added a syslog level feature "419002" with 1 message and interval of 1 second now. With this setting, the flooding is stopped now.&lt;BR /&gt;Thx to all of you guys for your support!&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 15:08:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5166007#M1115372</guid>
      <dc:creator>D Le Wando</dc:creator>
      <dc:date>2024-08-26T15:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5166010#M1115373</link>
      <description>&lt;P&gt;Wait and see it will appear again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Update me when you see it again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note:- you eun two anyconnect when you eun more then issue will be effect cpu and slow your FW.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 15:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5166010#M1115373</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-26T15:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: dupplicate tcp syn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5166023#M1115375</link>
      <description>&lt;P&gt;thanks for the update... i would dig deeper.. if the first syslog and the 5-tuple is different from 2nd syslog with duplicate sync, and you dont see a packet... then open a TAC case... what version are you runnning ? also review captures on both interfaces again to be completely sure there is no duplicate when the syslog comes in...&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 16:02:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dupplicate-tcp-syn-anyconnect/m-p/5166023#M1115375</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-26T16:02:03Z</dc:date>
    </item>
  </channel>
</rss>

