<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to support TCP Fast Open (RFC 7413) on ASA-Firewalls? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3804138#M14597</link>
    <description>Thanks a lot for your detailed answer!</description>
    <pubDate>Mon, 18 Feb 2019 14:57:37 GMT</pubDate>
    <dc:creator>patoberli</dc:creator>
    <dc:date>2019-02-18T14:57:37Z</dc:date>
    <item>
      <title>How to support TCP Fast Open (RFC 7413) on ASA-Firewalls?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3684870#M14591</link>
      <description>&lt;P&gt;&amp;nbsp;Hi,&lt;BR /&gt;&lt;BR /&gt;how do I enable the support for TFO (RFC 7413) in Cisco Adaptive Security Appliance Software Version 9.2 ?&lt;BR /&gt;&lt;BR /&gt;It seems not to work out of the box, i.e. normal connection establishment&amp;nbsp; (handshake without application data bytes) works well while TFO (syn,syn-ack with application data bytes) connection establishment is rejected.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;CaB&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3684870#M14591</guid>
      <dc:creator>CaB</dc:creator>
      <dc:date>2020-02-21T16:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to support TCP Fast Open (RFC 7413) on ASA-Firewalls?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3684945#M14592</link>
      <description>&lt;P&gt;Hi, I don't see this RFC supported by ASA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As workaround/test I think you could try with&amp;nbsp;&lt;SPAN&gt;TCP state bypass.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards.-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 13:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3684945#M14592</guid>
      <dc:creator>#Mat</dc:creator>
      <dc:date>2018-08-09T13:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to support TCP Fast Open (RFC 7413) on ASA-Firewalls?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3685120#M14593</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA can do TCP normalization :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/firewall/asa-firewall-cli/conns-connlimits.html#69801" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/firewall/asa-firewall-cli/conns-connlimits.html#69801&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can modify it with TCP map :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/firewall/asa-firewall-cli/conns-connlimits.html#53790" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/firewall/asa-firewall-cli/conns-connlimits.html#53790&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but as far as I see, per default, SYN with data is supported but not SYN/ACK with data:&lt;/P&gt;
&lt;TABLE width="96%" cellspacing="0" cellpadding="3" border="1"&gt;
&lt;TBODY&gt;
&lt;TR valign="top" align="left"&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;STRONG class="cBold"&gt;synack-data &lt;/STRONG&gt; {&lt;STRONG class="cBold"&gt; allow&lt;/STRONG&gt; | &lt;STRONG class="cBold"&gt; drop&lt;/STRONG&gt; }&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1253651" target="_blank"&gt;&lt;/A&gt;Sets the action for TCP SYNACK packets that contain data.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1253652" target="_blank"&gt;&lt;/A&gt;The&lt;STRONG class="cBold"&gt; allow&lt;/STRONG&gt; keyword allows TCP SYNACK packets that contain data.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1253653" target="_blank"&gt;&lt;/A&gt;(Default) The&lt;STRONG class="cBold"&gt; drop&lt;/STRONG&gt; keyword drops TCP SYNACK packets that contain data.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR valign="top" align="left"&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1253655" target="_blank"&gt;&lt;/A&gt;&lt;STRONG class="cBold"&gt; syn-data &lt;/STRONG&gt; {&lt;STRONG class="cBold"&gt; allow&lt;/STRONG&gt; | &lt;STRONG class="cBold"&gt; drop&lt;/STRONG&gt; }&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1253657" target="_blank"&gt;&lt;/A&gt;Sets the action for SYN packets with data.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1253658" target="_blank"&gt;&lt;/A&gt;(Default) The&lt;STRONG class="cBold"&gt; allow&lt;/STRONG&gt; keyword allows SYN packets with data.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1253659" target="_blank"&gt;&lt;/A&gt;The&lt;STRONG class="cBold"&gt; drop&lt;/STRONG&gt; keyword drops SYN packets with data.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 15:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3685120#M14593</guid>
      <dc:creator>Jerome BERTHIER</dc:creator>
      <dc:date>2018-08-09T15:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to support TCP Fast Open (RFC 7413) on ASA-Firewalls?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3685816#M14594</link>
      <description>&lt;P&gt;Hi Jerome,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;that was a very helpfull hint. I have started to modify the tcp normalization by allowing data in syn-acks.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;syn-ack allow&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As this did not fix the problem I configured the tcp map to be most liberal, i.e.:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;tcp-map tcp-map-test&lt;BR /&gt;&amp;nbsp; synack-data allow&lt;BR /&gt;&amp;nbsp; invalid-ack allow&lt;BR /&gt;&amp;nbsp; tcp-options range 6 7 allow&lt;BR /&gt;&amp;nbsp; tcp-options range 9 255 allow&lt;BR /&gt;&amp;nbsp; urgent-flag allow&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next week I will try to figure out which of the options are necessary in order to allow TFO.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;CaB&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 14:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3685816#M14594</guid>
      <dc:creator>CaB</dc:creator>
      <dc:date>2018-08-10T14:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to support TCP Fast Open (RFC 7413) on ASA-Firewalls?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3802818#M14595</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/770462"&gt;@CaB&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Did you ever get this to work, or is it maybe anyway supported now?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 15:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3802818#M14595</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2019-02-15T15:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to support TCP Fast Open (RFC 7413) on ASA-Firewalls?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3803871#M14596</link>
      <description>&lt;P&gt;Hi patoberli,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes, I got it to work. Here are the code snippets:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;tcp-map tcp-map-fastopen&lt;BR /&gt;&amp;nbsp; synack-data allow&lt;BR /&gt;&amp;nbsp; tcp-options range 6 7 allow&lt;BR /&gt;&amp;nbsp; tcp-options range 9 255 allow&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will need a class map to match the tcp stream:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;class-map TCP&lt;BR /&gt;&amp;nbsp;match port tcp range 1 65535&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And you have to apply it in the policy section:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect ftp&lt;BR /&gt; ...&lt;BR /&gt; inspect dns dns-map-60&lt;BR /&gt; class TCP&lt;BR /&gt; set connection random-sequence-number disable&lt;BR /&gt; set connection advanced-options tcp-map-fastopen&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the example above will apply the support for tcp fastopen to all tcp connections as the class map (TCP) matches any tcp port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;CaB&lt;/P&gt;</description>
      <pubDate>Mon, 18 Feb 2019 08:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3803871#M14596</guid>
      <dc:creator>CaB</dc:creator>
      <dc:date>2019-02-18T08:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to support TCP Fast Open (RFC 7413) on ASA-Firewalls?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3804138#M14597</link>
      <description>Thanks a lot for your detailed answer!</description>
      <pubDate>Mon, 18 Feb 2019 14:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-support-tcp-fast-open-rfc-7413-on-asa-firewalls/m-p/3804138#M14597</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2019-02-18T14:57:37Z</dc:date>
    </item>
  </channel>
</rss>

