<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you for all your help. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965235#M148722</link>
    <description>&lt;P&gt;Thank you for all your help.&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
    <pubDate>Wed, 09 Nov 2016 15:38:32 GMT</pubDate>
    <dc:creator>drbabbers</dc:creator>
    <dc:date>2016-11-09T15:38:32Z</dc:date>
    <item>
      <title>Flow closed by inspection</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965223#M148710</link>
      <description>&lt;P&gt;All,&lt;/P&gt;
&lt;P&gt;I am having an intermittent issue with an SQL based application running on a point to point style network. At each end an ASA firewall protects the 2 application servers. When the application fails, a generic SQL error appears in relation to TCP timeouts. At this exact time, the firewall produces this error:&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;6&lt;/TD&gt;
&lt;TD&gt;Nov 08 2016&lt;/TD&gt;
&lt;TD&gt;14:50:54&lt;/TD&gt;
&lt;TD&gt;302014&lt;/TD&gt;
&lt;TD&gt;1.1.1.1&lt;/TD&gt;
&lt;TD&gt;1433&lt;/TD&gt;
&lt;TD&gt;2.2.2.2&lt;/TD&gt;
&lt;TD&gt;53062&lt;/TD&gt;
&lt;TD&gt;Teardown TCP connection 645242116 for outside:1.1.1.1/1433 to inside:2.2.2.2/53062 duration 0:13:27 bytes 1187358713 Flow closed by inspection&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas please how I can progress?&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:30:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965223#M148710</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2019-03-12T08:30:23Z</dc:date>
    </item>
    <item>
      <title>This sounds like you have an</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965224#M148711</link>
      <description>&lt;P&gt;This sounds like you have an inspect configured for this type of traffic. Check your inspection rules, in ASDM that's under configuration -&amp;gt; Firewall -&amp;gt; Service Policy Rules.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2016 16:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965224#M148711</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-11-08T16:26:49Z</dc:date>
    </item>
    <item>
      <title>Thanks. Is there a way I can</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965225#M148712</link>
      <description>&lt;P&gt;Thanks. Is there a way I can determine which inspection rule is doing this?&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2016 18:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965225#M148712</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-11-08T18:36:48Z</dc:date>
    </item>
    <item>
      <title>As far as I can tell, not in</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965226#M148713</link>
      <description>&lt;P&gt;As far as I can tell, not in an easy way if there is a lot of traffic on this firewall.&lt;/P&gt;
&lt;P&gt;On a positive note, it must be (I hope) one of the inspections and not a default one. It must be a customized one as there is no default one for Port 1433.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm not sure if that will be dropped and logged in the ASP function, if so, this should help.&lt;/P&gt;
&lt;P&gt;On the CLI you can see all asp-drop statistics with&lt;/P&gt;
&lt;P&gt;show asp drop&lt;/P&gt;
&lt;P&gt;See here for more info: http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/s2.html&lt;/P&gt;
&lt;P&gt;With 'clear asp drop counters' you can clear the counters.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 07:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965226#M148713</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-11-09T07:42:50Z</dc:date>
    </item>
    <item>
      <title>Thanks for your response this</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965227#M148714</link>
      <description>&lt;P&gt;Thanks for your response this is helpful.&lt;/P&gt;
&lt;P&gt;I can't see anything obvious from an inspection point of view, however we are running 8.4(6) code on this ASA pair and I have seen a bug on 8.4 with 'flow closed by inspection'. CSCUJ54806. Perhaps now is the time to upgrade our code?&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 10:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965227#M148714</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-11-09T10:26:26Z</dc:date>
    </item>
    <item>
      <title>I believe that's the wrong</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965228#M148715</link>
      <description>&lt;P&gt;I believe that's the wrong bug id, for me it shows a security vulnerability with ICMP. But yeah, if there is such a bug in the 8.4.6 code, then I recommend you to switch to a fixed release.&lt;/P&gt;
&lt;P&gt;In case you go to a 9.x code, read carefully the release notes of all previous versions (special attention to 9.0), there were some configuration changes involved.&amp;nbsp;The biggest change are 'unified access-rules'.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 10:43:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965228#M148715</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-11-09T10:43:32Z</dc:date>
    </item>
    <item>
      <title>This issue has futher</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965229#M148716</link>
      <description>&lt;P&gt;This issue has futher developed and when the SQL application fails, I see the following log on the ASA:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;6&amp;nbsp;Nov 09 2016&amp;nbsp;10:20:08&amp;nbsp;106015&amp;nbsp;1.1.1.1&amp;nbsp;1433&amp;nbsp;2.2.2.2 61520&amp;nbsp;Deny TCP (no connection) from 1.1.1.1/1433 to 2.2.2.2/61520 flags ACK&amp;nbsp; on interface outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 11:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965229#M148716</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-11-09T11:09:23Z</dc:date>
    </item>
    <item>
      <title>That might be normal, as the</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965230#M148717</link>
      <description>&lt;P&gt;That might be normal, as the firewall has closed that connection with the previous message in your first thread.&lt;/P&gt;
&lt;P&gt;Could you please post your complete inspection policy?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 11:34:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965230#M148717</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-11-09T11:34:05Z</dc:date>
    </item>
    <item>
      <title>class-map tcp-bypass match</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965231#M148718</link>
      <description>&lt;P&gt;class-map tcp-bypass&lt;BR /&gt;&amp;nbsp;match access-list tcp-bypass&lt;BR /&gt;class-map netflow-export-class&lt;BR /&gt;&amp;nbsp;match access-list netflow-export&lt;BR /&gt;class-map tcp_conn_map&lt;BR /&gt;&amp;nbsp;match access-list tcp_conn_acl&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map NetFlow-traffic&lt;BR /&gt;&amp;nbsp;match access-list netflow-export&lt;BR /&gt;class-map ips_class_map&lt;BR /&gt;&amp;nbsp;match access-list traffic_to_ips&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map netflow-policy&lt;BR /&gt;&amp;nbsp;class netflow-export-class&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination 4.4.4.4&lt;BR /&gt;&amp;nbsp;class NetFlow-traffic&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination 4.4.4.4&lt;BR /&gt;policy-map tcp_con_policy&lt;BR /&gt;&amp;nbsp;class tcp_conn_map&lt;BR /&gt;&amp;nbsp; set connection timeout idle 8:00:00 reset &lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect waas &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;&amp;nbsp;class ips_class_map&lt;BR /&gt;&amp;nbsp; ips promiscuous fail-open&lt;BR /&gt;&amp;nbsp;class netflow-export-class&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination 4.4.4.4&lt;BR /&gt;&amp;nbsp;class NetFlow-traffic&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination 4.4.4.4&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;policy-map tcp-bypass-policy&lt;BR /&gt;&amp;nbsp;class tcp-bypass&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy tcp_con_policy interface outside&lt;BR /&gt;service-policy tcp_con_policy interface inside&lt;BR /&gt;service-policy tcp-bypass-policy interface dmz&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 12:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965231#M148718</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-11-09T12:24:28Z</dc:date>
    </item>
    <item>
      <title>Also if this helps:</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965232#M148719</link>
      <description>&lt;P&gt;Also if this helps:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show service-policy"&lt;/P&gt;
&lt;P&gt;Global policy: &lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: dns preset_dns_map, packet 400215268, drop 69814571, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: ftp, packet 12842, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: h323 h225 _default_h323_map, packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: h323 ras _default_h323_map, packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: netbios, packet 138560785, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: rsh, packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: rtsp, packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: skinny , packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: sqlnet, packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: tftp, packet 2159516, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: sip , packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: xdmcp, packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: esmtp _default_esmtp_map, packet 3017200, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: waas, packet 56690034, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: icmp, packet 92166119, drop 35324, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: icmp error, packet 32304756, drop 7135, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: ips_class_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPS: card status Up, mode promiscuous fail-open&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet input 32, packet output 75530394851, drop 32, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: netflow-export-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: NetFlow-traffic&lt;/P&gt;
&lt;P&gt;Interface outside:&lt;BR /&gt;&amp;nbsp; Service-policy: tcp_con_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: tcp_conn_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection policy:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection timeout policy:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; idle 8:00:00 reset &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DCD: disabled, retry-interval 0:00:15, max-retries 5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DCD: client-probe 0, server-probe 0, conn-expiration 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection advanced-options: tcp-state-bypass&lt;/P&gt;
&lt;P&gt;Interface inside:&lt;BR /&gt;&amp;nbsp; Service-policy: tcp_con_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: tcp_conn_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection policy:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection timeout policy:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; idle 8:00:00 reset &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DCD: disabled, retry-interval 0:00:15, max-retries 5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DCD: client-probe 0, server-probe 0, conn-expiration 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection advanced-options: tcp-state-bypass&lt;/P&gt;
&lt;P&gt;Interface dmz:&lt;BR /&gt;&amp;nbsp; Service-policy: tcp-bypass-policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: tcp-bypass&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection policy:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection advanced-options: tcp-state-bypass&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 12:26:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965232#M148719</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-11-09T12:26:46Z</dc:date>
    </item>
    <item>
      <title>FYI have setup 'tcp-state</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965233#M148720</link>
      <description>&lt;P&gt;FYI have setup 'tcp-state-bypass' in relation to the ASA denying TCP connections with no SYN present. So far the SQL application is working all OK. *fingers crossed*&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 12:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965233#M148720</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-11-09T12:28:13Z</dc:date>
    </item>
    <item>
      <title>Ok, good to read.</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965234#M148721</link>
      <description>&lt;P&gt;Ok, good to read.&lt;/P&gt;
&lt;P&gt;Interesting is this part here: &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Class-map: ips_class_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPS: card status Up, mode promiscuous fail-open&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet input 32, packet output 75530394851, drop 32, reset-drop 0&lt;/P&gt;
&lt;P&gt;That looks like you also have the IPS card installed? In this case it might be a policy there, if you send the affected traffic to the IPS. I don't have any IPS experience though, can't help if the traffic goes through it.&lt;/P&gt;
&lt;P&gt;Also some recommendation, you have some very old inspects active, which I recommend to disable for better compatibility. These are: dns (512 is not enough for ibm.com for example), esmtp (this breaks encrypted mail transfer in some cases), netbios (unless you need netbios traversing the firewall).&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 13:13:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965234#M148721</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-11-09T13:13:40Z</dc:date>
    </item>
    <item>
      <title>Thank you for all your help.</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965235#M148722</link>
      <description>&lt;P&gt;Thank you for all your help.&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 15:38:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965235#M148722</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-11-09T15:38:32Z</dc:date>
    </item>
    <item>
      <title>You also might want to check</title>
      <link>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965236#M148723</link>
      <description>&lt;P&gt;You also might want to check the "service resetinbound" and "service resetoutbound".&lt;/P&gt;
&lt;P&gt;I believe in your case the firewall might terminate the open connection after the default tcp connection timeout, but it's not sending a tcp rst packet to the host(s). Because of this, the host doesn't know the connection was terminated and the host still tries to use the connection.&lt;/P&gt;
&lt;P&gt;Source for the command and further explanation: http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/s1.html&lt;/P&gt;
&lt;P&gt;Please note, the defaults of this command changed in later software revisions. I'd turn it on&amp;nbsp;for internal interfaces, that way your server knows that the connection was closed by the firewall for whatever reason. Thanks to this your host knows it needs to open a new connection.&lt;/P&gt;
&lt;P&gt;Turning on tcp-state-bypass is dangerous, as it turns of many basic tcp security features.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2016 10:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flow-closed-by-inspection/m-p/2965236#M148723</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-11-11T10:18:51Z</dc:date>
    </item>
  </channel>
</rss>

