<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966431#M149076</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I agree with what you say, yes embryonic connections are somewhat illegitimate and ASA is doing what it is suppose to do.&lt;/P&gt;
&lt;P&gt;If we have continuous issues of embryonic connections limit reached, then we really need to identify the machines and track them down.&lt;/P&gt;
&lt;P&gt;That is the only way ASA can help in this case, as it is already dropping the traffic as per configuration.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if you have any specific query in regards to this, and I will try to answer.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
    <pubDate>Sat, 22 Oct 2016 15:22:44 GMT</pubDate>
    <dc:creator>Pulkit Saxena</dc:creator>
    <dc:date>2016-10-22T15:22:44Z</dc:date>
    <item>
      <title>Narrow down on Embryonic connections details on ASA5550</title>
      <link>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966428#M149073</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To protect against SYN attacks we have created a global maximum to half open connections. Currently 500 embryonic connections.&lt;/P&gt;
&lt;P&gt;It is working pretty fine now.&amp;nbsp;When the maximum count is reached SYSLOG&amp;nbsp;shows the following message:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE width="708" height="74"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;6&lt;/TD&gt;
&lt;TD&gt;Oct 20 2016&lt;/TD&gt;
&lt;TD&gt;12:11:14&lt;/TD&gt;
&lt;TD&gt;201010&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&amp;lt;PRIVATE IP&amp;gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;40333&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&amp;lt;PUBLIC IP&amp;gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;80&lt;/TD&gt;
&lt;TD&gt;Embryonic connection limit exceeded 500/500 for input packet from &lt;STRONG&gt;&amp;lt;PRIVATE_IP&amp;gt;&lt;/STRONG&gt;/40333 to &amp;lt;&lt;STRONG&gt;PUBLIC IP&amp;gt;&lt;/STRONG&gt;/80 on interface inside&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just need to confirm a couple of things here please:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Direction of the connection.&amp;nbsp;Is it correct that the connection is from inside&amp;nbsp;(LAN) to outside (Internet)?&lt;/LI&gt;
&lt;LI&gt;How to drill down to actually list the connections made from the&amp;nbsp;private IP to the outside public IP?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From what I see this is some portscanning that is taking place by compromised host residing on&amp;nbsp;my network (inside). What I am trying to do is to contact my users and send them a&amp;nbsp;list of all the public IPs&amp;nbsp;their possibly infected host/IP is&amp;nbsp;scanning&amp;nbsp;along with the ports so that they take the necessary action. I do not want to start using threat-detection with SHUN before I get hold of this report.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I&amp;nbsp;was thinking of&amp;nbsp;&lt;STRONG&gt;sh local-host &amp;lt;private_IP&amp;gt;&amp;nbsp;&lt;/STRONG&gt;and looking at &lt;STRONG&gt;Conn&lt;/STRONG&gt; but it lists legitimate&amp;nbsp;connections too. How can I only list&amp;nbsp;scanned destinations and ports only?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am using ASA5550 by the way.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966428#M149073</guid>
      <dc:creator>walidazab</dc:creator>
      <dc:date>2019-03-12T08:25:38Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966429#M149074</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Good to hear that embryonic connection configuration is working fine. To answer your questions :&lt;/P&gt;
&lt;P&gt;a) Yes you have analyzed it correctly connection is from inside to outside, some local machine using a random source port is making a connection to a public IP on port 80. It might be legitimate, might not be. That needs to be checked by tracking the local IP address and also utilizing its mac address and then checking the infected machine itself.&lt;/P&gt;
&lt;P&gt;b) Well it is actually tough to just drill down with one single output, but you can try a few outputs :&lt;/P&gt;
&lt;P&gt;sh local-host connection tcp 500&lt;/P&gt;
&lt;P&gt;sh local-host x.x.x.x &amp;nbsp;(once you identify the IP address of local user)&lt;/P&gt;
&lt;P&gt;sh local-host &amp;nbsp;connection embryonic&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Unfortunately ASA does not know which is legitimate and which is not, it only takes action on the basis of the set of policies configured on it.&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Oct 2016 00:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966429#M149074</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2016-10-21T00:56:29Z</dc:date>
    </item>
    <item>
      <title>Hello Pulkit,</title>
      <link>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966430#M149075</link>
      <description>&lt;P&gt;Hello&amp;nbsp;Pulkit,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks. I am a bit confused here about something though.&lt;/P&gt;
&lt;P&gt;Aren't &lt;STRONG&gt;embryonic&lt;/STRONG&gt; connections already considered&amp;nbsp;illegitimate?&amp;nbsp;Aren't they all half open and therefore&amp;nbsp;sort of categorized&amp;nbsp;as SYN or scan&amp;nbsp;attacks?&lt;/P&gt;
&lt;P&gt;So&amp;nbsp;am I stuck with this then? We have tons of logs indicating that Embryonic attacks exceed the maximum configured.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 14:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966430#M149075</guid>
      <dc:creator>walidazab</dc:creator>
      <dc:date>2016-10-22T14:49:18Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966431#M149076</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I agree with what you say, yes embryonic connections are somewhat illegitimate and ASA is doing what it is suppose to do.&lt;/P&gt;
&lt;P&gt;If we have continuous issues of embryonic connections limit reached, then we really need to identify the machines and track them down.&lt;/P&gt;
&lt;P&gt;That is the only way ASA can help in this case, as it is already dropping the traffic as per configuration.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if you have any specific query in regards to this, and I will try to answer.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 15:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966431#M149076</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2016-10-22T15:22:44Z</dc:date>
    </item>
    <item>
      <title>Hi again,</title>
      <link>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966432#M149077</link>
      <description>&lt;P&gt;Hi again,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Great. Let me share with you my goal then.&lt;/P&gt;
&lt;P&gt;Lets say I get numerous logs indicating a&amp;nbsp;particular IP is exceeding max embryonic connection. Here is an example log message from the live network:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 10pt;"&gt;%ASA-6-201010: Embryonic connection limit exceeded 500/500 for input packet from StaticSiteA/36293 to 52.21.58.159/23 on interface inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To&amp;nbsp;get more details about connections I&amp;nbsp;execute the command:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;ASA-Internet# &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sh local-host &amp;nbsp;StaticSiteA&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Output (attached) and below is a sample of this output:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 10pt;"&gt;&amp;nbsp; &amp;nbsp; TCP outside 74.91.115.242:23 inside StaticSiteA:53385, idle 0:00:00, bytes 0, flags &lt;STRONG&gt;saA&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 10pt;"&gt;&amp;nbsp; &amp;nbsp; TCP outside 221.229.172.75:30899 inside StaticSiteA:22, idle 0:00:11, bytes 249, flags &lt;STRONG&gt;UFIB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Knowing that this is a continuous&amp;nbsp;and ongoing behavior&amp;nbsp;with this host, my question now is,&amp;nbsp;how can I pinpoint the connection details for this&amp;nbsp;seemingly ongoing attack/scan from that host? Should I be looking for a&amp;nbsp;particular flag for example, say &lt;STRONG&gt;saA&lt;/STRONG&gt; and ignore other flags or should I be using another command altogether?&lt;/P&gt;
&lt;P&gt;In the above example and as attached it appears that this host is continuously scanning port 23 targeting many&amp;nbsp;IPs on the outside interface. Correct?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 15:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966432#M149077</guid>
      <dc:creator>walidazab</dc:creator>
      <dc:date>2016-10-22T15:48:57Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966433#M149078</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I had a look at the output and what I understand from it is that I see only two categories of flags : "saA" and "UFIB".&lt;BR /&gt;Going with the following link :&lt;BR /&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113602-ptn-113602.html&lt;/P&gt;
&lt;P&gt;It is pretty clear that "saA" means that inside machine sent "syn" to an outside public IP and is waiting for a reply and thus showing the &lt;BR /&gt;particular connection flag.&lt;BR /&gt;Similarly, "UFIB" means that from outside someone initiated ssh traffic to inside host and three way handshake completed after which the outside&lt;BR /&gt;IP also sent a FIN after some data transfer.&lt;/P&gt;
&lt;P&gt;So I think the local machine has a legitimate access from outside, but the question is why is the internal machine initiating random SYN packets.&lt;BR /&gt;We must check the local machine.&lt;/P&gt;
&lt;P&gt;Honestly these are the commands that we use usually and some that I mentioned above and yes you are right, connection flasg are very important.&lt;BR /&gt;On basis of that, we need to take action.&lt;/P&gt;
&lt;P&gt;ASA can only tell about the packets and connections, then we need to get the traffic checked at the local machine.&lt;/P&gt;
&lt;P&gt;If it is in directly connected subnet, then you can also look for it's mac address and can check further on the local machine.&lt;/P&gt;
&lt;P&gt;-&lt;BR /&gt;Pulkit&lt;BR /&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 17:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/narrow-down-on-embryonic-connections-details-on-asa5550/m-p/2966433#M149078</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2016-10-22T17:08:01Z</dc:date>
    </item>
  </channel>
</rss>

