<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The direct syslog on the ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963114#M149961</link>
    <description>&lt;P&gt;The direct syslog on the ASA has the syslog ID as follows:&lt;/P&gt;
&lt;P&gt;Error Message %ASA-5-338303: Address ipaddr (name) timed out, Removing rule&lt;/P&gt;
&lt;P&gt;Explanation: An IP address that was discovered from the dynamic filter rule table was removed. • ipaddr—The IP address from the DNS reply • name—The domain name Recommended Action None required.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could someone explain more on this??&lt;/P&gt;</description>
    <pubDate>Sun, 18 Sep 2016 13:37:25 GMT</pubDate>
    <dc:creator>saifuddin.miyaji</dc:creator>
    <dc:date>2016-09-18T13:37:25Z</dc:date>
    <item>
      <title>ASA TCP connection drop</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963113#M149960</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have been investigating the 'connection drops' for some critical Internet bound applications from quit a while now. During the investigation, we have seen some weird error messages on the CISCO ASA 5525. It continuously generates the "connection timed out, Removing rule" log messages in the syslog. We could see that the IPs of the applications under investigation also fall in these syslog messages.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Initially, we suspected the TCP timeouts, so we increased the tcp timeouts for certain IPs to '0', so that it never times out. But still the timeout messages for the same IPs are visible very frequently in the syslog messages.&lt;/P&gt;
&lt;P&gt;Please have a look at the attached log and advise.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA 5525, Version 9.5(1)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Saif&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963113#M149960</guid>
      <dc:creator>saifuddin.miyaji</dc:creator>
      <dc:date>2019-03-12T08:16:36Z</dc:date>
    </item>
    <item>
      <title>The direct syslog on the ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963114#M149961</link>
      <description>&lt;P&gt;The direct syslog on the ASA has the syslog ID as follows:&lt;/P&gt;
&lt;P&gt;Error Message %ASA-5-338303: Address ipaddr (name) timed out, Removing rule&lt;/P&gt;
&lt;P&gt;Explanation: An IP address that was discovered from the dynamic filter rule table was removed. • ipaddr—The IP address from the DNS reply • name—The domain name Recommended Action None required.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could someone explain more on this??&lt;/P&gt;</description>
      <pubDate>Sun, 18 Sep 2016 13:37:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963114#M149961</guid>
      <dc:creator>saifuddin.miyaji</dc:creator>
      <dc:date>2016-09-18T13:37:25Z</dc:date>
    </item>
    <item>
      <title>Hi Saifuddin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963115#M149962</link>
      <description>&lt;P&gt;Hi Saifuddin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By any means are we using any botnet filtering on the ASA ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If yes could you share the related config ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_141 gr-alert gr_gramm gr_run_anim Punctuation multiReplace" id="141" data-gr-id="141"&gt;Also&lt;/G&gt; check your DNS config on the ASA as DNS failures can cause the inability of the botnet filter to verify the DNS snooping data causing the ASA to drop traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 15:05:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963115#M149962</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-09-23T15:05:40Z</dc:date>
    </item>
    <item>
      <title>Hi Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963116#M149963</link>
      <description>&lt;P&gt;Hi Aditya,&lt;/P&gt;
&lt;P&gt;Yes, you are correct. We are doing BOTNET filtering and DHCP Snooping. We are suspecting that the dhcp snooping is causing this whole menace. Do you know of any way to filter some specific domains from snooping?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Saif&lt;/P&gt;</description>
      <pubDate>Sat, 24 Sep 2016 18:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963116#M149963</guid>
      <dc:creator>saifuddin.miyaji</dc:creator>
      <dc:date>2016-09-24T18:02:39Z</dc:date>
    </item>
    <item>
      <title>Hi Saif,</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963117#M149964</link>
      <description>&lt;P&gt;Hi Saif,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can add those domains to the Whitelist manually using the following command:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/document/33011/asa-botnet-configuration#Never_block_addresses:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Sep 2016 00:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963117#M149964</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-09-25T00:03:22Z</dc:date>
    </item>
    <item>
      <title>Hi Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963118#M149966</link>
      <description>&lt;P&gt;Hi Aditya,&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1.&lt;/STRONG&gt; For the command&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#dynamic-filter whitelist&lt;/P&gt;
&lt;P&gt;&amp;nbsp;#name &amp;lt;&amp;gt;&lt;/P&gt;
&lt;P&gt;what are the options for the &amp;lt;&amp;gt;? Can we use regular expressions here to specify all the subdomains of a parent domain? e.g. for msn.com and all its associated sub domains, can we use expression like "*.msn.com"?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2.&lt;/STRONG&gt; After whitelisting some of the domains, I see some weird type of syslog messages:&lt;/P&gt;
&lt;P&gt;First it times out the whiltelisted domain as if it was not -&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt; Address 74.109.89.93 (otp.actnet.com) timed out. Removing rule&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;then, after a few minutes, we receive the following message on the syslog:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Address 74.109.89.93 discovered for domain otp.actnet.com from whitelist. Adding rule&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please advise&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Saif&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2016 05:38:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-tcp-connection-drop/m-p/2963118#M149966</guid>
      <dc:creator>saifuddin.miyaji</dc:creator>
      <dc:date>2016-09-27T05:38:49Z</dc:date>
    </item>
  </channel>
</rss>

