<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic hi i have sent you a pm mate in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-2851-firewall-issues/m-p/2854383#M157522</link>
    <description>&lt;P&gt;hi i have sent you a pm mate&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jun 2016 15:51:51 GMT</pubDate>
    <dc:creator>CrazyxRascal</dc:creator>
    <dc:date>2016-06-15T15:51:51Z</dc:date>
    <item>
      <title>cisco 2851 firewall issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2851-firewall-issues/m-p/2854381#M157520</link>
      <description>&lt;P&gt;hi i am getting some firewall issues i am getting this error&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cisco(config)#$&lt;BR /&gt;*Jun 15 14:28:16.927: %APPFW-4-HTTP_PROTOCOL_VIOLATION: HTTP protocol violation (0) detected - resetting session 173.241.240.220:80 192.168.1.45:63831 on zone-pair sdm-zp-in-out class sdm-protocol-http appl-class sdm-http-blockparam&lt;BR /&gt;*Jun 15 14:28:43.191: %APPFW-4-HTTP_METHOD: HTTP method (post) matched - resetting session 192.168.1.17:53477 52.29.96.121:80 on zone-pair sdm-zp-in-out class sdm-protocol-http appl-class sdm-app-httpmethods&lt;BR /&gt;*Jun 15 14:28:57.199: %APPFW-4-HTTP_DEOBFUSCATION: Deobfuscation signature (15) detected - resetting session 192.168.1.45:64146 2.18.213.106:80 on zone-pair sdm-zp-in-out class sdm-protocol-http appl-class sdm-http-blockparam&lt;BR /&gt;*Jun 15 14:29:13.443: %APPFW-4-HTTP_METHOD: HTTP method (post) matched - resetting session 192.168.1.17:53642 52.28.130.45:80 on zone-pair sdm-zp-in-out class sdm-protocol-http appl-class sdm-app-httpmethods&lt;BR /&gt;*Jun 15 14:29:44.639: %APPFW-4-HTTP_DEOBFUSCATION: Deobfuscation signature (16) detected - resetting session 192.168.1.45:64219&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://gyazo.com/60115023b458ac061d791d5a4fc106b9" target="_blank"&gt;https://gyazo.com/60115023b458ac061d791d5a4fc106b9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;is this normal ? it not slowing the internet down or anything ? sorry i am new to this .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;also i am getting this&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2851-firewall-issues/m-p/2854381#M157520</guid>
      <dc:creator>CrazyxRascal</dc:creator>
      <dc:date>2019-03-12T07:53:23Z</dc:date>
    </item>
    <item>
      <title>hey</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2851-firewall-issues/m-p/2854382#M157521</link>
      <description>&lt;P&gt;hey&lt;/P&gt;
&lt;P&gt;from the screenshot your queue has filled , you need to increase it defaults can be very low , increase it bit by bit until the logs stop sending that message&lt;/P&gt;
&lt;P&gt;depending what way its configured theres a couple of ways to increase it&lt;/P&gt;
&lt;P&gt;ip inspect tcp reassembly queue length xxx&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;tcp reassembly queue length xxx&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip inspect tcp reassembly &lt;A name="wp1051334"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;To set parameters that define how Cisco IOS Firewall application inspection and Cisco&amp;nbsp;IOS Intrusion Prevention System (IPS) will handle out-of-order TCP packets, use the &lt;B class="cCN_CmdName"&gt;ip inspect tcp reassembly&lt;/B&gt; command in global configuration mode. To disable at least one defined parameter, use the &lt;B class="cBold"&gt;no&lt;/B&gt; form of this command.&lt;/P&gt;
&lt;P&gt;&lt;A name="wp1051335"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pCENB_CmdEnv_NoBold"&gt;&lt;B class="cCN_CmdName"&gt;ip inspect tcp reassembly&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt; {[&lt;/SPAN&gt;&lt;B class="cKeyword" style="font-weight: bold;"&gt;queue length&lt;/B&gt;&lt;EM class="cArgument" style="font-weight: normal;"&gt; packet-number&lt;/EM&gt;&lt;SPAN class="cCp_CmdPlain"&gt;]&lt;/SPAN&gt;&lt;EM class="cArgument"&gt; &lt;/EM&gt;&lt;SPAN class="cCp_CmdPlain"&gt;[&lt;/SPAN&gt;&lt;B class="cKeyword"&gt;timeout&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt; &lt;/SPAN&gt;&lt;EM class="cArgument"&gt;seconds&lt;/EM&gt;&lt;SPAN class="cCp_CmdPlain"&gt;] [&lt;/SPAN&gt;&lt;B class="cKeyword" style="font-weight: bold;"&gt;memory limit &lt;/B&gt;&lt;EM class="cArgument" style="font-weight: normal;"&gt;size-in-kb&lt;/EM&gt;&lt;SPAN class="cCp_CmdPlain"&gt;] [&lt;/SPAN&gt;&lt;B class="cKeyword"&gt;alarm&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt; {&lt;/SPAN&gt;&lt;B class="cKeyword"&gt;on&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt; | &lt;/SPAN&gt;&lt;B class="cKeyword"&gt;off&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt;}]} &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A name="wp1051336"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pCENB_CmdEnv_NoBold"&gt;&lt;B class="cCN_CmdName"&gt;no ip inspect tcp reassembly&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt; {[&lt;/SPAN&gt;&lt;B class="cKeyword"&gt;queue length&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt;]&lt;/SPAN&gt;&lt;EM class="cArgument"&gt; &lt;/EM&gt;&lt;SPAN class="cCp_CmdPlain"&gt;[&lt;/SPAN&gt;&lt;B class="cKeyword"&gt;timeout&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt;] [&lt;/SPAN&gt;&lt;B class="cKeyword"&gt;memory limit&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt;]} &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A name="wp1051356"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;H3 class="pCRSD_CmdRefSynDesc"&gt;Syntax Description&lt;/H3&gt;
&lt;DIV align="left"&gt;
&lt;TABLE width="80%" id="wp1051339table1051337" bordercolor="#808080" border="1" cellspacing="0" cellpadding="3"&gt;&lt;CAPTION&gt;&lt;/CAPTION&gt;
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1051339"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;&lt;SPAN style="color: black; font-style: normal; font-weight: bold;"&gt;queue length&lt;/SPAN&gt;&lt;SPAN class="cCp_CmdPlain"&gt; &lt;/SPAN&gt;&lt;EM class="cArgument"&gt;packet-number&lt;/EM&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1051341"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Maximum number of out-of-order packets that can be held per queue (buffer). (There are two queues per session.) &lt;BR /&gt;Available value range:&amp;nbsp;0&amp;nbsp;to&amp;nbsp;1024. Default value: 16.&lt;/P&gt;
&lt;A name="wp1051342"&gt;&lt;/A&gt;
&lt;P class="pNT_NoteTable"&gt;&lt;B&gt;Note &lt;/B&gt;&lt;A title="Related image, diagram or screenshot." class="show-image-alone" href="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif"&gt;&lt;IMG width="1" height="2" alt="" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" border="0" /&gt;&lt;/A&gt;If the queue length is set to 0, all out-of-order packets are dropped; that is, TCP out-of-order packet buffering and reassembly is disabled.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1051344"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;&lt;B class="cKeyword"&gt;timeout&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt; &lt;/SPAN&gt;&lt;EM class="cArgument"&gt;seconds&lt;/EM&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1051346"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Number of seconds the TCP reassembly module will hold out-of-order segments that are waiting for the first segment missing in the sequence.&lt;/P&gt;
&lt;A name="wp1051347"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;After the timeout timer has expired, a retry timer is started. The value for the retry timer is four times the configured timeout value.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1051349"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;&lt;B class="cKeyword" style="font-weight: bold;"&gt;memory limit &lt;/B&gt;&lt;EM class="cArgument" style="font-weight: normal;"&gt;size-in-kb&lt;/EM&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1051351"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Maximum memory use allowed by the TCP reassembly module.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1051353"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;&lt;B class="cKeyword"&gt;alarm&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt; {&lt;/SPAN&gt;&lt;B class="cKeyword"&gt;on&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt; | &lt;/SPAN&gt;&lt;B class="cKeyword"&gt;off&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt;}&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1051355"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;If enabled, a syslog message is generated when an out-of-order packet is dropped. Default value: &lt;B class="cKeyword"&gt;on&lt;/B&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 15 Jun 2016 15:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2851-firewall-issues/m-p/2854382#M157521</guid>
      <dc:creator>Mark Malone</dc:creator>
      <dc:date>2016-06-15T15:43:41Z</dc:date>
    </item>
    <item>
      <title>hi i have sent you a pm mate</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2851-firewall-issues/m-p/2854383#M157522</link>
      <description>&lt;P&gt;hi i have sent you a pm mate&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2016 15:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2851-firewall-issues/m-p/2854383#M157522</guid>
      <dc:creator>CrazyxRascal</dc:creator>
      <dc:date>2016-06-15T15:51:51Z</dc:date>
    </item>
  </channel>
</rss>

