<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, F,S,R,P are the tcp flags in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760991#M178034</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;F,S,R,P are the tcp flags.&lt;/P&gt;&lt;P&gt;F= FIN&lt;/P&gt;&lt;P&gt;S= SYN&lt;/P&gt;&lt;P&gt;R=RESET&lt;/P&gt;&lt;P&gt;P=PUSH&lt;/P&gt;&lt;P&gt;The captures suggest that the 10.0.15.183 is closing the connection as you can see the FIN flag in the TCP stream.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Did you capture bi-directional traffic?&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Are these captures taken on the ingress or egress interface?&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; If you see traffic on ingress and egress interface then it means firewall is permitting the traffic, try to troubleshoot the application on client end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share your findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
    <pubDate>Sun, 18 Oct 2015 05:46:51 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2015-10-18T05:46:51Z</dc:date>
    <item>
      <title>troubleshooting fwsm</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760988#M178019</link>
      <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have some services running behind &amp;nbsp;fwsm . sometimes i am not able to connect to the services behind fwsm .&lt;/P&gt;&lt;P&gt;for example services running port 8888,i have permitted icmp .but i cant ping the interface ip. (192.168.111.1) .&lt;/P&gt;&lt;P&gt;server behind fwsm are in ZoneA . source network are 10.0.10.0/20.(sh run attached)&lt;/P&gt;&lt;P&gt;how can i troubleshoot . since sometimes icmp are also blocking&amp;nbsp;, how can i make sure traffic hitting the firewall .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760988#M178019</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2019-03-12T06:44:43Z</dc:date>
    </item>
    <item>
      <title>1.Create an ACLaccess-list</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760989#M178024</link>
      <description>&lt;P&gt;1.Create an ACL&lt;BR /&gt;access-list cap extended permit ip host x.x.x.x host y.y.y.y&lt;/P&gt;&lt;P&gt;x.x.x.x = Source&lt;BR /&gt;y.y.y.y = Destination&lt;/P&gt;&lt;P&gt;2. enable captures on the interface where you want to check if the traffic is hitting,&lt;/P&gt;&lt;P&gt;For example if you want to check on zoneA,&lt;BR /&gt;capture capin interface zoneA access-list cap&lt;/P&gt;&lt;P&gt;3. initiate from traffic between the source and destination.&lt;/P&gt;&lt;P&gt;4. check the captures with the following command,&lt;/P&gt;&lt;P&gt;show cap capin&amp;nbsp;&lt;/P&gt;&lt;P&gt;5. You should be able to see the interested traffic if it is hitting the interface.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 09:08:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760989#M178024</guid>
      <dc:creator>prasmura</dc:creator>
      <dc:date>2015-10-14T09:08:29Z</dc:date>
    </item>
    <item>
      <title>Hi, Thanks for the reply .I</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760990#M178029</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply .&lt;/P&gt;&lt;P&gt;I took the below excerpts from the capture file , what tag 'F','R','S',P means ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;944: 11:10:33.437654434 802.1Q vlan#2 P0 10.0.15.183.50624 &amp;gt; 192.168.111.81.8446: . ack 2538599256 win 4095 &amp;lt;nop,nop,timestamp 859232921[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;945: 11:10:33.437654434 802.1Q vlan#2 P0 10.0.15.183.50624 &amp;gt; 192.168.111.81.8446: . ack 2538599309 win 4094 &amp;lt;nop,nop,timestamp 859232921[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;946: 11:10:33.437654434 802.1Q vlan#2 P0 10.0.15.183.50624 &amp;gt; 192.168.111.81.8446: F 2951293550:2951293550(0) ack 2538599309 win 4096 &amp;lt;nop,nop,timestamp 859232921[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;947: 11:10:33.437654434 802.1Q vlan#2 P0 10.0.15.183.50622 &amp;gt; 192.168.111.81.8446: R 1287941973:1287941973(0) win 0&lt;BR /&gt;&amp;nbsp;948: 11:10:33.437654434 802.1Q vlan#2 P0 10.0.15.183.50624 &amp;gt; 192.168.111.81.8446: R 2951293551:2951293551(0) win 0&lt;BR /&gt;&amp;nbsp;949: 11:10:33.437654644 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: S 2299287858:2299287858(0) win 65535 &amp;lt;mss 1460,nop,wscale 5,nop,nop,[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;950: 11:10:33.437654644 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: . ack 386543146 win 4117 &amp;lt;nop,nop,timestamp 859233124[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;951: 11:10:33.437654644 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: P 2299287859:2299288082(223) ack 386543146 win 4117 &amp;lt;nop,nop,timestamp 859233124[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;952: 11:10:33.437654644 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: . ack 386544070 win 4088 &amp;lt;nop,nop,timestamp 859233125[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;953: 11:10:33.437654644 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: P 2299288082:2299288408(326) ack 386544070 win 4096 &amp;lt;nop,nop,timestamp 859233125[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;954: 11:10:33.437654654 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: . ack 386544076 win 4095 &amp;lt;nop,nop,timestamp 859233134[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;955: 11:10:33.437654654 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: . ack 386544129 win 4094 &amp;lt;nop,nop,timestamp 859233134[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;956: 11:10:33.437654654 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: F 2299288408:2299288408(0) ack 386544129 win 4096 &amp;lt;nop,nop,timestamp 859233135[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;957: 11:10:33.437654654 802.1Q vlan#2 P0 10.0.15.183.50627 &amp;gt; 192.168.111.81.8446: S 1019481838:1019481838(0) win 65535 &amp;lt;mss 1460,nop,wscale 5,nop,nop,[|tcp]&amp;gt;&lt;BR /&gt;&amp;nbsp;958: 11:10:33.437654654 802.1Q vlan#2 P0 10.0.15.183.50626 &amp;gt; 192.168.111.81.8446: R 2299288409:2299288409(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;</description>
      <pubDate>Sat, 17 Oct 2015 12:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760990#M178029</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2015-10-17T12:34:01Z</dc:date>
    </item>
    <item>
      <title>Hi, F,S,R,P are the tcp flags</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760991#M178034</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;F,S,R,P are the tcp flags.&lt;/P&gt;&lt;P&gt;F= FIN&lt;/P&gt;&lt;P&gt;S= SYN&lt;/P&gt;&lt;P&gt;R=RESET&lt;/P&gt;&lt;P&gt;P=PUSH&lt;/P&gt;&lt;P&gt;The captures suggest that the 10.0.15.183 is closing the connection as you can see the FIN flag in the TCP stream.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Did you capture bi-directional traffic?&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Are these captures taken on the ingress or egress interface?&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; If you see traffic on ingress and egress interface then it means firewall is permitting the traffic, try to troubleshoot the application on client end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share your findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Sun, 18 Oct 2015 05:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-fwsm/m-p/2760991#M178034</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-18T05:46:51Z</dc:date>
    </item>
  </channel>
</rss>

