<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic  This may help in trying to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-ack/m-p/2730104#M178720</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This may help in trying to figure out why these are being denied&lt;/P&gt;&lt;P&gt;216.58.216.98 is Google&lt;/P&gt;&lt;P&gt;104.16.27.235 is Cloud Flare Net&lt;/P&gt;&lt;P&gt;208.111.168.7 is Limelight Networks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
    <pubDate>Thu, 17 Sep 2015 16:54:35 GMT</pubDate>
    <dc:creator>fsebera</dc:creator>
    <dc:date>2015-09-17T16:54:35Z</dc:date>
    <item>
      <title>Deny TCP (no connection) RST ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-ack/m-p/2730102#M178716</link>
      <description>&lt;P&gt;ASA 5520&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Logs are flooded with multiple Deny TCP entries on interface inside. &amp;nbsp;From internal user IPs to unknown outside public IPs:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 172.26.x.x/63422 to &lt;STRONG&gt;216.58.216.98&lt;/STRONG&gt;/443 flags RST ACK on interface inside&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 172.26.x.x/62898 to &lt;STRONG&gt;104.16.27.235&lt;/STRONG&gt;/80 flags RST ACK &amp;nbsp;on interface inside&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 172.26.x.x/62315 to &lt;STRONG&gt;208.111.168.7&lt;/STRONG&gt;/80 flags RST ACK &amp;nbsp;on interface inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking to see if these are normal or something to look into? &amp;nbsp;Let me know if there's anything else I can post&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-ack/m-p/2730102#M178716</guid>
      <dc:creator>aelsbernd</dc:creator>
      <dc:date>2019-03-12T06:36:58Z</dc:date>
    </item>
    <item>
      <title>Hi,I think these are not</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-ack/m-p/2730103#M178718</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think these are not normal if they are showing up in large volume.&lt;/P&gt;&lt;P&gt;The logs says that the TCP packet was dropped with the (RST ACK) flag.&lt;/P&gt;&lt;P&gt;Now , the thing is we have to find out why the RST are coming in for these internal Hosts.&lt;/P&gt;&lt;P&gt;It can be different reasons for that(Asymmetric routing , External proxy etc) so you would have to check the captures for the complete stream thru the ASA device and see what you are able to see for the connection.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 16:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-ack/m-p/2730103#M178718</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-09-17T16:49:46Z</dc:date>
    </item>
    <item>
      <title> This may help in trying to</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-ack/m-p/2730104#M178720</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This may help in trying to figure out why these are being denied&lt;/P&gt;&lt;P&gt;216.58.216.98 is Google&lt;/P&gt;&lt;P&gt;104.16.27.235 is Cloud Flare Net&lt;/P&gt;&lt;P&gt;208.111.168.7 is Limelight Networks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 16:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-ack/m-p/2730104#M178720</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2015-09-17T16:54:35Z</dc:date>
    </item>
  </channel>
</rss>

