<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Troubleshooting ASA large number of connection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638816#M198745</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am seeing an unusually &amp;nbsp;large number of connections (close to 1 Million)&amp;nbsp;on Firewall.. I am not sure if this connection is initiated from outside or inside. It seems&amp;nbsp;large number inside machines trying to reach some outside addresses&amp;nbsp;from connection flag&amp;nbsp;as they are using random port numbers as source and connection to outside on port 80 but Inside antivirus servers and client machine&amp;nbsp;antivirus &amp;nbsp;software are not showing these machines infected.&lt;/P&gt;&lt;P&gt;sh conn&lt;/P&gt;&lt;P&gt;TCP OUTSIDE a.b.c.d:80 INSIDE w.x.y.z:8942 idle 0:00:17 Bytes 1908 FLAGS - sX&lt;/P&gt;&lt;P&gt;.................&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are few difference OUTSIDE addresses but INSIDE is pretty much our entire public IP network user machines range.&lt;/P&gt;&lt;P&gt;The outside port is port 80 which indicates that it is an outside server but how could all these machines be trying to connect to this server.&lt;/P&gt;&lt;P&gt;AM I reading this incorrectly and it could be an outside machine trying to scan my public network machines using source port 80?&lt;/P&gt;&lt;P&gt;My other question is how to read the&amp;nbsp; connection flag correctly to determine the source?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:38:37 GMT</pubDate>
    <dc:creator>S891</dc:creator>
    <dc:date>2019-03-12T05:38:37Z</dc:date>
    <item>
      <title>Troubleshooting ASA large number of connection</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638816#M198745</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am seeing an unusually &amp;nbsp;large number of connections (close to 1 Million)&amp;nbsp;on Firewall.. I am not sure if this connection is initiated from outside or inside. It seems&amp;nbsp;large number inside machines trying to reach some outside addresses&amp;nbsp;from connection flag&amp;nbsp;as they are using random port numbers as source and connection to outside on port 80 but Inside antivirus servers and client machine&amp;nbsp;antivirus &amp;nbsp;software are not showing these machines infected.&lt;/P&gt;&lt;P&gt;sh conn&lt;/P&gt;&lt;P&gt;TCP OUTSIDE a.b.c.d:80 INSIDE w.x.y.z:8942 idle 0:00:17 Bytes 1908 FLAGS - sX&lt;/P&gt;&lt;P&gt;.................&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are few difference OUTSIDE addresses but INSIDE is pretty much our entire public IP network user machines range.&lt;/P&gt;&lt;P&gt;The outside port is port 80 which indicates that it is an outside server but how could all these machines be trying to connect to this server.&lt;/P&gt;&lt;P&gt;AM I reading this incorrectly and it could be an outside machine trying to scan my public network machines using source port 80?&lt;/P&gt;&lt;P&gt;My other question is how to read the&amp;nbsp; connection flag correctly to determine the source?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638816#M198745</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2019-03-12T05:38:37Z</dc:date>
    </item>
    <item>
      <title>Hi Fawad,Explaining the</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638817#M198748</link>
      <description>&lt;P&gt;Hi Fawad,&lt;/P&gt;&lt;P&gt;Explaining the output of show conn :&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;TCP OUTSIDE a.b.c.d:80 INSIDE w.x.y.z:8942 idle 0:00:17 Bytes 1908 FLAGS - sX&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;The inside host w.x.y.z is awaiting a SYN from the outside ip a.b.c.d&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So every TCP connection contains 2 SYN and 2 ACK. "s" is the SYN from the outside server which the inside server is waiting for.&lt;/P&gt;&lt;P&gt;The connection was initiated by the inside host a.b.c.d on port 80 for the outside server. The SYN was sent from inside host to outside server.&lt;/P&gt;&lt;P&gt;However the connection is awaiting the SYN/ACK back from outside server to inside client.&lt;/P&gt;&lt;P&gt;Please check the ips to determine if these connections are legitimate.&lt;/P&gt;&lt;P&gt;The connection flags can be read correctly as per the following doc :&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113602-ptn-113602.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2015 18:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638817#M198748</guid>
      <dc:creator>Divya Subramanian</dc:creator>
      <dc:date>2015-03-16T18:24:21Z</dc:date>
    </item>
    <item>
      <title>Hi Divya, thanks for your</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638818#M198752</link>
      <description>&lt;P&gt;Hi Divya, thanks for your reply but I'm little confused with your answer. Can you explain it?&amp;nbsp;&lt;/P&gt;&lt;P&gt;You said connection was initiated from inside host a.b.c.d ; while in my case a.b.c.d is the outside address. &amp;nbsp;You also said connection was initiated by inside host but when we checked on these machines some the inside IPs didn't even existed (though the IP is within valid subnet) so I am pretty sure this tcp SYN type of attack was initiated from outside (a.b.c.d). But again the confusing thing is how an outside machine can start sessions on port 80 (which is a server port) to a client port (random port).&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem I faced was there were 1000000s of these connections and they flooded the firewall connection limit.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2015 20:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638818#M198752</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2015-03-16T20:22:49Z</dc:date>
    </item>
    <item>
      <title>Hi,Maybe this will help you</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638819#M198753</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Maybe this will help you:&lt;/P&gt;&lt;P&gt;http://www.tunnelsup.com/understanding-cisco-asa-connection-flags&lt;/P&gt;&lt;P&gt;Because there is a X, you have IPS, or CX module. How about logs there.&lt;/P&gt;&lt;P&gt;Is there any chance you can have spoofed addresses on inside?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;About your question (port 80) - there is no problem to send traffic with source port 80 (registered) and target with high port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2015 22:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-asa-large-number-of-connection/m-p/2638819#M198753</guid>
      <dc:creator>Pavel Pokorny</dc:creator>
      <dc:date>2015-03-27T22:47:58Z</dc:date>
    </item>
  </channel>
</rss>

