<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you for the quick in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454412#M238665</link>
    <description>&lt;P&gt;Thank you for the quick update. Here is few things I want to mention. To verify I did:-&lt;/P&gt;&lt;P&gt;a) run a nmap scan to same remote network. There were very few tcp teardown messages as oppose to scan which I run through nessus (vulnerability scanner) which contributed to large number of teardown messages.&lt;/P&gt;&lt;P&gt;b) Some patterns I was able to deduce is in case of scanning through nessus, the replied came from gateway address of 10.12.24.1 with message containing the phrase '&lt;A class="question-hyperlink" href="http://networkengineering.stackexchange.com/questions/7789/tcp-reset-i-on-cisco-asa-5512x-version-9-1"&gt;TCP Reset-I &lt;/A&gt;'.?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, the scan was only able to identify single host where in namp scan more then 100+ endstations were discovered. The other teardown message I get is&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:courier new;"&gt;%PIXASA-6-302014: Teardown TCP connection id for interface:real-address/real-port to interface:real-address/real-port duration hh:mm:ss bytes bytes [reason] [(user)]&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:courier new;"&gt;with reason &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullpost"&gt;&lt;STRONG&gt;Failover primary closed&lt;BR /&gt;The standby unit in a failover pair deleted a connection because of a message received from the active unit&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This is the message I get when nmap queries a port on system which is closed.&lt;/P&gt;</description>
    <pubDate>Thu, 08 May 2014 13:25:16 GMT</pubDate>
    <dc:creator>asad ali</dc:creator>
    <dc:date>2014-05-08T13:25:16Z</dc:date>
    <item>
      <title>Troubleshooting  cisco 5585 ASA-6-106015 messages related to tcp deny syslog message</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454410#M238663</link>
      <description>&lt;P&gt;I'm troubleshooting a scenario where I'm getting countless TCP DENY messages in cisco asa 5585 traffic log. The sample logs looks like:-&lt;/P&gt;&lt;P&gt;Troubleshooting &amp;nbsp;cisco 5585 ASA-6-106015 messages related to TCP deny syslog message&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: monospace; font-size: 11.818181991577148px; line-height: normal;"&gt;166&amp;gt;May 07 2014 13:04:50: %ASA-6-106015: Deny TCP (no connection) from 10.10.71.203/46273 to 10.14.16.34/80 flags ACK &amp;nbsp;on interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and in most other cases I'm getting (RST)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: monospace; font-size: 11.818181991577148px; line-height: normal;"&gt;&amp;lt;166&amp;gt;May 07 2014 13:40:28: %ASA-6-106015: Deny TCP (no connection) from 10.10.71.203/57620 to 10.14.16.18/49156 flags RST &amp;nbsp;on interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: monospace; font-size: 11.818181991577148px; line-height: normal;"&gt;The syslog id reads as:-&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;106015&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Error Message %ASA-6-106015: Deny TCP (no connection) from IP_address /port to IP_address /port flags tcp_flags on interface interface_name.&lt;BR /&gt;Explanation The ASA discarded a TCP packet that has no associated connection in the ASA connection table. The ASA looks for a SYN flag in the packet, which indicates a request to establish a new connection. If the SYN flag is not set, and there is no existing connection, the ASA discards the packet.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Recommended Action None required unless the ASA receives a large volume of these invalid TCP packets. If this is the case, trace the packets to the source and determine the reason these packets were sent&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I want to know Is there a possibility these messages I see are result of local system firewall which is denying these messages. In such form, when the packet is rejected e.g receiving an rst from end-station what would be the possible message/event name. Should it be TCP DENY or teardown etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, what I'm interested to know If for suppose the end-station is refusing the connection to a port, what would be the message I would get from syslog? I have googl'ed and found reset-0 to be msg when the connection is refused from the end-station. I want to be clear since I'm analyzing logs from security point the wrong interpretation could mean not responding correct manner in case of real security incident E.g scanning attack.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454410#M238663</guid>
      <dc:creator>asad ali</dc:creator>
      <dc:date>2019-03-12T04:10:18Z</dc:date>
    </item>
    <item>
      <title>Hello, My recommendation</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454411#M238664</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My recommendation would be take a capture on both the inbound and outbound interfaces of the ASA in regards of the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then you will determine whether the connection is getting closed and after a few ms you are still receiving traffic for the previous session closed or if you are seeing asymetric routing that will cause that specific log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know how this goes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 12:42:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454411#M238664</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-05-08T12:42:46Z</dc:date>
    </item>
    <item>
      <title>Thank you for the quick</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454412#M238665</link>
      <description>&lt;P&gt;Thank you for the quick update. Here is few things I want to mention. To verify I did:-&lt;/P&gt;&lt;P&gt;a) run a nmap scan to same remote network. There were very few tcp teardown messages as oppose to scan which I run through nessus (vulnerability scanner) which contributed to large number of teardown messages.&lt;/P&gt;&lt;P&gt;b) Some patterns I was able to deduce is in case of scanning through nessus, the replied came from gateway address of 10.12.24.1 with message containing the phrase '&lt;A class="question-hyperlink" href="http://networkengineering.stackexchange.com/questions/7789/tcp-reset-i-on-cisco-asa-5512x-version-9-1"&gt;TCP Reset-I &lt;/A&gt;'.?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, the scan was only able to identify single host where in namp scan more then 100+ endstations were discovered. The other teardown message I get is&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:courier new;"&gt;%PIXASA-6-302014: Teardown TCP connection id for interface:real-address/real-port to interface:real-address/real-port duration hh:mm:ss bytes bytes [reason] [(user)]&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:courier new;"&gt;with reason &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullpost"&gt;&lt;STRONG&gt;Failover primary closed&lt;BR /&gt;The standby unit in a failover pair deleted a connection because of a message received from the active unit&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This is the message I get when nmap queries a port on system which is closed.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 13:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454412#M238665</guid>
      <dc:creator>asad ali</dc:creator>
      <dc:date>2014-05-08T13:25:16Z</dc:date>
    </item>
    <item>
      <title>Hello, First we will need to</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454413#M238666</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First we will need to identify the probes that NMAP sends against the ones from Nessus.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We might see different traffic patterns as their functionality is similar but Nessus is more powerful when used properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If what you are looking for is to make sure you are not able to identify that many hosts when running the NMAP scan you should be considering working with Threat-Detection Advance option and then customizing the measure values so shunning can happen faster in such an attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it make sense?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 13:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454413#M238666</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-05-08T13:47:20Z</dc:date>
    </item>
    <item>
      <title>The exact probe in terms of</title>
      <link>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454414#M238667</link>
      <description>&lt;P&gt;The exact probe in terms of scan type is 'aggressive'. Nessus does tcp scan by default.&lt;/P&gt;&lt;P&gt;What I'm trying to do is to find where these packets are being dropped at the end-station level or the firewall level. Thats why I have shared these messages. I'm from the sec team, the networking guys manage the routing / firewall part.&lt;/P&gt;&lt;P&gt;Firewall needs to differentiate on the syslog message level on which ends these packets are being dropped.&lt;/P&gt;&lt;P&gt;The settings allowed for scanning allows for any to any communication between source (scanner) and target.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 14:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/troubleshooting-cisco-5585-asa-6-106015-messages-related-to-tcp/m-p/2454414#M238667</guid>
      <dc:creator>asad ali</dc:creator>
      <dc:date>2014-05-08T14:04:29Z</dc:date>
    </item>
  </channel>
</rss>

