<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Understanding teardown from log in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/understanding-teardown-from-log/m-p/2430268#M270376</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The TCP Reset-I and TCP Reset-O should refer to the TCP RST coming from either higher or lower &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some other things affected by the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; also in the output of the ASA. For example when you check the output of &lt;STRONG&gt;"show conn"&lt;/STRONG&gt; command the host on the lowest &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interface is listed first. Same goes for log messages. The host on the lowest &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interface is mentioned first in the log messages for Building and Teardown the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding there is no way to determine the side which normally closed the connection from the log message itself. I would presume that the Client would usually do this but can't be 100% sure that its always like this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is not a clear indication that the firewall is doing something to the connection then I would suggest capturing traffic to find out what is happening to the connection. You can either attach some host to the network to capture all the traffic from some port or perhaps capture traffic on the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could for example configure a capture for your RDP connection like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list RDP-CAP permit tcp host &lt;EXTERNAL host="" ip=""&gt; host &lt;RDP srv="" public="" ip=""&gt;&lt;/RDP&gt;&lt;/EXTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list RDP-CAP permit tcp host &lt;RDP srv="" public="" ip=""&gt; host &lt;EXTERNAL host="" ip=""&gt;&lt;/EXTERNAL&gt;&lt;/RDP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture RDP-CAP type raw-data access-list RDP-CAP interface outside buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are expecting a lot of data you will either have to do the capture on some other device (ASAs buffer limited to approx the above amount of Bytes) or you can either create a capture for each direction separately to maximize the amount of traffic that can be captured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also leave out the Data in the actual packets and only capture the headers by using this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture RDP-CAP type raw-data access-list RDP-CAP interface outside buffer 33500000 circular-buffer headers-only&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can naturally use both of the above commands. Naturally you will have to use a different name for the &lt;STRONG&gt;"capture"&lt;/STRONG&gt;, I am not sure do you have to use a different ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then use this command to check if there is traffic captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wish to show capture contents on the CLI then you can use this command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture RDR-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then again you might want to load the capture to your host/server and open it with Wireshark then you could use this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:RDP-CAP t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/RDP-CAP.pcap" rel="nofollow"&gt;ftp://x.x.x.x/RDP-CAP.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can remove the capture with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture RDP-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to remove the capture ACL separately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure how much information can be gotten from the RDP server itself. I dont have to deal with the IT side at all usually so I don't really know to what extent you would be able to log what the actual server does during those connection issues. A traffic capture would certainly tell what happens to the data/connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Feb 2014 19:28:40 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-02-03T19:28:40Z</dc:date>
    <item>
      <title>Understanding teardown from log</title>
      <link>https://community.cisco.com/t5/network-security/understanding-teardown-from-log/m-p/2430267#M270371</link>
      <description>&lt;P&gt;Is the Reset-I always from the device on the higher security level interface (in this case 172.16.112.10/3389?&lt;/P&gt;&lt;P&gt;In the second case, what conclusions can be drawn from the teardown information "&lt;SPAN style="font-size: 10pt;"&gt;TCP FINs" - who is it that send the first FIN?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I'm strugglig to find the reasons for connections "freezing" or closing, but no errors that I can relate to the connection ids what so ever.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa.log:2014-02-03T15:04:32.186954+01:00 10.1.4.1 %ASA-6-302013: Built inbound TCP connection 1730891653 for wan:195.195.195.195/49624 (195.195.195.195/49624) to vlan547:172.16.112.10/3389 (212.112.9.209/3389)&lt;/P&gt;&lt;P&gt;asa.log:2014-02-03T17:21:36.585964+01:00 10.1.4.1 %ASA-6-302014: Teardown TCP connection 1730891653 for wan:195.195.195.195/49624 to&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;vlan547:172.16.112.10/3389 duration 2:17:05 bytes 35781464 TCP Reset-I&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa.log:2014-02-03T13:14:51.660321+01:00 10.1.4.1 %ASA-6-302013: Built inbound TCP connection 1729135626 for wan:195.195.195.195/50005 (195.195.195.195/50005) to vlan547:172.16.112.10/3389 (212.112.9.209/3389)&lt;/P&gt;&lt;P&gt;asa.log:2014-02-03T18:05:02.785968+01:00 10.1.4.1 %ASA-6-302014: Teardown TCP connection 1729135626 for wan:195.195.195.195/50005 to vlan547:172.16.112.10/3389 duration 4:50:14 bytes 36231472 TCP FINs&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:39:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-teardown-from-log/m-p/2430267#M270371</guid>
      <dc:creator>3moloz123</dc:creator>
      <dc:date>2019-03-12T03:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding teardown from log</title>
      <link>https://community.cisco.com/t5/network-security/understanding-teardown-from-log/m-p/2430268#M270376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The TCP Reset-I and TCP Reset-O should refer to the TCP RST coming from either higher or lower &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some other things affected by the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; also in the output of the ASA. For example when you check the output of &lt;STRONG&gt;"show conn"&lt;/STRONG&gt; command the host on the lowest &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interface is listed first. Same goes for log messages. The host on the lowest &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interface is mentioned first in the log messages for Building and Teardown the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding there is no way to determine the side which normally closed the connection from the log message itself. I would presume that the Client would usually do this but can't be 100% sure that its always like this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is not a clear indication that the firewall is doing something to the connection then I would suggest capturing traffic to find out what is happening to the connection. You can either attach some host to the network to capture all the traffic from some port or perhaps capture traffic on the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could for example configure a capture for your RDP connection like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list RDP-CAP permit tcp host &lt;EXTERNAL host="" ip=""&gt; host &lt;RDP srv="" public="" ip=""&gt;&lt;/RDP&gt;&lt;/EXTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list RDP-CAP permit tcp host &lt;RDP srv="" public="" ip=""&gt; host &lt;EXTERNAL host="" ip=""&gt;&lt;/EXTERNAL&gt;&lt;/RDP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture RDP-CAP type raw-data access-list RDP-CAP interface outside buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are expecting a lot of data you will either have to do the capture on some other device (ASAs buffer limited to approx the above amount of Bytes) or you can either create a capture for each direction separately to maximize the amount of traffic that can be captured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also leave out the Data in the actual packets and only capture the headers by using this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture RDP-CAP type raw-data access-list RDP-CAP interface outside buffer 33500000 circular-buffer headers-only&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can naturally use both of the above commands. Naturally you will have to use a different name for the &lt;STRONG&gt;"capture"&lt;/STRONG&gt;, I am not sure do you have to use a different ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then use this command to check if there is traffic captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wish to show capture contents on the CLI then you can use this command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture RDR-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then again you might want to load the capture to your host/server and open it with Wireshark then you could use this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:RDP-CAP t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/RDP-CAP.pcap" rel="nofollow"&gt;ftp://x.x.x.x/RDP-CAP.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can remove the capture with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture RDP-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to remove the capture ACL separately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure how much information can be gotten from the RDP server itself. I dont have to deal with the IT side at all usually so I don't really know to what extent you would be able to log what the actual server does during those connection issues. A traffic capture would certainly tell what happens to the data/connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Feb 2014 19:28:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-teardown-from-log/m-p/2430268#M270376</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-03T19:28:40Z</dc:date>
    </item>
  </channel>
</rss>

