<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Duplicate TCP SYN on ASA Firewall for LPD service in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-on-asa-firewall-for-lpd-service/m-p/2381115#M308144</link>
    <description>&lt;P&gt;Hello&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On my ASA Firewall I noticed in logs the following warnings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4&amp;nbsp;&amp;nbsp;&amp;nbsp; Nov 28 2013&amp;nbsp;&amp;nbsp;&amp;nbsp; 11:31:13&amp;nbsp;&amp;nbsp;&amp;nbsp; 419002&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 731&amp;nbsp;&amp;nbsp;&amp;nbsp; 20.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 515&amp;nbsp;&amp;nbsp;&amp;nbsp; Duplicate TCP SYN from WAN:10.0.0.1/731 to DMZ:20.0.0.1/515 with different initial sequence number&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp;&amp;nbsp; Nov 28 2013&amp;nbsp;&amp;nbsp;&amp;nbsp; 11:34:26&amp;nbsp;&amp;nbsp;&amp;nbsp; 106015&amp;nbsp;&amp;nbsp; 10.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 724&amp;nbsp;&amp;nbsp; 20.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 515&amp;nbsp;&amp;nbsp;&amp;nbsp; Deny TCP (no connection) from 10.0.0.1/724 to 20.0.0.1/515 flags FIN ACK&amp;nbsp; on interface WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created the service policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class-map WAN-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match port tcp eq lpd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map WAN-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class WAN-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection conn-max 0 embryonic-conn-max 0 per-client-max 0 per-client-embryonic-max 0 &lt;STRONG style="color: #000000; "&gt;random-sequence-number disable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy WAN-policy interface WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After apply the map I didn't get any duplicate TCP SYN..... but after a couple of hours they had appered. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to overcome that kind of situation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;vMario&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:10:32 GMT</pubDate>
    <dc:creator>yachooo79</dc:creator>
    <dc:date>2019-03-12T03:10:32Z</dc:date>
    <item>
      <title>Duplicate TCP SYN on ASA Firewall for LPD service</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-on-asa-firewall-for-lpd-service/m-p/2381115#M308144</link>
      <description>&lt;P&gt;Hello&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On my ASA Firewall I noticed in logs the following warnings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4&amp;nbsp;&amp;nbsp;&amp;nbsp; Nov 28 2013&amp;nbsp;&amp;nbsp;&amp;nbsp; 11:31:13&amp;nbsp;&amp;nbsp;&amp;nbsp; 419002&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 731&amp;nbsp;&amp;nbsp;&amp;nbsp; 20.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 515&amp;nbsp;&amp;nbsp;&amp;nbsp; Duplicate TCP SYN from WAN:10.0.0.1/731 to DMZ:20.0.0.1/515 with different initial sequence number&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp;&amp;nbsp; Nov 28 2013&amp;nbsp;&amp;nbsp;&amp;nbsp; 11:34:26&amp;nbsp;&amp;nbsp;&amp;nbsp; 106015&amp;nbsp;&amp;nbsp; 10.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 724&amp;nbsp;&amp;nbsp; 20.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 515&amp;nbsp;&amp;nbsp;&amp;nbsp; Deny TCP (no connection) from 10.0.0.1/724 to 20.0.0.1/515 flags FIN ACK&amp;nbsp; on interface WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created the service policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class-map WAN-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match port tcp eq lpd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map WAN-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class WAN-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection conn-max 0 embryonic-conn-max 0 per-client-max 0 per-client-embryonic-max 0 &lt;STRONG style="color: #000000; "&gt;random-sequence-number disable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy WAN-policy interface WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After apply the map I didn't get any duplicate TCP SYN..... but after a couple of hours they had appered. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to overcome that kind of situation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;vMario&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-on-asa-firewall-for-lpd-service/m-p/2381115#M308144</guid>
      <dc:creator>yachooo79</dc:creator>
      <dc:date>2019-03-12T03:10:32Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN on ASA Firewall for LPD service</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-on-asa-firewall-for-lpd-service/m-p/2381116#M308145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you identified what machine is sending these SYN packets (ip 10.0.0.1)?&amp;nbsp; I have heard of some applications trying to initiate several connections at a time.&amp;nbsp; Have you introduced any new machines/PC to the network recently?&amp;nbsp; How long have you been seeing these messages?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would first of all protect your network against SYN flood attacks as your network is currently wide open, given the configuration you posted.&amp;nbsp; The following config will help minimize your exposure to a SYN flood attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;policy-map WAN-policy&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;class WAN-class&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;set connection conn-max 100&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;set connection embryonic-conn-max 200&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;set connection per-client-embryonic-max 7&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;set connection per-client-max 5&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;set connection random-sequence-number enable&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;set connection timeout embryonic 0:0:45&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;The below link goes more in depth on attack mitigation and might be worth you reading.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Nov 2013 18:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-on-asa-firewall-for-lpd-service/m-p/2381116#M308145</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-11-28T18:49:17Z</dc:date>
    </item>
  </channel>
</rss>

