<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA State Table in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3823607#M309082</link>
    <description>&lt;P&gt;I know what you are saying. I am having a difficult time as well understanding where exactly is the setting that applies TCP and UDO statefull tracking. By default, ASA tracks UDP and TCP. I have read this statement in a milltion places, and yet not one has mentioned where this setting is defined. I know from reading many sources that ICMP tracking and inspection can be turned on using the "inspect ICMP" command under the default class in the default global group policy, but I really don't get it. If ICMP can be turned on, then why cant I use the same logic and turn on TCP and UDP inspection?&lt;/P&gt;</description>
    <pubDate>Thu, 21 Mar 2019 12:30:51 GMT</pubDate>
    <dc:creator>Mohammed Tarek</dc:creator>
    <dc:date>2019-03-21T12:30:51Z</dc:date>
    <item>
      <title>ASA State Table</title>
      <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/2409258#M309073</link>
      <description>&lt;P&gt;I had a question about the ASA's state table. I may be overthinking this!&lt;/P&gt;&lt;P&gt;When going from a higher security level to a lower security level, the ASA keeps track of the state of the connections, which you can see by 'show conn'.&lt;/P&gt;&lt;P&gt;However, whenever you poke holes from, say, the outside to the DMZ, I have read that is supposed to bypass the state table and just allow packets through, but when I do a 'show conn' I can see the connection in the results that have been initiated from a lower security level to a higher one. It seems like the ASA is still recording the sessions. So do those packets go into the state table of the ASA? Why would I see them linger around if they do not?&lt;/P&gt;&lt;P&gt;I do not have any policy maps inspecting these packets from the outside to the dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-state-table/m-p/2409258#M309073</guid>
      <dc:creator>bunjiega</dc:creator>
      <dc:date>2019-03-12T03:04:13Z</dc:date>
    </item>
    <item>
      <title>ASA State Table</title>
      <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/2409259#M309075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It shouldnt matter from where the connection is formed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to TCP Connections the ASA builds a connection as soon as it sees a TCP SYN which is also allowed through the firewall. Naturally how long the connection stays on the ASA depends on multiple factors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For UDP the ASA builds the connection also if the traffic is allowed through the firewall. Though as the UDP connection doesnt really have a state like a TCP connection it means that the UDP connection stays in the ASAs connection table as long as its not idle for too long.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 23:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-state-table/m-p/2409259#M309075</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-12T23:52:15Z</dc:date>
    </item>
    <item>
      <title>ASA State Table</title>
      <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/2409260#M309078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basic information that you need to know to understand how connections work through the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2 style="padding: 4px 0px 11px; font-family: Arial, Helvetica, sans-serif; font-size: 26px; line-height: 1em; color: #444444; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #cccccc; font-weight: normal; width: 940px;"&gt;ASA TCP Connection Flags (Connection build-up and teardown)&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bcad00.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bcad00.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to know this to understand in the state the connection is at on the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout settings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/t.html#wp1540870"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/t.html#wp1540870&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2 style="background-color: #ffffff; border-collapse: collapse; font-size: 2em; list-style: none; padding: 0px 0px 5px; font-weight: normal; line-height: 1.1em; color: #ee6804; font-family: Arial, verdana, sans-serif;"&gt;Understanding xlate and conn idle and timeout values through example&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-21948"&gt;https://supportforums.cisco.com/docs/DOC-21948&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 04:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-state-table/m-p/2409260#M309078</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-14T04:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA State Table</title>
      <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3393171#M309079</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So to confirm we do not see UDP states in the state table right?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not too sure, what you mean by UDP connection stays. Can you please explain me that?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jun 2018 08:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3393171#M309079</guid>
      <dc:creator>aditya_pujari</dc:creator>
      <dc:date>2018-06-03T08:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA State Table</title>
      <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3394158#M309080</link>
      <description>&lt;P&gt;ASA acts like a firewall so each and every packet needs to be inspected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;UDP also gets present on the conn table&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;UDP outside&amp;nbsp; 5.5.22.14:40012 inside&amp;nbsp; 10.22.20.5:44509, idle 0:02:01, bytes 156, flags X&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also read more, &lt;A href="https://supportforums.cisco.com/t5/firewalling/how-does-a-firewall-track-udp/td-p/2354302" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Furthermore, &lt;A href="https://en.wikipedia.org/wiki/UDP_hole_punching" target="_self"&gt;here&lt;/A&gt;'s some extra UDP connection state related info.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 09:57:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3394158#M309080</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-06-05T09:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA State Table</title>
      <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3394271#M309081</link>
      <description>&lt;P&gt;Hi Florin,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the explanation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 13:06:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3394271#M309081</guid>
      <dc:creator>aditya_pujari</dc:creator>
      <dc:date>2018-06-05T13:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA State Table</title>
      <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3823607#M309082</link>
      <description>&lt;P&gt;I know what you are saying. I am having a difficult time as well understanding where exactly is the setting that applies TCP and UDO statefull tracking. By default, ASA tracks UDP and TCP. I have read this statement in a milltion places, and yet not one has mentioned where this setting is defined. I know from reading many sources that ICMP tracking and inspection can be turned on using the "inspect ICMP" command under the default class in the default global group policy, but I really don't get it. If ICMP can be turned on, then why cant I use the same logic and turn on TCP and UDP inspection?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 12:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3823607#M309082</guid>
      <dc:creator>Mohammed Tarek</dc:creator>
      <dc:date>2019-03-21T12:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA State Table</title>
      <link>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3825431#M309083</link>
      <description>My opinion is that you need to be more specific on either TCP or UDP as each have a myriad of ports available.&lt;BR /&gt;So you can select from each protocol, what port to inspect: HTTP, DNS, SMTP..........</description>
      <pubDate>Mon, 25 Mar 2019 10:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-state-table/m-p/3825431#M309083</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2019-03-25T10:31:54Z</dc:date>
    </item>
  </channel>
</rss>

