<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How does a firewall track Udp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354303#M310243</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well the UDP connections don't really have a state to track like TCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess one of the most common things to track with regards UDP on the ASA firewall might be DNS inspection and things related to DNS queries. For example the ASA would allow only one reply to a DNS query with the &lt;STRONG&gt;"dns-guard"&lt;/STRONG&gt; global configuration or the one &lt;STRONG&gt;"dns-guard"&lt;/STRONG&gt; configuration in the &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configurations under the &lt;STRONG&gt;"inspect dns"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise I would imagine the first thing for the ASA to check is whether its rules allow the UDP Connection in question based on its destination/source address/port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the connections is allowed to form through the firewall then naturally all traffic related to that connection on the ASA is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the connection (by default) is idle for more than 2 minutes the connection will be removed from the firewall because of the &lt;STRONG&gt;"timeout" &lt;/STRONG&gt;configurations. Naturally with additional &lt;STRONG&gt;"policy-map" / "class-map"&lt;/STRONG&gt; configurations you can change this timeout value for a specific UDP connection you want to something longer or you can even change it globally for all UDP traffic with changing the &lt;STRONG&gt;"timeout"&lt;/STRONG&gt; configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine there is more things related to how ASA handles different UDP connections but the above are the things that come to mind at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please&amp;nbsp; do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 26 Oct 2013 16:59:33 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-10-26T16:59:33Z</dc:date>
    <item>
      <title>How does a firewall track Udp</title>
      <link>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354302#M310242</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone tell me how a firewall tracks the state of a udp connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354302#M310242</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2019-03-12T02:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: How does a firewall track Udp</title>
      <link>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354303#M310243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well the UDP connections don't really have a state to track like TCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess one of the most common things to track with regards UDP on the ASA firewall might be DNS inspection and things related to DNS queries. For example the ASA would allow only one reply to a DNS query with the &lt;STRONG&gt;"dns-guard"&lt;/STRONG&gt; global configuration or the one &lt;STRONG&gt;"dns-guard"&lt;/STRONG&gt; configuration in the &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configurations under the &lt;STRONG&gt;"inspect dns"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise I would imagine the first thing for the ASA to check is whether its rules allow the UDP Connection in question based on its destination/source address/port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the connections is allowed to form through the firewall then naturally all traffic related to that connection on the ASA is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the connection (by default) is idle for more than 2 minutes the connection will be removed from the firewall because of the &lt;STRONG&gt;"timeout" &lt;/STRONG&gt;configurations. Naturally with additional &lt;STRONG&gt;"policy-map" / "class-map"&lt;/STRONG&gt; configurations you can change this timeout value for a specific UDP connection you want to something longer or you can even change it globally for all UDP traffic with changing the &lt;STRONG&gt;"timeout"&lt;/STRONG&gt; configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine there is more things related to how ASA handles different UDP connections but the above are the things that come to mind at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please&amp;nbsp; do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Oct 2013 16:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354303#M310243</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-26T16:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: How does a firewall track Udp</title>
      <link>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354304#M310244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply, however I feel as I need to know more about how they track udp connections&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Oct 2013 19:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354304#M310244</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2013-10-26T19:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: How does a firewall track Udp</title>
      <link>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354305#M310245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not personally sure what else could be said about tracking UDP connections in general.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UDP compared to TCP doesnt contain much in its header for the ASA to keep track of.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check them here for example&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://nmap.org/book/tcpip-ref.html" rel="nofollow"&gt;http://nmap.org/book/tcpip-ref.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TCP Header (click to enlarge)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/2/2/163222-CSC-TCP-header.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;UDP Header (click to enlarge)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/3/2/163238-CSC-UDP-Header.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want a Cisco sourced answer then this is what the CCNP certification material says about the subject&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For UDP flows, the ASA tracks source and destination IP addresses and ports and the idle time since the last packet of the flow was seen by the ASA. For certain applications (such as DNS), the ASA also tracks request identifiers, to help it defend against packet-spoofing attacks. A UDP&amp;nbsp; flow is created in the connection table if the ASA security policy permits it. Because UDP flows have no state machine, UDP flows are deleted only when they are idle for longer than the configurable UDP idle timer&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So pretty much what I said in the above post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Oct 2013 19:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354305#M310245</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-26T19:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: How does a firewall track Udp</title>
      <link>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354306#M310246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi carl,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the ASA has a connection table (aka session table) that is used to track all connections permitted across the device. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this table maintains information not only connection-oriented/Transmission Control Protocol (TCP) sessions, but also the active communications, whether TCP or User Datagram Protocol (UDP), or based on advanced protocol inspection capabilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you could verify using the command &lt;STRONG&gt;show conn &lt;/STRONG&gt;or &lt;STRONG&gt;show conn detail&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show c?&lt;/P&gt;&lt;P&gt;&amp;nbsp; call-home&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; capture&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; checkheaps&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; checksum&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; chunkstat&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; clock&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; compression&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; configuration&amp;nbsp;&amp;nbsp;&amp;nbsp; conn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; console-output&amp;nbsp;&amp;nbsp;&amp;nbsp; controller&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; coredump&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; counters&amp;nbsp;&amp;nbsp;&amp;nbsp; cpu&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; crashinfo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; crypto&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; csc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ctiqbe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ctl-file&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; ctl-provider&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; curpriv&amp;nbsp; &lt;/P&gt;&lt;P&gt;ciscoasa# show conn&lt;/P&gt;&lt;P&gt;39 in use, 1008 most used&lt;/P&gt;&lt;P&gt;ESP outside VPN_Sydney_COLO inside VPN_Brisbane, idle 0:00:00, bytes 5928&lt;/P&gt;&lt;P&gt;UDP outside VPN_Melbourne:500 inside VPN_Brisbane:500, idle 0:01:13, bytes 168, flags -&lt;/P&gt;&lt;P&gt;ESP outside VPN_Sydney_COLO inside VPN_Brisbane, idle 0:00:09, bytes 127300&lt;/P&gt;&lt;P&gt;ESP outside VPN_HK_COLO inside VPN_Brisbane, idle 0:00:19, bytes 4732&lt;/P&gt;&lt;P&gt;UDP outside VPN_SanFrancisco:500 inside VPN_Brisbane:500, idle 0:01:12, bytes 716, flags -&lt;/P&gt;&lt;P&gt;UDP outside VPN_Hongkong:500 inside VPN_Brisbane:500, idle 0:01:19, bytes 504, flags -&lt;/P&gt;&lt;P&gt;UDP outside VPN_Sydney:500 inside VPN_Brisbane:500, idle 0:01:13, bytes 2296, flags -&lt;/P&gt;&lt;P&gt;GRE outside 203.x.x.1:0 inside VPN_Brisbane:0, idle 0:00:00, bytes 6495654, flags E&lt;/P&gt;&lt;P&gt;UDP outside VPN_Adelaide:500 inside VPN_Brisbane:500, idle 0:00:54, bytes 336, flags -&lt;/P&gt;&lt;P&gt;ESP outside VPN_Sydney_COLO inside VPN_Brisbane, idle 0:00:00, bytes 21292&lt;/P&gt;&lt;P&gt;ESP outside VPN_Sydney_COLO inside VPN_Brisbane, idle 0:00:09, bytes 289868&lt;/P&gt;&lt;P&gt;UDP outside VPN_Sydney_COLO:500 inside VPN_Brisbane:500, idle 0:00:09, bytes 51598992, flags -&lt;/P&gt;&lt;P&gt;ESP outside VPN_HK_COLO inside VPN_Brisbane, idle 0:00:06, bytes 4136&lt;/P&gt;&lt;P&gt;UDP outside VPN_HK_COLO:500 inside VPN_Brisbane:500, idle 0:00:19, bytes 1188, flags -&lt;/P&gt;&lt;P&gt;TCP outside 199.x.x.x:80 inside 10.1.50.136:56805, idle 0:00:58, bytes 0, flags UFR&lt;/P&gt;&lt;P&gt;TCP outside 199.x.x.x:80 inside 10.1.50.136:56804, idle 0:00:57, bytes 1321, flags UFRIO&lt;/P&gt;&lt;P&gt;TCP outside 199.x.x.x:80 inside 10.1.50.136:56775, idle 0:02:11, bytes 1254, flags UFRIO&lt;/P&gt;&lt;P&gt;TCP outside 199.x.x.x:80 inside 10.1.50.136:56774, idle 0:02:11, bytes 0, flags UFR&lt;/P&gt;&lt;P&gt;UDP outside VPN_NY_Site2:500 inside VPN_Brisbane:500, idle 0:01:18, bytes 336, flags -&lt;/P&gt;&lt;P&gt;TCP outside DIA_GW:179 inside VPN_Brisbane:33496, idle 0:00:00, bytes 41990954, flags UIO&lt;/P&gt;&lt;P&gt;UDP outside VPN_Perth:500 inside VPN_Brisbane:500, idle 0:00:33, bytes 4704, flags -&lt;/P&gt;&lt;P&gt;UDP outside VPN_Canberra:500 inside VPN_Brisbane:500, idle 0:01:12, bytes 168, flags -&lt;/P&gt;&lt;P&gt;GRE outside 203.x.x.1:0 inside VPN_Brisbane:0, idle 0:00:00, bytes 500076100, flags E&lt;/P&gt;&lt;P&gt;TCP outside 199.x.x.x:80 inside 10.1.50.136:56807, idle 0:01:26, bytes 0, flags U&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SNIPPED&gt;&lt;/SNIPPED&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show conn detail&lt;/P&gt;&lt;P&gt;42 in use, 1008 most used&lt;/P&gt;&lt;P&gt;Flags: A - awaiting inside ACK to SYN, a - awaiting outside ACK to SYN,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; B - initial SYN from outside, b - TCP state-bypass or nailed, C - CTIQBE media,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - DNS, d - dump, E - outside back connection, F - outside FIN, f - inside FIN,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; G - group, g - MGCP, H - H.323, h - H.225.0, I - inbound data,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - incomplete, J - GTP, j - GTP data, K - GTP t3-response&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; k - Skinny media, M - SMTP data, m - SIP media, n - GUP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; O - outbound data, P - inside back connection, p - Phone-proxy TFTP connection,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; q - SQL*Net data, R - outside acknowledged FIN,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R - UDP SUNRPC, r - inside acknowledged FIN, S - awaiting inside SYN,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; s - awaiting outside SYN, T - SIP, t - SIP transient, U - up,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; V - VPN orphan, W - WAAS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X - inspected by service module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ESP outside:VPN_London/41537 inside:VPN_Brisbane/2409,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; idle 4s, uptime 4s, timeout 30s, bytes 76&lt;/P&gt;&lt;P&gt;ESP outside:VPN_Sydney_COLO/54414 inside:VPN_Brisbane/8341,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; idle 0s, uptime 26s, timeout 30s, bytes 71524&lt;/P&gt;&lt;P&gt;UDP outside:VPN_Melbourne/500 inside:VPN_Brisbane/500,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags -, idle 1m31s, uptime 1m31s, timeout 2m0s, bytes 168&lt;/P&gt;&lt;P&gt;ESP outside:VPN_Sydney_COLO/9125 inside:VPN_Brisbane/17362,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; idle 27s, uptime 1m43s, timeout 30s, bytes 127300&lt;/P&gt;&lt;P&gt;ESP outside:VPN_HK_COLO/24294 inside:VPN_Brisbane/27579,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; idle 12s, uptime 3m29s, timeout 30s, bytes 4936&lt;/P&gt;&lt;P&gt;UDP outside:VPN_SanFrancisco/500 inside:VPN_Brisbane/500,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags -, idle 1m29s, uptime 4m13s, timeout 2m0s, bytes 716&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SNIPPED&gt;&lt;/SNIPPED&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Oct 2013 03:41:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-a-firewall-track-udp/m-p/2354306#M310246</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2013-10-27T03:41:35Z</dc:date>
    </item>
  </channel>
</rss>

