<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic what is the equivalent implementation of isr ios cli &amp;quot;ip tcp syn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290197#M311348</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Oscar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is supported but you need a class-map type management:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/mpf_service_policy.html#wp1167296"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/mpf_service_policy.html#wp1167296&lt;/A&gt;&lt;/P&gt;&lt;P&gt;TCP and UDP connection limits and timeouts, and TCP sequence number randomization: supported for management traffic...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CONTROL_ACL extended permit tcp host 1.1.1.2 interface outside eq https log&lt;/P&gt;&lt;P&gt;access-list CONTROL_ACL extended permit tcp host 1.1.1.2 interface outside eq ssh log&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;class-map type management CONTROL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; match access-list CONTROL_ACL&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class CONTROL&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection conn-max 1&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my tests, it worked for SSH but not for HTTPS:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh conn all&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2 in use, 2 most used&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:38670 NP Identity Ifc 1.1.1.10:22, idle 0:00:38, bytes 20, flags UfrOB&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:26470 NP Identity Ifc 1.1.1.10:443, idle 0:00:02, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After other sessions:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;%ASA-7-710005: TCP request discarded from 1.1.1.2/25085 to outside:1.1.1.10/22&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;%ASA-3-201011: Connection limit exceeded 1/1 for input packet from 1.1.1.2/25085 to 1.1.1.10/22 on interface outside&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh conn all&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;4 in use, 5 most used&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:41726 NP Identity Ifc 1.1.1.10:443, idle 0:00:43, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:26087 NP Identity Ifc 1.1.1.10:443, idle 0:00:45, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:33312 NP Identity Ifc 1.1.1.10:443, idle 0:00:47, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:26470 NP Identity Ifc 1.1.1.10:443, idle 0:00:04, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Somehow, 0 hitcount on HTTPS ACL...&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh access-list&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list CONTROL_ACL line 1 extended permit tcp host 1.1.1.2 interface outside eq https log informational interval 300 &lt;STRONG&gt;(hitcnt=0)&lt;/STRONG&gt; 0x59b7aa4c&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list CONTROL_ACL line 2 extended permit tcp host 1.1.1.2 interface outside eq ssh log informational interval 300 (hitcnt=8) 0x31fe983c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh asp drop&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Frame drop:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Flow is denied by configured rule (acl-drop)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;/P&gt;&lt;P&gt;&amp;nbsp; First TCP packet not SYN (tcp-not-syn)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 49&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; Connection limit reached (conn-limit)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; FP L2 rule drop (l2_acl)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 48&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Flow drop:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; SSL bad record detected (ssl-bad-record-detect)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh service-policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Global policy:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy: global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: CONTROL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection policy: conn-max 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;current conns 1, drop 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;you can also control each feature timeouts seperately via:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;telnet/ssh timeout 1&lt;/P&gt;&lt;P&gt;http server idle-timeout/&lt;SPAN style="font-size: 10pt;"&gt;session-timeout 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Note: I tried this in GNS (asa 8.4.2) and using telnet from a router (not using a real browser for HTTPS) so the results might not be reflect a production environnement...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Oct 2013 19:03:37 GMT</pubDate>
    <dc:creator>Patrick Moubarak</dc:creator>
    <dc:date>2013-10-09T19:03:37Z</dc:date>
    <item>
      <title>what is the equivalent implementation of isr ios cli "ip tcp synwait-time 10" on asa cli</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290194#M311345</link>
      <description>&lt;P&gt;I would like to see an implementation of an ISR IOS cli:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip tcp synwait-time 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on an ASA cli.&amp;nbsp; thank you much in advance.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290194#M311345</guid>
      <dc:creator>Oscar Quinonez</dc:creator>
      <dc:date>2019-03-12T02:48:56Z</dc:date>
    </item>
    <item>
      <title>what is the equivalent implementation of isr ios cli "ip tcp syn</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290195#M311346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Oscar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map ...&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;policy-map ...&lt;/P&gt;&lt;P&gt; class ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;set connection timeout embryonic &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;service-policy ... global|interface...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;embryonic &lt;/STRONG&gt;&lt;EM style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;hh&lt;/EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;:mm&lt;/SPAN&gt;&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;:&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;ss keyword &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;sets the timeout period until a TCP embryonic (half-open) connection is closed, between 0:0:5 and 1193:0:0. The default is 0:0:30. You can also set this value to 0, which means the connection never times out.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="http://www.cisco.com/en/US/partner/docs/security/asa/command-reference/s1.html#wp1453113"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/command-reference/s1.html#wp1453113&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 03:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290195#M311346</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2013-10-09T03:01:46Z</dc:date>
    </item>
    <item>
      <title>what is the equivalent implementation of isr ios cli "ip tcp syn</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290196#M311347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Patrick, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for the prompt response. I have implemented this for data flow going through the ASA (Data Plane). &lt;/P&gt;&lt;P&gt;My requirement is for traffic terminating (where the asa is the tcp server listener) on the ASA device itself (Management Plane). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried testing the below cli snippet, but was able to log into the device more than one times (set conn max to 1):&lt;/P&gt;&lt;P&gt;I launched on two ssh sessions from MY.MAN.IP.ADDR to the INSIDE.IP.ADDR.ASA successfully, where I expected only one session to complete.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network INT_inside &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host INSIDE.IP.ADDR.ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;﻿object network INT_outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host OUTSIDE.IP.ADDR.ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network INT_NET0965&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object object INT_inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object object INT_outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INT_NET0965 permit ip any object-group INT_NET0965 log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map INT_NET0965&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-list INT_NET0965&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class INT_NET0965&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection conn-max 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection embryonic 0:0:10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh MY.MAN.IP.ADDR 255.255.255.255 inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 17:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290196#M311347</guid>
      <dc:creator>Oscar Quinonez</dc:creator>
      <dc:date>2013-10-09T17:30:57Z</dc:date>
    </item>
    <item>
      <title>what is the equivalent implementation of isr ios cli "ip tcp syn</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290197#M311348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Oscar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is supported but you need a class-map type management:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/mpf_service_policy.html#wp1167296"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/mpf_service_policy.html#wp1167296&lt;/A&gt;&lt;/P&gt;&lt;P&gt;TCP and UDP connection limits and timeouts, and TCP sequence number randomization: supported for management traffic...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CONTROL_ACL extended permit tcp host 1.1.1.2 interface outside eq https log&lt;/P&gt;&lt;P&gt;access-list CONTROL_ACL extended permit tcp host 1.1.1.2 interface outside eq ssh log&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;class-map type management CONTROL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; match access-list CONTROL_ACL&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class CONTROL&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection conn-max 1&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my tests, it worked for SSH but not for HTTPS:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh conn all&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2 in use, 2 most used&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:38670 NP Identity Ifc 1.1.1.10:22, idle 0:00:38, bytes 20, flags UfrOB&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:26470 NP Identity Ifc 1.1.1.10:443, idle 0:00:02, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After other sessions:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;%ASA-7-710005: TCP request discarded from 1.1.1.2/25085 to outside:1.1.1.10/22&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;%ASA-3-201011: Connection limit exceeded 1/1 for input packet from 1.1.1.2/25085 to 1.1.1.10/22 on interface outside&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh conn all&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;4 in use, 5 most used&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:41726 NP Identity Ifc 1.1.1.10:443, idle 0:00:43, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:26087 NP Identity Ifc 1.1.1.10:443, idle 0:00:45, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:33312 NP Identity Ifc 1.1.1.10:443, idle 0:00:47, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;TCP outside 1.1.1.2:26470 NP Identity Ifc 1.1.1.10:443, idle 0:00:04, bytes 0, flags UB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Somehow, 0 hitcount on HTTPS ACL...&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh access-list&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list CONTROL_ACL line 1 extended permit tcp host 1.1.1.2 interface outside eq https log informational interval 300 &lt;STRONG&gt;(hitcnt=0)&lt;/STRONG&gt; 0x59b7aa4c&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list CONTROL_ACL line 2 extended permit tcp host 1.1.1.2 interface outside eq ssh log informational interval 300 (hitcnt=8) 0x31fe983c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh asp drop&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Frame drop:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Flow is denied by configured rule (acl-drop)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;/P&gt;&lt;P&gt;&amp;nbsp; First TCP packet not SYN (tcp-not-syn)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 49&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; Connection limit reached (conn-limit)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; FP L2 rule drop (l2_acl)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 48&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Flow drop:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; SSL bad record detected (ssl-bad-record-detect)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh service-policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Global policy:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy: global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: CONTROL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection policy: conn-max 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;current conns 1, drop 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;you can also control each feature timeouts seperately via:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;telnet/ssh timeout 1&lt;/P&gt;&lt;P&gt;http server idle-timeout/&lt;SPAN style="font-size: 10pt;"&gt;session-timeout 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Note: I tried this in GNS (asa 8.4.2) and using telnet from a router (not using a real browser for HTTPS) so the results might not be reflect a production environnement...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 19:03:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290197#M311348</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2013-10-09T19:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: what is the equivalent implementation of isr ios cli "ip tcp</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290198#M311349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick, &lt;/P&gt;&lt;P&gt;your feedback helped a lot. &lt;/P&gt;&lt;P&gt;I went ahead and ran a script to cycle through 65535 ports on a ASA h/w platform running s/w ver 8.4.38 and the only port that did not triggered the conn-max was https. It seems like a silly added feature or defect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This does not resolve my business policy requirments but at least it allows me to mitage to some level. &lt;/P&gt;&lt;P&gt;I wonder why there is not a set function for timing out a half-open session based on time rather than number. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ended up using the: &lt;/P&gt;&lt;P&gt;set connection embryonic-conn-max n &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;although I really need:&lt;/P&gt;&lt;P&gt;set connection timeout embryonic 0:0:10 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 18:19:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-equivalent-implementation-of-isr-ios-cli-quot-ip-tcp/m-p/2290198#M311349</guid>
      <dc:creator>Oscar Quinonez</dc:creator>
      <dc:date>2013-10-11T18:19:09Z</dc:date>
    </item>
  </channel>
</rss>

