<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Troubleshooting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274810#M347162</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Many thanks Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Jul 2013 16:07:28 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2013-07-03T16:07:28Z</dc:date>
    <item>
      <title>ASA Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274806#M347158</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Found this about troubeshooting ASA&amp;nbsp; connections--&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show perfmon &lt;/P&gt;&lt;P&gt;PERFMON STATS: Current Average &lt;/P&gt;&lt;P&gt;Xlates 0/s 0/s &lt;/P&gt;&lt;P&gt;Connections 2236/s 321/s &lt;/P&gt;&lt;P&gt;TCP Conns 2236/s 321/s &lt;/P&gt;&lt;P&gt;UDP Conns 0/s 0/s &lt;/P&gt;&lt;P&gt;URL Access 0/s 0/s &lt;/P&gt;&lt;P&gt;URL Server Req 0/s 0/s &lt;/P&gt;&lt;P&gt;TCP Fixup 0/s 0/s &lt;/P&gt;&lt;P&gt;TCP Intercept Established Conns 0/s 0/s &lt;/P&gt;&lt;P&gt;TCP Intercept Attempts 0/s 0/s &lt;/P&gt;&lt;P&gt;TCP Embryonic Conns Timeout 1012/s 4/s &lt;/P&gt;&lt;P&gt;HTTP Fixup 0/s 0/s &lt;/P&gt;&lt;P&gt;FTP Fixup 0/s 0/s &lt;/P&gt;&lt;P&gt;AAA Authen 0/s 0/s &lt;/P&gt;&lt;P&gt;AAA Author 0/s 0/s &lt;/P&gt;&lt;P&gt;AAA Account 0/s 0/s &lt;/P&gt;&lt;P&gt;VALID CONNS RATE in TCP INTERCEPT: Current Average &lt;/P&gt;&lt;P&gt;N/A 95.00% &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show conn &lt;/P&gt;&lt;P&gt;52121 in use, 52121 most used &lt;/P&gt;&lt;P&gt;TCP outside 17.24.101.118:26093 inside 192.168.1.111:80, idle 0:00:23, bytes 0, flags aB &lt;/P&gt;&lt;P&gt;TCP outside 111.76.36.109:23598 inside 192.168.1.111:80, idle 0:00:13, bytes 0, flags aB &lt;/P&gt;&lt;P&gt;TCP outside 24.185.110.202:32729 inside 192.168.1.111:80, idle 0:00:25, bytes 0, flags aB &lt;/P&gt;&lt;P&gt;TCP outside 130.203.2.204:56481 inside 192.168.1.111:80, idle 0:00:29, bytes 0, flags aB &lt;/P&gt;&lt;P&gt;TCP outside 39.142.106.205:18073 inside 192.168.1.111:80, idle 0:00:02, bytes 0, flags aB &lt;/P&gt;&lt;P&gt;TCP outside 75.27.223.63:51503 inside 192.168.1.111:80, idle 0:00:03, bytes 0, flags aB &lt;/P&gt;&lt;P&gt;TCP outside 121.226.213.239:18315 inside 192.168.1.111:80, idle 0:00:04, bytes 0, flags aB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What seems to be the cause of this attack and the intermittent access to the web server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274806#M347158</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T02:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274807#M347159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would seem like a SYN flood judging by the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The few connections shown in the "show conn" output are all at the same state. And basically the ASA has seen a TCP SYN from "outside" and has also seen TCP SYN ACK from the "inside" server as is to be expected but no actual last TCP ACK from the host that has sent the initial TCP SYN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "show perfmon" output also confirms this as there is a very high rate at which new TCP connections are built on the ASA. There is also a very high Embryonic Conns Timeout which to my understanding refers to connections that were not fully formed with the Three Way Handshake of TCP (TCP SYN -&amp;gt; TCP SYN,ACK -&amp;gt; TCP ACK)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically your server is overloaded by the SYN flood. Depending on your ASA model the ASA might also be under heavy load. In some cases I have even seen the ASA reach the maximum connection amount for the hardware and stop accepting connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 21:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274807#M347159</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-02T21:15:21Z</dc:date>
    </item>
    <item>
      <title>ASA Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274808#M347160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply so to fix issue like this we should config the TCP intercept with connection limit to server might be one of the options to fix this issue right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 21:50:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274808#M347160</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-07-02T21:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274809#M347161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you can set the maximum connections for the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess it basically requires you to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create an ACL that defines the traffic from any source to your server (with certain TCP ports even)&lt;/LI&gt;&lt;LI&gt;Create an &lt;STRONG&gt;"class-map"&lt;/STRONG&gt; and apply that ACL to it&lt;/LI&gt;&lt;LI&gt;Move under the current global &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; and attach the &lt;STRONG&gt;"class-map"&lt;/STRONG&gt; there&lt;/LI&gt;&lt;LI&gt;Define connection limits for traffic destined to the server&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also set the maximum embryonic connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also set the max connections and max embryonic connections on a per client basis which basically means that you can limit the connections so that if alot of the SYN traffic is coming from multiple same hosts then they will be more efficiently limited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure how many different source addresses the TCP SYNs were coming from. I would imagine there are numerous different IPs so it would be impossible to make any kind of other configuration to limit the connections. Naturally you can temporarily deny traffic to that server from Internet so that the ASA wont even build a connections for those attempts. This should possibly give you time to implement some configurations to mitigate the effects of the SYN Flood.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to the Command Reference of ASA 8.2 software which lists the different values you can set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s1.html#wp1424045"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s1.html#wp1424045&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 22:45:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274809#M347161</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-02T22:45:54Z</dc:date>
    </item>
    <item>
      <title>ASA Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274810#M347162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Many thanks Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 16:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting/m-p/2274810#M347162</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-07-03T16:07:28Z</dc:date>
    </item>
  </channel>
</rss>

