<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks for detailed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274189#M347630</link>
    <description>&lt;P&gt;Thanks for detailed information.&lt;/P&gt;&lt;P&gt;One question disturb me.&lt;/P&gt;&lt;P&gt;in my Cisco ASA &amp;nbsp; byte always shown 1 in tcp state bypass connections .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for example,&amp;nbsp;&lt;/P&gt;&lt;P&gt;P outside 192.168.201.63:46746 inside 10.84.33.4:7099, idle 0:13:51, &lt;STRONG&gt;bytes 1&lt;/STRONG&gt;, flags b&lt;BR /&gt;TCP outside 192.168.201.63:46747 inside 10.84.33.4:7099, idle 0:13:51, &lt;STRONG&gt;bytes 1&lt;/STRONG&gt;, flags b&lt;BR /&gt;TCP outside 192.168.201.63:45905 inside 10.84.33.4:7099, idle 1:00:30, &lt;STRONG&gt;bytes 1&lt;/STRONG&gt;, flags b&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help to clarify this case.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Sat, 11 Oct 2014 20:40:16 GMT</pubDate>
    <dc:creator>Samir Aliyev</dc:creator>
    <dc:date>2014-10-11T20:40:16Z</dc:date>
    <item>
      <title>Verification of TCP state bypass on Network</title>
      <link>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274184#M347625</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know the working of TCP state bypass and i have config under ASA&amp;nbsp; under global policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map all-traffic&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class all-traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This ASA&amp;nbsp; connects to switch B which has HSRP connection with Switch A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i see the ASA&amp;nbsp; log shows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:05: %ASA-6-302303: Built TCP state-bypass connection 7218 from outside:72.21.81.253/80 (72.21.81.253/80) to inside:192.168.52.9/9293 (192.168.11.2 /49248)&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:06: %ASA-6-302304: Teardown TCP state-bypass connection 6282 from outside:24.244.4.14/80 to inside:192.168.52.9/8529 duration&amp;nbsp; 1:02:12 bytes 4994733 Connection timeout&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:08: %ASA-7-710005: UDP request discarded from 192.168.52.9/7765 to inside:255.255.255.255/7765&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:10: %ASA-6-302304: Teardown TCP state-bypass connection 6286 from outside:24.244.4.14/80 to inside:192.168.52.9/8533 duration&amp;nbsp; 1:00:05 bytes 2787 Connection timeout&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:11: %ASA-6-302304: Teardown TCP state-bypass connection 6289 from outside:24.244.4.14/80 to inside:192.168.52.9/8536 duration&amp;nbsp; 1:00:04 bytes 2787 Connection timeout&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:11: %ASA-6-302304: Teardown TCP state-bypass connection 6288 from outside:24.244.4.14/80 to inside:192.168.52.9/8535 duration&amp;nbsp; 1:00:05 bytes 2787 Connection timeout&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:13: %ASA-7-710005: UDP request discarded from 192.168.52.9/7765 to inside:255.255.255.255/7765&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:18: %ASA-7-710005: UDP request discarded from 192.168.52.9/7765 to inside:255.255.255.255/7765&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:20: %ASA-6-302304: Teardown TCP state-bypass connection 6291 from outside:24.244.4.14/80 to inside:192.168.52.9/8538 duration&amp;nbsp; 1:00:05 bytes 2787 Connection timeout&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:23: %ASA-7-710005: UDP request discarded from 192.168.52.9/7765 to inside:255.255.255.255/7765&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:27: %ASA-6-305012: Teardown dynamic TCP translation from inside:192.168.52.9/8529 to outside:192.168.11.2/39901 duration 1:02:33&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:28: %ASA-7-710005: UDP request discarded from 192.168.52.9/7765 to inside:255.255.255.255/7765&lt;/P&gt;&lt;P&gt;Jun 21 2013 18:26:29: %ASA-6-302304: Teardown TCP state-bypass connection 6292 from outside:24.244.4.14/80 to inside:192.168.52.9/8539 duration&amp;nbsp; 1:00:05 bytes 2787 Connection timeout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh conn shows all the flags b&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP outside 74.120.148.2:443 inside 192.168.52.9:9226, idle 0:20:01, bytes 4657, flags b&lt;/P&gt;&lt;P&gt;TCP outside 69.192.94.131:443 inside 192.168.52.9:9189, idle 0:18:33, bytes 2971, flags b&lt;/P&gt;&lt;P&gt;TCP outside 69.192.94.131:443 inside 192.168.52.9:9188, idle 0:18:12, bytes 2843, flags b&lt;/P&gt;&lt;P&gt;TCP outside 69.192.94.131:443 inside 192.168.52.9:9185, idle 0:18:23, bytes 10715, flags b&lt;/P&gt;&lt;P&gt;TCP outside 69.192.94.131:443 inside 192.168.52.9:9136, idle 0:18:13, bytes 58935, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9205, idle 0:19:57, bytes 0, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9204, idle 0:18:07, bytes 34927, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9203, idle 0:18:07, bytes 35412, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9195, idle 0:19:57, bytes 0, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9194, idle 0:18:08, bytes 4738, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9193, idle 0:19:57, bytes 0, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9192, idle 0:18:07, bytes 8139, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9148, idle 0:18:09, bytes 8953, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9084, idle 0:39:19, bytes 551, flags b&lt;/P&gt;&lt;P&gt;TCP outside 173.194.33.60:80 inside 192.168.52.9:9083, idle 0:41:09, bytes 0, flags b&lt;/P&gt;&lt;P&gt;TCP outside 72.21.91.29:80 inside 192.168.52.9:9263, idle 0:06:41, bytes 3768, flags b&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to confirm on the current setup where traffic is entering and leaving via same ASA&amp;nbsp; is the TCP&amp;nbsp; bypass working or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274184#M347625</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T02:01:37Z</dc:date>
    </item>
    <item>
      <title>Verification of TCP state bypass on Network</title>
      <link>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274185#M347626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, your TCP State Bypass configuration has been applied to each of the connections above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This flag explanantion can be seen with the command &lt;STRONG&gt;"show conn detail"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; b - TCP state-bypass or nailed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you wont be seeing any other TCP flag with connections if you have set this to apply to all connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Jun 2013 11:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274185#M347626</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-22T11:28:15Z</dc:date>
    </item>
    <item>
      <title>Verification of TCP state bypass on Network</title>
      <link>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274186#M347627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for confirming my thoughts.&lt;/P&gt;&lt;P&gt;It was strange that even thoug traffic goes back and forth via single ASA i see all TCP flags --b&lt;/P&gt;&lt;P&gt;Seem this is default behaviour right?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Jun 2013 16:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274186#M347627</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-06-22T16:55:17Z</dc:date>
    </item>
    <item>
      <title>Verification of TCP state bypass on Network</title>
      <link>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274187#M347628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should be normal as you apply the TCP State Bypass to all traffic going through the ASA. Since the TCP State check is now bypassed, like the configuration says, the ASA essentially doesnt care about the flags/state of the TCP connection anymore and should to my understanding let all TCP traffic through that is allowed by the ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to try, you could always create an ACL that defines only traffic between certain IP addresses and attach this ACL to the &lt;STRONG&gt;"class-map"&lt;/STRONG&gt;&amp;nbsp; that you have configured. Then the TCP State Bypass would only be applied to the traffic/connections specified in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this you could try to generate TCP traffic that matches that ACL and also generate TCP traffic that doesnt match it and check the ASAs connection table while the connections are still there. You should see the other TCP connection with the flag &lt;STRONG&gt;"b"&lt;/STRONG&gt; and the other with some other TCP flags that you might be used to seing when looking with &lt;STRONG&gt;"show conn"&lt;/STRONG&gt; or &lt;STRONG&gt;"show conn detail"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Jun 2013 17:20:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274187#M347628</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-22T17:20:35Z</dc:date>
    </item>
    <item>
      <title>Verification of TCP state bypass on Network</title>
      <link>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274188#M347629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for Explaining it in more detail.I got it now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Jun 2013 17:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274188#M347629</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-06-22T17:39:53Z</dc:date>
    </item>
    <item>
      <title>Thanks for detailed</title>
      <link>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274189#M347630</link>
      <description>&lt;P&gt;Thanks for detailed information.&lt;/P&gt;&lt;P&gt;One question disturb me.&lt;/P&gt;&lt;P&gt;in my Cisco ASA &amp;nbsp; byte always shown 1 in tcp state bypass connections .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for example,&amp;nbsp;&lt;/P&gt;&lt;P&gt;P outside 192.168.201.63:46746 inside 10.84.33.4:7099, idle 0:13:51, &lt;STRONG&gt;bytes 1&lt;/STRONG&gt;, flags b&lt;BR /&gt;TCP outside 192.168.201.63:46747 inside 10.84.33.4:7099, idle 0:13:51, &lt;STRONG&gt;bytes 1&lt;/STRONG&gt;, flags b&lt;BR /&gt;TCP outside 192.168.201.63:45905 inside 10.84.33.4:7099, idle 1:00:30, &lt;STRONG&gt;bytes 1&lt;/STRONG&gt;, flags b&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help to clarify this case.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2014 20:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verification-of-tcp-state-bypass-on-network/m-p/2274189#M347630</guid>
      <dc:creator>Samir Aliyev</dc:creator>
      <dc:date>2014-10-11T20:40:16Z</dc:date>
    </item>
  </channel>
</rss>

