<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dropping unknown session - Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dropping-unknown-session-firewall/m-p/2221740#M349452</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The traffic is getting dropped because it's matching the "class-default" class-map which acts as a catchball for all the packets that didn't match previous class-maps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's default action is to DROP everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That UDP traffic uses port 0, this is not normal traffic and shouldn't be seen under normal circumstances.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, it's a good thing the firewall it's dropping it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 May 2013 23:23:34 GMT</pubDate>
    <dc:creator>Favaloro.</dc:creator>
    <dc:date>2013-05-29T23:23:34Z</dc:date>
    <item>
      <title>Dropping unknown session - Firewall</title>
      <link>https://community.cisco.com/t5/network-security/dropping-unknown-session-firewall/m-p/2221739#M349451</link>
      <description>&lt;P&gt;Dear Team, I am facing trouble to find out the problem. I am getting the alrms below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May 22 17:21:02.447: %FW-6-DROP_PKT: Dropping Unknown-l4 session 162.116.205.245:0 169.254.254.254:0 on zone-pair E_FW_ZON_PAIR_SLF_TO_WAN class class-default due to&amp;nbsp; DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;May 22 17:21:32.519: %FW-6-DROP_PKT: Dropping Unknown-l4 session 162.116.205.245:0 169.254.254.254:0 on zone-pair E_FW_ZON_PAIR_SLF_TO_WAN class class-default due to&amp;nbsp; DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I I could understand is that the session is being dropped due to something related with ident 0,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;someone could help me ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below I put some config lines which could help me to clarify it,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pbjs1468#show policy-map type inspect zone-pair E_FW_ZON_PAIR_SLF_TO_WAN sessions&lt;/P&gt;&lt;P&gt;policy exists on zp E_FW_ZON_PAIR_SLF_TO_WAN&lt;BR /&gt;Zone-pair: E_FW_ZON_PAIR_SLF_TO_WAN&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy inspect : E_FW_POLICY_MAP_SLF_TO_WAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: E_FW_CL_MAP_PROTOCOL_SLF_TO_WAN_98 (match-any)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: access-group name E_FW_SLF_TO_WAN_ACL_98&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33901576 packets, 6137009389 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Pass&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33901576 packets, 6137009389 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default (match-any)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 696394 packets, 19500766 bytes&lt;/P&gt;&lt;P&gt;pbjs1468#show class-map class-default&lt;BR /&gt;Class Map match-any class-default (id 0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Match any&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;policy-map type inspect E_FW_POLICY_MAP_LAN_TO_WAN&lt;BR /&gt;class type inspect E_FW_CLASSE_MAP_LAN_TO_WAN_00&lt;BR /&gt;&amp;nbsp; inspect E_FW_GLOBAL_PARAMETERS&lt;BR /&gt;class type inspect E_FW_CLASSE_MAP_LAN_TO_WAN_01&lt;BR /&gt;&amp;nbsp; inspect E_FW_GLOBAL_PARAMETERS&lt;BR /&gt;class type inspect E_FW_CL_MAP_PROTOCOL_LAN_TO_WAN_0E&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:47:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dropping-unknown-session-firewall/m-p/2221739#M349451</guid>
      <dc:creator>Onildo Ricardo Ribeiro</dc:creator>
      <dc:date>2019-03-12T01:47:33Z</dc:date>
    </item>
    <item>
      <title>Dropping unknown session - Firewall</title>
      <link>https://community.cisco.com/t5/network-security/dropping-unknown-session-firewall/m-p/2221740#M349452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The traffic is getting dropped because it's matching the "class-default" class-map which acts as a catchball for all the packets that didn't match previous class-maps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's default action is to DROP everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That UDP traffic uses port 0, this is not normal traffic and shouldn't be seen under normal circumstances.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, it's a good thing the firewall it's dropping it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 23:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dropping-unknown-session-firewall/m-p/2221740#M349452</guid>
      <dc:creator>Favaloro.</dc:creator>
      <dc:date>2013-05-29T23:23:34Z</dc:date>
    </item>
  </channel>
</rss>

