<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA/ FWSM Application connection Timeouts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089940#M393418</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi Jouni,&lt;/P&gt;&lt;P&gt;I applied the policy exactly as you have mentioned here. But for some reason there was no hitcount or connection for this policy. No ACL hits were shown. I am wondering if there is already a global policy you can not apply a policy on&amp;nbsp; the interface?? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SIP permit tcp any any range 5060 5065&lt;/P&gt;&lt;P&gt;access-list SIP permit udp any any range 5060 5065&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map SIP&lt;BR /&gt;match access-list SIP&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map SIP&lt;BR /&gt;class SIP&lt;BR /&gt;set connection conn-max 6000 &lt;BR /&gt;set connection timeout idle 0:05:00 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is default global policy:&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect tftp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect icmp &lt;BR /&gt;inspect dns &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# sh service-policy &lt;/P&gt;&lt;P&gt;Global policy: &lt;BR /&gt;Service-policy: global_policy&lt;BR /&gt;Class-map: inspection_default&lt;BR /&gt;Inspect: ftp, packet 1232958, drop 0, reset-drop 0&lt;BR /&gt;Inspect: h323 h225, packet 12, drop 0, reset-drop 0&lt;BR /&gt;Inspect: h323 ras, packet 39043, drop 1, reset-drop 0&lt;BR /&gt;Inspect: netbios, packet 18570, drop 0, reset-drop 0&lt;BR /&gt;Inspect: rsh, packet 0, drop 0, reset-drop 0&lt;BR /&gt;Inspect: skinny, packet 0, drop 0, reset-drop 0&lt;BR /&gt;Inspect: sqlnet, packet 0, drop 0, reset-drop 0&lt;BR /&gt;Inspect: sunrpc, packet 0, drop 0, reset-drop 0&lt;BR /&gt;Inspect: tftp, packet 242, drop 0, reset-drop 0&lt;BR /&gt;Inspect: sip, packet 215639, drop 3, reset-drop 0&lt;BR /&gt;Inspect: xdmcp, packet 10, drop 10, reset-drop 0&lt;BR /&gt;Inspect: dns, packet 2624017, drop 37, reset-drop 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface OUTSIDE:&lt;BR /&gt;Service-policy: SIP&lt;BR /&gt;Class-map: SIP&lt;BR /&gt;Set connection policy: conn-max 6000 &lt;BR /&gt;current conns 0, drop 0&lt;BR /&gt;Set connection timeout policy:&lt;BR /&gt;idle 0:05:00 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fawad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 06 Jan 2013 17:42:26 GMT</pubDate>
    <dc:creator>S891</dc:creator>
    <dc:date>2013-01-06T17:42:26Z</dc:date>
    <item>
      <title>ASA/ FWSM Application connection Timeouts</title>
      <link>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089936#M393410</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running FWSM 4.1(10). I have seen recent attacks on some host for certain SIP ports in the range 5060 - 5062. In one incident there were a Million connections , it caused Memory Full issue on FWSM and it stopped passing traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am wondering what methods could be used to prevent these attacks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there an advantage/disadvantage of changing some of these default connection timeouts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 1:00:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout pptp-gre 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is it safe to reduce udp connection timeout?&lt;/P&gt;&lt;P&gt;•3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; What value can be set for SIP timeouts and h323 timeouts to a safe value and still not disrupting?&lt;/P&gt;&lt;P&gt;•4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; How can I limit SIP connections to say 100 connections only, is it total sip connections, or host based sip connections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much!!!!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089936#M393410</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2019-03-12T00:43:27Z</dc:date>
    </item>
    <item>
      <title>ASA/ FWSM Application connection Timeouts</title>
      <link>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089937#M393412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would refer to the below documentation if you want to limit the amount of connections on the FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems though that when I compared the same sections for ASA and FWSM that the ASA had some additional options regarding the below configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/fwsm/fwsm41/configuration/guide/protct_f.html#wp1065885"&gt;http://www.cisco.com/en/US/docs/security/fwsm/fwsm41/configuration/guide/protct_f.html#wp1065885&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly I cant tell you anything about setting the timeouts as I'm not really familiar with SIP in general. Personally my only options would be to ask someone else or start trying out with new values&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you been able to monitor where the connections were initiated from? Were they from all over the world? Could there be any chance of creating an ACL rule that would partially limit this problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess someone at the forums section of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/community/netpro/collaboration-voice-video"&gt;https://supportforums.cisco.com/community/netpro/collaboration-voice-video&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could also give you some tips on how to proceed as they know alot more about this area.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Jan 2013 12:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089937#M393412</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-05T12:32:11Z</dc:date>
    </item>
    <item>
      <title>ASA/ FWSM Application connection Timeouts</title>
      <link>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089938#M393414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I wanted to get some idea if anyone has tried reducing SIP ports 5060 - 5062 time out. The other option could be limit the number of SIP connection, I would like to set it to 5000 and also time out to a low value like 10 - 15 minutes. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Jan 2013 20:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089938#M393414</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2013-01-05T20:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA/ FWSM Application connection Timeouts</title>
      <link>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089939#M393416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the document I linked explains how to define certain traffic and set connection limits and timeout only for that specific traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config)# access-list SIP permit tcp any host x.x.x.x range 5060 5062&lt;/P&gt;&lt;P&gt;hostname(config)# access-list SIP permit udp any host x.x.x.x range 5060 5062&lt;/P&gt;&lt;P&gt;hostname(config)# class-map SIP&lt;/P&gt;&lt;P&gt;hostname(config-cmap)# match access-list SIP&lt;/P&gt;&lt;P&gt;hostname(config-cmap)# policy-map SIP&lt;/P&gt;&lt;P&gt;hostname(config-pmap)# class SIP&lt;/P&gt;&lt;P&gt;hostname(config-pmap-c)# set connection conn-max 5000 conn-rate-limit xxx&lt;/P&gt;&lt;P&gt;hostname(config-pmap-c)# set connection timeout embryonic x:x:x half-closed x:x:x&lt;/P&gt;&lt;P&gt;hostname(config-pmap-c)# set connection timeout idle x:x:x&lt;/P&gt;&lt;P&gt;hostname(config-pmap-c)# service-policy SIP interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Jan 2013 21:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089939#M393416</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-05T21:14:22Z</dc:date>
    </item>
    <item>
      <title>ASA/ FWSM Application connection Timeouts</title>
      <link>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089940#M393418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi Jouni,&lt;/P&gt;&lt;P&gt;I applied the policy exactly as you have mentioned here. But for some reason there was no hitcount or connection for this policy. No ACL hits were shown. I am wondering if there is already a global policy you can not apply a policy on&amp;nbsp; the interface?? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SIP permit tcp any any range 5060 5065&lt;/P&gt;&lt;P&gt;access-list SIP permit udp any any range 5060 5065&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map SIP&lt;BR /&gt;match access-list SIP&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map SIP&lt;BR /&gt;class SIP&lt;BR /&gt;set connection conn-max 6000 &lt;BR /&gt;set connection timeout idle 0:05:00 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is default global policy:&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect tftp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect icmp &lt;BR /&gt;inspect dns &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# sh service-policy &lt;/P&gt;&lt;P&gt;Global policy: &lt;BR /&gt;Service-policy: global_policy&lt;BR /&gt;Class-map: inspection_default&lt;BR /&gt;Inspect: ftp, packet 1232958, drop 0, reset-drop 0&lt;BR /&gt;Inspect: h323 h225, packet 12, drop 0, reset-drop 0&lt;BR /&gt;Inspect: h323 ras, packet 39043, drop 1, reset-drop 0&lt;BR /&gt;Inspect: netbios, packet 18570, drop 0, reset-drop 0&lt;BR /&gt;Inspect: rsh, packet 0, drop 0, reset-drop 0&lt;BR /&gt;Inspect: skinny, packet 0, drop 0, reset-drop 0&lt;BR /&gt;Inspect: sqlnet, packet 0, drop 0, reset-drop 0&lt;BR /&gt;Inspect: sunrpc, packet 0, drop 0, reset-drop 0&lt;BR /&gt;Inspect: tftp, packet 242, drop 0, reset-drop 0&lt;BR /&gt;Inspect: sip, packet 215639, drop 3, reset-drop 0&lt;BR /&gt;Inspect: xdmcp, packet 10, drop 10, reset-drop 0&lt;BR /&gt;Inspect: dns, packet 2624017, drop 37, reset-drop 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface OUTSIDE:&lt;BR /&gt;Service-policy: SIP&lt;BR /&gt;Class-map: SIP&lt;BR /&gt;Set connection policy: conn-max 6000 &lt;BR /&gt;current conns 0, drop 0&lt;BR /&gt;Set connection timeout policy:&lt;BR /&gt;idle 0:05:00 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fawad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 17:42:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089940#M393418</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2013-01-06T17:42:26Z</dc:date>
    </item>
    <item>
      <title>ASA/ FWSM Application connection Timeouts</title>
      <link>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089941#M393419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We had this problem as well. Here is the policy I put in place on an ASA running 8.4(x). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(edited out some specifics though). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list x-sip-limit extended permit udp any any range sip 5070 &lt;/P&gt;&lt;P&gt;access-list x-sip-limit extended permit udp any range sip 5070 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map class-sip-udp&lt;/P&gt;&lt;P&gt; match access-list x-sip-limit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map outside_policy&lt;/P&gt;&lt;P&gt; class class-sip-udp&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection per-client-max 1000 &lt;/P&gt;&lt;P&gt;policy-map inside_policy&lt;/P&gt;&lt;P&gt; class class-sip-udp&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection per-client-max 1000 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy outside_policy interface outside&lt;/P&gt;&lt;P&gt;service-policy inside_policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#show service-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface outside:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy: outside_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-sip-udp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection policy: per-client-max 1000 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current conns 54, drop 5474250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface inside:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy: inside_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-sip-udp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set connection policy: per-client-max 1000 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current conns 15, drop 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Graham&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 22:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-fwsm-application-connection-timeouts/m-p/2089941#M393419</guid>
      <dc:creator>grahamt</dc:creator>
      <dc:date>2013-01-07T22:30:04Z</dc:date>
    </item>
  </channel>
</rss>

