<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Duplicate TCP SYN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088854#M394172</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the destination address some VPN Client Pool?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share your ASA configuration also?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Dec 2012 22:46:53 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2012-12-12T22:46:53Z</dc:date>
    <item>
      <title>Duplicate TCP SYN</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088853#M394170</link>
      <description>&lt;P&gt;Hello, I'm having an issue allowing legitimate network traffic out. My ASA logs are filling up with: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-4-419002: Duplicate TCP SYN from inside:192.168.1.41/xxxx to outside:172.16.1.215/xxxx with different initial sequence number&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic is known and good traffic. TCP-bypass did not appear to resolve this issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any other workarounds or suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088853#M394170</guid>
      <dc:creator>Spagsterj</dc:creator>
      <dc:date>2019-03-12T00:36:39Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088854#M394172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the destination address some VPN Client Pool?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share your ASA configuration also?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 22:46:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088854#M394172</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-12T22:46:53Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088855#M394173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, the destination address is a public server. However, the client 192.168.1.41 is contacting 172.16.1.215 using a VPN client. Communication between these two hosts pairs is wide open. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2012 01:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088855#M394173</guid>
      <dc:creator>Spagsterj</dc:creator>
      <dc:date>2012-12-13T01:05:19Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088856#M394174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that 192.168.1.41 is a VPN Client user IP and 172.16.1.215 IP is some server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the case then its pretty wierd considering the log messages states that the 192.168.1.41 is behind "inside" and 172.16.1.215 is behind "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or are we perhaps talking about a connection attempt through a L2L VPN and not Client VPN? I mean a connection between 2 LANs connected by Site to Site VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2012 10:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088856#M394174</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-13T10:30:31Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088857#M394180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, 192.168.1.41 is the client/PC on the inside and 172.16.1.215 is a server on another network, which is accessable via the outside interface.&amp;nbsp; 192.168.1.41 is attempting to connect using it's VPN client to 172.16.1.215. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN client or server is not Cisco - I did get it to work by writing a tcp-bypass policy, however I still beleive it should work without having to write the tcp-bypass policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2012 13:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088857#M394180</guid>
      <dc:creator>Spagsterj</dc:creator>
      <dc:date>2012-12-13T13:53:01Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088858#M394181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perfom a capture on the inside interface of the ASA matching this traffic, then create one to check the ASP drops...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin interface inside match tcp host 192.168.1.41 host 172.16.1.215 &lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then without the TCP-state-bypass in place attemtp to connect ( just one connection) and share the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cap capin&lt;/P&gt;&lt;P&gt;show cap asp | include 172.16.1.215&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2012 17:05:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088858#M394181</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-13T17:05:24Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088859#M394182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the packet capture. TCP-bypass was turned-off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# show cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 10:45:36.372569 802.1Q vlan#10 P0 192.168.1.41.1194 &amp;gt; 172.16.1.215.1194: S 2130111956:2130111956(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 10:45:39.372402 802.1Q vlan#10 P0 192.168.1.41.1194 &amp;gt; 172.16.1.215.1194: S 2130111956:2130111956(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 10:45:42.572297 802.1Q vlan#10 P0 192.168.1.41.1194 &amp;gt; 172.16.1.215.1194: S 2130111956:2130111956(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;3 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# show cap asp | include 172.16.1.215&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2012 15:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088859#M394182</guid>
      <dc:creator>Spagsterj</dc:creator>
      <dc:date>2012-12-14T15:57:00Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088860#M394183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case we only see the SYN packets, no SYN-ACK..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA does not seem to be dropping it as you do not have those packets on the ASP capture...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way you could run a capture on the server side ( if there is an ASA run it there) or on the server itself to make sure he is receiving the SYN packets,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2012 17:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn/m-p/2088860#M394183</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-14T17:20:15Z</dc:date>
    </item>
  </channel>
</rss>

