<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA 5505 - SYN Timeout in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131235#M394881</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmm, how can i check that? This is an extract fro "sh conn" on the remote pix (192.168.200.253) -&amp;nbsp; is that what i should be looking at?&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;TCP out 192.168.100.5:135 in 192.168.200.122:4733 idle 0:01:28 Bytes 0 flags saA&lt;BR /&gt;&lt;P&gt;TCP out 192.168.100.2:135 in 192.168.200.3:4242 idle 0:00:30 Bytes 0 flags saA&lt;/P&gt;&lt;P&gt;TCP out 192.168.100.2:135 in 192.168.200.3:4243 idle 0:00:09 Bytes 0 flags saA&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;this is an sh conn extrct from the asa (192.168.100.253)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;TCP outside 192.168.200.55:135 inside 192.168.100.115:53181, idle 0:00:03, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP outside 192.168.200.66:135 inside 192.168.100.115:53180, idle 0:00:02, bytes 0, flags saA&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both devices have internet access and don't have any routers behind the firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe the problem is to be on the asa not the remote pix (but may be wrong)..... i am the only person with access to the pix and i haven't made a change for around six months but i did make a change to the asa a few days back... ill post the config but i think is a simple one so wonder if it is the hardware... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4)&lt;BR /&gt;!&lt;BR /&gt;hostname bosfw&lt;BR /&gt;enable password 1nbBm6rSIvdi3SGH encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.100.0 Network-Boston&lt;BR /&gt;name 192.168.200.0 Network-London&lt;BR /&gt;name 192.168.40.0 Network-HongKong&lt;BR /&gt;name 192.168.101.0 Network-Boston-VPN&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.1.10.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name domain.com&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip Network-Boston 255.255.255.0 Network-London 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip Network-Boston 255.255.255.0 Network-London 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip Network-Boston 255.255.255.0 Network-HongKong 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip Network-Boston 255.255.255.0 Network-Boston-VPN 255.255.255.0&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip Network-Boston 255.255.255.0 Network-HongKong 255.255.255.0&lt;BR /&gt;access-list vpnuser_splitTunnelAcl standard permit Network-Boston 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool VPNDHCP 192.168.101.100-192.168.101.200 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.1.10.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;aaa-server CyptoCard protocol radius&lt;BR /&gt;aaa-server CyptoCard (inside) host 192.168.100.1&lt;BR /&gt; key password&lt;BR /&gt; radius-common-pw password&lt;BR /&gt;no eou allow clientless&lt;BR /&gt;http server enable&lt;BR /&gt;http Network-Boston 255.255.255.0 inside&lt;BR /&gt;http Network-HongKong 255.255.255.0 inside&lt;BR /&gt;http Network-London 255.255.255.0 inside&lt;BR /&gt;http Network-Boston-VPN 255.255.255.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 62.X.X.X&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer 116.X.X.X&lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet Network-London 255.255.255.0 inside&lt;BR /&gt;telnet Network-HongKong 255.255.255.0 inside&lt;BR /&gt;telnet Network-Boston 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh Network-London 255.255.255.0 inside&lt;BR /&gt;ssh Network-HongKong 255.255.255.0 inside&lt;BR /&gt;ssh Network-Boston 255.255.255.0 inside&lt;BR /&gt;ssh Network-Boston-VPN 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;group-policy vpnuser internal&lt;BR /&gt;group-policy vpnuser attributes&lt;BR /&gt; dns-server value 192.168.100.1 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value vpnuser_splitTunnelAcl&lt;BR /&gt; default-domain value arete.net&lt;BR /&gt;tunnel-group 62.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group 62.X.X.X ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 116.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group 116.X.X.X ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group vpnuser type ipsec-ra&lt;BR /&gt;tunnel-group vpnuser general-attributes&lt;BR /&gt; address-pool VPNDHCP&lt;BR /&gt; authentication-server-group CyptoCard&lt;BR /&gt; default-group-policy vpnuser&lt;BR /&gt;tunnel-group vpnuser ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:cbb7494c7b6b48db5d01a8fc7f1ce042&lt;BR /&gt;: end&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Nov 2012 18:19:16 GMT</pubDate>
    <dc:creator>Tarran</dc:creator>
    <dc:date>2012-11-30T18:19:16Z</dc:date>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131229#M394871</link>
      <description>&lt;P&gt;Cisco ASA 5505&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 7.2(4)&lt;/P&gt;&lt;P&gt;Device Manager Version 5.2(4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have and vpn tunnel between a pix network (192.168.200.0/24) and an asa network (192.168.100.0/24); it's been running fine for awhile now but this morning i've come in an i can not access anything on the pix network, (mail, file &amp;amp; web servers). Each attempt to access results in a SYN timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;6 Nov 30 2012 14:24:01 302014 192.168.200.9 192.168.100.115&amp;nbsp; Teardown TCP connection 6014 for outside:192.168.200.9/135 to inside:192.168.100.115/51240 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone suggest what the issue is... and a fix please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Tarran&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131229#M394871</guid>
      <dc:creator>Tarran</dc:creator>
      <dc:date>2019-03-12T00:30:49Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131230#M394873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the L2L VPN up even though the connections dont go through?&lt;/LI&gt;&lt;LI&gt;When attempting the connections, does the VPN connections counters go up?&lt;UL&gt;&lt;LI&gt;show crypto ipsec sa peer x.x.x.x&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Are you managing both Firewalls? Can you access the remote sides firewall to check the situation there?&lt;/LI&gt;&lt;LI&gt;Have any changes been made?&lt;/LI&gt;&lt;LI&gt;Are you testing connections only to single host on the remote side or is there any other host to which you can test connections to?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 16:39:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131230#M394873</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-30T16:39:29Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131231#M394874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm assuming this is your basic ipsec site to site. Check and make sure the IPSEC tunnel is being built on either side with the&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto ipsec sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and make sure the two networks are talking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or, you could simply try restarting the VPN if nothing is working at all?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;clear crypto ipsec sa peer IPADDRESS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the restart doesnt work then I would verify if there have been any changes on either end.&amp;nbsp; Some of the things to look for includes, NO NAT statements removed or changed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 16:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131231#M394874</guid>
      <dc:creator>Jack Leung</dc:creator>
      <dc:date>2012-11-30T16:40:39Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131232#M394875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In reply:&lt;/P&gt;&lt;P&gt;- The VPN is up.&lt;/P&gt;&lt;P&gt;- The counters also go up per connection attempt&lt;/P&gt;&lt;P&gt;- i manage both sides of the vpn and i haven't made changes in atleast a few days.... the asa is a very simple config setup.&lt;/P&gt;&lt;P&gt;- i am testing multiple hosts and all seem to come back with syn timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also restarted both sides of the vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 17:12:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131232#M394875</guid>
      <dc:creator>Tarran</dc:creator>
      <dc:date>2012-11-30T17:12:04Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131233#M394876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can confirm the vpn tunnel is being built on both sides. I have also tried restarting the vpn but with no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 17:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131233#M394876</guid>
      <dc:creator>Tarran</dc:creator>
      <dc:date>2012-11-30T17:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131234#M394879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the TCP connection attempts, can you confirm that they are being "Built" on the remote side firewall? As in that the remote firewall can see the SYN from the connection initiator?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can see the connections being formed on the remote firewall it would seem more logical that there is either some configurations change made on that side (since no host can bring up a TCP connection) or perhaps is something wrong with the actual firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried booting up the firewalls?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you see any TCP connections from the hosts on the remote network? Are they connecting to anything, even to Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any routers behind the remote firewall or just flat switch network? Can you see anythng behind the remote firewall with "show arp" command? (Clear the arp with "clear arp" if they are old markings)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 17:19:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131234#M394879</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-30T17:19:52Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131235#M394881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmm, how can i check that? This is an extract fro "sh conn" on the remote pix (192.168.200.253) -&amp;nbsp; is that what i should be looking at?&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;TCP out 192.168.100.5:135 in 192.168.200.122:4733 idle 0:01:28 Bytes 0 flags saA&lt;BR /&gt;&lt;P&gt;TCP out 192.168.100.2:135 in 192.168.200.3:4242 idle 0:00:30 Bytes 0 flags saA&lt;/P&gt;&lt;P&gt;TCP out 192.168.100.2:135 in 192.168.200.3:4243 idle 0:00:09 Bytes 0 flags saA&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;this is an sh conn extrct from the asa (192.168.100.253)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;TCP outside 192.168.200.55:135 inside 192.168.100.115:53181, idle 0:00:03, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP outside 192.168.200.66:135 inside 192.168.100.115:53180, idle 0:00:02, bytes 0, flags saA&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both devices have internet access and don't have any routers behind the firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe the problem is to be on the asa not the remote pix (but may be wrong)..... i am the only person with access to the pix and i haven't made a change for around six months but i did make a change to the asa a few days back... ill post the config but i think is a simple one so wonder if it is the hardware... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4)&lt;BR /&gt;!&lt;BR /&gt;hostname bosfw&lt;BR /&gt;enable password 1nbBm6rSIvdi3SGH encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.100.0 Network-Boston&lt;BR /&gt;name 192.168.200.0 Network-London&lt;BR /&gt;name 192.168.40.0 Network-HongKong&lt;BR /&gt;name 192.168.101.0 Network-Boston-VPN&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.1.10.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name domain.com&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip Network-Boston 255.255.255.0 Network-London 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip Network-Boston 255.255.255.0 Network-London 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip Network-Boston 255.255.255.0 Network-HongKong 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip Network-Boston 255.255.255.0 Network-Boston-VPN 255.255.255.0&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip Network-Boston 255.255.255.0 Network-HongKong 255.255.255.0&lt;BR /&gt;access-list vpnuser_splitTunnelAcl standard permit Network-Boston 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool VPNDHCP 192.168.101.100-192.168.101.200 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.1.10.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;aaa-server CyptoCard protocol radius&lt;BR /&gt;aaa-server CyptoCard (inside) host 192.168.100.1&lt;BR /&gt; key password&lt;BR /&gt; radius-common-pw password&lt;BR /&gt;no eou allow clientless&lt;BR /&gt;http server enable&lt;BR /&gt;http Network-Boston 255.255.255.0 inside&lt;BR /&gt;http Network-HongKong 255.255.255.0 inside&lt;BR /&gt;http Network-London 255.255.255.0 inside&lt;BR /&gt;http Network-Boston-VPN 255.255.255.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 62.X.X.X&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer 116.X.X.X&lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet Network-London 255.255.255.0 inside&lt;BR /&gt;telnet Network-HongKong 255.255.255.0 inside&lt;BR /&gt;telnet Network-Boston 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh Network-London 255.255.255.0 inside&lt;BR /&gt;ssh Network-HongKong 255.255.255.0 inside&lt;BR /&gt;ssh Network-Boston 255.255.255.0 inside&lt;BR /&gt;ssh Network-Boston-VPN 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;group-policy vpnuser internal&lt;BR /&gt;group-policy vpnuser attributes&lt;BR /&gt; dns-server value 192.168.100.1 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value vpnuser_splitTunnelAcl&lt;BR /&gt; default-domain value arete.net&lt;BR /&gt;tunnel-group 62.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group 62.X.X.X ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 116.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group 116.X.X.X ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group vpnuser type ipsec-ra&lt;BR /&gt;tunnel-group vpnuser general-attributes&lt;BR /&gt; address-pool VPNDHCP&lt;BR /&gt; authentication-server-group CyptoCard&lt;BR /&gt; default-group-policy vpnuser&lt;BR /&gt;tunnel-group vpnuser ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:cbb7494c7b6b48db5d01a8fc7f1ce042&lt;BR /&gt;: end&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 18:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131235#M394881</guid>
      <dc:creator>Tarran</dc:creator>
      <dc:date>2012-11-30T18:19:16Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131236#M394883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Just a thought but could the asa shun the remote network?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 18:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131236#M394883</guid>
      <dc:creator>Tarran</dc:creator>
      <dc:date>2012-11-30T18:47:51Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131237#M394886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are those ALL connections showing on the PIX side? Can you see any other connections on the PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the "show arp" show on the PIX side? Does it show anything for the LAN interface? If it does can you clear the arp with "clear arp" command and see if any of the previous IP/MAC appear on the PIX arp table (could naturally ping the previous ones also to see if they appear)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I am reading the TCP Flags correctly&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;PIX has seen the SYN from the host behind ASA initiating the TCP connection&lt;UL&gt;&lt;LI&gt;Therefore connection attempt has come through the L2L VPN&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;But this is where it stops for PIX also&lt;UL&gt;&lt;LI&gt;To my understanding it sees the TCP SYN from the Client/host on attempting the connection from behind the ASA but doesnt get ANY reply from the host behind the PIX. So even the PIX doesnt see any return traffic for the TCP connection forming from hosts behind it.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Usually the above means that&lt;UL&gt;&lt;LI&gt;Either the hosts are blocking the connection&lt;/LI&gt;&lt;LI&gt;They have incorrect default gateway&lt;/LI&gt;&lt;LI&gt;There is some other routing problem related to the return traffic that is forwarding the traffic to a wrong place&lt;/LI&gt;&lt;LI&gt;Some device in between broken down or some connection is down&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would really check ARP on the PIX. If you say there is no routers behind the PIX, the PIX should see every single host behind it on its ARP table. Are you sure there is not some kind of problem with the network behind PIX (broken LAN switch)? Have you tried to connect with several different ports?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I presume this network is a production one (is in real use)? Have you changed the ASA outside IP address to private for the purpose of this forum post? Or do you have a NAT device in front of the ASA doing static NAT for ASAs outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 19:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131237#M394886</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-30T19:14:52Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131238#M394888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is strange as is working now after just restarting the comcast router and asa (i had already done this). I think either the ASA or the comcast router is on the way out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to reply to some of the things you mention as really don't want this kind of thing happening where i don't have a clue to what went wrong or why is started working again:&lt;/P&gt;&lt;P&gt;- I know (well, seems most likely) the hosts had the correct details on the PIX side as other sites can access them (and there are multiple hosts also and would be strange that they all had died) as can also the clients at the pix site.&lt;/P&gt;&lt;P&gt;- the pix can see all hosts behind it; there are no routers. it is possible a switch is on it's way out on the pix site though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;I presume this network is a production one (is in real use)? Have you changed the ASA outside IP address to private for the purpose of this forum post? Or do you have a NAT device in front of the ASA doing static NAT for ASAs outside interface?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;This is a production network; i didn't change the outside interface ip address to a private one - it has a router doing static nat; the router is provided by comcast and this is how they provide the router and address range, not allowing you to access or change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above info, does it seem likely that it is the asa or comcast router that is having the issues?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Dec 2012 21:01:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131238#M394888</guid>
      <dc:creator>Tarran</dc:creator>
      <dc:date>2012-12-01T21:01:54Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 - SYN Timeout</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131239#M394889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tarran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recommend next time to run captures on both side, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow you to make sure the ASA and the PIX are receiving the traffic and ofcourse that all the host are acting as they should, then we will be able to determine where is the problem...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this time I agree with Jouni about what the flags are letting us know is that the SYN is being sent and no SYN-ACK is received but again captures next time will help us &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Dec 2012 22:38:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131239#M394889</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-01T22:38:24Z</dc:date>
    </item>
    <item>
      <title>router is a TP Link TL-ER5120</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131240#M394890</link>
      <description>&lt;P&gt;delete me&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:37:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-syn-timeout/m-p/2131240#M394890</guid>
      <dc:creator>flyntransam</dc:creator>
      <dc:date>2016-02-16T18:37:15Z</dc:date>
    </item>
  </channel>
</rss>

