<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA DDoS Mitigation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-ddos-mitigation/m-p/1817421#M416948</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jerome,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA will automatically drop PSH-ACK packets that are not part of an existing connection, which will prevent your server(s) from ever receiving them. The endpoints must first complete a TCP 3-way handshake before these packets would be allowed. You'll see syslogs like this when the packets are dropped:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.1/12345 to 192.168.1.1/80 flags PSH ACK on interface outside&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Dec 2011 14:03:32 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-12-20T14:03:32Z</dc:date>
    <item>
      <title>Cisco ASA DDoS Mitigation</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ddos-mitigation/m-p/1817420#M416941</link>
      <description>&lt;P&gt;hi I have been reading ASA document defining how to defend DDoS attack specifically SYN Attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the document ASA can defense half open TCP connection. "SYN Attacks"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but what if the attack was a "PSH+ACK" AFAIK this is not considered half-open since there's no session related to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does ASA defend against this?&amp;nbsp; Are there any documetation or papers the discuss this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tia,&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ddos-mitigation/m-p/1817420#M416941</guid>
      <dc:creator>jmacaranas</dc:creator>
      <dc:date>2020-02-21T12:30:42Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA DDoS Mitigation</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ddos-mitigation/m-p/1817421#M416948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jerome,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA will automatically drop PSH-ACK packets that are not part of an existing connection, which will prevent your server(s) from ever receiving them. The endpoints must first complete a TCP 3-way handshake before these packets would be allowed. You'll see syslogs like this when the packets are dropped:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.1/12345 to 192.168.1.1/80 flags PSH ACK on interface outside&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Dec 2011 14:03:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ddos-mitigation/m-p/1817421#M416948</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-12-20T14:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA DDoS Mitigation</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ddos-mitigation/m-p/1817422#M416957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does this mean if I see the mentioned syslog message that it is a DOS attack?&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 17:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ddos-mitigation/m-p/1817422#M416957</guid>
      <dc:creator>helsayed78</dc:creator>
      <dc:date>2013-06-06T17:20:59Z</dc:date>
    </item>
  </channel>
</rss>

