<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 877w ZBFW issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997308#M434556</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having a few issues since changing from a cbac firewall to a zone based firewall running on a Cisco 877w IOS: &lt;/P&gt;&lt;P&gt;c870-advipservicesk9-mz.124-24.T6.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Enabling http layer 7 inspection stops certain websites and downloads working. As a work around I have just enabled layer 3/4 inspection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In my config if I enable the following then it breaks certain websites and downloads:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;class-map type inspect match-all cm_http&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match access-group name zInternal_Subnets&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I am seeing strange traffic being dropped from port 0 to port 3? This happens quite frequently, and it generally coincides with opening fatrat which is a download manager and bit torrent client. The only info I can find on this port is: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Port(s)&lt;/SPAN&gt;&lt;/TH&gt; &lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Protocol&lt;/SPAN&gt;&lt;/TH&gt; &lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Service&lt;/SPAN&gt;&lt;/TH&gt; &lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Details&lt;/SPAN&gt;&lt;/TH&gt; &lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Source&lt;/SPAN&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR style="cursor: pointer;" title="updated: 2009-12-01, hits: 3366"&gt;&lt;TD style="width: 15%; text-align: center;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;3 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;tcp,udp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;compressnet&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 70%;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;SynDrop trojan uses this port.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Delta Force also uses port 3 (TCP).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; IANA assigned for: Compression Process&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Port also used by: Midnight Commander&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;SG&lt;/EM&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="cursor: pointer;" title="updated: 2009-02-24, hits: 4988"&gt;&lt;TD style="width: 15%; text-align: center;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;3 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;tcp,udp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD style="width: 70%;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;Compression Process (official)&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;Wikipedia&lt;/EM&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="cursor: pointer;" title="updated: 2009-02-24, hits: 4988"&gt;&lt;TD style="width: 15%; text-align: center;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;3 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;tcp,udp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;compressnet&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 70%;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;Compression Process&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;IANA&lt;/EM&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="cursor: pointer;" title="updated: 2010-03-12, hits: 2764"&gt;&lt;TD style="width: 15%; text-align: center;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;3 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;tcp,udp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;compressnet&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 70%;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;Midnight Commander Sometimes this program is assigned to this port&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could be a trojan or related to compression process? - what I would like to know is whether or not I should be allowing this through the firewall, ie if it's used in compressing data between clients then that could be quite usefull!?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eg: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4049: [syslog@9 s_sn="4049"]: 004043: %FW-6-LOG_SUMMARY: 1 packet were dropped from 63.142.161.6:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4050: [syslog@9 s_sn="4050"]: 004044: %FW-6-LOG_SUMMARY: 1 packet were dropped from 118.4.250.164:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4051: [syslog@9 s_sn="4051"]: 004045: %FW-6-LOG_SUMMARY: 1 packet were dropped from 190.229.222.76:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4052: [syslog@9 s_sn="4052"]: 004046: %FW-6-LOG_SUMMARY: 1 packet were dropped from 180.180.81.94:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4053: [syslog@9 s_sn="4053"]: 004047: %FW-6-LOG_SUMMARY: 1 packet were dropped from 122.125.91.186:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4054: [syslog@9 s_sn="4054"]: 004048: %FW-6-LOG_SUMMARY: 1 packet were dropped from 63.142.161.35:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4055: [syslog@9 s_sn="4055"]: 004049: %FW-6-LOG_SUMMARY: 1 packet were dropped from 91.205.69.186:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Lastly I am also getting a lot of dropped packets:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-DROP_PKT: Dropping tcp session 10.10.0.2:34445 216.137.55.60:443&amp;nbsp; due to&amp;nbsp; RST inside current window with ip ident 0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 3 packets were dropped from 112.208.244.186:58464 =&amp;gt; 85.200.97.32:64664 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 112.208.244.186:445 =&amp;gt; 112.208.32.251:46151 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 112.208.244.186:60092 =&amp;gt; 118.215.189.177:443 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 178.111.60.151:55755 =&amp;gt; 10.10.0.10:40760 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 3 packets were dropped from 10.5.0.3:32856 =&amp;gt; 98.137.129.181:80 (target:class)-(ZP_OUTBOUND:cm_generic_traffic)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 112.208.244.186:445 =&amp;gt; 112.208.32.251:46620 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 113.160.85.70:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.189.177:443 =&amp;gt; 10.10.0.3:39282 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.189.177:443 =&amp;gt; 10.10.0.3:40047 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-DROP_PKT: Dropping tcp session 118.215.189.177:443 10.10.0.3:40047 on zone-pair ZP_out_nat class class-default due to&amp;nbsp; DROP action found in policy-map with ip ident 0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-DROP_PKT: Dropping tcp session 118.215.178.110:443 10.10.0.3:52182&amp;nbsp; due to&amp;nbsp; Stray Segment with ip ident 0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 118.215.189.177:443 =&amp;gt; 10.10.0.3:40047 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 118.215.189.177:443 =&amp;gt; 10.10.0.3:39282 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:51745 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:33809 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:44424 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:37326 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:57595 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 10.5.0.3:32856 =&amp;gt; 98.137.129.181:80 (target:class)-(ZP_OUTBOUND:cm_generic_traffic)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 3 packets were dropped from 112.208.244.186:58464 =&amp;gt; 85.200.97.32:65477 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:45402 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 112.208.244.186:40047 =&amp;gt; 118.215.189.177:443 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached my config also - if someone could help me out with any or all of the above would be much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:17:10 GMT</pubDate>
    <dc:creator>csc.nes-wa</dc:creator>
    <dc:date>2019-03-11T23:17:10Z</dc:date>
    <item>
      <title>877w ZBFW issues</title>
      <link>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997308#M434556</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having a few issues since changing from a cbac firewall to a zone based firewall running on a Cisco 877w IOS: &lt;/P&gt;&lt;P&gt;c870-advipservicesk9-mz.124-24.T6.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Enabling http layer 7 inspection stops certain websites and downloads working. As a work around I have just enabled layer 3/4 inspection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In my config if I enable the following then it breaks certain websites and downloads:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;class-map type inspect match-all cm_http&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match access-group name zInternal_Subnets&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I am seeing strange traffic being dropped from port 0 to port 3? This happens quite frequently, and it generally coincides with opening fatrat which is a download manager and bit torrent client. The only info I can find on this port is: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Port(s)&lt;/SPAN&gt;&lt;/TH&gt; &lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Protocol&lt;/SPAN&gt;&lt;/TH&gt; &lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Service&lt;/SPAN&gt;&lt;/TH&gt; &lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Details&lt;/SPAN&gt;&lt;/TH&gt; &lt;TH&gt;&lt;SPAN style="font-size: 8pt;"&gt;Source&lt;/SPAN&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR style="cursor: pointer;" title="updated: 2009-12-01, hits: 3366"&gt;&lt;TD style="width: 15%; text-align: center;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;3 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;tcp,udp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;compressnet&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 70%;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;SynDrop trojan uses this port.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Delta Force also uses port 3 (TCP).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; IANA assigned for: Compression Process&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Port also used by: Midnight Commander&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;SG&lt;/EM&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="cursor: pointer;" title="updated: 2009-02-24, hits: 4988"&gt;&lt;TD style="width: 15%; text-align: center;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;3 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;tcp,udp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD style="width: 70%;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;Compression Process (official)&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;Wikipedia&lt;/EM&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="cursor: pointer;" title="updated: 2009-02-24, hits: 4988"&gt;&lt;TD style="width: 15%; text-align: center;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;3 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;tcp,udp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;compressnet&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 70%;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;Compression Process&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;IANA&lt;/EM&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="cursor: pointer;" title="updated: 2010-03-12, hits: 2764"&gt;&lt;TD style="width: 15%; text-align: center;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;3 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;tcp,udp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 5%; text-align: center; white-space: nowrap;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;compressnet&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 70%;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;Midnight Commander Sometimes this program is assigned to this port&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could be a trojan or related to compression process? - what I would like to know is whether or not I should be allowing this through the firewall, ie if it's used in compressing data between clients then that could be quite usefull!?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eg: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4049: [syslog@9 s_sn="4049"]: 004043: %FW-6-LOG_SUMMARY: 1 packet were dropped from 63.142.161.6:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4050: [syslog@9 s_sn="4050"]: 004044: %FW-6-LOG_SUMMARY: 1 packet were dropped from 118.4.250.164:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4051: [syslog@9 s_sn="4051"]: 004045: %FW-6-LOG_SUMMARY: 1 packet were dropped from 190.229.222.76:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4052: [syslog@9 s_sn="4052"]: 004046: %FW-6-LOG_SUMMARY: 1 packet were dropped from 180.180.81.94:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4053: [syslog@9 s_sn="4053"]: 004047: %FW-6-LOG_SUMMARY: 1 packet were dropped from 122.125.91.186:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4054: [syslog@9 s_sn="4054"]: 004048: %FW-6-LOG_SUMMARY: 1 packet were dropped from 63.142.161.35:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;4055: [syslog@9 s_sn="4055"]: 004049: %FW-6-LOG_SUMMARY: 1 packet were dropped from 91.205.69.186:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Lastly I am also getting a lot of dropped packets:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-DROP_PKT: Dropping tcp session 10.10.0.2:34445 216.137.55.60:443&amp;nbsp; due to&amp;nbsp; RST inside current window with ip ident 0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 3 packets were dropped from 112.208.244.186:58464 =&amp;gt; 85.200.97.32:64664 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 112.208.244.186:445 =&amp;gt; 112.208.32.251:46151 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 112.208.244.186:60092 =&amp;gt; 118.215.189.177:443 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 178.111.60.151:55755 =&amp;gt; 10.10.0.10:40760 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 3 packets were dropped from 10.5.0.3:32856 =&amp;gt; 98.137.129.181:80 (target:class)-(ZP_OUTBOUND:cm_generic_traffic)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 112.208.244.186:445 =&amp;gt; 112.208.32.251:46620 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 113.160.85.70:0 =&amp;gt; 10.5.0.3:3 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.189.177:443 =&amp;gt; 10.10.0.3:39282 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.189.177:443 =&amp;gt; 10.10.0.3:40047 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-DROP_PKT: Dropping tcp session 118.215.189.177:443 10.10.0.3:40047 on zone-pair ZP_out_nat class class-default due to&amp;nbsp; DROP action found in policy-map with ip ident 0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-DROP_PKT: Dropping tcp session 118.215.178.110:443 10.10.0.3:52182&amp;nbsp; due to&amp;nbsp; Stray Segment with ip ident 0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 118.215.189.177:443 =&amp;gt; 10.10.0.3:40047 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 118.215.189.177:443 =&amp;gt; 10.10.0.3:39282 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:51745 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:33809 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:44424 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:37326 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:57595 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 10.5.0.3:32856 =&amp;gt; 98.137.129.181:80 (target:class)-(ZP_OUTBOUND:cm_generic_traffic)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 3 packets were dropped from 112.208.244.186:58464 =&amp;gt; 85.200.97.32:65477 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 2 packets were dropped from 118.215.178.110:443 =&amp;gt; 10.10.0.3:45402 (target:class)-(ZP_out_nat:class-default)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;%FW-6-LOG_SUMMARY: 1 packet were dropped from 112.208.244.186:40047 =&amp;gt; 118.215.189.177:443 (target:class)-(ZP_self_out:inspect_self_OUTBOUND)&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached my config also - if someone could help me out with any or all of the above would be much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997308#M434556</guid>
      <dc:creator>csc.nes-wa</dc:creator>
      <dc:date>2019-03-11T23:17:10Z</dc:date>
    </item>
    <item>
      <title>877w ZBFW issues</title>
      <link>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997309#M434557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have downgraded to c870-advipservicesk9-mz.124-20.T3.bin as per the suggestion from this thread &lt;A _jive_internal="true" href="https://community.cisco.com/thread/2089462"&gt;https://supportforums.cisco.com/thread/2089462&lt;/A&gt; and this has resolved problem 1, with http inspection enabled all traffic is working as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try upgrading one release at time and see what IOS version starts causing this problem and report back&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still have problems with 2 &amp;amp; 3 however. So any answers/suggestions regarding those would be appreciated &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 01:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997309#M434557</guid>
      <dc:creator>mightymouse2045</dc:creator>
      <dc:date>2012-06-09T01:29:09Z</dc:date>
    </item>
    <item>
      <title>877w ZBFW issues</title>
      <link>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997310#M434558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For problem 2&amp;amp;3: Are you having problems with some applications not working properly? Because for what I can see 95% of the dropped packets are from outside to the inside... which is good, the firewall is doing its work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for this for example:&lt;/P&gt;&lt;P&gt;"%FW-6-LOG_SUMMARY: 1 packet were dropped&amp;nbsp; from 10.5.0.3:32856 =&amp;gt; 98.137.129.181:80&amp;nbsp; (target:class)-(ZP_OUTBOUND:cm_generic_traffic)"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet is being dropped from inside to outside by a policy-map that is inspecting... I don't have an answer for that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 19:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997310#M434558</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2012-06-09T19:56:00Z</dc:date>
    </item>
    <item>
      <title>877w ZBFW issues</title>
      <link>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997311#M434559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Henrik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah I have a problem uploading from within fatrat bit torrent client.... I can download but can't upload.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said the connections to port :3, are coinciding with opening fatrat. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as the configuration is concerned it looks fine to you?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2012 11:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/877w-zbfw-issues/m-p/1997311#M434559</guid>
      <dc:creator>mightymouse2045</dc:creator>
      <dc:date>2012-06-10T11:04:39Z</dc:date>
    </item>
  </channel>
</rss>

