<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Large number of session from inside to outside ( how to stop) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/large-number-of-session-from-inside-to-outside-how-to-stop/m-p/2003915#M440664</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is that inside host? It is trying to perform DNS resolution, as UDP/53 is DNS request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To prevent that inside host for doing DNS resolution, you can configure the following:&lt;/P&gt;&lt;P&gt;access-list acl-inside deny udp host 192.168.2.2 any eq 53&lt;/P&gt;&lt;P&gt;access-list acl-inside permit ip any any&lt;/P&gt;&lt;P&gt;access-group acl-inside in interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jun 2012 12:17:51 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-06-19T12:17:51Z</dc:date>
    <item>
      <title>Large number of session from inside to outside ( how to stop)</title>
      <link>https://community.cisco.com/t5/network-security/large-number-of-session-from-inside-to-outside-how-to-stop/m-p/2003914#M440663</link>
      <description>&lt;P&gt;Hi every body,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today i want to disuccs one issue i am facing on my network ( might be it common ). &lt;/P&gt;&lt;P&gt;My network Topology is simple, there is one Inside network , one Outside and one DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on My inside LAN, one host is continously making session with outside live host on port 53. We are using NAT for all traffic that go for internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This one host is making more then 1000 session when i give the command&amp;nbsp; " show conn " . I try to block outside and inside host by using ACL , but it not working as i want&amp;nbsp; ( this acl do not block what i want)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;like this " access-list acl-inisde deny ip host x.x.x.y host 192.168.2.2&amp;nbsp; ( where x.x.x.y is live IP on internet). &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-group acl-inside out interface inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again when i look in to show conn table i found more then 1000 enteries with in few seconds. Port use for host is UDP 53.&lt;/P&gt;&lt;P&gt;The follwoing is output &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh conn | in 192.168.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UDP outside 192.228.79.201:53 inside 192.168.2.2:49262, idle 0:00:02, bytes 51, flags -&lt;/P&gt;&lt;P&gt;UDP outside 199.7.83.42:53 inside 192.168.2.2:50342, idle 0:00:00, bytes 44, flags -&lt;/P&gt;&lt;P&gt;UDP outside 192.112.36.4:53 inside 192.168.2.2:49943, idle 0:00:00, bytes 40, flags -&lt;/P&gt;&lt;P&gt;UDP outside 202.12.27.33:53 inside 192.168.2.2:50999, idle 0:00:00, bytes 43, flags -&lt;/P&gt;&lt;P&gt;UDP outside 199.7.83.42:53 inside 192.168.2.2:49991, idle 0:00:00, bytes 39, flags -&lt;/P&gt;&lt;P&gt;UDP outside 199.7.83.42:53 inside 192.168.2.2:49490, idle 0:00:00, bytes 44, flags -&lt;/P&gt;&lt;P&gt;UDP outside 202.12.27.33:53 inside 192.168.2.2:65299, idle 0:00:00, bytes 44, flags -&lt;/P&gt;&lt;P&gt;UDP outside 192.228.79.201:53 inside 192.168.2.2:50548, idle 0:00:00, bytes 43, flags -&lt;/P&gt;&lt;P&gt;UDP outside 198.41.0.4:53 inside 192.168.2.2:50548, idle 0:00:00, bytes 43, flags -&lt;/P&gt;&lt;P&gt;UDP outside 192.228.79.201:53 inside 192.168.2.2:49534, idle 0:00:00, bytes 36, flags -&lt;/P&gt;&lt;P&gt;UDP outside 202.12.27.33:53 inside 192.168.2.2:65378, idle 0:00:01, bytes 44, flags -&lt;/P&gt;&lt;P&gt;UDP outside 199.7.83.42:53 inside 192.168.2.2:49439, idle 0:00:01, bytes 35, flags -&lt;/P&gt;&lt;P&gt;UDP outside 199.7.83.42:53 inside 192.168.2.2:50293, idle 0:00:01, bytes 36, flags -&lt;/P&gt;&lt;P&gt;UDP outside 199.7.83.42:53 inside 192.168.2.2:65502, idle 0:00:01, bytes 50, flags -&lt;/P&gt;&lt;P&gt;UDP outside 202.12.27.33:53 inside 192.168.2.2:49842, idle 0:00:01, bytes 45, flags -&lt;/P&gt;&lt;P&gt;UDP outside 192.228.79.201:53 inside 192.168.2.2:49556, idle 0:00:01, bytes 35, flags -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i clear the conn table for this IP , following is the outpout on ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# clear conn address 192.168.2.2&lt;/P&gt;&lt;P&gt;1111 connection(s) deleted.&lt;/P&gt;&lt;P&gt;ASA# clear conn address 192.168.2.2&lt;/P&gt;&lt;P&gt;642 connection(s) deleted.&lt;/P&gt;&lt;P&gt;ASA# clear conn address 192.168.2.2&lt;/P&gt;&lt;P&gt;30 connection(s) deleted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and after some time again more then 1000 session buit withine one minute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HOw i can stop such things, your help will be appericiated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A file is attached for reference.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:21:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/large-number-of-session-from-inside-to-outside-how-to-stop/m-p/2003914#M440663</guid>
      <dc:creator>Muhammad Azhar</dc:creator>
      <dc:date>2019-03-11T23:21:01Z</dc:date>
    </item>
    <item>
      <title>Large number of session from inside to outside ( how to stop)</title>
      <link>https://community.cisco.com/t5/network-security/large-number-of-session-from-inside-to-outside-how-to-stop/m-p/2003915#M440664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is that inside host? It is trying to perform DNS resolution, as UDP/53 is DNS request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To prevent that inside host for doing DNS resolution, you can configure the following:&lt;/P&gt;&lt;P&gt;access-list acl-inside deny udp host 192.168.2.2 any eq 53&lt;/P&gt;&lt;P&gt;access-list acl-inside permit ip any any&lt;/P&gt;&lt;P&gt;access-group acl-inside in interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 12:17:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/large-number-of-session-from-inside-to-outside-how-to-stop/m-p/2003915#M440664</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-19T12:17:51Z</dc:date>
    </item>
  </channel>
</rss>

