<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Duplicate TCP SYN from INT X.X.X.X in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902639#M458114</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Fadi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question here is why is the host sending incorrect tcp packets ( SYN packest) In this case you will need to work on the host first and see why is doing that. BUT if you want to solve this on the easiest and non-secure way you will need to configure a TCP state bypass rule so the ASA will no longer statefully inspect the TCP connections:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit tcp host ip_host_behind_asa host outside_server &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map test&lt;/P&gt;&lt;P&gt;match access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class test&lt;/P&gt;&lt;P&gt;set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Mar 2012 01:07:08 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-03-16T01:07:08Z</dc:date>
    <item>
      <title>Duplicate TCP SYN from INT X.X.X.X</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902638#M458113</link>
      <description>&lt;P&gt;Hiii guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; do anybody can assist me in to fix the issue of the log i'm getting on my ASA firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:Duplicate TCP SYN from INT: (MY IP behind ASA) to Outside: (the remote server outside ASA) with differenet initial sequence number&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i don't know why this comes even i can see the traffic is reaching the remote server??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please your urgent support is needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fadi&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902638#M458113</guid>
      <dc:creator>fadimabrouk</dc:creator>
      <dc:date>2019-03-11T22:42:29Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN from INT X.X.X.X</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902639#M458114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Fadi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question here is why is the host sending incorrect tcp packets ( SYN packest) In this case you will need to work on the host first and see why is doing that. BUT if you want to solve this on the easiest and non-secure way you will need to configure a TCP state bypass rule so the ASA will no longer statefully inspect the TCP connections:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit tcp host ip_host_behind_asa host outside_server &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map test&lt;/P&gt;&lt;P&gt;match access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class test&lt;/P&gt;&lt;P&gt;set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 01:07:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902639#M458114</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-03-16T01:07:08Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN from INT X.X.X.X</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902640#M458115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sounds to be a soultion, not secure but i will test it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanx &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Mar 2012 10:21:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902640#M458115</guid>
      <dc:creator>fadimabrouk</dc:creator>
      <dc:date>2012-03-18T10:21:38Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN from INT X.X.X.X</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902641#M458116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it's working fine now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2012 06:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-from-int-x-x-x-x/m-p/1902641#M458116</guid>
      <dc:creator>fadimabrouk</dc:creator>
      <dc:date>2012-04-05T06:03:03Z</dc:date>
    </item>
  </channel>
</rss>

