<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX error 106015: Deny TCP (no connection) flags PSH ACK in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432582#M532827</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm having the same issue on my 515E running 6.3(5) and I've not yet been able to tell where this is coming from. I understand why the PIX is logging this since it's not in the conn table but the big question is why? I have one Inside, one Outside, and one DMZ interface...and am performing PAT outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Dec 2005 19:30:31 GMT</pubDate>
    <dc:creator>jim.normand</dc:creator>
    <dc:date>2005-12-21T19:30:31Z</dc:date>
    <item>
      <title>PIX error 106015: Deny TCP (no connection) flags PSH ACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432578#M532811</link>
      <description>&lt;P&gt;Hi Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a server which is behind a PIX 525 (OS version 6.3(3)). Clients on other segments connect to an application on this server, which is actually HTTP on a non-standard port. The connection always fails and I get the following system log message on the PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;106015: Deny TCP (no connection) from 10.219.58.83/35528 to 10.219.126.72/2061 flags PSH ACK  on&lt;/P&gt;&lt;P&gt;interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found an explanation on cisco.com at the following URL:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/sw/secursw/ps2120/products_system_message_guide_chapter09186a008051a0cd.html#wp1052198" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/sw/secursw/ps2120/products_system_message_guide_chapter09186a008051a0cd.html#wp1052198&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------------------------------------&lt;/P&gt;&lt;P&gt;106015 &lt;/P&gt;&lt;P&gt;Error Message    %PIX-6-106015: Deny TCP (no connection) from IP_address/port to &lt;/P&gt;&lt;P&gt;IP_address/port flags tcp_flags on interface interface_name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explanation    This message is logged when the firewall discards a TCP packet that has no associated connection in the firewall unit's connection table. The firewall looks for a SYN flag in the packet, which indicates a request to establish a new connection. If the SYN flag is not set, and there is not an existing connection, the firewall discards the packet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recommended Action    None required unless the firewall receives a large volume of these invalid TCP packets. If this is the case, trace the packets to the source and determine the reason these packets were sent. &lt;/P&gt;&lt;P&gt;----------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A sniffer was run on the client to capture packet trace when it accesses the server. The TCP 3-way handshake was successfully done. But when the client was asking for data from the server, the client set the PSH bits. As far as I know, the PIX is correctly configured and "permit ip any any" is temporarily configured on the ACLs to troubleshoot the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to know what's the real cause of the problem? Is it PIX configuration error or is it the app not behaving correctly? Anyone knows a workaround, kindly tell me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;B.Rgds,&lt;/P&gt;&lt;P&gt;Lim TS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:24:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432578#M532811</guid>
      <dc:creator>limtohsoon</dc:creator>
      <dc:date>2020-02-21T08:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: PIX error 106015: Deny TCP (no connection) flags PSH ACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432579#M532816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Quick question - Is the HTTP fixup protocol enabled, and if enabled, is the fixup configured for the non-standard HTTP port that you are using?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Sep 2005 01:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432579#M532816</guid>
      <dc:creator>pwicks</dc:creator>
      <dc:date>2005-09-24T01:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX error 106015: Deny TCP (no connection) flags PSH ACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432580#M532818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have yet to check whether HTTP fixup is enabled for that particular port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One question - Will enabling HTTP fixup for that port overwrite the default port 80?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;B.Rgds,&lt;/P&gt;&lt;P&gt;Lim TS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Sep 2005 16:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432580#M532818</guid>
      <dc:creator>limtohsoon</dc:creator>
      <dc:date>2005-09-25T16:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX error 106015: Deny TCP (no connection) flags PSH ACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432581#M532823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is another scenario but it's similar to the one I posted earlier. Two interfaces involved in this case; DMZ-A and DMZ-B. DMZ-A is the higher security-level interface. There's a pool of servers on DMZ-A with IP addresses 10.219.126.70 - .78. The client (with IP address 10.219.58.83) initiates HTTP connection to any of the servers on non-standard port and the request originates on DMZ-B. The client application fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are outputs of "show log" on the PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 10.219.126.70/2061 to 10.219.58.83/56850 flags PSH ACK  on interface DMZ-A&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 10.219.58.83/64961 to 10.219.126.72/2061 flags PSH ACK  on interface DMZ-B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol http 2061&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem persists and following is PIX "show log":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;106015: Deny TCP (no connection) from 10.219.58.83/65106 to 10.219.126.78/2061 flags ACK  on interface DMZ-B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to know whether this is an application error or whether there's anything we can do on the PIX to work around the issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;B.Rgds,&lt;/P&gt;&lt;P&gt;Lim TS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Sep 2005 06:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432581#M532823</guid>
      <dc:creator>limtohsoon</dc:creator>
      <dc:date>2005-09-26T06:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX error 106015: Deny TCP (no connection) flags PSH ACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432582#M532827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm having the same issue on my 515E running 6.3(5) and I've not yet been able to tell where this is coming from. I understand why the PIX is logging this since it's not in the conn table but the big question is why? I have one Inside, one Outside, and one DMZ interface...and am performing PAT outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2005 19:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-error-106015-deny-tcp-no-connection-flags-psh-ack/m-p/432582#M532827</guid>
      <dc:creator>jim.normand</dc:creator>
      <dc:date>2005-12-21T19:30:31Z</dc:date>
    </item>
  </channel>
</rss>

