<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic threat detection and frequent disconnection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704633#M535701</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You were not at all able to delete the threat-detection on the ASA, even after doing "clear configure threat-detcetion" ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well do you have any IPS device in the network???&lt;/P&gt;&lt;P&gt;Can you share your configuration from ASA and also the output " show module".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Aug 2011 15:56:07 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-08-17T15:56:07Z</dc:date>
    <item>
      <title>threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704624#M535669</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can threat detection provoque frequent disconnections on allowed traffic?&lt;/P&gt;&lt;P&gt;We are using&amp;nbsp; asa 5520 with 8.3.1 IOS&lt;/P&gt;&lt;P&gt;For instance in ASDM we see SYN attack messages .The source ip address correspond to external an external host (in the outside interface) wich is allowed to connect to&amp;nbsp; internal servers(in the internal interfaces).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our threat conf is as follow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection rate dos-drop rate-interval 600 average-rate 100 burst-rate 400&lt;/P&gt;&lt;P&gt;threat-detection rate dos-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;/P&gt;&lt;P&gt;threat-detection rate bad-packet-drop rate-interval 600 average-rate 100 burst-rate 400&lt;/P&gt;&lt;P&gt;threat-detection rate bad-packet-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;/P&gt;&lt;P&gt;threat-detection rate acl-drop rate-interval 600 average-rate 400 burst-rate 800&lt;/P&gt;&lt;P&gt;threat-detection rate acl-drop rate-interval 3600 average-rate 320 burst-rate 640&lt;/P&gt;&lt;P&gt;threat-detection rate conn-limit-drop rate-interval 600 average-rate 100 burst-rate 400&lt;/P&gt;&lt;P&gt;threat-detection rate conn-limit-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;/P&gt;&lt;P&gt;threat-detection rate icmp-drop rate-interval 600 average-rate 100 burst-rate 400&lt;/P&gt;&lt;P&gt;threat-detection rate icmp-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;/P&gt;&lt;P&gt;threat-detection rate scanning-threat rate-interval 600 average-rate 500 burst-rate 1000&lt;/P&gt;&lt;P&gt;threat-detection rate scanning-threat rate-interval 3600 average-rate 500 burst-rate 1000&lt;/P&gt;&lt;P&gt;threat-detection rate syn-attack rate-interval 600 average-rate 100 burst-rate 200&lt;/P&gt;&lt;P&gt;threat-detection rate syn-attack rate-interval 3600 average-rate 80 burst-rate 160&lt;/P&gt;&lt;P&gt;threat-detection rate fw-drop rate-interval 600 average-rate 400 burst-rate 1600&lt;/P&gt;&lt;P&gt;threat-detection rate fw-drop rate-interval 3600 average-rate 320 burst-rate 1280&lt;/P&gt;&lt;P&gt;threat-detection rate inspect-drop rate-interval 600 average-rate 400 burst-rate 1600&lt;/P&gt;&lt;P&gt;threat-detection rate inspect-drop rate-interval 3600 average-rate 320 burst-rate 1280&lt;/P&gt;&lt;P&gt;threat-detection rate interface-drop rate-interval 600 average-rate 2000 burst-rate 8000&lt;/P&gt;&lt;P&gt;threat-detection rate interface-drop rate-interval 3600 average-rate 1600 burst-rate 6400&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port number-of-rate 1&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol number-of-rate 1&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704624#M535669</guid>
      <dc:creator>roussillon</dc:creator>
      <dc:date>2019-03-11T21:00:18Z</dc:date>
    </item>
    <item>
      <title>threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704625#M535672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roussillon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes definitely it is one of the possiblities, if the firewall sees a lot of connection request coming from the trusted host as well, it would perceive it to be a threat and give you the logs, there might be cases of internet disconnect as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try taking the logs, and captures when the internet gets disconnected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 02:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704625#M535672</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-19T02:09:57Z</dc:date>
    </item>
    <item>
      <title>threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704626#M535676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I disable basic threat detection with the command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no threat-detection basic-threat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But user get disconnected as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I disable threat detection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 13:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704626#M535676</guid>
      <dc:creator>roussillon</dc:creator>
      <dc:date>2011-07-19T13:38:04Z</dc:date>
    </item>
    <item>
      <title>threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704627#M535678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;Can someone please tell how to stop or properly configuring threat detection apparently the basic setting are not good for production?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jul 2011 09:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704627#M535678</guid>
      <dc:creator>roussillon</dc:creator>
      <dc:date>2011-07-21T09:44:09Z</dc:date>
    </item>
    <item>
      <title>Re: threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704628#M535682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roussillon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We first need to identify the exact reason for drops, if this disconnects are so frequent then you first need to check the logs that you get at the time of the disconnect on the disconnect. If the logs say something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; "%ASA-4-733100: [Interface] drop rate 1 exceeded. Current burst rate is 1 per&amp;nbsp; second, max configured rate is 8000; Current average rate is 2030 per second, max&amp;nbsp; configured rate is 2000; Cumulative total count is 3930654." &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;A name="wp4963994"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; For a scanning drop caused by potential attacks: &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;A name="wp5402170"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; "ASA-4-733100: [Scanning] drop rate-1 exceeded. Current burst rate is 10 per&amp;nbsp; second_max configured rate is 10; Current average rate is 245 per second_max&amp;nbsp; configured rate is 5; Cumulative total count is 147409 (35 instances received) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;A name="wp5402155"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; For bad packets caused by potential attacks: &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;A name="wp4963995"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; "%ASA-4-733100: [Bad pkts] drop rate 1 exceeded. Current burst rate is 0 per&amp;nbsp; second, max configured rate is 400; Current average rate is 760 per second, max&amp;nbsp; configured rate is 100; Cumulative total count is 1938933"&lt;/EM&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe the legitimate outside host is sending requests which is exceeding the normal value defined in the threat-detection. If so we can create an exception for that particular host in the threat-detection, so that it is always allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover could you tell me if you are using any IPS module with the ASA??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jul 2011 15:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704628#M535682</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-21T15:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704629#M535685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are not using any IPS module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am logging all warning messages(severity=4) to a syslog server when I do a search for messages I can not find&amp;nbsp; %ASA-4-733100 nor %ASA-4-733101. In the logs there are message like %ASA-4-106023 or %ASA-4-31300, but not those we are looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'am also&amp;nbsp; logging&amp;nbsp; messages 733100 &amp;amp; 733101 to console but nothing get logged.&lt;/P&gt;&lt;P&gt;I did as follow:&lt;/P&gt;&lt;P&gt; logging list notify-threat message 733100-733101&lt;/P&gt;&lt;P&gt;logging monitor notify-threat&lt;/P&gt;&lt;P&gt;term monitor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Nevertheless the command show threat-detection rate syn-attack show:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Average(eps)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current(eps)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trigger&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total events&lt;/P&gt;&lt;P&gt;10-min SYN attck&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand That an exception can be configured if scanning threat detection is enable with the command:&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;threat-detection scanning-threat &lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;[&lt;STRONG&gt;shun &lt;/STRONG&gt;[&lt;STRONG&gt;except &lt;/STRONG&gt;{&lt;STRONG style="font-weight: bold;"&gt;ip-address &lt;/STRONG&gt;ip_address &lt;EM&gt;mask&lt;/EM&gt; |&lt;STRONG style="font-weight: bold;"&gt; object-group&lt;/STRONG&gt; network_object_group_id}]]&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt; But in our ASA scanning-threat is not active. That's why I do not understand why connections get interrupted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have noticed that connections comming from host with their own public ip address are less impacted, but really less impacted. I configure a computer with a public ip address(not nat, no ip masquerading), then&amp;nbsp; I started&amp;nbsp; annyconnect client and it stayed connected during 28 hours. It was me who stop the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jul 2011 13:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704629#M535685</guid>
      <dc:creator>roussillon</dc:creator>
      <dc:date>2011-07-23T13:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704630#M535689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can someone help us please? this is really urgent and enoyng.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how can we just make threat detection disapear??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 05:47:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704630#M535689</guid>
      <dc:creator>roussillon</dc:creator>
      <dc:date>2011-07-27T05:47:48Z</dc:date>
    </item>
    <item>
      <title>threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704631#M535694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roussillon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you really wanna disable all the thread detection on the firewall, then you can just put a no in front of the threat-detection statements and disable them or use "clear configure threat-detection" to clear all the commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/customer/docs/security/asa/asa82/command/reference/c2.html#wp2400005"&gt;http://www.cisco.com/en/US/customer/docs/security/asa/asa82/command/reference/c2.html#wp2400005&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 06:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704631#M535694</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-27T06:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704632#M535696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hy&lt;/P&gt;&lt;P&gt;sorry if i answer late, but I was out off office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried both method but nothing works.&lt;/P&gt;&lt;P&gt;Do you know if ASA can do Save reset?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 11:24:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704632#M535696</guid>
      <dc:creator>roussillon</dc:creator>
      <dc:date>2011-08-17T11:24:09Z</dc:date>
    </item>
    <item>
      <title>threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704633#M535701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You were not at all able to delete the threat-detection on the ASA, even after doing "clear configure threat-detcetion" ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well do you have any IPS device in the network???&lt;/P&gt;&lt;P&gt;Can you share your configuration from ASA and also the output " show module".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 15:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704633#M535701</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-17T15:56:07Z</dc:date>
    </item>
    <item>
      <title>threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704634#M535704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Indeed in ASDM we see SYN attack messages. But I think it is not the real problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem occurs when à user behind à box doing NAT connects to a server with a natted ip behind the ASA. I would say double NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the output of the command show module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mod Card Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Model&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;--- -------------------------------------------- ------------------ &lt;/P&gt;&lt;P&gt;&amp;nbsp; 0 ASA 5520 Adaptive Security Appliance&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA5520&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mod MAC Address Range&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hw Version&amp;nbsp;&amp;nbsp; Fw Version&amp;nbsp;&amp;nbsp; Sw Version&lt;/P&gt;&lt;P&gt;--- --------------------------------- ------------ ------------ ---------------&lt;/P&gt;&lt;P&gt;&amp;nbsp; 0 c47d.4f3b.6b15 to c47d.4f3b.6b19&amp;nbsp; 2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.0(11)5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8.3(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mod SSM Application Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSM Application Version&lt;/P&gt;&lt;P&gt;--- ------------------------------ ---------------- --------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mod Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Data Plane Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Compatibility&lt;/P&gt;&lt;P&gt;--- ------------------ --------------------- -------------&lt;/P&gt;&lt;P&gt;&amp;nbsp; 0 Up Sys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Not Applicable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 20:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704634#M535704</guid>
      <dc:creator>roussillon</dc:creator>
      <dc:date>2011-08-17T20:09:21Z</dc:date>
    </item>
    <item>
      <title>threat detection and frequent disconnection</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704635#M535710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am not sure now about the real issue, are you not able to access a server on the inside for inside hosts itself??? If that is the case then i woudl need the ip addresses of source and destination and if the inside hosts need to access the server o its natted ip only. It would be great if you can provide an output of :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;show run global&lt;/P&gt;&lt;P&gt;show run static&lt;/P&gt;&lt;P&gt;show run same&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 02:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-and-frequent-disconnection/m-p/1704635#M535710</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T02:24:49Z</dc:date>
    </item>
  </channel>
</rss>

