<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP teardown in Cisco Pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680136#M536770</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This Cisco pix does not have a "cap" command available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"cap capout access-list cap interface outside" command is failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are running 6.1(2). Do we have anyother ways to investigate this porblem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tabassum&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Jul 2011 18:31:48 GMT</pubDate>
    <dc:creator>c.tabassum</dc:creator>
    <dc:date>2011-07-01T18:31:48Z</dc:date>
    <item>
      <title>TCP teardown in Cisco Pix</title>
      <link>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680132#M536762</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an issue in the Cisco PIx 515e series. The IOS is 6.1(2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have set sepecific access-list to allow incoming traffic to inside interface. But still the TCP 3-way handshaking is dropped here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;302001: Built inbound TCP connection 11959955 for faddr &lt;A href="http://135.68.1.213/2525" target="_blank"&gt;135.86.1.203/2525&lt;/A&gt; gaddr &lt;A href="http://135.25.237.71/9300" target="_blank"&gt;125.52.207.71/9300&lt;/A&gt; laddr &lt;A href="http://10.5.2.14/9300" target="_blank"&gt;10.5.2.14/9300&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;302002: Teardown TCP connection 11959955 faddr &lt;A href="http://135.68.1.213/2525" target="_blank"&gt;135.86.1.203/2525&lt;/A&gt; gaddr &lt;A href="http://135.25.237.71/9300" target="_blank"&gt;125.52.207.71/9300&lt;/A&gt; laddr &lt;A href="http://10.5.2.14/9300" target="_blank"&gt;10.5.2.14/9300&lt;/A&gt; duration 0:00:00 bytes 0 (TCP Reset-I)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz1 security40&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside 125.52.207.3 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz1 10.5.2.100 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host 135.86.1.203 host 135.52.207.71 eq 9300&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz1,outside) 135.52.207.72 10.5.2.14 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group acl_out in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 125.52.207.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx.&lt;/P&gt;&lt;P&gt;tabassum&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680132#M536762</guid>
      <dc:creator>c.tabassum</dc:creator>
      <dc:date>2019-03-11T20:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: TCP teardown in Cisco Pix</title>
      <link>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680133#M536764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify if the nat'd IP for 10.2.2.14 in DMZ1 is 135.86.1.203? Looking at the public IPs you assigned for outside and default gateway, it should be in the range 125.52.207.x , unless I miss something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please confirm this and post the config, if possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 18:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680133#M536764</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2011-07-01T18:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: TCP teardown in Cisco Pix</title>
      <link>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680134#M536766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The &lt;A href="http://135.68.1.213/2525" style="border-collapse: collapse; font-size: 12px; list-style-type: none; outline-style: none; color: #2f6681; text-decoration: none;" target="_blank"&gt;135.86.1.203&lt;/A&gt; IP is an outside client IP address who is trying to connect our server at 125.52.207.71 (which is NATed for the real server 10.5.2.14) on port 9300, sorry for the typo (135.52.207.72).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be &lt;/P&gt;&lt;P&gt;static (dmz1,outside) 125.52.207.71 10.5.2.14 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am getting an error &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;302001: Built inbound TCP connection 11959955 for faddr &lt;A href="http://135.68.1.213/2525" style="border-collapse: collapse; font-size: 12px; list-style-type: none; outline-style: none; color: #2f6681; text-decoration: none;" target="_blank"&gt;135.86.1.203/2525&lt;/A&gt; gaddr &lt;A href="http://135.25.237.71/9300" style="border-collapse: collapse; font-size: 12px; list-style-type: none; outline-style: none; color: #2f6681; text-decoration: none;" target="_blank"&gt;125.52.207.71/9300&lt;/A&gt; laddr &lt;A href="http://10.5.2.14/9300" style="border-collapse: collapse; font-size: 12px; list-style-type: none; outline-style: none; color: #2f6681; text-decoration: none;" target="_blank"&gt;10.5.2.14/9300&lt;/A&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;302002: Teardown TCP connection 11959955 faddr &lt;A href="http://135.68.1.213/2525" style="border-collapse: collapse; font-size: 12px; list-style-type: none; outline-style: none; color: #2f6681; text-decoration: none;" target="_blank"&gt;135.86.1.203/2525&lt;/A&gt; gaddr &lt;A href="http://135.25.237.71/9300" style="border-collapse: collapse; font-size: 12px; list-style-type: none; outline-style: none; color: #2f6681; text-decoration: none;" target="_blank"&gt;125.52.207.71/9300&lt;/A&gt; laddr &lt;A href="http://10.5.2.14/9300" style="border-collapse: collapse; font-size: 12px; list-style-type: none; outline-style: none; color: #2f6681; text-decoration: none;" target="_blank"&gt;10.5.2.14/9300&lt;/A&gt; duration 0:00:00 bytes 0 (TCP Reset-I)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The web application is not seeing any traffic hitting and can't find anything in their syslog.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 18:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680134#M536766</guid>
      <dc:creator>c.tabassum</dc:creator>
      <dc:date>2011-07-01T18:13:21Z</dc:date>
    </item>
    <item>
      <title>TCP teardown in Cisco Pix</title>
      <link>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680135#M536767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tabassum,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the server ip is 125.52.207.72 and not 135.52.207.72. It looks to me to be a more server issue than a firewall issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To verify it you would need to take the captures, something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip any host &lt;A href="http://135.68.1.213/2525" target="_blank"&gt;135.86.1.203&lt;/A&gt; host 125.52.207.72&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip any&amp;nbsp; host 125.52.207.72&amp;nbsp; host &lt;A href="http://135.68.1.213/2525" target="_blank"&gt;135.86.1.203&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap perrmit ip any host &lt;A href="http://135.68.1.213/2525" target="_blank"&gt;135.86.1.203&lt;/A&gt; host 10.5.2.14&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap perrmit ip any host 10.5.2.14 host &lt;A href="http://135.68.1.213/2525" target="_blank"&gt;135.86.1.203&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then apply captures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout access-list cap interface outside&lt;/P&gt;&lt;P&gt;cap capdmz access-list cap interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try connecting again, and then collect the captures:&lt;/P&gt;&lt;P&gt;show cap capout&lt;/P&gt;&lt;P&gt;show cap capdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would tell from where the reset is coming.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 18:15:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680135#M536767</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-01T18:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: TCP teardown in Cisco Pix</title>
      <link>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680136#M536770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This Cisco pix does not have a "cap" command available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"cap capout access-list cap interface outside" command is failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are running 6.1(2). Do we have anyother ways to investigate this porblem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tabassum&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 18:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680136#M536770</guid>
      <dc:creator>c.tabassum</dc:creator>
      <dc:date>2011-07-01T18:31:48Z</dc:date>
    </item>
    <item>
      <title>TCP teardown in Cisco Pix</title>
      <link>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680137#M536772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tabassum,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It becomes difficult troubleshooting on such old versions, may be we can upgrade to version 6.3.5 and then troubleshoot if possible, because looking at the log, it suggest me that the reset was sent by the host on the internal network. so yes, try taking captures on the server machine and check if is sending back SYN ACk packets, you can run wireshark on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 18:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680137#M536772</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-01T18:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: TCP teardown in Cisco Pix</title>
      <link>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680138#M536773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Varun.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try to capture the packet from the server. It's a Solaris box. I am using snoop to get the details.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 19:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-teardown-in-cisco-pix/m-p/1680138#M536773</guid>
      <dc:creator>c.tabassum</dc:creator>
      <dc:date>2011-07-01T19:06:05Z</dc:date>
    </item>
  </channel>
</rss>

