<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP Segment Overwrite 1300/0 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167115#M53881</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i want to create custom event filter, but i need yr help with steps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) event action rule&lt;/P&gt;&lt;P&gt;2) event action filter&lt;/P&gt;&lt;P&gt;3) add new&lt;/P&gt;&lt;P&gt;4) signature 1300/0&lt;/P&gt;&lt;P&gt;5) action to subtrack, i can see here (log-pair-packets, produce-verbose-alert), but these actions to subtrack ?&lt;/P&gt;&lt;P&gt;how i can do it, and later how to view it ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thankssss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 07 Apr 2013 05:43:51 GMT</pubDate>
    <dc:creator>alkabeer80</dc:creator>
    <dc:date>2013-04-07T05:43:51Z</dc:date>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167110#M53872</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have cisco IPS 4270 inline, and before cisco ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can always see signature 1300/0 fires, i have applied TCP normalization on ASA and still i can see same signature fire.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there anything i can do to trace the root cause?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tcp-map tcp-NORM_Map&lt;BR /&gt;&amp;nbsp; check-retransmission &lt;BR /&gt;&amp;nbsp; checksum-verification &lt;BR /&gt;&amp;nbsp; exceed-mss drop&lt;BR /&gt;&amp;nbsp; queue-limit 5 timeout 3&lt;BR /&gt;&amp;nbsp; syn-data drop&lt;BR /&gt;&amp;nbsp; window-variation drop-connection&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;class-map CONNS_Class&lt;BR /&gt;match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map CONNS_policy&lt;BR /&gt;class CONNS_Class&lt;BR /&gt;&amp;nbsp; set connection conn-max 5000 embryonic-conn-max 1500 per-client-max 50 per-client-embryonic-max 15 &lt;BR /&gt;&amp;nbsp; set connection timeout embryonic 0:00:45 half-closed 0:05:00 tcp 0:10:00 reset dcd 0:00:20 3 &lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-NORM_Map&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy CONNS_policy interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167110#M53872</guid>
      <dc:creator>alkabeer80</dc:creator>
      <dc:date>2019-03-10T12:56:13Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167111#M53874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the past, signature 1300-0 had issues with the regex that were causing excessive false positives.&amp;nbsp; I would first verify that you are using the newest version of this signature which was released in S637.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Apr 2013 17:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167111#M53874</guid>
      <dc:creator>_____Adam</dc:creator>
      <dc:date>2013-04-02T17:10:40Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167112#M53875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, there is multiple bugs &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCsg23774" target="_blank"&gt;CSCsg23774&lt;/A&gt;/&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCsg91311" target="_blank"&gt;CSCsg91311&lt;/A&gt; related to this particular signature and false positive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can find more information about the signature on the following link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1300"&gt;http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1300&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the above link says "This signature may trigger upon analyzing traffic assigned to the same virtual sensor when the sensor is configured to monitor 2 or more networks, and the tcp connection is crossing 2 or more networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the sensor sees the same traffic twice within the same virtual sensor, this signature may fire." So, do you think this could be happening in our scenario? If you think this is not the issue and sensor is seeing the traffic only once, then we can also configure event action filter for the concerned traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, you might want to confirm fist if you are running the newest version for this signature. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Apr 2013 17:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167112#M53875</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-04-02T17:17:10Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167113#M53877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have updated to latest signature "S705". still the signature fires.&lt;/P&gt;&lt;P&gt;this IPS is inline, traffic from outside "public" is hitting internal VS and its only one network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other solution ?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Apr 2013 03:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167113#M53877</guid>
      <dc:creator>alkabeer80</dc:creator>
      <dc:date>2013-04-07T03:48:14Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167114#M53880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To see more details on the traffic you can configure a custom event action filter for this signature as Juan has suggested.&amp;nbsp; Some possible values that will provide you with more details are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;log-pair-packets (This will show you full traffic details)&lt;/P&gt;&lt;P&gt;produce-verbose-alert (This will give a more verbose alert with traffic hexdump)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Apr 2013 04:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167114#M53880</guid>
      <dc:creator>_____Adam</dc:creator>
      <dc:date>2013-04-07T04:13:32Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167115#M53881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i want to create custom event filter, but i need yr help with steps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) event action rule&lt;/P&gt;&lt;P&gt;2) event action filter&lt;/P&gt;&lt;P&gt;3) add new&lt;/P&gt;&lt;P&gt;4) signature 1300/0&lt;/P&gt;&lt;P&gt;5) action to subtrack, i can see here (log-pair-packets, produce-verbose-alert), but these actions to subtrack ?&lt;/P&gt;&lt;P&gt;how i can do it, and later how to view it ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thankssss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Apr 2013 05:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167115#M53881</guid>
      <dc:creator>alkabeer80</dc:creator>
      <dc:date>2013-04-07T05:43:51Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167116#M53882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That sounds like the correct steps.&amp;nbsp; Those actions subtract only if you specify a custom IP address.&amp;nbsp; By default it will have 0.0.0.0-255.255.255.255 which will not subtract anything.&amp;nbsp; You can see a graphical tutorial of this here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://popravak.wordpress.com/2012/04/30/event-action-filters/"&gt;http://popravak.wordpress.com/2012/04/30/event-action-filters/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So just follow the steps you listed and then you should see more information in the alert the next time the signature fires.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Apr 2013 14:59:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167116#M53882</guid>
      <dc:creator>_____Adam</dc:creator>
      <dc:date>2013-04-07T14:59:16Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167117#M53883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I followed the procedure and i get the below packet Data, i could not interpret it, plz help me in this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet Data Ether: ---- Ethernet2 OSI=2 ---- &lt;/P&gt;&lt;P&gt;Ether: &lt;/P&gt;&lt;P&gt;Ether:&amp;nbsp;&amp;nbsp; dst =&amp;nbsp; 0:21:5e:3f:39:2a&lt;/P&gt;&lt;P&gt;Ether:&amp;nbsp;&amp;nbsp; src =&amp;nbsp; 0:24:c3:ae:41:c3&lt;/P&gt;&lt;P&gt;Ether: proto =&amp;nbsp; 0x8100 "(VLAN) IEEE 802.1q"&lt;/P&gt;&lt;P&gt;Ether: &lt;/P&gt;&lt;P&gt;VLAN: ---- IEEE802dot1q IEEE=802.1q OSI=2 ---- &lt;/P&gt;&lt;P&gt;VLAN: &lt;/P&gt;&lt;P&gt;VLAN: flags = 0000010010001001 1161&lt;/P&gt;&lt;P&gt;VLAN:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 000............. 0x0 = [priority]&lt;/P&gt;&lt;P&gt;VLAN:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ...0............ 0x0 = [cfi]&lt;/P&gt;&lt;P&gt;VLAN:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ....010010001001 1161 = [id]&lt;/P&gt;&lt;P&gt;VLAN:&amp;nbsp; type =&amp;nbsp; 0x800 "(IP) Internet protocol (v4 or v6)"&lt;/P&gt;&lt;P&gt;VLAN: &lt;/P&gt;&lt;P&gt;IPv4: ---- IPv4 RFC=791 OSI=3 ---- &lt;/P&gt;&lt;P&gt;IPv4: &lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ver =&amp;nbsp; 4 "Internet Protocol version 4"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hlen =&amp;nbsp; 5 (20 bytes) "No IP options present"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tos = 00000000 0x0&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 000..... 0x0 = [precedence] "Routine"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ...0.... 0x0 = [delay] "Normal delay"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ....0... 0x0 = [throughput] "Normal throughput"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .....0.. 0x0 = [reliability] "Normal reliability"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ......00 0x0 = [reserved]&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; len =&amp;nbsp; 41 (21 bytes of data)&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; id =&amp;nbsp; 0x6c14&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp; flags = 010 0x2 (bit fields)&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.. 0x0 = [reserved]&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1. 0x1 = [df] "Do not fragment"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ..0 0x0 = [mf] "no more fragments"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp; offset =&amp;nbsp; 0 (0 bytes)&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ttl =&amp;nbsp; 118 (hops)&lt;/P&gt;&lt;P&gt;IPv4: protocol =&amp;nbsp; 6 "(TCP) Transmition Control Protocol (RFC793)"&lt;/P&gt;&lt;P&gt;IPv4: checksum =&amp;nbsp; 0x4a60&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp; saddr =&amp;nbsp; 1.1.1.1&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp; daddr =&amp;nbsp; 2.2.2.2&lt;/P&gt;&lt;P&gt;IPv4: &lt;/P&gt;&lt;P&gt;TCP: ---- TCP RFC=793 OSI=4 ---- &lt;/P&gt;&lt;P&gt;TCP: &lt;/P&gt;&lt;P&gt;TCP: sport =&amp;nbsp; 51608&lt;/P&gt;&lt;P&gt;TCP: dport =&amp;nbsp; 80&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; seq =&amp;nbsp; 1386163655&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; ack =&amp;nbsp; 3800346912&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp; hlen =&amp;nbsp; 5 (20 bytes) "No TCP options present"&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; res =&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp; code = 010000 0x10&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0..... 0x0 = [urg]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1.... 0x1 = [ack] "Acknowledgement Field Significant"&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ..0... 0x0 = [psh]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ...0.. 0x0 = [rst]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ....0. 0x0 = [syn]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .....0 0x0 = [fin]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; win =&amp;nbsp; 64860 (bytes)&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; crc =&amp;nbsp; 0x8627 (CRC-16)&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; urg =&amp;nbsp; 0 (byte offset)&lt;/P&gt;&lt;P&gt;TCP: &lt;/P&gt;&lt;P&gt;Data: 0000&amp;nbsp; 00 00 00 00 00 00&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ......&lt;/P&gt;&lt;P&gt;Data:&lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 04:46:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167117#M53883</guid>
      <dc:creator>alkabeer80</dc:creator>
      <dc:date>2013-04-08T04:46:39Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167118#M53884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any update ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 12:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167118#M53884</guid>
      <dc:creator>alkabeer80</dc:creator>
      <dc:date>2013-04-10T12:01:42Z</dc:date>
    </item>
    <item>
      <title>TCP Segment Overwrite 1300/0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167119#M53885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the same problem.&lt;/P&gt;&lt;P&gt;Cisco IPS 4255 and TCP Segment Overwrite signature is fired.&lt;/P&gt;&lt;P&gt;after invertigation I think, that the df-bit set is the reason of this problem.&lt;/P&gt;&lt;P&gt;i have this topology:&lt;/P&gt;&lt;P&gt;host1 -&amp;gt; LAN -&amp;gt;(IPS)-&amp;gt; local router (route map with DF-bit set) -&amp;gt; ipsec tunnel (with smaler MTU) -&amp;gt; &lt;/P&gt;&lt;P&gt;remote router (route map with DF-bit set) -&amp;gt; remote LAN-&amp;gt; host2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the host1 established the tcp connection with host2 it sends first data segment, and the segment size is too big to go through ipsec-tunnel without fragmentation. A this moment IPS sees this first data segment.&lt;/P&gt;&lt;P&gt;Local router sends the icmp (need fragmentation with information of the next hop MTU) paket to the host1, and host1 resends the first data segment with less segment size to go &lt;SPAN style="font-size: 10pt;"&gt;through ipsec-tunnel without fragmentation. A this moment IPS sees the fist data segment &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;(first 256bytes) &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;second time and &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;TCP Segment Overwrite signature is fired.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know yet how to solve this problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 14:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-segment-overwrite-1300-0/m-p/2167119#M53885</guid>
      <dc:creator>obryadinrv</dc:creator>
      <dc:date>2013-07-16T14:41:40Z</dc:date>
    </item>
  </channel>
</rss>

