<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP Window Variation  id=1307 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-window-variation-id-1307/m-p/1733370#M56122</link>
    <description>&lt;P&gt;Hi, We are getting quite a lot of these alerts and I can't find any info. on the internet.&amp;nbsp; Can anyone shed any light on it..&amp;nbsp; There are hundreds of these alerts and most of the time the IP adresses are different.&amp;nbsp; As far as I can see most of the time the attacker ip address has been from inside address range.&amp;nbsp; Thanks. Regards &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1277786506114716833&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: abcips1&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 414&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; time: Oct 06, 2011 05:26:59 UTC&amp;nbsp; offset=0&amp;nbsp; timeZone=GMT00:00&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=TCP Window Variation&amp;nbsp; id=1307&amp;nbsp; version=S212&amp;nbsp; type=anomaly&amp;nbsp; created=20030801&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: TCP Window varied in a suspect way&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Info/Misc&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; interfaceGroup: vs0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan: 0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: x.x.x.x&amp;nbsp; locality=OUT&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 39825&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: x.x.x.x&amp;nbsp; locality=OUT&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 5667&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=learned&amp;nbsp; type=linux&amp;nbsp; relevance=relevant&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; riskRatingValue: 100&amp;nbsp; targetValueRating=medium&amp;nbsp; attackRelevanceRating=relevant&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; threatRatingValue: 100&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; interface: ge0_1&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol: tcp&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 12:30:13 GMT</pubDate>
    <dc:creator>desaijaimin</dc:creator>
    <dc:date>2019-03-10T12:30:13Z</dc:date>
    <item>
      <title>TCP Window Variation  id=1307</title>
      <link>https://community.cisco.com/t5/network-security/tcp-window-variation-id-1307/m-p/1733370#M56122</link>
      <description>&lt;P&gt;Hi, We are getting quite a lot of these alerts and I can't find any info. on the internet.&amp;nbsp; Can anyone shed any light on it..&amp;nbsp; There are hundreds of these alerts and most of the time the IP adresses are different.&amp;nbsp; As far as I can see most of the time the attacker ip address has been from inside address range.&amp;nbsp; Thanks. Regards &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1277786506114716833&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: abcips1&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 414&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; time: Oct 06, 2011 05:26:59 UTC&amp;nbsp; offset=0&amp;nbsp; timeZone=GMT00:00&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=TCP Window Variation&amp;nbsp; id=1307&amp;nbsp; version=S212&amp;nbsp; type=anomaly&amp;nbsp; created=20030801&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: TCP Window varied in a suspect way&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Info/Misc&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; interfaceGroup: vs0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan: 0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: x.x.x.x&amp;nbsp; locality=OUT&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 39825&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: x.x.x.x&amp;nbsp; locality=OUT&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 5667&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=learned&amp;nbsp; type=linux&amp;nbsp; relevance=relevant&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; riskRatingValue: 100&amp;nbsp; targetValueRating=medium&amp;nbsp; attackRelevanceRating=relevant&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; threatRatingValue: 100&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; interface: ge0_1&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol: tcp&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:30:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-window-variation-id-1307/m-p/1733370#M56122</guid>
      <dc:creator>desaijaimin</dc:creator>
      <dc:date>2019-03-10T12:30:13Z</dc:date>
    </item>
    <item>
      <title>TCP Window Variation  id=1307</title>
      <link>https://community.cisco.com/t5/network-security/tcp-window-variation-id-1307/m-p/1733371#M56125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; &lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1307"&gt;http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1307&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might have some kind of device (proxy or firewall, possibly) that is manipulating the size of the TCP window.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Oct 2011 17:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-window-variation-id-1307/m-p/1733371#M56125</guid>
      <dc:creator>mark.barrett</dc:creator>
      <dc:date>2011-10-06T17:59:15Z</dc:date>
    </item>
    <item>
      <title>TCP Window Variation  id=1307</title>
      <link>https://community.cisco.com/t5/network-security/tcp-window-variation-id-1307/m-p/1733372#M56129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mark. We do have an ASA as well as proxy (threat management gateway). I did see link that you posted before I posted my question but its not very clear from the article what can be done to resolve the problem.&amp;nbsp; It says "incorrectly configured" but in what way? It would have been nice if it gave us the possible solutions?&amp;nbsp; or what to check?&amp;nbsp; Thanks. Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Oct 2011 08:10:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-window-variation-id-1307/m-p/1733372#M56129</guid>
      <dc:creator>desaijaimin</dc:creator>
      <dc:date>2011-10-07T08:10:21Z</dc:date>
    </item>
  </channel>
</rss>

