<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX 6.3(3): droping denied TCP connections in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305046#M561328</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Reading the specs, the PIX should silently drop denied inbound TCP packets. We have two PIX 515E 6.3(3) with 4 "outside" interfaces in use (failover configuration). Only the interface with the lowest security id drops inbound TCP connections, the other 3 interfaces send a TCP RST back. Both services resetinbound and resetoutside are deactivated as it is per default. For my understanding, all interfaces should drop denied inbound TCP connections. What I'm doing wrong?&lt;/P&gt;&lt;P&gt;Thank's for any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Daniel &lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:36:19 GMT</pubDate>
    <dc:creator>druch</dc:creator>
    <dc:date>2020-02-21T07:36:19Z</dc:date>
    <item>
      <title>PIX 6.3(3): droping denied TCP connections</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305046#M561328</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Reading the specs, the PIX should silently drop denied inbound TCP packets. We have two PIX 515E 6.3(3) with 4 "outside" interfaces in use (failover configuration). Only the interface with the lowest security id drops inbound TCP connections, the other 3 interfaces send a TCP RST back. Both services resetinbound and resetoutside are deactivated as it is per default. For my understanding, all interfaces should drop denied inbound TCP connections. What I'm doing wrong?&lt;/P&gt;&lt;P&gt;Thank's for any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Daniel &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:36:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305046#M561328</guid>
      <dc:creator>druch</dc:creator>
      <dc:date>2020-02-21T07:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3(3): droping denied TCP connections</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305047#M561330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should not be the case.  Are you certain the PIX is sending back the RST packets and not the target host?  How are determining this is happening?  You are correct in your understanding, the PIX should appear to be a balck hole on your network.  Firewalls are less useful if you know they are there...hence the reason we drop the packets rather than responding and letting the potential attacker know that the hosts exists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2004 15:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305047#M561330</guid>
      <dc:creator>scoclayton</dc:creator>
      <dc:date>2004-08-31T15:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3(3): droping denied TCP connections</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305048#M561331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;We've tested the interfaces with a port scanner (nmap) and noticed this behaviour. As I wrote before, only the interface with the lowest security id didn't sent back an RST on blocked ports.&lt;/P&gt;&lt;P&gt;Is it possible that the failover configuration has somthing to do with that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Daniel &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2004 18:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305048#M561331</guid>
      <dc:creator>druch</dc:creator>
      <dc:date>2004-08-31T18:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3(3): droping denied TCP connections</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305049#M561332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope, the failover configuration should have nothing to do with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have tested this behavior many times and I am confident that the PIX does not behave as indicated above.  At this point, I would suggest you go ahead and open a TAC case so that an engineer can take a look at your test setup and find the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2004 19:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305049#M561332</guid>
      <dc:creator>scoclayton</dc:creator>
      <dc:date>2004-08-31T19:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3(3): droping denied TCP connections</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305050#M561336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;Thank's for your input. So, I'll open a TAC-Case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2004 05:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-3-droping-denied-tcp-connections/m-p/305050#M561336</guid>
      <dc:creator>druch</dc:creator>
      <dc:date>2004-09-01T05:15:17Z</dc:date>
    </item>
  </channel>
</rss>

