<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA - Deny TCP (no connection) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288838#M811287</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scratching my head with this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Email notifications are not getting generated from the inside network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quick Topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside -&amp;gt; FWSM -&amp;gt; 6500 (NAT) -&amp;gt; 2nd Level ASA -&amp;gt; 1st Level ASA (PAT)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SMTP access is allowed throughout. I can see Build/Teardown on FWSM and 2nd Level ASA. However, on 1st Level ASA I can see 'Deny TCP (no connection)..RST Flag' in the logs of 1st Level ASA for the return traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Going through forums etc, I believe there are mainly two reasons for this error 1) Asymmetric routing 2) SMTP inspection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case, neither Asymmetric routing nor SMTP inspection is occuring. Still I get the above error. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please assist. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:05:05 GMT</pubDate>
    <dc:creator>tech_trac</dc:creator>
    <dc:date>2019-03-11T16:05:05Z</dc:date>
    <item>
      <title>ASA - Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288838#M811287</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scratching my head with this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Email notifications are not getting generated from the inside network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quick Topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside -&amp;gt; FWSM -&amp;gt; 6500 (NAT) -&amp;gt; 2nd Level ASA -&amp;gt; 1st Level ASA (PAT)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SMTP access is allowed throughout. I can see Build/Teardown on FWSM and 2nd Level ASA. However, on 1st Level ASA I can see 'Deny TCP (no connection)..RST Flag' in the logs of 1st Level ASA for the return traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Going through forums etc, I believe there are mainly two reasons for this error 1) Asymmetric routing 2) SMTP inspection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case, neither Asymmetric routing nor SMTP inspection is occuring. Still I get the above error. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please assist. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288838#M811287</guid>
      <dc:creator>tech_trac</dc:creator>
      <dc:date>2019-03-11T16:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288839#M811288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please assist. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Aug 2009 05:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288839#M811288</guid>
      <dc:creator>tech_trac</dc:creator>
      <dc:date>2009-08-13T05:57:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288840#M811289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Deny TCP (no connection) is a statement that a packet arrived on the firewall for a connection that doesn't exist - the connection may never existed or recently torn down.  To determine what may have caused this situation, choose a single connection (source/destination IP address) and configure a packet capture on the ingress and egress interfaces as described at this link (be sure to use the interface specific/NAT IP addresses):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.nortfm.com/?View=entry&amp;amp;EntryID=1" target="_blank"&gt;http://www.nortfm.com/?View=entry&amp;amp;EntryID=1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, to supplement this packet capture, enable the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 512000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run an example test (matching the configured packet capture) and gather all relevant logs from the time of the traffic.  This syslog output as well as the packet captures should provide you an insight as to what the issue is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If SMTP inspection is enabled, you may want to confirm whether the SMTP server sends a TCP Reset.  Also, confirm if any SMTP commands as sent between the client and server are modified to X's.  Sometimes, changing the available SMTP commands can result in a reset from the SMTP Server with a 500 ERROR.  More information about 'inspect esmtp' is available at the link below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i2.html#wp1719425" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i2.html#wp1719425&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This 'RST Flag' Deny TCP (no connection) may be just a final errant packet sent from the host after the connection was torn down by the ASA or the other end.  A packet capture and syslogs of the flow will greatly assist diagnosing the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Aug 2009 01:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288840#M811289</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2009-08-14T01:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288841#M811293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is a Production ASA. Would logging buffered debugging degrade the performance at all. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Aug 2009 11:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288841#M811293</guid>
      <dc:creator>tech_trac</dc:creator>
      <dc:date>2009-08-16T11:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288842#M811296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;'logging buffered debugging' rarely degrades performance on a production box in my experience.  However, do NOT enable 'logging traps debugging' or 'logging console debugging' if your ASA is heavily utilized.  This could impact performance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Aug 2009 13:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288842#M811296</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2009-08-16T13:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288843#M811297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have pasted below the capture and debug log from ASA. I can see that mail server initiated a 'sackOK' after the beginning TCP handshake to which ASA responded with RST. What is 'sackOK' used for. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INTERNET SMTP Mail Server = 66.87.124.55&lt;/P&gt;&lt;P&gt;SMTP Sender Sender = 172.16.30.160 (NAT'ed IP)&lt;/P&gt;&lt;P&gt;ASA Outside Interface = 88.23.43.98&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capture: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 19: 17:20:26.624982 172.16.30.160.1231 &amp;gt; 66.87.124.55.25: S&lt;/P&gt;&lt;P&gt;1157537987:1157537987(0) win 65535 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;  20: 17:20:26.625166 88.23.43.98.54446 &amp;gt; 66.87.124.55.25: S&lt;/P&gt;&lt;P&gt;1916008998:1916008998(0) win 65535 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;  21: 17:20:26.868882 66.87.124.55.25 &amp;gt; 88.23.43.98.54446: S&lt;/P&gt;&lt;P&gt;2012653347:2012653347(0) ack 1916008999 win 5840 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;  22: 17:20:26.868912 66.87.124.55.25 &amp;gt; 172.16.30.160.1231: S&lt;/P&gt;&lt;P&gt;3195801731:3195801731(0) ack 1157537988 win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;  23: 17:20:26.869660 172.16.30.160.1231 &amp;gt; 66.87.124.55.25: . ack&lt;/P&gt;&lt;P&gt;3195801732 win 65535&lt;/P&gt;&lt;P&gt;  24: 17:20:26.869690 88.23.43.98.54446 &amp;gt; 66.87.124.55.25: . ack&lt;/P&gt;&lt;P&gt;2012653348 win 65535&lt;/P&gt;&lt;P&gt;  25: 17:20:27.116311 66.87.124.55.59671 &amp;gt; 88.23.43.98.113: S&lt;/P&gt;&lt;P&gt;2007441486:2007441486(0) win 5840 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;  26: 17:20:27.116372 88.23.43.98.113 &amp;gt; 66.87.124.55.59671: R 0:0(0) ack&lt;/P&gt;&lt;P&gt;2007441487 win 5840&lt;/P&gt;&lt;P&gt;  27: 17:20:27.363155 66.87.124.55.25 &amp;gt; 88.23.43.98.54446: P&lt;/P&gt;&lt;P&gt;2012653348:2012653456(108) ack 1916008999 win 5840&lt;/P&gt;&lt;P&gt;  28: 17:20:27.363170 66.87.124.55.25 &amp;gt; 172.16.30.160.1231: P&lt;/P&gt;&lt;P&gt;3195801732:3195801840(108) ack 1157537988 win 5840&lt;/P&gt;&lt;P&gt;  29: 17:20:27.363491 66.87.124.55.25 &amp;gt; 88.23.43.98.54446: F&lt;/P&gt;&lt;P&gt;2012653456:2012653456(0) ack 1916008999 win 5840&lt;/P&gt;&lt;P&gt;  30: 17:20:27.363506 66.87.124.55.25 &amp;gt; 172.16.30.160.1231: F&lt;/P&gt;&lt;P&gt;3195801840:3195801840(0) ack 1157537988 win 5840&lt;/P&gt;&lt;P&gt;  31: 17:20:27.363888 172.16.30.160.1231 &amp;gt; 66.87.124.55.25: . ack&lt;/P&gt;&lt;P&gt;3195801841 win 65427&lt;/P&gt;&lt;P&gt;  32: 17:20:27.363903 88.23.43.98.54446 &amp;gt; 66.87.124.55.25: . ack&lt;/P&gt;&lt;P&gt;2012653457 win 65427&lt;/P&gt;&lt;P&gt;  33: 17:20:27.364620 172.16.30.160.1231 &amp;gt; 66.87.124.55.25: P&lt;/P&gt;&lt;P&gt;1157537988:1157538010(22) ack 3195801841 win 65427&lt;/P&gt;&lt;P&gt;  34: 17:20:27.364650 88.23.43.98.54446 &amp;gt; 66.87.124.55.25: P&lt;/P&gt;&lt;P&gt;1916008999:1916009021(22) ack 2012653457 win 65427&lt;/P&gt;&lt;P&gt;  35: 17:20:27.373744 172.16.30.160.1231 &amp;gt; 66.87.124.55.25: FP&lt;/P&gt;&lt;P&gt;1157538010:1157538082(72) ack 3195801841 win 65427&lt;/P&gt;&lt;P&gt;  36: 17:20:27.373759 88.23.43.98.54446 &amp;gt; 66.87.124.55.25: FP&lt;/P&gt;&lt;P&gt;1916009021:1916009093(72) ack 2012653457 win 65427&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug Log: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oct  2 2009 17:19:30: %ASA-6-302013: Built outbound TCP connection&lt;/P&gt;&lt;P&gt;242317791 for OUTSIDE-INTERFACE:66.87.124.55/25 (66.87.124.55/25) to&lt;/P&gt;&lt;P&gt;INSIDE-INTERFACE:172.16.30.160/1151 (88.23.43.98/54445)&lt;/P&gt;&lt;P&gt;Oct  2 2009 17:19:31: %ASA-6-302014: Teardown TCP connection 242317791 for&lt;/P&gt;&lt;P&gt;OUTSIDE-INTERFACE:66.87.124.55/25 to INSIDE-INTERFACE:172.16.30.160/1151&lt;/P&gt;&lt;P&gt;duration 0:00:00 bytes 130 TCP FINs&lt;/P&gt;&lt;P&gt;Oct  2 2009 17:20:26: %ASA-6-302013: Built outbound TCP connection&lt;/P&gt;&lt;P&gt;242319817 for OUTSIDE-INTERFACE:66.87.124.55/25 (66.87.124.55/25) to&lt;/P&gt;&lt;P&gt;INSIDE-INTERFACE:172.16.30.160/1231 (88.23.43.98/54446)&lt;/P&gt;&lt;P&gt;Oct  2 2009 17:20:27: %ASA-6-302014: Teardown TCP connection 242319817 for&lt;/P&gt;&lt;P&gt;OUTSIDE-INTERFACE:66.87.124.55/25 to INSIDE-INTERFACE:172.16.30.160/1231&lt;/P&gt;&lt;P&gt;duration 0:00:00 bytes 202 TCP FINs&lt;/P&gt;&lt;P&gt;Oct  2 2009 17:20:27: %ASA-6-106015: Deny TCP (no connection) from&lt;/P&gt;&lt;P&gt;66.87.124.55/25 to 88.23.43.98/54446 flags RST  on interface&lt;/P&gt;&lt;P&gt;OUTSIDE-INTERFACE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Oct 2009 12:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288843#M811297</guid>
      <dc:creator>tech_trac</dc:creator>
      <dc:date>2009-10-11T12:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288844#M811298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It gets extremely complicated to troubleshoot any one flow when you have multiple firewalls in the path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that said, these deny tcp no conn syslog is only for a reset packet, which is ok to see. Once the conn gets torn down, reset packets for the same flow arrives which does not get passed on to the other interface for the reason no connection in the table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. see if you can eliminate one firewall at a time by placing the client after one firewall at a time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Oct 2009 21:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deny-tcp-no-connection/m-p/1288844#M811298</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-10-11T21:15:21Z</dc:date>
    </item>
  </channel>
</rss>

