<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SYN flood attack log In CSA MC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943731#M84422</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are not getting any such attack logs again this means that this was a false alarm caused because of some genuine application. Although it is better to have protection against such attacks. Following link may help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/csa/csa45/user_guide/AppexB.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/csa/csa45/user_guide/AppexB.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Mar 2008 14:09:30 GMT</pubDate>
    <dc:creator>didyap</dc:creator>
    <dc:date>2008-03-19T14:09:30Z</dc:date>
    <item>
      <title>SYN flood attack log In CSA MC</title>
      <link>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943730#M84420</link>
      <description>&lt;P&gt;I got an SYN flood attack log in CSA MC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSA log: TESTMODE: A potential SYN Flood attack has been detected. This may also indicate a possible routing problem. Reason: The TCP Listen Queue is full using interface Wired\HP NC7781 Gigabit Server Adapter #2. TCP: CSA MC IP/5401-&amp;gt;local Instance IP/4418, flags 0x12. The operation would have been denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Note: In log I have specified CSA MC IP and local Instance IP instead of its IP address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understood that SYN flooding is a type of denial of service attack and this alert has occured when a TCP/IP connection was requested by MC to the Instance. It has resulted in a half open connection, as the return address that is not in use. MC has detected it and it got denied. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know what action I have to take at tins point?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Arumugam.K&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943730#M84420</guid>
      <dc:creator>akumaresan</dc:creator>
      <dc:date>2019-03-10T11:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: SYN flood attack log In CSA MC</title>
      <link>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943731#M84422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are not getting any such attack logs again this means that this was a false alarm caused because of some genuine application. Although it is better to have protection against such attacks. Following link may help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/csa/csa45/user_guide/AppexB.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/csa/csa45/user_guide/AppexB.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Mar 2008 14:09:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943731#M84422</guid>
      <dc:creator>didyap</dc:creator>
      <dc:date>2008-03-19T14:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: SYN flood attack log In CSA MC</title>
      <link>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943732#M84424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arumugam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've been having similar issue regarding SYN flood alerts.  The affected system in turn starts to send additional ACK requests.  This results in issues with the IIS functionality on that server. Clients begin to no longer have the ability to access the site hosted on the server. We've been battling between Cisco and Microsoft on this one.  The issue appears to have started around Patch Tuesday in February.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question to you is this: Have you noticed any latency with the system that is reporting the SYN flood?  I'm curious if the problem is local to us, or possibly wide spread.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Mar 2008 17:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943732#M84424</guid>
      <dc:creator>chickman</dc:creator>
      <dc:date>2008-03-22T17:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: SYN flood attack log In CSA MC</title>
      <link>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943733#M84426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone else noted the following alert?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"A potential SYN Flood attack is currently in progress. 1 unresponsive connection attempts have been detected since the last notification. Source addresses included X.X.X.X. Ports included TCP/XXX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've not been able to associate this issue with anything on the system.  It appears to be a CSA bug, but unsure if we're the only ones seeing it.  Please advise!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Christopher&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Apr 2008 23:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943733#M84426</guid>
      <dc:creator>chickman</dc:creator>
      <dc:date>2008-04-03T23:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: SYN flood attack log In CSA MC</title>
      <link>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943734#M84428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to put this out there, but it turns out that CSA 5.2 has a low threshold for syn floods.  We got a bug ID of CSCsq07997.  This WILL cause service interruptions if your end clients/connections are behind a low end pix.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 May 2008 14:12:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943734#M84428</guid>
      <dc:creator>chickman</dc:creator>
      <dc:date>2008-05-03T14:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: SYN flood attack log In CSA MC</title>
      <link>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943735#M84429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I got this event fron an internal IP. So I dont feel its malicious alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great and thanks a lot to everyone for giving a good solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Arumugam.K&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 May 2008 10:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943735#M84429</guid>
      <dc:creator>akumaresan</dc:creator>
      <dc:date>2008-05-27T10:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: SYN flood attack log In CSA MC</title>
      <link>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943736#M84430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I experienced the exact situation.  My only choice at the time was to disable the netshim for that host in the registry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 May 2008 15:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-flood-attack-log-in-csa-mc/m-p/943736#M84430</guid>
      <dc:creator>mcvosi</dc:creator>
      <dc:date>2008-05-29T15:11:08Z</dc:date>
    </item>
  </channel>
</rss>

