<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP SYN/FIN from port 37892 to port 0 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500487#M90814</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you mean 3041-0.  You should not see SYN and FIN flag set as the description denotes.  This is not normal however a deeper look into this maybe warranted.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN client should be using IPSec or SSL encryption so you should not normally see this at all.  You possibly have any further information like a traffic sample I can have a further look at?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Jan 2006 06:06:06 GMT</pubDate>
    <dc:creator>jlimbo</dc:creator>
    <dc:date>2006-01-04T06:06:06Z</dc:date>
    <item>
      <title>TCP SYN/FIN from port 37892 to port 0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500486#M90813</link>
      <description>&lt;P&gt;Has anyone seen the TCP SYN/FIN 3140 signature trigger on TCP traffic from port 37892 to port 0?  I have seen this many different times including from traffic coming from a VPN client to a Cisco VPN Concentrator.  Just today I saw it coming from a client to an unknown(to me) host in which later I observed the two communicating via SSL.  I am wondering if this is a bug in the Cisco VPN client software or possibly a bug in the way the IDS is decoding certain encrypted packets.  Any ideas?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500486#M90813</guid>
      <dc:creator>shadow.cipher</dc:creator>
      <dc:date>2019-03-10T09:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN/FIN from port 37892 to port 0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500487#M90814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you mean 3041-0.  You should not see SYN and FIN flag set as the description denotes.  This is not normal however a deeper look into this maybe warranted.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN client should be using IPSec or SSL encryption so you should not normally see this at all.  You possibly have any further information like a traffic sample I can have a further look at?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2006 06:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500487#M90814</guid>
      <dc:creator>jlimbo</dc:creator>
      <dc:date>2006-01-04T06:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN/FIN from port 37892 to port 0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500488#M90815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, subsig 0.  I know SYN/FIN is not RFC compliant and  it was used to circumvent poorly coded packet filtering firewalls back a few years ago.  These packets however have been seen coming from different networks, but usually having a similiar M.O.(dealing with encryption and NAT).  I am thinking these are network artifacts which can and do occur, but the fact that I have seen it so many times is making me think it's a bug.  I"ll try to dig up some packet captures for you to look at.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2006 00:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500488#M90815</guid>
      <dc:creator>shadow.cipher</dc:creator>
      <dc:date>2006-01-05T00:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN/FIN from port 37892 to port 0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500489#M90816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The signature itself has been released quite a long time ago and it has not changed.  So I would attribute the change in frequency of alerts to a change in network traffic. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2006 05:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500489#M90816</guid>
      <dc:creator>jlimbo</dc:creator>
      <dc:date>2006-01-05T05:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN/FIN from port 37892 to port 0</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500490#M90817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have noticed this same sort of traffic on a network containing a Cisco VPNc 3030 v4.7.2 VPN concentrator.  Is this expected of the VPN traffic?  Or, like the original poster suspected, is it a bug with how the packets are encrypted?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 14:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-fin-from-port-37892-to-port-0/m-p/500490#M90817</guid>
      <dc:creator>mepenzien</dc:creator>
      <dc:date>2007-07-16T14:27:00Z</dc:date>
    </item>
  </channel>
</rss>

