<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: deny TCP (no connection) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection/m-p/1110541#M913551</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PLease look for the " teardown " message rather then what you are filtering now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will tell us why the connection was terminated in the first place.After the connection was terminated,still the server 10.40.50.41 is sending traffic which is being denied by f/w. ( for obvious reason that there is no associated connection and to create a conneciton,the SYN bit should be sent.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Sep 2008 17:05:32 GMT</pubDate>
    <dc:creator>suschoud</dc:creator>
    <dc:date>2008-09-09T17:05:32Z</dc:date>
    <item>
      <title>deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection/m-p/1110539#M913549</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am getting some logs on my ASA v8.0(3) :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:38:16: %ASA-6-106015: Deny TCP (no connection) from 10.40.62.7/1153 to 10.40.9.54/1521 flags PSH ACK  on interface inside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:42:25: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/4566 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:42:26: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/4566 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:42:27: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/4566 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:42:28: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/4566 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:42:29: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/4566 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:46:56: %ASA-6-106015: Deny TCP (no connection) from 10.40.62.7/1782 to 10.40.68.10/8443 flags RST  on interface inside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:47:30: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/1411 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:47:31: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/1411 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:47:32: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/1411 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:47:33: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/1411 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 14:47:34: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.41/1521 to 10.40.62.7/1411 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 15:13:16: %ASA-6-106015: Deny TCP (no connection) from 10.40.62.7/4566 to 10.40.50.41/1521 flags PSH ACK  on interface inside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 15:28:52: %ASA-6-106015: Deny TCP (no connection) from 10.40.62.7/2034 to 10.40.50.31/80 flags RST  on interface inside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 15:28:52: %ASA-6-106015: Deny TCP (no connection) from 10.40.62.7/2034 to 10.40.50.31/80 flags RST  on interface inside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 15:49:00: %ASA-6-106015: Deny TCP (no connection) from 10.40.62.7/2215 to SRV_PROXY_DNS_10_106_23_20/8080 flags RST  on interface inside&lt;/P&gt;&lt;P&gt;&amp;lt;166&amp;gt;Sep 03 2008 15:52:25: %ASA-6-106015: Deny TCP (no connection) from 10.40.50.31/80 to 10.40.62.7/2356 flags ACK  on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a filter of one day log messages.&lt;/P&gt;&lt;P&gt;I decide to filter 10.40.62.7 and "Deny TCP (no connection)" because this client has some problem of deconnection with an Oracle Client. &lt;/P&gt;&lt;P&gt;I increase the timeout time of TCP but it doesn't seem to be better.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection/m-p/1110539#M913549</guid>
      <dc:creator>charles.repain</dc:creator>
      <dc:date>2019-03-11T13:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection/m-p/1110540#M913550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Error Message - %PIX|ASA-6-106015: Deny TCP (no connection) from IP_address/port to IP_address/port flags tcp_flags on interface interface_name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explanation - The security appliance discarded a TCP packet that has no associated connection in the security appliance connection table. The security appliance looks for a SYN flag in the packet, which indicates a request to establish a new connection. If the SYN flag is not set, and there is not an existing connection, the security appliance discards the packet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recommended Action - None required unless the security appliance receives a large volume of these invalid TCP packets. If this is the case, trace the packets to the source and determine the reason these packets were sent.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Sep 2008 15:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection/m-p/1110540#M913550</guid>
      <dc:creator>smahbub</dc:creator>
      <dc:date>2008-09-09T15:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: deny TCP (no connection)</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection/m-p/1110541#M913551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PLease look for the " teardown " message rather then what you are filtering now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will tell us why the connection was terminated in the first place.After the connection was terminated,still the server 10.40.50.41 is sending traffic which is being denied by f/w. ( for obvious reason that there is no associated connection and to create a conneciton,the SYN bit should be sent.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Sep 2008 17:05:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection/m-p/1110541#M913551</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2008-09-09T17:05:32Z</dc:date>
    </item>
  </channel>
</rss>

