<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Duplicate TCP SYN log entries in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989308#M934837</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;8.3 or 8.4 invalidated the ability to route to 127.x.x.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My solution for 8.4 is to route to the outside.&amp;nbsp;&amp;nbsp; This also works on 8.2, so it is a better solution across versions.&amp;nbsp; This is what you normally have to do with VPN site-to-site tunnels.&amp;nbsp; If you aren't used to doing this, then I'll bet you've noticed that the tunnels only seem to come up when the spoke end talks inward to the hub ASA.&amp;nbsp; This is because small spoke sites tend to route all traffic (even most of 10.0.0.0/8) towards 0.0.0.0.&amp;nbsp; While hubs have far greater 10.0.0.0/8 population which routes inward by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So create a specific route for your VPN pools..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 10.x.x.0&amp;nbsp;&amp;nbsp; 0.x.x.255&amp;nbsp; to outside default gateway (0.0.0.0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've already tested this on a 8.4 and 8.2 ASA and they both work.&amp;nbsp; The routing blackhole stops.&amp;nbsp; We've eliminated a few million daily Duplicate TCP SYNs "attacks" with two routes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Dec 2012 02:40:28 GMT</pubDate>
    <dc:creator>Royal Frazier</dc:creator>
    <dc:date>2012-12-14T02:40:28Z</dc:date>
    <item>
      <title>Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989301#M934826</link>
      <description>&lt;P&gt;I have an appliance capturing syslog information from my ASA5520. I am seeing a TON of entries for &lt;EM&gt;ASA-4-419002: Duplicate TCP SYN from inside:XXX.XXX.XXX.XXX/##### to inside:YYY.YYY.YYY.YYY/44487 with different initial, &lt;/EM&gt;with the first IP address logged with several different ports, and the second IP address as the exact same IP/port every time. This happens across a few other FROM addresses as well, with each of them pointing to a single IP/port pair. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I want to know: How do I get rid of these? Is this indicative of some sort of spoofing or attack? Should I be concerned about some sort of malware on the inside, or is the firewall catching some sort of SYN attack originating from outside? Or is it just something I should ignore as the ASA is doing it's job? &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989301#M934826</guid>
      <dc:creator>Johnny Flanagan</dc:creator>
      <dc:date>2020-02-21T12:41:27Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989302#M934827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Johnny,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firstly, you have landed yourself up in wireless tech zone. This question deserves a posting in the security zone. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly, for the logs you posted above, here are my two cents:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; A duplicate TCP SYN was received during the three-way-handshake that has a different initial sequence number than the SYN that opened the embryonic connection. This could indicate that SYNs are being spoofed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may like to do some config as sample below to prevent your network from SYN Flood attack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create an acl with source any and destination specific to the TO-IP-ADDRESS that you see in the logs above&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host &lt;SINGLE_IP_AS_YOU_MENTIONED_ABOVE&gt;&lt;/SINGLE_IP_AS_YOU_MENTIONED_ABOVE&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host &lt;SINGLE_IP_AS_YOU_MENTIONED_ABOVE&gt;&lt;/SINGLE_IP_AS_YOU_MENTIONED_ABOVE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map c-inside-machine&lt;/P&gt;&lt;P&gt;match access-list 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map p-inside-machine&lt;/P&gt;&lt;P&gt;class c-inside-machine&lt;/P&gt;&lt;P&gt;set connection conn-max 100&lt;/P&gt;&lt;P&gt;set connection embryonic-conn-max 200&lt;/P&gt;&lt;P&gt;set connection per-client-embryonic-max 7&lt;/P&gt;&lt;P&gt;set connection per-client-max 5&lt;/P&gt;&lt;P&gt;set connection random-sequence-number enable&lt;/P&gt;&lt;P&gt;set connection timeout embryonic 0:0:45&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;service-policy p-inside-machine interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can also refer the config below for more details and deeper understanding on the suggested config&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S Please do rate good posts that answers your question to help others finding the similar solution in less time and to avoid duplicacy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 21:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989302#M934827</guid>
      <dc:creator>mopaul</dc:creator>
      <dc:date>2012-07-19T21:06:05Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989303#M934828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guess I fat-fingered (clicked?) the discussion group I wanted to send this to. Thanks for the heads-up. It should be in the proper forum now. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will look at this in the morning. I'm a relative newbie to the Cisco CLI, so we'll see what I can do. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 21:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989303#M934828</guid>
      <dc:creator>Johnny Flanagan</dc:creator>
      <dc:date>2012-07-19T21:17:26Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989304#M934829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;If you ask me, I would say someone is doing a sweep attack. Yes, you can stop this with the Cisco’s threat-detection mechanism in your Cisco ASA, by utilizing the “shun” keyword. Please be sure to apply a suitable rate-interval, in order not to block legitimate network traffic. Good luck, bro &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For further details on this, please do refer to &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_threat.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_threat.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you do find this comment useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jul 2012 17:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989304#M934829</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-20T17:16:06Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989305#M934830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We actually just got that turned off, as it was generating a lot of false positives and restricting valid access. I'll read on it, and see what controls are there to minimize the impact to legitimate traffic. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jul 2012 18:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989305#M934830</guid>
      <dc:creator>Johnny Flanagan</dc:creator>
      <dc:date>2012-07-20T18:56:53Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989306#M934831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The #1 reason this occurs has nothing to do with scans or attacks or anything like that.&amp;nbsp; This is normally a routing issue.&amp;nbsp; Due to firewalls often owning default routes or large bocks of IPs, traffic to non-existant IPs end up at the inside.&amp;nbsp; If the firewall doesn't own that PRIVATE IP in a DMZ or active VPN session, typically routing sends it back inward where the inner router will loop it back up to 255 depending upon TTL. THIS is almost certainly the cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Every instance of mass DUP TCP SYNs I've ever seen were routing blackholes looping simple, singular attempts to initiate a TCP connection to a device that does not exist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take one of the destinations, I'll bet it didn't exist when they happened.&amp;nbsp; A common scenario is how Cisco handles VPN clients on the ASA (happened with concentrators, too).&amp;nbsp; The VPN Address pool for clients might be 10.1.1.0/24.&amp;nbsp; However the individual IPs are only routable when a session is active with each IP.&amp;nbsp; When IPs in the pool aren't active, the ASA doesn't "own" them.&amp;nbsp; Any traffic for them will be bounced back internally (assuming a rule doesn't block traffic).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a simple test form any desktop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Telnet&amp;nbsp; 10.1.1.120&amp;nbsp;&amp;nbsp; 9999&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Substitute an IP that is being "attacked" with DUP TCP SYNs often.&amp;nbsp; Mark sure it really isn't alive.&amp;nbsp; Check your logs after you telnet.&amp;nbsp; You should get over 500 DUP SYNs over two minutes from that one telnet statement. I believe Telnet will attempt one retry after 60 or 120 seconds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is a simple routing blackhole.&amp;nbsp; It often occurs with unaccounted IP ranges that are inclusive within your routing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying a fix here that so far is working.&amp;nbsp; On a router you would implement a large, less specific NULL route to dump traffic to hosts that aren't connected or routable.&amp;nbsp; ASAs don't support NULL routes in my reasearch, however...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;install a STATIC ROUTE 10.0.0.0 0.255.255.255&amp;nbsp; to gateway 127.0.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As with anuy NULL route implementation, You'll have to figure out how big or specific the 10.x.x.x can get for your router.&amp;nbsp; You must be careful.&amp;nbsp; This will dump anytraffic for any IP that the ASA doesn't have a CONNECTED INTERFACE or a SPECIFIC ROUTE for already through statics or ospf, etc.&amp;nbsp; Over generalize and you just SHUNNED large swaths of your network.&amp;nbsp; People will notice.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 22:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989306#M934831</guid>
      <dc:creator>Royal Frazier</dc:creator>
      <dc:date>2012-12-07T22:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989307#M934836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for a great response, I believe you are on to something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are having the same problem in our network and was trying to add the static route you mentioned, but get the error &lt;/P&gt;&lt;P&gt;%Invalid next hop address. We have tried it on both the core switch and the ASA with the same error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where did you add this route?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//Mattias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2012 11:02:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989307#M934836</guid>
      <dc:creator>cryptonic</dc:creator>
      <dc:date>2012-12-13T11:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989308#M934837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;8.3 or 8.4 invalidated the ability to route to 127.x.x.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My solution for 8.4 is to route to the outside.&amp;nbsp;&amp;nbsp; This also works on 8.2, so it is a better solution across versions.&amp;nbsp; This is what you normally have to do with VPN site-to-site tunnels.&amp;nbsp; If you aren't used to doing this, then I'll bet you've noticed that the tunnels only seem to come up when the spoke end talks inward to the hub ASA.&amp;nbsp; This is because small spoke sites tend to route all traffic (even most of 10.0.0.0/8) towards 0.0.0.0.&amp;nbsp; While hubs have far greater 10.0.0.0/8 population which routes inward by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So create a specific route for your VPN pools..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 10.x.x.0&amp;nbsp;&amp;nbsp; 0.x.x.255&amp;nbsp; to outside default gateway (0.0.0.0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've already tested this on a 8.4 and 8.2 ASA and they both work.&amp;nbsp; The routing blackhole stops.&amp;nbsp; We've eliminated a few million daily Duplicate TCP SYNs "attacks" with two routes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2012 02:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989308#M934837</guid>
      <dc:creator>Royal Frazier</dc:creator>
      <dc:date>2012-12-14T02:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989309#M934838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect! Issue is resolved with the route you suggested. Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our VPN-users use the network 10.250.1.0/24 so all I did was to add a static route to our ISP gateway:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 10.250.1.0 255.255.255.0 &lt;ISP gateway=""&gt;&lt;/ISP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the log-viewer is readable &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Thanks again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//Mattias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2012 08:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989309#M934838</guid>
      <dc:creator>cryptonic</dc:creator>
      <dc:date>2012-12-14T08:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989310#M934839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't abandoned my post, just been swamped with other duties. &lt;SPAN __jive_emoticon_name="plain" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I get a chance here on my side, I'll implement these suggestions and see if it fixes my problems as well. Thanks for all of the info. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2012 13:44:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989310#M934839</guid>
      <dc:creator>Johnny Flanagan</dc:creator>
      <dc:date>2012-12-14T13:44:38Z</dc:date>
    </item>
    <item>
      <title>Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989311#M934840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; in reading this thread, I also see this and tested both a static route of the client pools to the outside router - that worked, but also created an inside interface (we have 2 client pools defined on this box)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!define source object group&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_8&lt;/P&gt;&lt;P&gt; network-object object RAS-pool1&lt;/P&gt;&lt;P&gt; network-object object RAS-pool2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!define destination object group&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_9&lt;/P&gt;&lt;P&gt; network-object object RAS-pool1&lt;/P&gt;&lt;P&gt; network-object object RAS-pool2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!deny source to destinaion object groups, permit other&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip object-group DM_INLINE_NETWORK_8 object-group DM_INLINE_NETWORK_9 access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so, anything sent to inside firewall/router via inside interface that sees the client pool route back to the ASA will get snubbed since the source appears to be a ASA defined pool address and could not be sourced validly from outside the ASA, therefore it is an invalid packet and should be snubbed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would be interested in others comments on this approach.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 20:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989311#M934840</guid>
      <dc:creator>rdmcleod</dc:creator>
      <dc:date>2013-06-19T20:10:23Z</dc:date>
    </item>
    <item>
      <title>Resurrecting this dead thread</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989312#M934841</link>
      <description>&lt;P&gt;Resurrecting this dead thread - I have the same problem. &amp;nbsp;We're already routing the user's vpn /24 out to the Internet (external next hop). &amp;nbsp;&lt;/P&gt;
&lt;P&gt;To suppress the syslog message, in the cli, send a no logging message command.&lt;/P&gt;

&lt;PRE&gt;
no logging message 419002
&lt;/PRE&gt;

&lt;P&gt;According to&amp;nbsp;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/syslog-guide/syslogs/logmsgs.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/syslog-guide/syslogs/logmsgs.html&lt;/A&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;419002 is&amp;nbsp;&lt;SPAN style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; font-size: 12.2360000610352px; line-height: normal;"&gt;Error Message&amp;nbsp;&lt;/SPAN&gt;&lt;A name="37984" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; font-size: 12.2360000610352px; line-height: normal; background-color: rgb(255, 255, 255);"&gt;&lt;/A&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; font-size: 12.2360000610352px; line-height: normal;"&gt;%ASA-4-419002: Received duplicate TCP SYN&amp;nbsp;&lt;/SPAN&gt;3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2015 14:28:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989312#M934841</guid>
      <dc:creator>cscbrannent</dc:creator>
      <dc:date>2015-01-26T14:28:32Z</dc:date>
    </item>
    <item>
      <title>FYI - I just added the</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989313#M934842</link>
      <description>&lt;P&gt;FYI - I just added the following to our ASA to solve exactly this same Duplicate TCP SYN issue:&lt;/P&gt;
&lt;P&gt;route outside &amp;lt;our_VPN_pool_network_address&amp;gt; 255.255.255.0 0.0.0.0 1 &lt;BR /&gt;&lt;BR /&gt;This worked perfectly.&amp;nbsp; All of the Duplicate TCP Syn messages have now stopped from this ASA.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Nice to have a well behaved ASA again..&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;/mischief_managed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2016 21:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989313#M934842</guid>
      <dc:creator>deanlawson</dc:creator>
      <dc:date>2016-02-09T21:26:28Z</dc:date>
    </item>
    <item>
      <title>I know this post is older now</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989314#M934843</link>
      <description>&lt;P&gt;I know this post is older now, but great info, thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I had a static route on the upstream router for a /24 pointing to the ASA 'outside' interface for which I only had maybe a dozen 1:1 NATs set up on. For any IP &lt;STRONG&gt;without&lt;/STRONG&gt; a NAT set up, it of course was routing back up to its gateway (upstream router) and causing a routing loop, which flooded my logs with these TCP SYN errors.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2016 16:47:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/1989314#M934843</guid>
      <dc:creator>dthomas53</dc:creator>
      <dc:date>2016-06-10T16:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/4035875#M1066991</link>
      <description>&lt;P&gt;Royal Frazier, you are a LEGEND! we need more like you on these boards. please come back!&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 04:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/4035875#M1066991</guid>
      <dc:creator>david.haughn</dc:creator>
      <dc:date>2020-02-26T04:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP SYN log entries</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/4143018#M1073447</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;SPAN class="user-badges-list"&gt;&lt;SPAN&gt;&amp;nbsp;Royal Frazier&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Beginner lia-component-message-view-widget-author-username"&gt;.&amp;nbsp; Once someone disconnects from a Cisco Anyconnect VPN the firewall doesnt know where to send the traffic and creates a nasty loop.&amp;nbsp; My CPU utilizated went up to almost 90%.&amp;nbsp; To solve I simply put in a route for the Anyconnnect VPN pool network to got to the loopback interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Beginner lia-component-message-view-widget-author-username"&gt;route (interface) ( Cisco Anyconnect pool) (Cisco Anyconnect Subnet Mask) (loopback interface)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Beginner lia-component-message-view-widget-author-username"&gt;route inside 10.60.0.0 255.255.255.0 127.0.0.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Beginner lia-component-message-view-widget-author-username"&gt;Hope this helps.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 13:33:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-log-entries/m-p/4143018#M1073447</guid>
      <dc:creator>kylemiller452225788</dc:creator>
      <dc:date>2020-08-28T13:33:04Z</dc:date>
    </item>
  </channel>
</rss>

