<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: duplicate tcp syn messages in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-messages/m-p/1295216#M947996</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; A duplicate TCP SYN was received during the three-way-handshake that has a different initial sequence number than the SYN that opened the embryonic connection. This could indicate that SYNs are being spoofed. This message occurs in Release 7.0.4.1 and later. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa71/system/message/logmsgs.html?bcsi_scan_73B62AB387D5D02C=0&amp;amp;bcsi_scan_filename=logmsgs.html#wp3456474" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/system/message/logmsgs.html?bcsi_scan_73B62AB387D5D02C=0&amp;amp;bcsi_scan_filename=logmsgs.html#wp3456474&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Oct 2009 03:54:19 GMT</pubDate>
    <dc:creator>dhananjoy chowdhury</dc:creator>
    <dc:date>2009-10-08T03:54:19Z</dc:date>
    <item>
      <title>duplicate tcp syn messages</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-messages/m-p/1295215#M947995</link>
      <description>&lt;P&gt;I'm using the ASA for anyconnect users and I keep seeing log messages similar to the following:&lt;/P&gt;&lt;P&gt;4	date=Oct 07 2009	Source IP=10.1.1.201	Source Port=17571	Destination IP=10.0.250.18	Destination Port53887	Duplicate TCP SYN from inside:10.1.1.201/17571 to inside:10.0.250.18/53887 with different initial sequence number&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source changes from various server (so far our Anti-virus server, dns, and Active directory servers) the destination appears to be client ip's that have disconnected. &lt;/P&gt;&lt;P&gt;I would like to stop this as it is filling my logs up with spurious information&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:43:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-messages/m-p/1295215#M947995</guid>
      <dc:creator>3msands</dc:creator>
      <dc:date>2020-02-21T11:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: duplicate tcp syn messages</title>
      <link>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-messages/m-p/1295216#M947996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; A duplicate TCP SYN was received during the three-way-handshake that has a different initial sequence number than the SYN that opened the embryonic connection. This could indicate that SYNs are being spoofed. This message occurs in Release 7.0.4.1 and later. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa71/system/message/logmsgs.html?bcsi_scan_73B62AB387D5D02C=0&amp;amp;bcsi_scan_filename=logmsgs.html#wp3456474" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/system/message/logmsgs.html?bcsi_scan_73B62AB387D5D02C=0&amp;amp;bcsi_scan_filename=logmsgs.html#wp3456474&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Oct 2009 03:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/duplicate-tcp-syn-messages/m-p/1295216#M947996</guid>
      <dc:creator>dhananjoy chowdhury</dc:creator>
      <dc:date>2009-10-08T03:54:19Z</dc:date>
    </item>
  </channel>
</rss>

