<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP packet with SYN flag sets and windows size equal to zero in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858093#M963267</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which tcp port numbers do your private protocol, called 9010t, use?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Sep 2007 15:21:16 GMT</pubDate>
    <dc:creator>a.alekseev</dc:creator>
    <dc:date>2007-09-14T15:21:16Z</dc:date>
    <item>
      <title>TCP packet with SYN flag sets and windows size equal to zero</title>
      <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858092#M963265</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running software version 7.2(2) on an ASA5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the appliance in transparent mode to filter traffic from the wireless lan ( connected to the outside ) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to the wired lan ( connected to the inside ). In this first test phase I configured my ASA5510 to permit all the ip &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;traffic between wireless lan and wired lan :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list IN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list OUT extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUT in interface outside&lt;/P&gt;&lt;P&gt;access-group IN in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My wireless terminals use a private protocol, called 9010t, to communicate with the application server. This protocol    &lt;/P&gt;&lt;P&gt;opens a TCP session to the application server using a packet with the SYN flag sets and the Window size equal to zero. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This first TCP packet is discarded by the ASA5510, in my opinion because the ASA5510 recognises it as a malformed packet, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and wireless terminals can't connect to the application server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to manage the ASA5510 to permit this first TCP packet to cross the ASA5510 itself, granting wireless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;terminals to connect to the application server ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrea&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:11:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858092#M963265</guid>
      <dc:creator>Andrea Fabbri</dc:creator>
      <dc:date>2019-03-11T11:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet with SYN flag sets and windows size equal to zero</title>
      <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858093#M963267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which tcp port numbers do your private protocol, called 9010t, use?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 15:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858093#M963267</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2007-09-14T15:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet with SYN flag sets and windows size equal to zero</title>
      <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858094#M963268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;  the application server of the 9010t protocol ( created by Teklogix ) is listening on the 9999 tcp port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help ! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 06:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858094#M963268</guid>
      <dc:creator>Andrea Fabbri</dc:creator>
      <dc:date>2007-09-17T06:00:34Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet with SYN flag sets and windows size equal to zero</title>
      <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858095#M963269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try to indentify the root cause of your problem.&lt;/P&gt;&lt;P&gt;Do you have any messages on the asa/pix?&lt;/P&gt;&lt;P&gt;Try enable logging.&lt;/P&gt;&lt;P&gt;# for telnet/ssh&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logg on &lt;/P&gt;&lt;P&gt;logg mon 7&lt;/P&gt;&lt;P&gt;term mon&lt;/P&gt;&lt;P&gt;# for console&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logg on&lt;/P&gt;&lt;P&gt;logg con 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have "nat-contol" or "no nat-control"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 08:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858095#M963269</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2007-09-17T08:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet with SYN flag sets and windows size equal to zero</title>
      <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858096#M963271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;  during test phase I enabled both logging and packet capture. In particular the capture shows :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-SMICHELE# sh capture&lt;/P&gt;&lt;P&gt;capture ASP-DROP type asp-drop all [Capturing - 190100 bytes]&lt;/P&gt;&lt;P&gt;capture ACL-OUT type raw-data access-list TEST interface outside [Capturing - 4048 bytes]&lt;/P&gt;&lt;P&gt;capture ACL-IN type raw-data access-list TEST interface inside [Capturing - 583 bytes]&lt;/P&gt;&lt;P&gt;ASA-SMICHELE#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-SMICHELE# sh capture ACL-IN&lt;/P&gt;&lt;P&gt;4 packets captured&lt;/P&gt;&lt;P&gt;   1: 06:25:19.211933 172.16.58.15.137 &amp;gt; 172.16.255.255.137:  udp 50&lt;/P&gt;&lt;P&gt;   2: 06:25:19.962016 172.16.58.15.137 &amp;gt; 172.16.255.255.137:  udp 50&lt;/P&gt;&lt;P&gt;   3: 06:25:20.712029 172.16.58.15.137 &amp;gt; 172.16.255.255.137:  udp 50&lt;/P&gt;&lt;P&gt;   4: 06:31:38.388575 172.16.58.15.138 &amp;gt; 172.16.255.255.138:  udp 201&lt;/P&gt;&lt;P&gt;4 packets shown&lt;/P&gt;&lt;P&gt;ASA-SMICHELE#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-SMICHELE# sh capture ACL-OUT&lt;/P&gt;&lt;P&gt;49 packets captured&lt;/P&gt;&lt;P&gt;   1: 06:23:32.410928 172.16.58.80.3083 &amp;gt; 172.16.58.15.9999: P 160698610:160698617(7) ack 806354767&lt;/P&gt;&lt;P&gt;win 4096&lt;/P&gt;&lt;P&gt;   2: 06:23:39.080135 172.16.58.80.3083 &amp;gt; 172.16.58.15.9999: P 160698610:160698617(7) ack 806354767&lt;/P&gt;&lt;P&gt;win 4096&lt;/P&gt;&lt;P&gt;   3: 06:23:49.760580 172.16.58.80.3083 &amp;gt; 172.16.58.15.9999: P 160698610:160698617(7) ack 806354767&lt;/P&gt;&lt;P&gt;win 4096&lt;/P&gt;&lt;P&gt;   4: 06:24:01.766241 172.16.58.80.3083 &amp;gt; 172.16.58.15.9999: P 160698610:160698617(7) ack 806354767&lt;/P&gt;&lt;P&gt;win 4096&lt;/P&gt;&lt;P&gt;   5: 06:24:07.829531 172.16.58.80.3083 &amp;gt; 172.16.58.15.9999: P 160698610:160698617(7) ack 806354767&lt;/P&gt;&lt;P&gt;win 4096&lt;/P&gt;&lt;P&gt;   6: 06:25:19.212055 172.16.58.15.137 &amp;gt; 172.16.255.255.137:  udp 50&lt;/P&gt;&lt;P&gt;   7: 06:25:19.962032 172.16.58.15.137 &amp;gt; 172.16.255.255.137:  udp 50&lt;/P&gt;&lt;P&gt;   8: 06:25:20.712045 172.16.58.15.137 &amp;gt; 172.16.255.255.137:  udp 50&lt;/P&gt;&lt;P&gt;   9: 06:27:16.093501 172.16.58.80.3083 &amp;gt; 172.16.58.15.9999: P 160698610:160698617(7) ack 806354767&lt;/P&gt;&lt;P&gt;win 4096&lt;/P&gt;&lt;P&gt;  10: 06:27:21.658886 172.16.58.80.3083 &amp;gt; 172.16.58.15.9999: P 160698610:160698617(7) ack 806354767&lt;/P&gt;&lt;P&gt;win 4096&lt;/P&gt;&lt;P&gt;.............&lt;/P&gt;&lt;P&gt;.............&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where 172.16.58.80 is the IP address of one of the wireless terminals and 172.16.58.15 is the application server IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see from the output of the capture there's no evidence of the first TCP packet with SYN flag sets &lt;/P&gt;&lt;P&gt;from the wireless terminal to the application server. Anyway I'm sure that this TCP packet starts from the &lt;/P&gt;&lt;P&gt;wireless terminal to the application server because I can see it through a Wireshark session on my PC &lt;/P&gt;&lt;P&gt;( plugged in an HUB device on the ethernet segment of the wireless LAN ).&lt;/P&gt;&lt;P&gt;The only tcp packets the capture shows me are the attempts the wireless client makes to download the server&lt;/P&gt;&lt;P&gt;pages ( packets 172.16.58.80.xxxx &amp;gt; 172.16.58.15.9999 with ack sets ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 10:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858096#M963271</guid>
      <dc:creator>Andrea Fabbri</dc:creator>
      <dc:date>2007-09-18T10:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet with SYN flag sets and windows size equal to zero</title>
      <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858097#M963272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;andreafbr,&lt;/P&gt;&lt;P&gt;Could you answer to my questions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also&lt;/P&gt;&lt;P&gt;What do you have in connection table?&lt;/P&gt;&lt;P&gt;" sh conn protocol tcp long"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 11:07:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858097#M963272</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2007-09-18T11:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet with SYN flag sets and windows size equal to zero</title>
      <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858098#M963273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;a.alekseev,&lt;/P&gt;&lt;P&gt;           I'm sorry but I can't do a new test until next Monday. I planned this new test next Monday morning.&lt;/P&gt;&lt;P&gt;Do you want to ask me something else to test ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much !  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrea&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 07:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858098#M963273</guid>
      <dc:creator>Andrea Fabbri</dc:creator>
      <dc:date>2007-09-19T07:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet with SYN flag sets and windows size equal to zero</title>
      <link>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858099#M963274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;   I'm sorry if I answer you just now to your e-mail. The ASA5510 is working with version 7.2(2) in transparent mode &lt;/P&gt;&lt;P&gt;and nat-control is not supported. I enabled :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging console 7&lt;/P&gt;&lt;P&gt;logging monitor 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is the logging output :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-6-302016: Teardown UDP connection 167 for outside:172.16.255.255/138 to i&lt;/P&gt;&lt;P&gt;nside:172.16.59.80/138 duration 0:02:01 bytes 201&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:172.16.59.80 duration 0:02:01&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host outside:172.16.58.80&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:172.16.58.15&lt;/P&gt;&lt;P&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.58.80/1541 to 172.16.58.15/9999 flags PSH ACK  o&lt;/P&gt;&lt;P&gt;n interface outside&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host outside:172.16.58.80 duration 0:00:00&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:172.16.58.15 duration 0:00:00&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:172.16.61.111&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built outbound UDP connection 189 for outside:172.16.255.255/138 (172.16.255.255/138)&lt;/P&gt;&lt;P&gt; to inside:172.16.61.111/138 (172.16.61.111/138)&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:172.16.57.30&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built outbound UDP connection 190 for outside:172.16.255.255/137 (172.16.255.255/137)&lt;/P&gt;&lt;P&gt; to inside:172.16.57.30/137 (172.16.57.30/137)&lt;/P&gt;&lt;P&gt;%ASA-6-302016: Teardown UDP connection 169 for outside:172.16.255.255/138 to inside:172.16.59.119/13&lt;/P&gt;&lt;P&gt;8 duration 0:02:01 bytes 217&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:172.16.59.119 duration 0:03:40&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host outside:172.16.58.80&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:172.16.58.15&lt;/P&gt;&lt;P&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.58.80/1541 to 172.16.58.15/9999 flags PSH ACK  o&lt;/P&gt;&lt;P&gt;n interface outside&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host outside:172.16.58.80 duration 0:00:00&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:172.16.58.15 duration 0:00:00&lt;/P&gt;&lt;P&gt;%ASA-6-302016: Teardown UDP connection 171 for outside:172.16.255.255/138 to inside:172.16.63.11/138&lt;/P&gt;&lt;P&gt; duration 0:02:01 bytes 201&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:172.16.63.11 duration 0:02:01&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host outside:172.16.58.80&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:172.16.58.15&lt;/P&gt;&lt;P&gt;%ASA-6-106015: Deny TCP (no connection) from 172.16.58.80/1541 to 172.16.58.15/9999 flags PSH ACK  o&lt;/P&gt;&lt;P&gt;n interface outside&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host outside:172.16.58.80 duration 0:00:00&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:172.16.58.15 duration 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see there's no evidence of a packet from 172.16.58.80/1541 to 172.16.58.15/9999 with the&lt;/P&gt;&lt;P&gt;SYN flag sets.&lt;/P&gt;&lt;P&gt;I also do the "sh conn protocol tcp long" command :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sh conn protocol tcp long&lt;/P&gt;&lt;P&gt;17 in use, 28 most used&lt;/P&gt;&lt;P&gt;Flags: A - awaiting inside ACK to SYN, a - awaiting outside ACK to SYN,&lt;/P&gt;&lt;P&gt;       .........&lt;/P&gt;&lt;P&gt;       X - inspected by service module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and I see no connections active.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I decided to change interfaces roles : inside interface linked to the wireles lan and outside interface linked to the &lt;/P&gt;&lt;P&gt;wired lan. This change seems to SOLVE my problem because now wireless terminals can connect to the apllication server and &lt;/P&gt;&lt;P&gt;the "sh conn protocol tcp long" command presents :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh conn all long&lt;/P&gt;&lt;P&gt;26 in use, 26 most used&lt;/P&gt;&lt;P&gt;Flags: A - awaiting inside ACK to SYN, a - awaiting outside ACK to SYN,&lt;/P&gt;&lt;P&gt;       ........&lt;/P&gt;&lt;P&gt;       X - inspected by service module&lt;/P&gt;&lt;P&gt;TCP outside:172.16.58.15/9999 (172.16.58.15/9999) inside:172.16.58.80/1284 (172.16.58.80/1284) flags&lt;/P&gt;&lt;P&gt; UIO idle 0:00:00 bytes 1029&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help  !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bye&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrea&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2007 15:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-packet-with-syn-flag-sets-and-windows-size-equal-to-zero/m-p/858099#M963274</guid>
      <dc:creator>Andrea Fabbri</dc:creator>
      <dc:date>2007-10-05T15:38:04Z</dc:date>
    </item>
  </channel>
</rss>

