<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Connection Cache in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connection-cache/m-p/772269#M984549</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as i know the way to view the present state table is to do a "sh conn" on your FWSM. This will show you all the current connections the FWSM is keeping track of and if TCP connections the TCP flags. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit - sorrydidn't answer the first bit. The state table is how a stateful firewall keeps track of connections. So a simple example would &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client on inside telnets to a server on outside. FWSM records the client IP address, the client port number, the destination IP address, the destination port number (which will be 23 in this case) and the TCP flag which for the initial packet will be a SYN flag.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the server responds the TCP flag will be a SYN/ACK and because the firewall has an entry in it's state table for the corresponding SYN it will allow it through. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that if a server on the outside sent a SYN/ACK packet but there was no corresponding SYN packet in it's state table it would drop the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Jul 2007 20:11:07 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2007-07-11T20:11:07Z</dc:date>
    <item>
      <title>Connection Cache</title>
      <link>https://community.cisco.com/t5/network-security/connection-cache/m-p/772266#M984544</link>
      <description>&lt;P&gt;Most servers are blocked by the access list. If a server is allowed to bypass the access list and a connection is created. Where does the connection cached in the FWSM?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-cache/m-p/772266#M984544</guid>
      <dc:creator>nguyenvinht</dc:creator>
      <dc:date>2019-03-11T10:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Cache</title>
      <link>https://community.cisco.com/t5/network-security/connection-cache/m-p/772267#M984545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i understand you correctly the FWSM will keep the connection record in it's state table for as long as the connection is active. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there something more specific you were looking for ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2007 19:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-cache/m-p/772267#M984545</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-07-11T19:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Cache</title>
      <link>https://community.cisco.com/t5/network-security/connection-cache/m-p/772268#M984547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is exactly in the state table? Is there a way I can view the state table? I have other questions after this but first I neeed to understand this step first. Thanks in advance for your reply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2007 20:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-cache/m-p/772268#M984547</guid>
      <dc:creator>nguyenvinht</dc:creator>
      <dc:date>2007-07-11T20:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Cache</title>
      <link>https://community.cisco.com/t5/network-security/connection-cache/m-p/772269#M984549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as i know the way to view the present state table is to do a "sh conn" on your FWSM. This will show you all the current connections the FWSM is keeping track of and if TCP connections the TCP flags. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit - sorrydidn't answer the first bit. The state table is how a stateful firewall keeps track of connections. So a simple example would &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client on inside telnets to a server on outside. FWSM records the client IP address, the client port number, the destination IP address, the destination port number (which will be 23 in this case) and the TCP flag which for the initial packet will be a SYN flag.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the server responds the TCP flag will be a SYN/ACK and because the firewall has an entry in it's state table for the corresponding SYN it will allow it through. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that if a server on the outside sent a SYN/ACK packet but there was no corresponding SYN packet in it's state table it would drop the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2007 20:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-cache/m-p/772269#M984549</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-07-11T20:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Cache</title>
      <link>https://community.cisco.com/t5/network-security/connection-cache/m-p/772270#M984551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is a connection from inside server 10.10.10.1 to outside server 20.20.20.1 on port 23. The traffic is flowing. The flow is recorded in the state table. What will happen if another connection is opened from server 10.10.10.1 to another outside server 30.30.30.1 by telnet or ftp? Now what is recorded in the state table? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will these two statements recorded in the state table?&lt;/P&gt;&lt;P&gt;10.10.10.1-&amp;gt;30.30.30.1 on port 23&lt;/P&gt;&lt;P&gt;10.10.10.1-&amp;gt;20.20.20.1 on port 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this happen, does this kill the flow from 10.10.10.1 to 20.20.20.1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2007 20:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-cache/m-p/772270#M984551</guid>
      <dc:creator>nguyenvinht</dc:creator>
      <dc:date>2007-07-11T20:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Cache</title>
      <link>https://community.cisco.com/t5/network-security/connection-cache/m-p/772271#M984553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No it doesn't kill the flow because all the information is recorded in the state table. So in your example the destination address is different so it the 2 connections can be seen as separate int the state table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But let's go one further&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.10.10.1 opens a telnet connection to 20.20.20.1. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.10.10.1 open an ssh connection to 20.20.20.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both these are also separate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.10.10.1 -&amp;gt; 20.20.20.1 23 &lt;/P&gt;&lt;P&gt;10.10.10.1 -&amp;gt; 20.20.20.1 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And one step further &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.10.10.1 opens a telnet connection to 20.20.20.1&lt;/P&gt;&lt;P&gt;10.10.10.1 opens another telnet connection to 20.20.20.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again these are kept separate because although i haven't included them in the examples so far, the source port is also recorded so&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.10.10.1 2551   20.20.20.1 23 &lt;/P&gt;&lt;P&gt;10.10.10.1 2661   20.20.20.1 23 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this makes sense&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2007 05:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-cache/m-p/772271#M984553</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-07-12T05:45:16Z</dc:date>
    </item>
  </channel>
</rss>

