02-09-2012 01:06 PM - edited 03-11-2019 03:27 PM
Let's suppose you have a server that is accessed via telnet. Further let us suppose that this application wasn't written very well such that it issues packets that don't have an associated syn or whatever. Now in a LAN environment who cares but in a firewall environment these packets are thrown away rather than the end point saying, ,"HuH?" Bottomline is there a way to stop the ASA firewall from inspecting something related to a specific host. In other words have the ASA just pass it through even though there isn't a state or the application is not playing by the rules. I suspect not but thought I would ask.
thx
02-09-2012 01:16 PM
Hello Whanson,
I would say TCP state-bypass. This will not inspect the TCP protocol on a stateful way.
That should do it!
Regards,
Julio
Do rate all the helpful posts!!
02-09-2012 01:20 PM
Where is that command entered? And thx
02-09-2012 01:22 PM
Sorry found it as part of policymap thx again
02-09-2012 01:25 PM
Hello,
Correct. let me know if I can do something else for you.
Otherwise please mark the question as answered so future users can learn from this.
Regards,
Julio
02-09-2012 01:46 PM
Your are the man. Thank you very much.
02-09-2012 01:52 PM
Hello Whanson,
It is my pleasure to help!
please mark the question as answered so future users can learn from this.
Julio
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide