ā04-25-2019 11:38 PM
Hi All
i am getting this message in my firewall Teardown TCP connection 20081514 for INTERNET:x.x.x.x/80 to APP_DMZ:y.y.y.y/51760 duration 0:00:58 bytes 9859 TCP FINs
it means the flag is sent to y.y.y.y or its deleted by firewall before sending flag to y.y.y.y by x.x.x.x
Solved! Go to Solution.
ā04-26-2019 06:39 AM
There are some details that are inconsistent, such as using port 51760 in the build message and using port 51766 in the tear down. Or using connection number 20081514 in the build message and using connection number 20087604 in the tear down. It makes me wonder if the messages are really part of the same transaction.
But it seems to me that there is an explanation of what is happening. A device in the DMZ initiates an HTTP request (TCP port 80) to some web server in the Internet and the ASA creates a connection entry. A TCP session was established. We do not know how many packets were transmitted. But we do know that the TCP session was very brief and that 9859 bytes were transmitted. And then the web server sent TCP FIN to terminate the TCP session. So the ASA then tears down the TCP session. The processing on the ASA is fairly straight forward and I do not see a problem on the ASA. The real question, it seems to me, is why is the web server terminating the TCP session.
HTH
Rick
ā04-25-2019 11:46 PM
Look at the tear down examples below :
Is this continously happening or just 1 case ?
ā04-26-2019 12:57 AM - edited ā04-27-2019 03:42 AM
Hi Balaji
i am sending the traffic from DMZ interface from y.y.y.y/80 to x.x.x.x(internet)
i am able to send message in response i get message in firewall is
Built dynamic TCP translation from APP_DMZ:y.y.y.y/80 to INTERNET:x.x.x.x
and after that i am receiving two logs in firewall
Built outbound TCP connection 20081514 for INTERNET:x.x.x.x/80 (x.x.x.x/80) to APP_DMZ:y.y.y.y.y/51760 (y.y.y.y/51760)
Teardown TCP connection 20087604 for INTERNET:x.x.x.x/80 to APP_DMZ:y.y.y.y/51766 duration 0:00:01 bytes 9859 TCP FINs
and its happen every time.
ā04-26-2019 06:13 AM
202.51.3.237 I do not see the connection for the port 80, the connection is open. But the tear down coming from 202.51.3.237
Since we are not sure what is your Rule base, can you post your full configuration to have a look your ACL
Also provide ASA Model and show version along with config.
ā04-26-2019 06:39 AM
There are some details that are inconsistent, such as using port 51760 in the build message and using port 51766 in the tear down. Or using connection number 20081514 in the build message and using connection number 20087604 in the tear down. It makes me wonder if the messages are really part of the same transaction.
But it seems to me that there is an explanation of what is happening. A device in the DMZ initiates an HTTP request (TCP port 80) to some web server in the Internet and the ASA creates a connection entry. A TCP session was established. We do not know how many packets were transmitted. But we do know that the TCP session was very brief and that 9859 bytes were transmitted. And then the web server sent TCP FIN to terminate the TCP session. So the ASA then tears down the TCP session. The processing on the ASA is fairly straight forward and I do not see a problem on the ASA. The real question, it seems to me, is why is the web server terminating the TCP session.
HTH
Rick
ā04-27-2019 03:37 AM
Hi Richard
thanks to let me understand that server is sending acknowledgement to tear off the connection(its the behavior of the server to send a acknowledgment flag back to the host so that he(host) understand that transaction is successful)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide