01-02-2018 03:19 AM - edited 02-21-2020 07:03 AM
Hii
My company recently bought a USM which has been flooding my firewall with syn packets.
Now as a solution i've applied tcp intercept but it is not getting applied globally.
Temporarily i've applied it on inside interface which is pretty much helpful.
I'm using version asa 9.7 and asdm 7.7.
Please suggest what could be the issue.
01-03-2018 04:48 AM
Hello,
The Interface based policy would take preference over global policy. Nevertheless, the global policy should work as well if there is no override or overlaps. Can you paste your MPF config section from show run output. Also, please specify what is the requirement.
Regards,
AJ
01-03-2018 05:45 AM
01-03-2018 06:06 AM
Hello,
The config here looks good and should work on global basis as well. Unless, we have some part of global config not letting the the conn-max config take over. Can you please share the global policy map output as well. Hide if there is any sensitive info.
Regards,
AJ
01-03-2018 12:53 PM
01-03-2018 08:51 PM
Hello,
So, for the connection limit, you would need a separate class-map to be called under the global policy. Something like:
access-list synattack extended permit tcp any any
class-map synattack
match access-list synattack
policy-map global_policy
class inspection_default
inspect ftp
**
**
class synattack
set connection embryonic-conn-max 50
service-policy global_policy global
and remove the policy from inside interface. It should now work on global level.
HTH,
AJ
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide