05-20-2010 12:57 PM
I'm a little confused by this one. What would case the default inspection policies to close RDP sessions due to inspection?
6 | May 20 2010 | 15:40:05 | 302014 | 172.20.0.35 | 49388 | 10.1.0.200 | 3389 | Teardown TCP connection 708656 for VPN-DMZ:172.20.0.35/49388 to VPN-Trusted:10.1.0.200/3389 duration 0:00:00 bytes 2690 Flow closed by inspection (USERNAME) |
I only have the default inspections configured.
policy-map type inspect dns migrated_dns_map_1
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns migrated_dns_map_1
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
Also I see no drops on the service policy
sh service-policy
Global policy:
Service-policy: global_policy
Class-map: inspection_default
Inspect: dns migrated_dns_map_1, packet 12, drop 0, reset-drop 0
Inspect: ftp, packet 0, drop 0, reset-drop 0
Inspect: h323 h225 _default_h323_map, packet 0, drop 0, reset-drop 0
tcp-proxy: bytes in buffer 0, bytes dropped 0
Inspect: h323 ras _default_h323_map, packet 0, drop 0, reset-drop 0
Inspect: rsh, packet 0, drop 0, reset-drop 0
Inspect: rtsp, packet 0, drop 0, reset-drop 0
tcp-proxy: bytes in buffer 0, bytes dropped 0
Inspect: esmtp _default_esmtp_map, packet 0, drop 0, reset-drop 0
Inspect: sqlnet, packet 0, drop 0, reset-drop 0
Inspect: skinny , packet 0, drop 0, reset-drop 0
tcp-proxy: bytes in buffer 0, bytes dropped 0
Inspect: sunrpc, packet 0, drop 0, reset-drop 0
tcp-proxy: bytes in buffer 0, bytes dropped 0
Inspect: xdmcp, packet 0, drop 0, reset-drop 0
Inspect: sip , packet 0, drop 0, reset-drop 0
tcp-proxy: bytes in buffer 0, bytes dropped 0
Inspect: netbios, packet 29, drop 0, reset-drop 0
Inspect: tftp, packet 0, drop 0, reset-drop 0
Inspect: ip-options _default_ip_options_map, packet 0, drop 0, reset-drop 0
05-20-2010 02:26 PM
It's actually closed by the default TCP inspection of the firewall, not part of the application specific inspection.
Here is that particular syslog message# 302014 for your reference:
http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html#wp4770614
"show asp drop" might show the reason of why it's being dropped. You might want to clear the asp drop counters, then trigger the error if possible, and "show asp drop".
Hope that answers your question.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide