Jul 13 10 10:39 pm
Jul 14 10 10:08 am
Jul 14 10 6:17 pm
Wingate firewall hit report:
Time: 14/07/10 10:10:00
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 217.73.200.219 : 80
Destination IP Address: 192.168.200.41 : 3976
Protocol: TCP
TCP flags: R
Time-to-live: 254
Wingate firewall hit report:
Time: 14/07/10 10:12:18
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 198.133.219.10 : 443
Destination IP Address: 192.168.200.41 : 2384
Protocol: TCP
TCP flags: R
Time-to-live: 254
Wingate firewall hit report:
Time: 14/07/10 10:12:22
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 72.163.4.161 : 443
Destination IP Address: 192.168.200.41 : 2343
Protocol: TCP
TCP flags: R
Time-to-live: 225
Wingate firewall hit report:
Time: 14/07/10 10:13:05
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 217.212.252.192 : 80
Destination IP Address: 192.168.200.41 : 2362
Protocol: TCP
TCP flags: R
Time-to-live: 254
Jul 15 10 6:37 pm
Wingate firewall hit report:
Time: 14/07/10 18:38:36
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 195.222.17.41 : 80
Destination IP Address: 192.168.200.41 : 2195
Protocol: TCP
TCP flags: RA
Time-to-live: 40
Jul 21 10 8:18 am
Now, can we somehow remove this packets from the blocked list or (which is much correct) make Cisco to drop them?
Being more precise, what is the default TCP connection timeout (I'll try to find a way to set it {minus 2-3sec} on the border router)?
Jul 21 10 8:22 pm
logan wrote:Well, these blocked packets aren't really in error, so WinGate is correct to record them. I haven't used WG6 for a while, but I'll have a look later today and see if you can disable these warnings.
logan wrote:I know that juniper routers have an option called "TCP RST Invalidate Session Immediately" which causes sessions to be closed immediately when an RST packet is received. It sounds like something similar might be enabled on the path of these sessions (probably on the remote side if WinGate is getting the warnings). If your local Cisco has an option like this, try toggling it, which may cause it to deal with extraneous R / RA packets itself.
Jul 22 10 5:04 am
logan wrote:I know that juniper routers have an option called "TCP RST Invalidate Session Immediately" which causes sessions to be closed immediately when an RST packet is received. It sounds like something similar might be enabled on the path of these sessions (probably on the remote side if WinGate is getting the warnings). If your local Cisco has an option like this, try toggling it, which may cause it to deal with extraneous R / RA packets itself.
Jul 22 10 5:00 pm
Jul 22 10 5:56 pm
Alen wrote:Logan, yesterday I understand that the best variant would be to increase wait time for R and RA packets of closed sessions in Wingate (or OS?). Is it possible?
Jul 22 10 7:35 pm
Jul 23 10 8:51 pm
Aug 01 10 9:18 pm
Aug 02 10 9:24 am
Aug 03 10 8:28 pm
logan wrote:The more I think about it, the more it seems that the only way this can really be resolved is to get the Cisco to invalidate the sessions immediately, and therefore block the packets responding to a closed session itself.
logan wrote:I noted from your first post that you check WinGate's firewall daily as part of your security policy/practice, so I'm guessing that you want to hide these packets to reduce the amount of insignificant noise in the firewall tab.
logan wrote:That being the case, there may be an alternate solution to filtering the noise. Instead of reading the packets in the firewall tab, you could read them from the actual log file. The only hurdle is that the information about blocked packets is encoded so not very useful without first being decoded.
All that would be needed is a program that can parse the firewall log file, decode the blocked packet information, and then filter out the packets that you don't want to see. That's the tricky part.
Aug 04 10 3:15 pm
Aug 04 10 5:54 pm
logan wrote:I don't know of any programs that would be able to do this, so I'm writing a simple program that will read the log file, decode the actual packet info and then filter out packets with the RST flag or RST and ACK flags. I'll send you a copy when it's working.
Aug 10 10 1:41 am
Apr 03 11 10:20 pm
Apr 04 11 1:09 pm
Apr 04 11 10:42 pm
adrien wrote:You are correct. When using ENS policy, the policy is applied in the WinGate engine once the engine is notified that there is a new connection made.
If the connection is disallowed by ENS policy, then the connection is terminated.
By this stage, the initial packet has already been forwarded.
Apr 04 11 11:50 pm
Apr 05 11 5:14 am