Moderator: Qbik Staff
Wingate firewall hit report:
Time: 14/07/10 10:10:00
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 217.73.200.219 : 80
Destination IP Address: 192.168.200.41 : 3976
Protocol: TCP
TCP flags: R
Time-to-live: 254
Wingate firewall hit report:
Time: 14/07/10 10:12:18
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 198.133.219.10 : 443
Destination IP Address: 192.168.200.41 : 2384
Protocol: TCP
TCP flags: R
Time-to-live: 254
Wingate firewall hit report:
Time: 14/07/10 10:12:22
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 72.163.4.161 : 443
Destination IP Address: 192.168.200.41 : 2343
Protocol: TCP
TCP flags: R
Time-to-live: 225
Wingate firewall hit report:
Time: 14/07/10 10:13:05
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 217.212.252.192 : 80
Destination IP Address: 192.168.200.41 : 2362
Protocol: TCP
TCP flags: R
Time-to-live: 254
Wingate firewall hit report:
Time: 14/07/10 18:38:36
Reason: Port Range
Source MAC address: 00-26-0B-6B-B1-73
Destination MAC address: 00-10-B5-F8-13-DD
Source IP Address: 195.222.17.41 : 80
Destination IP Address: 192.168.200.41 : 2195
Protocol: TCP
TCP flags: RA
Time-to-live: 40
Now, can we somehow remove this packets from the blocked list or (which is much correct) make Cisco to drop them?
Being more precise, what is the default TCP connection timeout (I'll try to find a way to set it {minus 2-3sec} on the border router)?
logan wrote:Well, these blocked packets aren't really in error, so WinGate is correct to record them. I haven't used WG6 for a while, but I'll have a look later today and see if you can disable these warnings.
logan wrote:I know that juniper routers have an option called "TCP RST Invalidate Session Immediately" which causes sessions to be closed immediately when an RST packet is received. It sounds like something similar might be enabled on the path of these sessions (probably on the remote side if WinGate is getting the warnings). If your local Cisco has an option like this, try toggling it, which may cause it to deal with extraneous R / RA packets itself.
logan wrote:I know that juniper routers have an option called "TCP RST Invalidate Session Immediately" which causes sessions to be closed immediately when an RST packet is received. It sounds like something similar might be enabled on the path of these sessions (probably on the remote side if WinGate is getting the warnings). If your local Cisco has an option like this, try toggling it, which may cause it to deal with extraneous R / RA packets itself.
Alen wrote:Logan, yesterday I understand that the best variant would be to increase wait time for R and RA packets of closed sessions in Wingate (or OS?). Is it possible?
logan wrote:The more I think about it, the more it seems that the only way this can really be resolved is to get the Cisco to invalidate the sessions immediately, and therefore block the packets responding to a closed session itself.
logan wrote:I noted from your first post that you check WinGate's firewall daily as part of your security policy/practice, so I'm guessing that you want to hide these packets to reduce the amount of insignificant noise in the firewall tab.
logan wrote:That being the case, there may be an alternate solution to filtering the noise. Instead of reading the packets in the firewall tab, you could read them from the actual log file. The only hurdle is that the information about blocked packets is encoded so not very useful without first being decoded.
All that would be needed is a program that can parse the firewall log file, decode the blocked packet information, and then filter out the packets that you don't want to see. That's the tricky part.
logan wrote:I don't know of any programs that would be able to do this, so I'm writing a simple program that will read the log file, decode the actual packet info and then filter out packets with the RST flag or RST and ACK flags. I'll send you a copy when it's working.
adrien wrote:You are correct. When using ENS policy, the policy is applied in the WinGate engine once the engine is notified that there is a new connection made.
If the connection is disallowed by ENS policy, then the connection is terminated.
By this stage, the initial packet has already been forwarded.
Users browsing this forum: No registered users and 12 guests