Eugene, snippet from
http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_i2.html

The following example shows a possible message that can be displayed when
packets are dropped:

*Sep 9 19:56:28.699: %FW-6-DROP_PKT: Dropping tcp pkt 17.2.2.1:0 =>
19.2.2.1:0 with ip
ident 229 due to Invalid Header length


 *Sep 9 20:30:47.839: %FW-6-DROP_TCP_PKT: Dropping tcp pkt
17.2.2.1:42829 => 19.2.2.1:80
due to SYN pkt with illegal flags -- ip ident 23915 tcpflags 40962
seq.no 3928613134 ack 0


 *Sep 10 00:30:24.931: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 17.2.2.1:45771 =>


 19.2.2.1:80 due to SYN with data or with PSH/URG flags -- ip ident
55001 tcpflags 40962 seq.no 2232798685 ack 0


 *Aug 29 21:57:16.895: %FW-6-DROP_PKT: Dropping tcp pkt 17.2.2.1:51613
=> 19.2.2.1:80 due
to Out-Of-Order Segment


 Table 
35<http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_i2.html#wp1048937>describes
messages that occur when packets are dropped.


Table 35 ip inspect log drop-pkt Messages
  Field
 Description

Invalid Header length

The datagram is so small that it could not contain the layer 4 TCP,
Universal Computer Protocol (UCP), or Internet Control Message Protocol
(ICMP) header.

Police rate limiting

Rate limiting is enabled, and the packet in question has exceeded the rate
limit.

Session limiting

Session limiting is on, and the session count exceeds the configured
session threshold.

Bidirectional traffic disabled

Session is unidirectional and the firewall is seeing packets in the other
direction and dropping the session.

SYN with data or with PSH/URG flags

TCP SYN packet is seen with data.

Segment matching no TCP connection

Non-initial TCP segment is received without a valid session.

Invalid Segment

There is an invalid TCP segment.

Invalid Seq#

The packet contains an invalid TCP sequence number.

Invalid Ack (or no Ack)

The packet contains an invalid TCP acknowledgement number.

Invalid Flags

Flags in a TCP segment are invalid.

Invalid Checksum

There is an invalid TCP checksum.

SYN inside current window

A synchronization packet is seen within the window of an already
established TCP connection.

RST inside current window

A reset (RST) packet is observed within the window of an already
established TCP connection.

Out-Of-Order Segment

The packets in a segment are out of order.

Retransmitted Segment with Invalid Flags

A retransmitted packet was already acknowledged by the receiver.

Stray Segment

A TCP segment is received that should not have been received through the
TCP state machine such as a TCP SYN packet being received in the listen
state.

Internal Error

The TCP state machine that is maintained by the firewall encounters an
internal error.

Invalid Window scale option

The responder on one side of a firewall proposes an illegal window scale
option. The window scale option is illegal in this case because the
initiating side did not propose the option first.

Invalid TCP options

The options in the TCP header are not TCP protocol compliant.

With regards
Kings
CCNA,CCSP,CCNP,CCIP,CCIE #35914 (Security)

On Wed, Aug 1, 2012 at 11:02 AM, Eugene Pefti <eug...@koiossystems.com>wrote:

>  Hi Kings,
> In this case these packets should be different from packets dropped by ACL
> ?
> Can you please give me an example of the packet that is dropped by CBAC
> and reported by "FW-6-DROP_PKT".
> I remember there's a table somewhere at Cisco docs with specific
> conditions qualifying to drop.
> I just want to simulate and confirm that I can see events generated by FW
> for dropped packets.
>
>  Eugene
>
>   From: Kingsley Charles <kingsley.char...@gmail.com>
> Date: Tuesday, July 31, 2012 10:24 PM
> To: Eugene Pefti <eug...@koiossystems.com>
> Cc: "ccie_security@onlinestudylist.com" <ccie_security@onlinestudylist.com
> >
> Subject: Re: [OSL | CCIE_Security] "ip inspect log drop-pkt" doesn't have
> any effect in CBAC
>
>   It informs the packets dropped by CBAC.
>
>
>  With regards
> Kings
> CCNA,CCSP,CCNP,CCIP,CCIE #35914 (Security)
>
>
> On Tue, Jul 31, 2012 at 5:13 PM, Eugene Pefti <eug...@koiossystems.com>wrote:
>
>>  Folks,****
>>
>> Has someone had any use of the above said command while having CBAC
>> firewall?****
>>
>> I expected it to show me dropped packets that are not allowed inbound but
>> the router was silent until I add “log” option to the incoming ACL.****
>>
>> On the other hand it works good in ZFW:****
>>
>> ** **
>>
>> Jul 31 10:31:48.122: %FW-6-DROP_PKT: Dropping Unknown-l7 session
>> 200.13.111.12:52818 200.13.25.2:23 on zone-pair INSIDE-OUTSIDE class
>> class-default due to  DROP action found in policy-map with ip ident 0****
>>
>> ** **
>>
>> Eugene****
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>> Are you a CCNP or CCIE and looking for a job? Check out
>> www.PlatinumPlacement.com
>>
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to