One of our customers have a 4240 IPS on which there is one inline pair and 2 promiscuous interfaces.
The inline pair is used between an internet router and a switch on which is connected a pair of ASAs.
The problem happens when we connect the inline pair, sudeenly and after a random period of time ranging from 2 to 4 hours, and although the upload trafic on the internet router is limited by the ISP to 500 Kbps, we see bursts of 6 Mbps and disconnection for the internet link
I have tried to set the virtual sensor inline-TCP-evasion-protection-mode to asymmetric instead of the default set to strict, I think this has solved the problem untill now( first day of monitoring) but I need to know how it resolved it??????
What does the asymmetric mode exactly do? ( Please provide additional information than the original documentation whihc is not very informative)
And how could it solve the problem in my case?
btw I'm using multiple virtual sensors for each of the inline pair and the rest of the two promiscuous interfaces
Unfortunately there is always trade-off between security vs performance.
By turning the inline-TCP-evasion-protection-mode to asymmetric, it is essentially turning off the TCP normalizer engine which leaves the network vulnerable to evasion techniques (specific to TCP protocol), ie: the 1300 range signatures.
There are possibilities that those TCP traffic does not comply to normal TCP standard, and it is being picked up by the normalizer engine, and they are either being dropped, OR/ due to the nature of "strict" mode, it waited for the ACK before it performs the inspection hence the burst of traffic.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...