I am getting the follwong message in our PIX log: 2006-07-14 11:44:28 Local4.Info 192.168.12.9 %PIX-6-302014: Teardown TCP connection 52170120 for dmz1:192.168.*.*/64894 to inside:192.168.*.*/25 duration 0:00:00 bytes 0 TCP Reset-I. I know that the -I in the TCP Reset tells me that it is from the inside but inside what. This traffic is between the DMZ and inside interfacces, can I tell what direction the reset came from?
The duplication was an accident, sorry for the inconveince. I would appreciate your opinion, I havent recieved an answer to my question. Since the PIX only will report Reset-I or Reset-O what will it report when the reset comes from a DMZ?
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...