Solved

Checking for half open connections

Posted on 2004-08-08
8
2,129 Views
Last Modified: 2007-12-19
Hi,

This is really an extension of my previous post. I managed to track down the issue behind high cpu utilization, which was indeed caused by a worm. The worm caused a lot of hosts to open and terminate connections to our servers, leaving them in the TIME_WAIT state. Some hosts had opened thousands of connections to the servers.

How do I track down these half-closed connections on the firewall? A "show conn " gives out a lot of detail. What do I need to look for?

Second question.

While I was trying to track down the infected hosts using a sniffer, a vendor suggested that I use the MSFC on the core switch as a source and filter it on the specific VLAN. How is this different from port mirroring?

The commands I used were

MSFC sniffing ----> set span (msfc) (destination port) filter (vlan_number)
Port sniffing   ----> set span (vlan_number) (destination port)

Each of these methods threw up a completely different set of statistics. What is the difference?
0
Comment
Question by:fullerms
  • 3
  • 2
8 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 20 total points
ID: 11750291
any statefull inspection firewall should manage this automatically, or better give some options like timeouts to close them.
On the other side, it depends on the implementation of your TCP/IP stack on the effected server how it handles such sockets, most likely the OS provides a timeout for such sockets in TIME_WAIT state too.
0
 
LVL 6

Author Comment

by:fullerms
ID: 11750479
Agreed. The firewall does have timeouts values for half open connections.

My question is, how do I check for half open connections on the firewall? At any given point of time, the firewall is handling 3 times the normal number of connections. We need information on half open connections to track down the offending IPs. How do I go about this?
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 11751154
> ..  how do I check for half open connections on the firewall?
read your docs of the firewall. There is no general answer, it's specific to your firewall.
0
Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

 
LVL 6

Author Comment

by:fullerms
ID: 11751563
The firewall is a Cisco Pix v 6.3(3).
0
 
LVL 6

Author Comment

by:fullerms
ID: 15898269
I wouldn't like to be called a miser, but I feel that a refund would be more appropriate. I did not get the answer that could have helped me.
0
 
LVL 20

Expert Comment

by:Venabili
ID: 15898337
You were pointed in the right direction what to read. You never said if you checked your documentation...
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
BSODs from ntoskrnl.exe and fltmgr.sys 4 72
Fortinet FWs backdoor vulnerability 3 87
VPN running on Windows 2008 Server 11 80
firewall inside of network 9 73
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now