Solved

Checking for half open connections

Posted on 2004-08-08
8
2,148 Views
Last Modified: 2007-12-19
Hi,

This is really an extension of my previous post. I managed to track down the issue behind high cpu utilization, which was indeed caused by a worm. The worm caused a lot of hosts to open and terminate connections to our servers, leaving them in the TIME_WAIT state. Some hosts had opened thousands of connections to the servers.

How do I track down these half-closed connections on the firewall? A "show conn " gives out a lot of detail. What do I need to look for?

Second question.

While I was trying to track down the infected hosts using a sniffer, a vendor suggested that I use the MSFC on the core switch as a source and filter it on the specific VLAN. How is this different from port mirroring?

The commands I used were

MSFC sniffing ----> set span (msfc) (destination port) filter (vlan_number)
Port sniffing   ----> set span (vlan_number) (destination port)

Each of these methods threw up a completely different set of statistics. What is the difference?
0
Comment
Question by:fullerms
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
8 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 20 total points
ID: 11750291
any statefull inspection firewall should manage this automatically, or better give some options like timeouts to close them.
On the other side, it depends on the implementation of your TCP/IP stack on the effected server how it handles such sockets, most likely the OS provides a timeout for such sockets in TIME_WAIT state too.
0
 
LVL 6

Author Comment

by:fullerms
ID: 11750479
Agreed. The firewall does have timeouts values for half open connections.

My question is, how do I check for half open connections on the firewall? At any given point of time, the firewall is handling 3 times the normal number of connections. We need information on half open connections to track down the offending IPs. How do I go about this?
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 11751154
> ..  how do I check for half open connections on the firewall?
read your docs of the firewall. There is no general answer, it's specific to your firewall.
0
Forrester Webinar: xMatters Delivers 261% ROI

Guest speaker Dean Davison, Forrester Principal Consultant, explains how a Fortune 500 communication company using xMatters found these results: Achieved a 261% ROI, Experienced $753,280 in net present value benefits over 3 years and Reduced MTTR by 91% for tier 1 incidents.

 
LVL 6

Author Comment

by:fullerms
ID: 11751563
The firewall is a Cisco Pix v 6.3(3).
0
 
LVL 6

Author Comment

by:fullerms
ID: 15898269
I wouldn't like to be called a miser, but I feel that a refund would be more appropriate. I did not get the answer that could have helped me.
0
 
LVL 20

Expert Comment

by:Venabili
ID: 15898337
You were pointed in the right direction what to read. You never said if you checked your documentation...
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
exact syntax to permit ipfilter rules in Solaris 10 x86 2 72
SRX240 SYSLOG Setting 6 136
Which the best UTM recommended ? 2 140
IP Address white listing in Windows Firewall 5 65
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question