Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

TCP Reset-I

Posted on 2006-06-12
9
Medium Priority
?
6,964 Views
Last Modified: 2013-11-29
Can anyone tell me what I means other than Internal in regads to TCP reset?
0
Comment
Question by:awakenings
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
9 Comments
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16887704
Are you referring to resetting the TCP/IP stack for your operating system? If so it means resetting to the defaults, or original configuration at the time of the installation of the operating system. It is done by running at a command line:
netsh  int  ip  reset  c:\log.txt
0
 

Author Comment

by:awakenings
ID: 16888237
I have been seeing this in syslog.
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16889378
Could you provide a little more information? Do you mean Syslog as in a firewall log, or the Windows Event viewer under system? Could you provide the full message, and event or error number as well.
Thanks.
0
 [eBook] Windows Nano Server

Download this FREE eBook and learn all you need to get started with Windows Nano Server, including deployment options, remote management
and troubleshooting tips and tricks

 

Author Comment

by:awakenings
ID: 16890215
Rob... Thanks for your patience.  I am just getting back to this.  It has been a hectic day and I've been pulled in too many different directions.

     I am looking at Firewall logs.  The relavant portion of the log (sanitized of course) is;

Teardown TCP connection ######### faddr 10.10.10.10/80 gaddr 10.10.10.11/2964 laddr 10.10.10.11/2964 duration 0:01:40 bytes ####### (TCP Reset-I)

     I've seen the multiple times.   It is a small part of a larger troublshooting issue.

Thanks,

Awakenings
0
 
LVL 77

Accepted Solution

by:
Rob Williams earned 750 total points
ID: 16891028
Sorry but I am not  familiar with that log entry so did a little reading. To give credit where it is due see the following link. Very thorough explanation by TheeGreatCornholio:
http://www.firewall.cx/ftopicp-11301.html
0
 

Author Comment

by:awakenings
ID: 16897119
Ah... Input verses output.  That is very easy.  It is just the location on the network device - inside or outside.  The reset portion I already understood.  Thanks....
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16897165
Inside or outside, or as they correct and say actually high security side and low security side.

Thanks awakenings,
--Rob
0
 

Author Comment

by:awakenings
ID: 16897291
Rob,  It is only high and low if ASA is involved and on a PIX I believe.  I may be wrong though.
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16897354
You are likely quite right. You are outside my field of expertise, which is very small. :-)  I was referring to the Pix though, as I haven't seen those result on my firewalls.
0

Featured Post

Plesk WordPress Toolkit

Plesk's WordPress Toolkit allows server administrators, resellers and customers to manage their WordPress instances, enabling a variety of development workflows for WordPress admins of all skill levels, from beginners to pros.

See why 2/3 of Plesk servers use it.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Make the most of your online learning experience.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question