Solved

TCP Reset-I

Posted on 2006-06-12
9
6,957 Views
Last Modified: 2013-11-29
Can anyone tell me what I means other than Internal in regads to TCP reset?
0
Comment
Question by:awakenings
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
9 Comments
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16887704
Are you referring to resetting the TCP/IP stack for your operating system? If so it means resetting to the defaults, or original configuration at the time of the installation of the operating system. It is done by running at a command line:
netsh  int  ip  reset  c:\log.txt
0
 

Author Comment

by:awakenings
ID: 16888237
I have been seeing this in syslog.
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16889378
Could you provide a little more information? Do you mean Syslog as in a firewall log, or the Windows Event viewer under system? Could you provide the full message, and event or error number as well.
Thanks.
0
Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

 

Author Comment

by:awakenings
ID: 16890215
Rob... Thanks for your patience.  I am just getting back to this.  It has been a hectic day and I've been pulled in too many different directions.

     I am looking at Firewall logs.  The relavant portion of the log (sanitized of course) is;

Teardown TCP connection ######### faddr 10.10.10.10/80 gaddr 10.10.10.11/2964 laddr 10.10.10.11/2964 duration 0:01:40 bytes ####### (TCP Reset-I)

     I've seen the multiple times.   It is a small part of a larger troublshooting issue.

Thanks,

Awakenings
0
 
LVL 77

Accepted Solution

by:
Rob Williams earned 250 total points
ID: 16891028
Sorry but I am not  familiar with that log entry so did a little reading. To give credit where it is due see the following link. Very thorough explanation by TheeGreatCornholio:
http://www.firewall.cx/ftopicp-11301.html
0
 

Author Comment

by:awakenings
ID: 16897119
Ah... Input verses output.  That is very easy.  It is just the location on the network device - inside or outside.  The reset portion I already understood.  Thanks....
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16897165
Inside or outside, or as they correct and say actually high security side and low security side.

Thanks awakenings,
--Rob
0
 

Author Comment

by:awakenings
ID: 16897291
Rob,  It is only high and low if ASA is involved and on a PIX I believe.  I may be wrong though.
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16897354
You are likely quite right. You are outside my field of expertise, which is very small. :-)  I was referring to the Pix though, as I haven't seen those result on my firewalls.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question