?
Solved

TCP Reset-I

Posted on 2006-06-12
9
Medium Priority
?
6,960 Views
Last Modified: 2013-11-29
Can anyone tell me what I means other than Internal in regads to TCP reset?
0
Comment
Question by:awakenings
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
9 Comments
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16887704
Are you referring to resetting the TCP/IP stack for your operating system? If so it means resetting to the defaults, or original configuration at the time of the installation of the operating system. It is done by running at a command line:
netsh  int  ip  reset  c:\log.txt
0
 

Author Comment

by:awakenings
ID: 16888237
I have been seeing this in syslog.
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16889378
Could you provide a little more information? Do you mean Syslog as in a firewall log, or the Windows Event viewer under system? Could you provide the full message, and event or error number as well.
Thanks.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:awakenings
ID: 16890215
Rob... Thanks for your patience.  I am just getting back to this.  It has been a hectic day and I've been pulled in too many different directions.

     I am looking at Firewall logs.  The relavant portion of the log (sanitized of course) is;

Teardown TCP connection ######### faddr 10.10.10.10/80 gaddr 10.10.10.11/2964 laddr 10.10.10.11/2964 duration 0:01:40 bytes ####### (TCP Reset-I)

     I've seen the multiple times.   It is a small part of a larger troublshooting issue.

Thanks,

Awakenings
0
 
LVL 77

Accepted Solution

by:
Rob Williams earned 750 total points
ID: 16891028
Sorry but I am not  familiar with that log entry so did a little reading. To give credit where it is due see the following link. Very thorough explanation by TheeGreatCornholio:
http://www.firewall.cx/ftopicp-11301.html
0
 

Author Comment

by:awakenings
ID: 16897119
Ah... Input verses output.  That is very easy.  It is just the location on the network device - inside or outside.  The reset portion I already understood.  Thanks....
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16897165
Inside or outside, or as they correct and say actually high security side and low security side.

Thanks awakenings,
--Rob
0
 

Author Comment

by:awakenings
ID: 16897291
Rob,  It is only high and low if ASA is involved and on a PIX I believe.  I may be wrong though.
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 16897354
You are likely quite right. You are outside my field of expertise, which is very small. :-)  I was referring to the Pix though, as I haven't seen those result on my firewalls.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question