Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 9088
  • Last Modified:

Sonicwall - NSA 2400 TCP Handshake Violation

Good morning,
I have a Sonciwall NSA 2400 with multiple Sub Interfaces/VLAN's.  One of these VLAN's hosts an WIN2K8 RDS Server.  When users logon and try to access the internet, loads of the below errors get logged on the Sonicwall.  The users web connections never resolve properly.  

We have tried.

 1.  Turning off TCP timeout.
 2.  Disable Content Filtering


Any ideas?

1      11/04/2013 11:11:21.384      Debug      Network      TCP packet received on non-existent/closed connection; TCP packet dropped      20.0.201.8, 51782, X2:V201      207.240.254.97, 443, X1      TCP Flag(s): ACK              
2      11/04/2013 11:10:21.192      Debug      Network      TCP packet received on non-existent/closed connection; TCP packet dropped      20.0.201.8, 51746, X2:V201      207.240.254.97, 443, X1      TCP Flag(s): ACK              
3      11/04/2013 11:08:51.704      Debug      Network Access      Broadcast packet dropped      20.0.201.8, 0, X2:V201      20.0.201.255, 20584      Protocol:137              
4      11/04/2013 11:05:56.128      Notice      Network Access      TCP handshake violation detected; TCP connection dropped      20.0.201.8, 51604, X2:V201      192.168.0.23, 8059, X1      Handshake Timeout              
5      11/04/2013 11:05:43.880      Debug      Network Access      Broadcast packet dropped      20.0.201.8, 0, X2:V201      20.0.201.255, 20584      Protocol:137              
6      11/04/2013 11:04:51.160      Notice      Network Access      TCP handshake violation detected; TCP connection dropped      20.0.201.8, 51563, X2:V201      192.168.20.27, 445, X1      Handshake Timeout              
7      11/04/2013 11:04:39.544      Debug      Network      TCP packet received on non-existent/closed connection; TCP packet dropped      20.0.201.8, 51316, X2:V201      143.166.83.190, 80, X1      TCP Flag(s): ACK              
8      11/04/2013 11:03:01.112      Notice      Network Access      TCP handshake violation detected; TCP connection dropped      20.0.201.8, 51499, X2:V201      192.168.0.23, 8059, X1      Handshake Timeout              
9      11/04/2013 11:02:59.144      Debug      Network      TCP packet received on non-existent/closed connection; TCP packet dropped      20.0.201.8, 51449, X2:V201      64.18.20.10, 80, X1      TCP Flag(s): ACK
0
GeminiTechnology
Asked:
GeminiTechnology
  • 2
1 Solution
 
Blue Street TechLast KnightsCommented:
Hi GeminiTechnology,

What is the SonicOS firmware version? (you most likely need to upgrade your firmware)
Have you performed any hardening on the security appliance?
What type of WAN connection is being used?

This Log message is displayed when the SonicWALL firewall receives a TCP packet after a particular connection was closed.

This is a generic error message as there are a number of root causes that can create this error. For example: A packet was delayed in transition for some reason and reaches the SonicWALL after the connection was closed. The SonicWALL Firewall drops the packet and logs the message.

Login to the SonicWALL and go to Firewall Settings > Flood Protection then match the following settings:
Under TCP Settings
• Enforce strict TCP compliance with RFC 793 and RFC 1122: Uncheck
        • Enable TCP handshake enforcement: Uncheck
• Enable TCP checksum enforcement: Uncheck
• Enable TCP handshake timeout: Uncheck
Layer 3 SYN Flood Protection - SYN Proxy
• SYN Flood Protection Mode: select Watch and report possible SYN floods
Then re-test with new connections (terminating the old ones by closing the browsers).

If that still fails to resolve, follow below:
Increase the Inactivity timeout of the rules on the SonicWALL.
VPN tunnels: You may need to increase activity timeout on the LAN to VPN as well as the VPN to LAN rule to avoid timeout conditions.
Make sure the upstream device, source and destination computers connecting to each other do not have latency.

Let me know how it goes and please answer the above questions in the interim.
Thanks!
0
 
GeminiTechnologyAuthor Commented:
Thank you!
0
 
Blue Street TechLast KnightsCommented:
You're welcome! Glad I could help...thanks for the points!
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now