
11-7
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 11 Connection Settings
Configure Connection Settings
Customize Abnormal TCP Packet Handling (TCP Maps, TCP Normalizer)
The TCP Normalizer identifies abnormal packets that the ASA can act on when they are detected; for
example, the ASA can allow, drop, or clear the packets. TCP normalization helps protect the ASA from
attacks. TCP normalization is always enabled, but you can customize how some features behave.
The default configuration includes the following settings:
no check-retransmission
no checksum-verification
exceed-mss allow
queue-limit 0 timeout 4
reserved-bits allow
syn-data allow
synack-data drop
invalid-ack drop
seq-past-window drop
tcp-options range 6 7 clear
tcp-options range 9 255 clear
tcp-options selective-ack allow
tcp-options timestamp allow
tcp-options window-scale allow
ttl-evasion-protection
urgent-flag clear
window-variation allow-connection
To customize the TCP normalizer, first define the settings using a TCP map. Then, you can apply the
map to selected traffic classes using service policies.
Procedure
Step 1
Create a TCP map to specify the TCP normalization criteria that you want to look for.
hostname(config)#
tcp-map
tcp-map-name
Step 2
Configure the TCP map criteria by entering one or more of the following commands. The defaults are
used for any commands you do not enter. Use the
no
form of a command to disable the setting.
•
check-retransmission
—Prevent inconsistent TCP retransmissions. This command is disabled by
default.
•
checksum-verification
—Verify the TCP checksum, dropping packets that fail verification. This
command is disabled by default.
•
exceed-mss
{
allow
|
drop
}—Allow or drop packets whose data length exceeds the TCP maximum
segment size. The default is to allow the packets.
•
invalid-ack
{
allow
|
drop
}—Allow or drop packets with an invalid ACK. The default is to drop the
packet, with the exception of WAAS connections, where they are allowed. You might see invalid
ACKs in the following instances:
–
In the TCP connection SYN-ACK-received status, if the ACK number of a received TCP packet
is not exactly the same as the sequence number of the next TCP packet sending out, it is an
invalid ACK.
–
Whenever the ACK number of a received TCP packet is greater than the sequence number of
the next TCP packet sending out, it is an invalid ACK.
Summary of Contents for ASA 5512-X
Page 5: ...P A R T 1 Service Policies and Access Control ...
Page 6: ......
Page 51: ...P A R T 2 Network Address Translation ...
Page 52: ......
Page 127: ...P A R T 3 Application Inspection ...
Page 128: ......
Page 255: ...P A R T 4 Connection Settings and Quality of Service ...
Page 256: ......
Page 303: ...P A R T 5 Advanced Network Protection ...
Page 304: ......
Page 339: ...P A R T 6 ASA Modules ...
Page 340: ......