Hi forum,
I have a problem with a PIX 525. It is configured with an interface acting as a DMZ (called dmz_wan) where all traffic is permitted and no translation between this interface and the inside interface.
There is an application server in inside (192.168.0.16) listening at port 211/tcp.
The problem is that sometimes the client side located on the DMZ interface (192.168.2.126) drops the connection without a logical reason for that. (no rules involved directly)
I've installed a syslog and the message that appears related to that is the following:
<166>:Mar 16 12:54:34 CEST: %PIX-6-106015: Deny TCP (no connection) from 192.168.2.126/1447 to 192.168.0.16/211 flags PSH ACK on interface dmz_wan
This application is crucial. Is there a way to bypass this drop action or does anybody know if I need to reconfigure something (fixup, timeouts, tcp options or something like that)?
Bear in mind that this DMZ is a trusted zone so if I have to 'low' the level of security is not a problem for now.
Thanks in advance, guys
I have a problem with a PIX 525. It is configured with an interface acting as a DMZ (called dmz_wan) where all traffic is permitted and no translation between this interface and the inside interface.
There is an application server in inside (192.168.0.16) listening at port 211/tcp.
The problem is that sometimes the client side located on the DMZ interface (192.168.2.126) drops the connection without a logical reason for that. (no rules involved directly)
I've installed a syslog and the message that appears related to that is the following:
<166>:Mar 16 12:54:34 CEST: %PIX-6-106015: Deny TCP (no connection) from 192.168.2.126/1447 to 192.168.0.16/211 flags PSH ACK on interface dmz_wan
This application is crucial. Is there a way to bypass this drop action or does anybody know if I need to reconfigure something (fixup, timeouts, tcp options or something like that)?
Bear in mind that this DMZ is a trusted zone so if I have to 'low' the level of security is not a problem for now.
Thanks in advance, guys