I missed that IA comment, thnx.
[Expert@VSX-01:5]# enabled_blades
fw ips identityServer
But 'adlog a dc' in 'Connection state' gives solid 'has connection'
'cpwd_admin list' showing [21:25:48] 15/4/2015 for all processes which is time/day when I applied R77_20_jumbo_hf, 'top' is not bad since that time;) Will look again
But 'stickness' to specific source IP addresses bothers me the most
See below , I spoofed source IP (1) and it was dropped. And I spoofed another IP (2) and got response from server, magic ? Very repeatable.
1) #sudo nmap -e eth0 -Pn -S 10.29.121.88 10.94.7.211 -p 80
Code:
[Expert@VSX-01:5]# fw ctl zdebug drop | grep 10.29.121.88
;[vs_5];[tid_0];[fw4_0];fw_log_drop_ex: Packet proto=6 10.29.121.88:50352 -> 10.94.7.211:80 dropped by fw_filter_chain Reason: chain hold failed;
;[vs_5];[tid_0];[fw4_0];fw_log_drop_ex: Packet proto=6 10.29.121.88:50353 -> 10.94.7.211:80 dropped by fw_filter_chain Reason: chain hold failed;
2) # sudo nmap -e eth0 -Pn -S 10.29.121.244 10.94.7.211 -p 80
Code:
[Expert@VSX-01:5]# tcpdump -ni Lan5.373 host 10.29.121.244
07:41:27.889310 IP 10.29.121.244.59291 > 10.94.7.211.http: S 3853270289:3853270289(0) win 3072 <mss 1460>
07:41:27.889411 IP 10.94.7.211.http > 10.29.121.244.59291: S 3866447525:3866447525(0) ack 3853270290 win 8192 <mss 1460>
When looking at 'fw monitor' I can see only 'i' in the first case...
And $FWDIR/log/ is showing IA logs, but nothing interesting there. I am surprised these are present without running debug thou
Code:
[Expert@VSX-01:5]# ls -ltr $FWDIR/log/
-rw-rw-r-- 1 admin root 3002209 Apr 19 16:48 pdpd.elg
-rw-rw-r-- 1 admin root 5692894 Apr 19 16:58 pepd.elg
Bookmarks