16-8
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 16 Connection Settings
Configure Connection Settings
•
queue-limit
pkt_num
[
timeout
seconds
]—Set the maximum number of out-of-order packets that
can be buffered and put in order for a TCP connection, between 1 and 250 packets. The default is 0,
which means this setting is disabled and the default system queue limit is used depending on the
type of traffic:
–
Connections for application inspection (the
inspect
command), IPS (the
ips
command), and
TCP check-retransmission (the TCP map
check-retransmission
command) have a queue limit
of 3 packets. If the ASA receives a TCP packet with a different window size, then the queue
limit is dynamically changed to match the advertised setting.
–
For other TCP connections, out-of-order packets are passed through untouched.
If you set the
queue-limit
command to be 1 or above, then the number of out-of-order packets
allowed for all TCP traffic matches this setting. For example, for application inspection, IPS, and
TCP check-retransmission traffic, any advertised settings from TCP packets are ignored in favor of
the
queue-limit
setting. For other TCP traffic, out-of-order packets are now buffered and put in
order instead of passed through untouched.
The
timeout
seconds
argument sets the maximum amount of time that out-of-order packets can
remain in the buffer, between 1 and 20 seconds; if they are not put in order and passed on within the
timeout period, then they are dropped. The default is 4 seconds. You cannot change the timeout for
any traffic if the
pkt_num
argument is set to 0; you need to set the
limit
to be 1 or above for the
timeout
keyword to take effect.
•
reserved-bits
{
allow
|
clear
|
drop
}—Set the action for reserved bits in the TCP header. You can
allow
the packet (without changing the bits),
clear
the bits and allow the packet, or
drop
the packet.
•
seq-past-window
{
allow
|
drop
}—Set the action for packets that have past-window sequence
numbers, namely the sequence number of a received TCP packet is greater than the right edge of the
TCP receiving window. You can
allow
the packets only if the
queue-limit
command is set to 0
(disabled). The default is to drop the packets.
•
synack-data
{
allow
|
drop
}—Allow or drop TCP SYNACK packets that contain data. The default
is to drop the packet.
•
syn-data
{
allow
|
drop
}—Allow or drop SYN packets with data. The default is to allow the packet.
•
tcp-options
{
selective-ack
|
timestamp
|
window-scale
|
range
lower upper
} {
allow
|
clear
}—Set
the action for packets with TCP options. Three options are named:
selective-ack
(selective
acknowledgment mechanism),
timestamp
, and
window-scale
(window scale mechanism). For other
options, you specify them by number on the
range
keyword, where the range limits are 6-7, 9-255.
You can enter the command multiple times in a map to define your complete policy.
You can
allow
the packet (without changing the options),
clear
the options and allow the packet, or
drop
the packet. The default for the three named options is to allow them; the default for all other
options is to clear them. Note that clearing the timestamp option disables PAWS and RTT.
•
ttl-evasion-protection
—Protect against TTL evasion attacks. TTL evasion protection is enabled by
default, so you would only need to enter the
no
form of this command.
For example, an attacker can send a packet that passes policy with a very short TTL. When the TTL
goes to zero, a router between the ASA and the endpoint drops the packet. It is at this point that the
attacker can send a malicious packet with a long TTL that appears to the ASA to be a retransmission
and is passed. To the endpoint host, however, it is the first packet that has been received by the
attacker. In this case, an attacker is able to succeed without security preventing the attack.
•
urgent-flag
{
allow
|
clear
}—Set the action for packets with the URG flag. You can
allow
the
packet, or
clear
the flag and allow the packet. The default is to clear the flag.
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......