mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
Add periods to alt text
No other changes
This commit is contained in:
@ -44,17 +44,17 @@ If the initial TCP handshake is failing because of packet drops, then you would
|
||||
|
||||
Source side connecting on port 445:
|
||||
|
||||

|
||||

|
||||
|
||||
Destination side: applying the same filter, you do not see any packets.
|
||||
|
||||

|
||||

|
||||
|
||||
For the rest of the data, TCP will retransmit the packets five times.
|
||||
|
||||
**Source 192.168.1.62 side trace:**
|
||||
|
||||

|
||||

|
||||
|
||||
**Destination 192.168.1.2 side trace:**
|
||||
|
||||
@ -79,15 +79,15 @@ In the below screenshots, you see that the packets seen on the source and the de
|
||||
|
||||
**Source Side**
|
||||
|
||||

|
||||

|
||||
|
||||
**On the destination-side trace**
|
||||
|
||||

|
||||

|
||||
|
||||
You also see an ACK+RST flag packet in a case when the TCP establishment packet SYN is sent out. The TCP SYN packet is sent when the client wants to connect on a particular port, but if the destination/server for some reason does not want to accept the packet, it would send an ACK+RST packet.
|
||||
|
||||

|
||||

|
||||
|
||||
The application that's causing the reset (identified by port numbers) should be investigated to understand what is causing it to reset the connection.
|
||||
|
||||
@ -110,8 +110,8 @@ auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:enable /fai
|
||||
|
||||
You can then review the Security event logs to see for a packet drop on a particular port-IP and a filter ID associated with it.
|
||||
|
||||

|
||||

|
||||
|
||||
Now, run the command `netsh wfp show state`, this will generate a wfpstate.xml file. After you open this file and filter for the ID that you find in the above event (2944008), you'll be able to see a firewall rule name that's associated with this ID that's blocking the connection.
|
||||
|
||||

|
||||

|
||||
|
Reference in New Issue
Block a user