Submit a ticketCall us

Have You Auto Renewed? If not, you're missing out.
The SolarWinds Renewal Program comes with a host of benefits including the most recent product updates, 24/7 technical support, virtual instructor-led training and more. Experience all of this with the convenience of Auto Renewal, and never worry about missing any of these great benefits. Learn More.

Home > Success Center > Netflow Traffic Analyzer (NTA) > How Netflow summaries of TCP RST packets are handled by NTA

How Netflow summaries of TCP RST packets are handled by NTA

Table of contents
Created by Daniel Polaske, last modified by Alexandra.Nerpasova on Oct 12, 2017

Views: 32 Votes: 0 Revisions: 8

Updated October 12, 2017

Overview

TCP RST is generated by the router firewall when the idle TCP session times out (1 hour by default) and thus are valid to have an ingress/source Interface index of '0', because they're locally self-generated packets originating in the Router's CPU, without a real 'interface'.  If it's a firewall RST injection packet, the source IP will be spoofed.

 

Environment

  • All Orion NTA environments

Detail

Please note, this behavior will cause NTA to drop the flows due to the SNMP interface index ID of 0, or due to a mismatching management IP address mapped between the node and source IP address (the spoofed address).

 

Suggested Tags:  TCP, TCP RST, RST, SNMP, interface, index, ID, 

 

Reason for Rework or Feedback from Technical Content Review:

 

 

Last modified

Tags

Classifications

Public