TCP RESET in windows server 2016
Hi Team, Server is sending TCP reset frequently and not sure the reason. we use windows server 2016 + windows NLB and it is vmnet3 network adapter of vmware. Please find the capture logs from client machine
No. Time Delta DeltaTCPCon DeltaFrom1stFrame Source Destination Protocol TTL Seq No Next Seq No ACK No TCP Len Source Port Dest Port Identification Info
27944 2021-02-23 08:05:33.072669 1.188323000 0.000000000 0.000000000 CLIENT SERVER TCP 64 0 1 0 0 40656 (40656) https (443) 0x32c4 (12996) 40656 → https(443) [SYN] Seq=0 Win=29200 Len=0 MSS=1460 SACK_PERM=1 TSval=1497627054 TSecr=0 WS=128
27945 2021-02-23 08:05:33.073133 0.000464000 0.000464000 0.000464000 SERVER CLIENT TCP 128 0 1 1 0 https (443) 40656 (40656) 0x2791 (10129) https(443) → 40656 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1 TSval=1487099916 TSecr=1497627054
27946 2021-02-23 08:05:33.073178 0.000045000 0.000045000 0.000509000 CLIENT SERVER TCP 64 1 1 1 0 40656 (40656) https (443) 0x32c5 (12997) 40656 → https(443) [ACK] Seq=1 Ack=1 Win=29312 Len=0 TSval=1497627054 TSecr=1487099916
27947 2021-02-23 08:05:33.073951 0.000773000 0.000773000 0.001282000 CLIENT SERVER TLSv1.2 64 1 208 1 207 40656 (40656) https (443) 0x32c6 (12998) Client Hello
27948 2021-02-23 08:05:33.096190 0.022239000 0.022239000 0.023521000 SERVER CLIENT TCP 128 1 1449 208 1448 https (443) 40656 (40656) 0x2792 (10130) https(443) → 40656 [ACK] Seq=1 Ack=208 Win=2108160 Len=1448 TSval=1487099939 TSecr=1497627055 [TCP segment of a reassembled PDU]
27949 2021-02-23 08:05:33.096257 0.000067000 0.000067000 0.023588000 CLIENT SERVER TCP 64 208 208 1449 0 40656 (40656) https (443) 0x32c7 (12999) 40656 → https(443) [ACK] Seq=208 Ack=1449 Win=32128 Len=0 TSval=1497627078 TSecr=1487099939
27950 2021-02-23 08:05:33.096295 0.000038000 0.000038000 0.023626000 SERVER CLIENT TCP 128 1449 2897 208 1448 https (443) 40656 (40656) 0x2793 (10131) https(443) → 40656 [ACK] Seq=1449 Ack=208 Win=2108160 Len=1448 TSval=1487099939 TSecr=1497627055 [TCP segment of a reassembled PDU]
27951 2021-02-23 08:05:33.096306 0.000011000 0.000011000 0.023637000 CLIENT SERVER TCP 64 208 208 2897 0 40656 (40656) https (443) 0x32c8 (13000) 40656 → https(443) [ACK] Seq=208 Ack=2897 Win=35072 Len=0 TSval=1497627078 TSecr=1487099939
27952 2021-02-23 08:05:33.096308 0.000002000 0.000002000 0.023639000 SERVER CLIENT TLSv1.2 128 2897 3785 208 888 https (443) 40656 (40656) 0x2794 (10132) Server Hello, Certificate, Server Key Exchange, Server Hello Done
27953 2021-02-23 08:05:33.096315 0.000007000 0.000007000 0.023646000 CLIENT SERVER TCP 64 208 208 3785 0 40656 (40656) https (443) 0x32c9 (13001) 40656 → https(443) [ACK] Seq=208 Ack=3785 Win=37888 Len=0 TSval=1497627078 TSecr=1487099939
27954 2021-02-23 08:05:33.104173 0.007858000 0.007858000 0.031504000 CLIENT SERVER TLSv1.2 ...
Is it one client or many that have this issue?
Many of the client have this issue but all intermittent. It doesn't happen always...
There is no packet drop or firewall block at client and sever level but not sure what happened..
It looks good right up till it isn't (server sends RST).
(Makes it through Step 7. in Establishing a Secure Session by Using TLS)
Are you getting schannel events in the Windows logs? Maybe increase the logging.
If you can share a packet capture it makes it easier to peer inside the back and forth of TLS.
Thank you for your inputs.. let me check the above details.
In TCP RST,ACK packet wireshark warning says "group" 'sequence".
The User's Guide has a section on Expert Info entries.
It's possible to Customize the Wireshark Expert to reduce the serverity of RST.