<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower communicating with private network? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5150091#M1114586</link>
    <description>&lt;P&gt;&lt;SPAN&gt;I will attach a photo copy but the plain and simple thing to it is an unknown private network probing just the firepower module and always the same domain port 53. It’s every 5 seconds round the clock, it’s two slight different 172.x.x.x IPs hitting it double time; as the photo shows&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jul 2024 15:38:03 GMT</pubDate>
    <dc:creator>Myleslandish</dc:creator>
    <dc:date>2024-07-24T15:38:03Z</dc:date>
    <item>
      <title>Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127548#M1113429</link>
      <description>&lt;P&gt;Hello, I’ve just redeployed my ASA5506x and noticed that I kept seeing an unfamiliar ip address popping up and with closer inspection it seems to be in direct communication with my firepower modules ip address. I don’t have nor know anyone near me that’s using the up address range of 172.22.4.33 or 172.17.4.33 but they both are clearly making/building connections and being granted access to the firepower module of the unit. If anyone has any suggestions on how to proceed please let me know. The two ip addresses are the only two that keep popping up and it isn’t occasional but constant filling up the syslog. It just started yesterday. Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2024 23:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127548#M1113429</guid>
      <dc:creator>Myleslandish</dc:creator>
      <dc:date>2024-06-08T23:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127610#M1113431</link>
      <description>&lt;P&gt;you can use the following commands:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sh conn address x.x.x.x detail&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sh local-host x.x.x.x all detail&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;this will give you more idea of where it is coming from and what ports.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;can you attach a snip of the syslog ? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;then you can take a packet capture on the ASA to dig further.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2024 06:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127610#M1113431</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-06-09T06:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127628#M1113432</link>
      <description>&lt;P&gt;The ASA5506x are gone EOL. Use ARP tables on the ASA5506x to see the MAC addresses of the devices associated with these IPs&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show arp
show arp | i x.x.x.x&lt;/LI-CODE&gt;
&lt;P&gt;Capture traffic using packet capture tools (e.g., Wireshark or tcpdump) to analyze&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;capture cap interface [interface_name] match ip host 172.22.4.33
capture cap interface [interface_name] match ip host 172.17.4.33
show capture cap
&lt;/LI-CODE&gt;
&lt;P&gt;you can also see the live syslog entries for these ip address to narrow down what are these IPs doing.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show logging | i 172.22.4.33&lt;/LI-CODE&gt;
&lt;P&gt;and you also use command&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show conn address 172.22.4.33 netmask 255.255.255.255&lt;/LI-CODE&gt;
&lt;P&gt;you can refer to this &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/sourcefire-firepower-8000-series-appliances/117778-technote-sourcefire-00.html" target="_self"&gt;Guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2024 09:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127628#M1113432</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-06-09T09:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127631#M1113433</link>
      <description>&lt;P&gt;Access to box or access through box ?&lt;/P&gt;
&lt;P&gt;Access to box you need to disable http in FTD or use control plane ACL&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2024 10:00:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127631#M1113433</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-09T10:00:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127642#M1113434</link>
      <description>&lt;P&gt;Since 172.16.0.0 through 172.31.255.255 are all private networks (not publicly routable), the connections must be originating somewhere on your internal network. If you are on a corporate network, they could be vulnerability scanners (authorized or unauthorized) that simply sweep through all reachable subnets periodically.&lt;/P&gt;
&lt;P&gt;In any case they should only be granted access if they present valid credentials. A TCP conneciton will occur if something tries, for instance, to open an ssh session but does not have valid credentials.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2024 11:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127642#M1113434</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-06-09T11:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127695#M1113438</link>
      <description>&lt;P&gt;not necessarily... many ISP backbones are all RFC1918... it could be a scan from them or a malicious host .. Also not all ISP do good&amp;nbsp; RFC1918 filtering inside their network (may do it at peering points) so technically you could have a TCP syn somehow make it and then the response may never get back.. i actually block out any rfc1918 from the outside interface and also put null routes as safeguard&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2024 18:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127695#M1113438</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-06-09T18:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127712#M1113439</link>
      <description>&lt;P&gt;Alright, if the issue is due to these IP addresses coming from the outside interface, then defining access-lists to deny them is a good solution. The ASA has an implicit deny rule, but if these IP addresses are reaching your Firepower module, it indicates that the access-list for the outside interface might not be configured properly. Remember, the ASA processes the packet first, and then the SFR module checks the packet.&lt;/P&gt;
&lt;P&gt;To address this, you can define access-lists to explicitly deny these IP addresses. Here’s how you can do it&lt;BR /&gt;Define access-lists to deny traffic from the IP addresses 172.22.4.33 and 172.17.4.33&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;access-list OUTSIDE_IN extended deny ip host 172.22.4.33 any
access-list OUTSIDE_IN extended deny ip host 172.17.4.33 any
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;Apply the access-list to the outside interface&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;access-group OUTSIDE_IN in interface outside
&lt;/LI-CODE&gt;
&lt;P&gt;monitoring the traffic to ensure that these IP addresses are being block&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show logging | include 172.22.4.33
show logging | include 172.17.4.33
&lt;/LI-CODE&gt;</description>
      <pubDate>Sun, 09 Jun 2024 20:32:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5127712#M1113439</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-06-09T20:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5134545#M1113695</link>
      <description>&lt;P&gt;It’s not letting me type my message no matter how I word it. Open screenshots in numerical order 1193,1194,1195,1196&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for this but it’s what I deal with constantly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2024 12:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5134545#M1113695</guid>
      <dc:creator>Myleslandish</dc:creator>
      <dc:date>2024-06-21T12:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5134547#M1113696</link>
      <description>&lt;P&gt;I’m just posting this screenshot in case my post above gets removed like every other attempt.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2024 12:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5134547#M1113696</guid>
      <dc:creator>Myleslandish</dc:creator>
      <dc:date>2024-06-21T12:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5137796#M1113887</link>
      <description>&lt;P&gt;is this issue solved or not?&lt;/P&gt;
&lt;P&gt;can you draw topolgy and show in which interface you see this traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jun 2024 01:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5137796#M1113887</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-29T01:14:15Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5140971#M1114053</link>
      <description>&lt;P&gt;I keep trying to post and no matter what I say it says there’s something in it that goes against something. This is nuts&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jul 2024 23:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5140971#M1114053</guid>
      <dc:creator>Myleslandish</dc:creator>
      <dc:date>2024-07-06T23:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5140972#M1114054</link>
      <description>&lt;P&gt;What could I be saying or from what I’ve said what’s possibly wrong with describing my issue and responding to questions?&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jul 2024 23:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5140972#M1114054</guid>
      <dc:creator>Myleslandish</dc:creator>
      <dc:date>2024-07-06T23:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5140973#M1114055</link>
      <description>&lt;P&gt;It’s only resolved bc I shut down/changed the main access point in the main house. So I’m not seeing it anymore. But I have a question I’m surprised I can’t find online or on message boards. How do you confirm commands on the ASDM CLI? I can’t reset my wlan AP or really I can’t do many things not being able to say yes or confirm or whatever. I’ve seen shift x. But nothing works. Please if someone knows let me know. Frfr&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jul 2024 00:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5140973#M1114055</guid>
      <dc:creator>Myleslandish</dc:creator>
      <dc:date>2024-07-07T00:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5150091#M1114586</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I will attach a photo copy but the plain and simple thing to it is an unknown private network probing just the firepower module and always the same domain port 53. It’s every 5 seconds round the clock, it’s two slight different 172.x.x.x IPs hitting it double time; as the photo shows&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 15:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5150091#M1114586</guid>
      <dc:creator>Myleslandish</dc:creator>
      <dc:date>2024-07-24T15:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5150096#M1114587</link>
      <description>&lt;P&gt;The source IP is 192.168.1.2. A device at that address is trying to access a DESTINATION address of 172.17.4.33 for DNS requests (udp/53).&lt;/P&gt;
&lt;P&gt;Your ACL inside_Access_in is blocking the requests, probably since it is an RFC 1918 destination which should indeed&amp;nbsp; be excluded from allowed outbound traffic.&lt;/P&gt;
&lt;P&gt;Check the source host configuration for any DNS servers setup there and fix them to legitimate allowed DNS servers and the firewall logs messages will stop.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 15:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5150096#M1114587</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-07-24T15:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower communicating with private network?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5150102#M1114588</link>
      <description>&lt;P&gt;Are you use ASA ad dns server for client?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 15:50:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-communicating-with-private-network/m-p/5150102#M1114588</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-24T15:50:35Z</dc:date>
    </item>
  </channel>
</rss>

