<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic syslog ASA-4-313005 and black nurse in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/syslog-asa-4-313005-and-black-nurse/m-p/3056560#M147294</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are high around of ASA syslog related to ASA-4-313005 which also related to ICMP type3, code 3&lt;/P&gt;
&lt;P&gt;------&lt;/P&gt;
&lt;P&gt;Jan 26 10:36:04 192.168.10.2 %ASA-4-313005: No matching connection for ICMP error message: icmp src INSIDE:111.222.333.444 dst INSIDE:555.666.777.888 (type 3, code 3) on inside interface.&amp;nbsp; Original IP payload: udp src 111.222.333.444/6343 dst 555.666.777.888/6343.&lt;/P&gt;
&lt;P&gt;Jan 26 10:36:04 192.168.10.2 %ASA-4-313005: No matching connection for ICMP error message: icmp src outside:111.222.333.555 dst INSIDE:777.888.333.444 (type 3, code 3) on outside interface.&amp;nbsp; Original IP payload: udp src 111.222.333.555/59851 dst 777.888.333.444/53.&lt;/P&gt;
&lt;P&gt;Jan 26 10:36:04 192.168.10.2 %ASA-4-313005: No matching connection for ICMP error message: icmp src outside:555.666.777.888 dst INSIDE:123.123.123.123 (type 3, code 3) on outside interface.&amp;nbsp; Original IP payload: udp src 123.123.123.123/59764 dst 555.666.777.888/53.&lt;/P&gt;
&lt;P&gt;-----&lt;/P&gt;
&lt;P&gt;Is it related to Black Nurse attack?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:50:13 GMT</pubDate>
    <dc:creator>Machi Ma</dc:creator>
    <dc:date>2019-03-12T08:50:13Z</dc:date>
    <item>
      <title>syslog ASA-4-313005 and black nurse</title>
      <link>https://community.cisco.com/t5/network-security/syslog-asa-4-313005-and-black-nurse/m-p/3056560#M147294</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are high around of ASA syslog related to ASA-4-313005 which also related to ICMP type3, code 3&lt;/P&gt;
&lt;P&gt;------&lt;/P&gt;
&lt;P&gt;Jan 26 10:36:04 192.168.10.2 %ASA-4-313005: No matching connection for ICMP error message: icmp src INSIDE:111.222.333.444 dst INSIDE:555.666.777.888 (type 3, code 3) on inside interface.&amp;nbsp; Original IP payload: udp src 111.222.333.444/6343 dst 555.666.777.888/6343.&lt;/P&gt;
&lt;P&gt;Jan 26 10:36:04 192.168.10.2 %ASA-4-313005: No matching connection for ICMP error message: icmp src outside:111.222.333.555 dst INSIDE:777.888.333.444 (type 3, code 3) on outside interface.&amp;nbsp; Original IP payload: udp src 111.222.333.555/59851 dst 777.888.333.444/53.&lt;/P&gt;
&lt;P&gt;Jan 26 10:36:04 192.168.10.2 %ASA-4-313005: No matching connection for ICMP error message: icmp src outside:555.666.777.888 dst INSIDE:123.123.123.123 (type 3, code 3) on outside interface.&amp;nbsp; Original IP payload: udp src 123.123.123.123/59764 dst 555.666.777.888/53.&lt;/P&gt;
&lt;P&gt;-----&lt;/P&gt;
&lt;P&gt;Is it related to Black Nurse attack?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-asa-4-313005-and-black-nurse/m-p/3056560#M147294</guid>
      <dc:creator>Machi Ma</dc:creator>
      <dc:date>2019-03-12T08:50:13Z</dc:date>
    </item>
    <item>
      <title>This looks like a genuine</title>
      <link>https://community.cisco.com/t5/network-security/syslog-asa-4-313005-and-black-nurse/m-p/3056561#M147297</link>
      <description>&lt;P&gt;This looks like a genuine response for original packets sent across the ASA. &amp;nbsp;For example:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;Original IP payload: udp src 111.222.333.555/59851 dst 777.888.333.444/53.&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;The black nurse attack is usually originated from the outside to inside with a large stream.&lt;/P&gt;
&lt;P&gt;Another indicator that this may not be an attack is the fact that the first message was between Inside to Inside interface. It's highly unlikely that an attack would occur from within the network (possible though). It would be good to investigate the inside host sending the packet in the place to see if this is a genuine packet.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 05:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-asa-4-313005-and-black-nurse/m-p/3056561#M147297</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-26T05:28:31Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/syslog-asa-4-313005-and-black-nurse/m-p/3056562#M147299</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;BlackNurse is based on ICMP with Type 3 Code 3 packets. So the above error which you posted is&lt;/SPAN&gt;&amp;nbsp;related to Black Nurse Attack.It's known also to cisco as&amp;nbsp;&lt;SPAN&gt;DoS vulnerability with ICMP default implementation. Chick link below, hope it will help.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc07227/?referring_site=s&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 07:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-asa-4-313005-and-black-nurse/m-p/3056562#M147299</guid>
      <dc:creator>saif musa</dc:creator>
      <dc:date>2017-01-26T07:19:05Z</dc:date>
    </item>
  </channel>
</rss>

