<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Spoofed packet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886793#M155033</link>
    <description>&lt;P&gt;We have a server was having connection issue, from further analysis I discovered that our firewall getting dropped due spoofed packet,&lt;BR /&gt;in my opinion it is a false positive, my topology L2 is following:&lt;BR /&gt;&lt;BR /&gt;S1--&amp;gt;S2--&amp;gt;Nexus--&amp;gt;Firewall&lt;/P&gt;
&lt;P&gt;then firewall come back on nexus and nexus route toward different interface where is the final destination. S1 has a default route with next hop layer 3 of firewall&lt;BR /&gt;&lt;BR /&gt;S1 and Firewall has common broadcast interface Layer 3&lt;BR /&gt;&lt;BR /&gt;Perhaps Firewall detects two net coming from same mac (in imput and output with same mac: the nexus MAC) and apply rule about spoofed&lt;BR /&gt;&lt;BR /&gt;Am I correct?&lt;BR /&gt;However if I disable spoofed rule into FW every packet flows in right way.&lt;BR /&gt;&lt;BR /&gt;Any advice?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:35:21 GMT</pubDate>
    <dc:creator>solid_978</dc:creator>
    <dc:date>2019-03-12T07:35:21Z</dc:date>
    <item>
      <title>Spoofed packet</title>
      <link>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886793#M155033</link>
      <description>&lt;P&gt;We have a server was having connection issue, from further analysis I discovered that our firewall getting dropped due spoofed packet,&lt;BR /&gt;in my opinion it is a false positive, my topology L2 is following:&lt;BR /&gt;&lt;BR /&gt;S1--&amp;gt;S2--&amp;gt;Nexus--&amp;gt;Firewall&lt;/P&gt;
&lt;P&gt;then firewall come back on nexus and nexus route toward different interface where is the final destination. S1 has a default route with next hop layer 3 of firewall&lt;BR /&gt;&lt;BR /&gt;S1 and Firewall has common broadcast interface Layer 3&lt;BR /&gt;&lt;BR /&gt;Perhaps Firewall detects two net coming from same mac (in imput and output with same mac: the nexus MAC) and apply rule about spoofed&lt;BR /&gt;&lt;BR /&gt;Am I correct?&lt;BR /&gt;However if I disable spoofed rule into FW every packet flows in right way.&lt;BR /&gt;&lt;BR /&gt;Any advice?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886793#M155033</guid>
      <dc:creator>solid_978</dc:creator>
      <dc:date>2019-03-12T07:35:21Z</dc:date>
    </item>
    <item>
      <title>Does all the internal traffic</title>
      <link>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886794#M155034</link>
      <description>&lt;P&gt;Does all the internal traffic enter just one interface on the firewall? &amp;nbsp;Does the firewall have a Portchannel to anything?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are there more than one L3 routed path between some devices so that asymmetric routing could be happening?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 19:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886794#M155034</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-06T19:46:04Z</dc:date>
    </item>
    <item>
      <title>Hi Philip,</title>
      <link>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886795#M155035</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;yep previously there was asymmetric routing and then I try to fix with static /32, at the moment I have just /32 route vs firewall, as side firewall has two /32 route too, one for LAN pointing layer 3 next hop of S1 (source) and other one face common layer 3 between nexus and firewall,the interface are 2 normal interface but I have still spoofed packet&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 20:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886795#M155035</guid>
      <dc:creator>solid_978</dc:creator>
      <dc:date>2016-04-06T20:11:14Z</dc:date>
    </item>
    <item>
      <title>Does someone have any advice</title>
      <link>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886796#M155036</link>
      <description>&lt;P&gt;Does someone have any advice for fix this situation?&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 04:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofed-packet/m-p/2886796#M155036</guid>
      <dc:creator>solid_978</dc:creator>
      <dc:date>2016-05-12T04:52:04Z</dc:date>
    </item>
  </channel>
</rss>

