<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA logging to Remote Syslog Server failed, ip spoofing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777239#M177558</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have wierd problem, i have configured ASA A/S pair&amp;nbsp;(8.6) to send syslogs to remote SIEM syslog server but traffic is blocked by asa itself with message&amp;nbsp;106016, IP spoofing detected from ...&lt;/P&gt;
&lt;P&gt;Logging is configured to send syslogs from Inside interface to host (10.14.1.69) that is also on network where Inside interface is connected.&lt;/P&gt;
&lt;P&gt;I have checked arp tables on switch hosting Inside network, on asa also and MAC to IP entries are fine.&lt;/P&gt;
&lt;P&gt;EE-ASA01# sho run logg &amp;nbsp;- this is active ASA&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 131072&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host Inside 10.14.1.69&lt;/P&gt;
&lt;P&gt;I have entered ip reverse lookup... command&amp;nbsp;on Inside&amp;nbsp;to disable spoofing but still same.&lt;/P&gt;
&lt;P&gt;Also tried to initiate syslog sending from management interface but spoofing message persist even with another int as a source.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Same happens on different ASA A/S pair&amp;nbsp;that is version 9.1.&lt;/P&gt;
&lt;P&gt;Same "Inside" network&lt;/P&gt;
&lt;P&gt;I have found few topics with same issues but none with answers&lt;/P&gt;
&lt;P&gt;Do you have any idea how to solve this? All other networking appliances are doing fine, just ASA...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Srdjan&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:49:21 GMT</pubDate>
    <dc:creator>srdjankatic</dc:creator>
    <dc:date>2019-03-12T06:49:21Z</dc:date>
    <item>
      <title>ASA logging to Remote Syslog Server failed, ip spoofing</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777239#M177558</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have wierd problem, i have configured ASA A/S pair&amp;nbsp;(8.6) to send syslogs to remote SIEM syslog server but traffic is blocked by asa itself with message&amp;nbsp;106016, IP spoofing detected from ...&lt;/P&gt;
&lt;P&gt;Logging is configured to send syslogs from Inside interface to host (10.14.1.69) that is also on network where Inside interface is connected.&lt;/P&gt;
&lt;P&gt;I have checked arp tables on switch hosting Inside network, on asa also and MAC to IP entries are fine.&lt;/P&gt;
&lt;P&gt;EE-ASA01# sho run logg &amp;nbsp;- this is active ASA&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 131072&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host Inside 10.14.1.69&lt;/P&gt;
&lt;P&gt;I have entered ip reverse lookup... command&amp;nbsp;on Inside&amp;nbsp;to disable spoofing but still same.&lt;/P&gt;
&lt;P&gt;Also tried to initiate syslog sending from management interface but spoofing message persist even with another int as a source.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Same happens on different ASA A/S pair&amp;nbsp;that is version 9.1.&lt;/P&gt;
&lt;P&gt;Same "Inside" network&lt;/P&gt;
&lt;P&gt;I have found few topics with same issues but none with answers&lt;/P&gt;
&lt;P&gt;Do you have any idea how to solve this? All other networking appliances are doing fine, just ASA...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Srdjan&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777239#M177558</guid>
      <dc:creator>srdjankatic</dc:creator>
      <dc:date>2019-03-12T06:49:21Z</dc:date>
    </item>
    <item>
      <title>Was not clear enough. traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777240#M177560</link>
      <description>&lt;P&gt;Was not clear enough.&amp;nbsp;&lt;SPAN&gt;traffic is blocked by asa itself with message&amp;nbsp;106016, IP spoofing detected from ... when i do packet trace. SIEM does not recieve anything but asa is not logging ip spoofing unless i do packet trace&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2015 21:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777240#M177560</guid>
      <dc:creator>srdjankatic</dc:creator>
      <dc:date>2015-11-02T21:47:46Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777241#M177562</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As per the problem description I understand that you are getting the ip spoofing syslog whenever you run packet-tracer to test the syslog traffic. I am assuming that your packet tracer looks like:&lt;/P&gt;
&lt;P&gt;packet-tracer input inside udp &amp;lt;ASA-IP&amp;gt; &amp;lt;port&amp;gt; &amp;lt;syslog-server-ip&amp;gt; &amp;lt;port&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Running the above mentioned packet-tracer will generate a deny ip spoofing syslog message.&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; This happens because above mentioned packet-tracer when interpreted by ASA suggests that the source IP used in the packet tracer resides somewhere in the network behind inside interface.&lt;/P&gt;
&lt;P&gt;But the ASA is also aware that the source IP used in the packet-tracer is also present on its inside interface. This condition will trigger the IP spoofing syslog and traffic will be dropped.&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; I want to understand if you are seeing the syslog deny message only while trying the packet-tracer or do you see it when the actual traffic is generated from the box.&lt;/P&gt;
&lt;P&gt;Also feel free to correct my understanding of the issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;R.Seth&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 01:57:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777241#M177562</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-03T01:57:33Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777242#M177564</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;it is correct, only packet tracer generates spoofing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you notice anything unusual in my syslog&amp;nbsp;cfg, looks fine to me?&lt;/P&gt;
&lt;P&gt;I dont have access to SIEM so i cant check syslog listener.&lt;/P&gt;
&lt;P&gt;I will check packet capture, maybe it will show does some syslog traffic is going out of Inside int.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 11:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777242#M177564</guid>
      <dc:creator>srdjankatic</dc:creator>
      <dc:date>2015-11-03T11:12:10Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777243#M177566</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Packet tracer is used to evalute configuration for pass through traffic. The ACL and NAT is not applied on the traffic which is initiated from the ASA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no issue with your configuration, the ip spoof syslog is generated because you are using ASA IP as the source IP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps!!!&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;R.Seth&lt;/P&gt;
&lt;P&gt;Mark the answer as correct if it helps in resolving your query!!!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 11:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-to-remote-syslog-server-failed-ip-spoofing/m-p/2777243#M177566</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-03T11:46:32Z</dc:date>
    </item>
  </channel>
</rss>

