<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Firewall sending emails to Ironport Internal in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall-sending-emails-to-ironport-internal/m-p/2520741#M236066</link>
    <description>&lt;P&gt;Hello I have a question about ASA firewall and Ironport devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I have found lately it that ironport is showing that firewall we have here is sending over 1000 emails in a hour which is causing ironport to stop all email traffic inside and outside. &amp;nbsp;How do I find out what is causing this issue.&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="width:100.0%;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="height:19px;"&gt;&lt;P&gt;&lt;STRONG&gt;IP Addresses&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width:121px;height:19px;"&gt;&lt;P align="right"&gt;My Reports&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin-left:.5in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="width:100.0%;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin-left:.5in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="width:1226px;" summary="" width="1226"&gt;&lt;THEAD&gt;&lt;TR&gt;&lt;TH&gt;&lt;P align="center"&gt;Sender IP Address&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;Hostname&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__TOTAL_RECIPIENTS" title="Click to sort descending" target="_blank"&gt;Total Attempted&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__BLOCKED_REPUTATION" title="Click to sort descending" target="_blank"&gt;Stopped by Reputation Filtering&amp;nbsp;&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__BLOCKED_INVALID_RECIPIENT" title="Click to sort descending" target="_blank"&gt;Stopped as Invalid Recipients&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__DETECTED_SPAM" title="Click to sort descending" target="_blank"&gt;Spam Detected&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__DETECTED_VIRUS" title="Click to sort descending" target="_blank"&gt;Virus Detected&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__THREAT_CONTENT_FILTER" title="Click to sort descending" target="_blank"&gt;Stopped by Content Filter&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__TOTAL_THREAT_RECIPIENTS" title="Click to sort descending" target="_blank"&gt;Total Threat&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;Clean&lt;/P&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;172.16.x.x&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;xxx.xxx.xxx&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;2,753&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;1,047&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;530&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;623&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;43&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;0&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;2,243&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;510&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have pasted a what i saw today&amp;nbsp;&lt;BR /&gt;I know that .local is internal communication&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:33:31 GMT</pubDate>
    <dc:creator>Adam Coombs</dc:creator>
    <dc:date>2019-03-12T04:33:31Z</dc:date>
    <item>
      <title>ASA Firewall sending emails to Ironport Internal</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-sending-emails-to-ironport-internal/m-p/2520741#M236066</link>
      <description>&lt;P&gt;Hello I have a question about ASA firewall and Ironport devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I have found lately it that ironport is showing that firewall we have here is sending over 1000 emails in a hour which is causing ironport to stop all email traffic inside and outside. &amp;nbsp;How do I find out what is causing this issue.&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="width:100.0%;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="height:19px;"&gt;&lt;P&gt;&lt;STRONG&gt;IP Addresses&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width:121px;height:19px;"&gt;&lt;P align="right"&gt;My Reports&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin-left:.5in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="width:100.0%;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin-left:.5in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="width:1226px;" summary="" width="1226"&gt;&lt;THEAD&gt;&lt;TR&gt;&lt;TH&gt;&lt;P align="center"&gt;Sender IP Address&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;Hostname&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__TOTAL_RECIPIENTS" title="Click to sort descending" target="_blank"&gt;Total Attempted&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__BLOCKED_REPUTATION" title="Click to sort descending" target="_blank"&gt;Stopped by Reputation Filtering&amp;nbsp;&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__BLOCKED_INVALID_RECIPIENT" title="Click to sort descending" target="_blank"&gt;Stopped as Invalid Recipients&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__DETECTED_SPAM" title="Click to sort descending" target="_blank"&gt;Spam Detected&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__DETECTED_VIRUS" title="Click to sort descending" target="_blank"&gt;Virus Detected&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__THREAT_CONTENT_FILTER" title="Click to sort descending" target="_blank"&gt;Stopped by Content Filter&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;&lt;A href="https://10.255.0.210:8081/monitor/reports/yui-dt14-href-MAIL_INCOMING_DOMAIN_IP_DETAIL__TOTAL_THREAT_RECIPIENTS" title="Click to sort descending" target="_blank"&gt;Total Threat&lt;/A&gt;&lt;/P&gt;&lt;/TH&gt;&lt;TH&gt;&lt;P align="center"&gt;Clean&lt;/P&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;172.16.x.x&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;xxx.xxx.xxx&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;2,753&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;1,047&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;530&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;623&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;43&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;0&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;2,243&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="right"&gt;510&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have pasted a what i saw today&amp;nbsp;&lt;BR /&gt;I know that .local is internal communication&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-sending-emails-to-ironport-internal/m-p/2520741#M236066</guid>
      <dc:creator>Adam Coombs</dc:creator>
      <dc:date>2019-03-12T04:33:31Z</dc:date>
    </item>
    <item>
      <title>Hello, So you see the IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-sending-emails-to-ironport-internal/m-p/2520742#M236068</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you see the IP address of the firewall as the source of the email traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a huge amount of emails so I doubt this is because of a feature such as smart-call home that allows your ASA to send traffic as an example.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would think about NAT taking place and then the packet being shown as your firewall IP address before going to the IronPort box.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My recommendation is do captures on the interface where the Email Clients are and the interface where the IronPort sits.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it makes sense?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;&lt;P&gt;CCIE 42930, 2xCCNP, JNCIS-SEC&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For inmediate support&amp;nbsp;&lt;/STRONG&gt;http://iNetworks.cr&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2014 23:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-sending-emails-to-ironport-internal/m-p/2520742#M236068</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-07-30T23:26:35Z</dc:date>
    </item>
    <item>
      <title> Well this makes a little</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-sending-emails-to-ironport-internal/m-p/2520743#M236070</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well this makes a little sense to me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a&amp;nbsp;nat (Outside,Inside) 1 source dynamic any interface destination static nat rule in place. reason for this is the default route for my 6513 goes to a different firewall i am decomming.&lt;/P&gt;&lt;P&gt;What should I be looking for in the captures and are you talking about wireshark or capture ironport interface inside match tcp ......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the helping me&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jul 2014 13:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-sending-emails-to-ironport-internal/m-p/2520743#M236070</guid>
      <dc:creator>Adam Coombs</dc:creator>
      <dc:date>2014-07-31T13:18:44Z</dc:date>
    </item>
  </channel>
</rss>

