<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Packet- tracer Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-problem/m-p/2528431#M236393</link>
    <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;I have the following problem when i apply packet tracer command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "packet-tracer input internal tcp 192.168.1.13 25 &lt;/STRONG&gt;192.168.3.10 smtp"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.3.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; EXTERNAL&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-smtp&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Mail-Server&lt;BR /&gt;&amp;nbsp;nat (INTERNAL,EXTERNAL) static 192.168.3.10&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.1.13/25 to 192.168.3.10/25&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INTERNAL,EXTERNAL) after-auto source dynamic OBJ_GENERIC_ALL interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INTERNAL&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: EXTERNAL&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/P&gt;&lt;P&gt;#################&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "show running-config"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(5)&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif INTERNAL&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif TMG&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;nameif EXTERNAL&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network OBJ_GENERIC_ALL&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Mail-Server&lt;BR /&gt;&amp;nbsp;host 192.168.1.13&lt;BR /&gt;access-list EXTERNAL_access extended permit tcp any object Mail-Server eq smtp&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu INTERNAL 1500&lt;BR /&gt;mtu EXTERNAL 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu TMG 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network Mail-Server&lt;BR /&gt;&amp;nbsp;nat (INTERNAL,EXTERNAL) static 192.168.3.10&lt;BR /&gt;!&lt;BR /&gt;nat (INTERNAL,EXTERNAL) after-auto source dynamic OBJ_GENERIC_ALL interface&lt;BR /&gt;nat (TMG,EXTERNAL) after-auto source dynamic OBJ_GENERIC_ALL interface&lt;BR /&gt;access-group EXTERNAL_access in interface EXTERNAL&lt;BR /&gt;route EXTERNAL 0.0.0.0 0.0.0.0 192.168.3.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 management&lt;BR /&gt;http 192.168.1.0 255.255.255.0 INTERNAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.0.2-192.168.0.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:d6ec33d7249eec7c088f95b9d3827d9c&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My question is what is "sp-security" and why it drop my packets ??&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:30:01 GMT</pubDate>
    <dc:creator>tareken87</dc:creator>
    <dc:date>2019-03-12T04:30:01Z</dc:date>
    <item>
      <title>ASA Packet- tracer Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-problem/m-p/2528431#M236393</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;I have the following problem when i apply packet tracer command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "packet-tracer input internal tcp 192.168.1.13 25 &lt;/STRONG&gt;192.168.3.10 smtp"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.3.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; EXTERNAL&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-smtp&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Mail-Server&lt;BR /&gt;&amp;nbsp;nat (INTERNAL,EXTERNAL) static 192.168.3.10&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.1.13/25 to 192.168.3.10/25&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INTERNAL,EXTERNAL) after-auto source dynamic OBJ_GENERIC_ALL interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INTERNAL&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: EXTERNAL&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/P&gt;&lt;P&gt;#################&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "show running-config"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(5)&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif INTERNAL&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif TMG&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;nameif EXTERNAL&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network OBJ_GENERIC_ALL&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Mail-Server&lt;BR /&gt;&amp;nbsp;host 192.168.1.13&lt;BR /&gt;access-list EXTERNAL_access extended permit tcp any object Mail-Server eq smtp&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu INTERNAL 1500&lt;BR /&gt;mtu EXTERNAL 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu TMG 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network Mail-Server&lt;BR /&gt;&amp;nbsp;nat (INTERNAL,EXTERNAL) static 192.168.3.10&lt;BR /&gt;!&lt;BR /&gt;nat (INTERNAL,EXTERNAL) after-auto source dynamic OBJ_GENERIC_ALL interface&lt;BR /&gt;nat (TMG,EXTERNAL) after-auto source dynamic OBJ_GENERIC_ALL interface&lt;BR /&gt;access-group EXTERNAL_access in interface EXTERNAL&lt;BR /&gt;route EXTERNAL 0.0.0.0 0.0.0.0 192.168.3.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 management&lt;BR /&gt;http 192.168.1.0 255.255.255.0 INTERNAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.0.2-192.168.0.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:d6ec33d7249eec7c088f95b9d3827d9c&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My question is what is "sp-security" and why it drop my packets ??&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:30:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-problem/m-p/2528431#M236393</guid>
      <dc:creator>tareken87</dc:creator>
      <dc:date>2019-03-12T04:30:01Z</dc:date>
    </item>
    <item>
      <title>Hello, Here are the reasons</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-tracer-problem/m-p/2528432#M236395</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;SPAN style="font-size:16px;"&gt;Hello,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;SPAN style="font-size:16px;"&gt;Here are the reasons why the packet might be dropped due to this reason:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&lt;SPAN style="font-size:18px;"&gt;&lt;EM&gt;&lt;STRONG&gt;Name: sp-security-failed&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp;Slowpath security checks failed:&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;This counter is incremented and packet is dropped when the security appliance is:&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; 1) In routed mode receives a through-the-box:&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp; - L2 broadcast packet&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp; - IPv4 packet with destination IP address equal to 0.0.0.0&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp; - IPv4 packet with source IP address equal to 0.0.0.0&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&amp;nbsp;2) In routed or transparent mode and receives a through-the-box IPv4 packet with:&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp; - first octet of the source IP address equal to zero&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp; - source IP address equal to the loopback IP address&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp; - network part of source IP address equal to all 0's&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp; - network part of the source IP address equal to all 1's&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; &amp;nbsp; - source IP address host part equal to all 0's or all 1's&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp; 3) In routed or transparent mode and receives an IPv4 or IPv6 packet with same source &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and destination IP addresses&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&lt;SPAN style="font-size:18px;"&gt;&lt;EM&gt;&lt;STRONG&gt;Recommendation:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;1 and 2) Determine if an external user is trying to compromise the protected network. Check for misconfigured clients.&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;3) If this message counter is incrementing rapidly, an attack may be in progress. Use the packet capture feature to capture type asp packets, and check the source MAC address in the packet to see where they are coming from.&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;Syslogs:&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;1 and 2) 106016&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;3) 106017&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;106016&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&lt;SPAN class="pEM_ErrMsg" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; font-size: 12.2360000610352px; margin: 7px 0em 6px; line-height: normal;"&gt;Error Message&amp;nbsp;%ASA-2-106016:&amp;nbsp;Deny IP spoof from (&lt;EM class="cEmphasis"&gt;&amp;nbsp;IP_address&lt;/EM&gt;&amp;nbsp;) to&amp;nbsp;&lt;EM class="cEmphasis"&gt;IP_address&lt;/EM&gt;&amp;nbsp;on interface interface_name.&lt;/SPAN&gt;&lt;P class="pEE_ErrExp" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Explanation A packet arrived at the ASA interface that has a destination IP address of 0.0.0.0 and a destination MAC address of the ASA interface. In addition, this message is generated when the ASA discarded a packet with an&amp;nbsp;invalid source address, which may include one of the following or some other invalid address:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12.8800001144409px; line-height: normal;"&gt;&lt;LI class="pBuS_BulletStepsub" style="font-size: 12.2360000610352px; margin: 0px 0em 14px 0.65in; text-align: left; list-style-type: disc;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Loopback network&amp;nbsp;(127.0.0.0)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="pBuS_BulletStepsub" style="font-size: 12.2360000610352px; margin: 0px 0em 14px 0.65in; text-align: left; list-style-type: disc;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Broadcast&amp;nbsp;(limited, net-directed, subnet-directed, and all-subnets-directed)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="pBuS_BulletStepsub" style="font-size: 12.2360000610352px; margin: 0px 0em 14px 0.65in; text-align: left; list-style-type: disc;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;The destination host (land.c)&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="pB2_Body2" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;To further enhance spoof packet detection, use the&amp;nbsp;&lt;B class="cBold"&gt;icmp&lt;/B&gt;&amp;nbsp;command to configure the ASA to discard packets with source addresses belonging to the internal network, because&lt;SPAN class="cCp_CmdPlain"&gt;&amp;nbsp;the&amp;nbsp;&lt;/SPAN&gt;&lt;B class="cBold"&gt;access-list&lt;/B&gt;&amp;nbsp;&lt;SPAN class="cCp_CmdPlain"&gt;command has been deprecated and is no longer guaranteed to work correctly.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Recommended Action Determine if an external user is trying to compromise the protected network. Check for misconfigured clients.&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; margin: 0px 0em; line-height: 18px; font-size: 12.8800001144409px;"&gt;106017&lt;/DIV&gt;&lt;DIV class="pEx1_Example1" style="color: rgb(0, 0, 0); margin: 0px 0em; line-height: 18px;"&gt;&lt;P style="font-family: 'Courier New', Courier, mono; font-size: 12.8800001144409px;"&gt;&lt;SPAN class="pEM_ErrMsg" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; font-size: 12.2360000610352px; margin: 7px 0em 6px; line-height: normal;"&gt;Error Message&amp;nbsp;%ASA-2-106017: Deny IP due to Land Attack from&amp;nbsp;&lt;EM class="cEmphasis"&gt;IP_address&lt;/EM&gt;&amp;nbsp;to&amp;nbsp;&lt;EM class="cEmphasis"&gt;IP_address&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pEE_ErrExp" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;+ Explanation The ASA received a packet with the IP source address equal to the IP destination, and the destination port equal to the source port. This message indicates a spoofed packet that is designed to attack systems. This attack is referred to as a Land Attack.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;+ Recommended Action If this message persists, an attack may be in progress. The packet does not provide enough information to determine where the attack originates.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Please don't forget to rate and mark as correct the&amp;nbsp;Post!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Let me know if there are further questions regarding this&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;David Castro,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pEA_ErrAct" style="color: rgb(0, 0, 0); margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;&lt;FONT face="courier new, courier, monospace"&gt;Regards,&lt;/FONT&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 22 Mar 2015 20:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-tracer-problem/m-p/2528432#M236395</guid>
      <dc:creator>David Johan Castro Fernandez</dc:creator>
      <dc:date>2015-03-22T20:12:55Z</dc:date>
    </item>
  </channel>
</rss>

