<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking &amp;quot;BOGON&amp;quot; traffic. AKA Private IP on the outside interfac in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-quot-bogon-quot-traffic-aka-private-ip-on-the-outside/m-p/2404108#M307943</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Stephen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have configured the outside interface with security level 0, then it will block all traffic unless permitted on an ACL.&lt;/P&gt;&lt;P&gt;So if you don’t have any ACL on the outside, then there is no need to block it, If you have an ACL just confirm the traffic is not permitted, otherwise the ASA will apply the implicit 'deny ip any any'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate useful posts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Dec 2013 00:46:23 GMT</pubDate>
    <dc:creator>lcambron</dc:creator>
    <dc:date>2013-12-03T00:46:23Z</dc:date>
    <item>
      <title>Blocking "BOGON" traffic. AKA Private IP on the outside interface on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-quot-bogon-quot-traffic-aka-private-ip-on-the-outside/m-p/2404107#M307941</link>
      <description>&lt;P style="margin-bottom: 0pt;"&gt;Is it necessary to block “bogon” networks on the outside interface or does the Cisco ASA firewall do it by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;I noticed this line below on my logs and it kind of scared me for sec..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;2013-11-27 T13:27:55.540306-05:00 ga-asa-5505-50 : %ASA-session-6-302016: Teardown UDP connection 6480256 for outside:&lt;STRONG&gt;192.168.1.10/5061 &lt;/STRONG&gt;to inside:A-&lt;STRONG&gt;192.168.110.4/5060 &lt;/STRONG&gt;duration 17:19:43 bytes 20060171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;It looks like the traffic came from outside the network from &lt;STRONG&gt;192.168.1.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;So if that the case would the access list below block those "private" networks.&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;What is aim to block&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;10.0.0.0/8&amp;nbsp; (A)&lt;/P&gt;&lt;P&gt;172.16.0.0/12 (B)&lt;/P&gt;&lt;P&gt;192.168.0.0/16 (C)&lt;/P&gt;&lt;P&gt;224.0.0.0/4 (MULTICAST D)&lt;/P&gt;&lt;P&gt;240.0.0.0/5 (E)&lt;/P&gt;&lt;P&gt;127.0.0.0/8 (LOOPBACK)&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;10.0.0.0/8&amp;nbsp; (A)&lt;BR /&gt;172.16.0.0/12 (B)&lt;BR /&gt;192.168.0.0/16 (C)&lt;BR /&gt;224.0.0.0/4 (MULTICAST D)&lt;BR /&gt;240.0.0.0/5 (E)&lt;BR /&gt;127.0.0.0/8 (LOOPBACK)&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;--------------------------------------------------------&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network bogons&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;network-object 10.0.0.0 255.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;network-object 172.16.0.0 255.240.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;network-object 192.168.0.0 255.255.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;network-object 224.0.0.0 240.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;network-object 240.0.0.0 248.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;network-object 127.0.0.0 255.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list world extended deny ip object-group bogons any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group world in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;------------------------------------------------------&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-quot-bogon-quot-traffic-aka-private-ip-on-the-outside/m-p/2404107#M307941</guid>
      <dc:creator>stevechege</dc:creator>
      <dc:date>2019-03-12T03:11:42Z</dc:date>
    </item>
    <item>
      <title>Blocking "BOGON" traffic. AKA Private IP on the outside interfac</title>
      <link>https://community.cisco.com/t5/network-security/blocking-quot-bogon-quot-traffic-aka-private-ip-on-the-outside/m-p/2404108#M307943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Stephen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have configured the outside interface with security level 0, then it will block all traffic unless permitted on an ACL.&lt;/P&gt;&lt;P&gt;So if you don’t have any ACL on the outside, then there is no need to block it, If you have an ACL just confirm the traffic is not permitted, otherwise the ASA will apply the implicit 'deny ip any any'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate useful posts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 00:46:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-quot-bogon-quot-traffic-aka-private-ip-on-the-outside/m-p/2404108#M307943</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2013-12-03T00:46:23Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking "BOGON" traffic. AKA Private IP on the outside inte</title>
      <link>https://community.cisco.com/t5/network-security/blocking-quot-bogon-quot-traffic-aka-private-ip-on-the-outside/m-p/2404109#M307946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.....You are correct...i was just freaking out. It turns out to be a host from a "site-to-site" VPN connection that is allowed.&lt;/P&gt;&lt;P&gt;I guess i deal with alot of IPTABLES configurations, so i defaulted to thinking that way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e on the public interface. (linux iptables).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# iptables -A INPUT -i eth1 -s 192.168.0.0/24 -j DROP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# iptables -A INPUT -i eth1 -s 10.0.0.0/8 -j DROP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the refresher.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good day.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 01:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-quot-bogon-quot-traffic-aka-private-ip-on-the-outside/m-p/2404109#M307946</guid>
      <dc:creator>stevechege</dc:creator>
      <dc:date>2013-12-03T01:35:57Z</dc:date>
    </item>
  </channel>
</rss>

