<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IP spoof question cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340296#M343767</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You got it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's always good to add more security to your Firewalls so RPF is a good deal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 01 Sep 2013 07:38:46 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-09-01T07:38:46Z</dc:date>
    <item>
      <title>IP spoof question cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340292#M343738</link>
      <description>&lt;P&gt;I got the following,&lt;/P&gt;&lt;P&gt;Deny IP spoof from (0.1.0.4) to 10.1.1.101 on interface intranet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic has correctly been denied but ip verify reverse-path is not configured on intranet interface to prevent ip spoofing. So, how did the ASA denied ip spoofing ? does it means unicast RPF is not necessary ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340292#M343738</guid>
      <dc:creator>giuseppe parlato</dc:creator>
      <dc:date>2019-03-12T02:32:21Z</dc:date>
    </item>
    <item>
      <title>IP spoof question cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340293#M343746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not related to the RPF Check per se;&lt;/P&gt;&lt;PRE style="font-size: 11px; overflow: auto; max-width: 650px; min-width: 400px; height: auto; color: #000000;"&gt;
%PIX|ASA-2-106016: Deny IP spoof from (IP_address) to IP_address on 
interface interface_name.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="color: #000000; font-size: 12px;" type="1"&gt;&lt;LI&gt;This message is generated when a packet arrives at the security appliance interface that has a destination IP address of 0.0.0.0 and a destination MAC address of the security appliance interface. In addition, this message is generated when the security appliance discarded a packet with an invalid source address, which can include one of the following or some other invalid address: &lt;UL&gt;&lt;LI&gt;Loopback network (127.0.0.0)&lt;/LI&gt;&lt;LI&gt;Broadcast (limited, net-directed, subnet-directed, and all-subnets-directed)&lt;/LI&gt;&lt;LI&gt;The destination host (land.c)&lt;/LI&gt;&lt;/UL&gt;In order to further enhance spoof packet detection, use the &lt;STRONG&gt;icmp&lt;/STRONG&gt; command to configure the security appliance to discard packets with source addresses belonging to the internal network. This is because the &lt;STRONG&gt;access-list&lt;/STRONG&gt; command has been deprecated and is no longer guaranteed to work correctly.&lt;STRONG&gt;Recommended Action:&lt;/STRONG&gt; Determine if an external user is trying to compromise the protected network. Check for misconfigured clients.&lt;/LI&gt;&lt;LI&gt;&lt;PRE style="font-size: 11px; overflow: auto; max-width: 650px; min-width: 400px; height: auto;"&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segur&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 22:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340293#M343746</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-08-29T22:40:04Z</dc:date>
    </item>
    <item>
      <title>IP spoof question cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340294#M343755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correctly I would have had a different message for ip spoofing with RPF. Is RPF still adviced to be configured ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 07:07:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340294#M343755</guid>
      <dc:creator>giuseppe parlato</dc:creator>
      <dc:date>2013-08-30T07:07:56Z</dc:date>
    </item>
    <item>
      <title>IP spoof question cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340295#M343762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me add..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. couldn't find explenation for,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;In order to further enhance spoof packet detection, use the &lt;STRONG&gt;icmp &lt;/STRONG&gt;command to configure the security appliance to discard packets with&amp;nbsp; source addresses belonging to the internal network. This is because the &lt;STRONG&gt;access-list &lt;/STRONG&gt;command has been deprecated and is no longer guaranteed to work correctly.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;2. 106016 log message is related to a check which is not configurable right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 07:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340295#M343762</guid>
      <dc:creator>giuseppe parlato</dc:creator>
      <dc:date>2013-08-30T07:18:58Z</dc:date>
    </item>
    <item>
      <title>IP spoof question cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340296#M343767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You got it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's always good to add more security to your Firewalls so RPF is a good deal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Sep 2013 07:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340296#M343767</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-01T07:38:46Z</dc:date>
    </item>
    <item>
      <title>IP spoof question cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340297#M343774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) That means that you can configure the ASA to deny ICMP packets (using the ICMP syntax) comming on the outside interface from source IP addresses from the internal side (as this is certanly never expected).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)Exactly, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Hey my man! Remember to rate all of my answers. We are helping for free and some kudos are really appreciated&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Sep 2013 07:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340297#M343774</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-01T07:41:18Z</dc:date>
    </item>
    <item>
      <title>IP spoof question cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340298#M343778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 15:03:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-question-cisco-asa/m-p/2340298#M343778</guid>
      <dc:creator>giuseppe parlato</dc:creator>
      <dc:date>2013-09-02T15:03:18Z</dc:date>
    </item>
  </channel>
</rss>

