<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to block Fake connection on firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269133#M349079</link>
    <description>&lt;P&gt;looks like i am under attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can i block these connections? 10.10.101.33 is not ip address of any of my internal machine &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.206:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.205:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.205:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.205:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.205:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.204:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.204:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.204:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.204:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.203:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.203:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.203:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.203:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.202:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.202:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.202:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.202:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.201:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.201:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.201:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.201:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.200:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.200:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:50:21 GMT</pubDate>
    <dc:creator>ahmad82pkn</dc:creator>
    <dc:date>2019-03-12T01:50:21Z</dc:date>
    <item>
      <title>How to block Fake connection on firewall</title>
      <link>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269133#M349079</link>
      <description>&lt;P&gt;looks like i am under attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can i block these connections? 10.10.101.33 is not ip address of any of my internal machine &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.206:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.205:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.205:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.205:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.205:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.204:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.204:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.204:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.204:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.203:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.203:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.203:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.203:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.202:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.202:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.202:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.202:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.201:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.201:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.201:3306 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.201:1433 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.200:6673 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 42.237.252.200:135 INSIDE 10.10.101.33:8888, idle 0:00:00, bytes 0, flags saA&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269133#M349079</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2019-03-12T01:50:21Z</dc:date>
    </item>
    <item>
      <title>How to block Fake connection on firewall</title>
      <link>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269134#M349080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems that the connections is indeed built from a host behind the INSIDE interface towards Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that you dont even have a network with the 10.10.101.x/yy in your LAN? Or just that you shouldnt have a host with that IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing to make ASA check the routing table against a source IP address on the INSIDE could be achieved with the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip verify reverse-path interface INSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried to determine where the traffic is coming from?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you could also block the connection with ACL from ever trying to form through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 20:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269134#M349080</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-28T20:54:33Z</dc:date>
    </item>
    <item>
      <title>How to block Fake connection on firewall</title>
      <link>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269135#M349081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi i dont have this subnet in my LAN, on my inside traffic just give stars since no vlan of said subnet.&lt;/P&gt;&lt;P&gt;yes it looks to be coming from inside, but on my inside core switch, i dont show any ARP or route for this strange IP.&lt;/P&gt;&lt;P&gt;not sure how to find it &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip verify reverse-path interface INSIDE&amp;nbsp; Doest this command cause any CPU Spike? since i am running in production right now, though with slow internet response due to above issue.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How can i find the source? its kind of fake source.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 21:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269135#M349081</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2013-05-28T21:07:21Z</dc:date>
    </item>
    <item>
      <title>How to block Fake connection on firewall</title>
      <link>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269136#M349082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure on the commands effect on the performance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either you use the command or block the connections with ACL and then start tracking down the host causing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command I suggested will essentially check the ASAs routing table against the source IP address. If the routing table doesnt contain that IP address or a network to which it belongs to&amp;nbsp; then the ASA drops the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there alot of connection attempts on your firewall constantly? Are you able to check the core switch from where the traffic volume is higher to track down the host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the core switch a L3 device or is the network behind the ASA purely L2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 21:17:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-block-fake-connection-on-firewall/m-p/2269136#M349082</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-28T21:17:05Z</dc:date>
    </item>
  </channel>
</rss>

