<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UDP reverse path check in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986173#M440776</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I can see it is not the case where I have 2 vlans in the same subnet.&lt;/P&gt;&lt;P&gt;Looking in ASDM I see:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Management0/0 interface = security level 100 = Intern = native vlan (ip address 10.100.100.1)&lt;/P&gt;&lt;P&gt;Redundant1.50 interface = security level 100 = SPECTRA-LAN = vlan50 (no ip address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subnet 10.100.100.0/24 must belong to vlan50.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Redundant1 is ethernet0/0 and ethernet0/1. Configuration allows communication between interfaces with same security level. All acl policies from subnet 10.100.100.0/24 is bound to interface &lt;INTERN&gt; and acl from &lt;SPECTRA-LAN&gt; allows all traffic to any less secure network.&lt;/SPECTRA-LAN&gt;&lt;/INTERN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´m currently not sure how the fysical cabling is connected, but I´ll have to look as it seems traffic from subnet 10.100.100.0/24 can come in from both management0/0 and the redundant interfaces eth0/0 + eth0/1 ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this make sence at all ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 17 Jun 2012 08:23:53 GMT</pubDate>
    <dc:creator>robert</dc:creator>
    <dc:date>2012-06-17T08:23:53Z</dc:date>
    <item>
      <title>UDP reverse path check</title>
      <link>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986171#M440771</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA running 8.2(5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I enable ip spoofing on my network interfaces I see this getting logged:&lt;/P&gt;&lt;P&gt;Deny UDP reverse path check from 10.100.100.102 to 10.100.100.255 on interface SPECTRA-LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is because interface SPECTRA-LAN (VLAN50) is the interface connected to the network with ip 10.100.100.0/24 but the interface do not have a ip address so it does not exist in the routing table I believe?&lt;/P&gt;&lt;P&gt;However interface INTERN do also belong to network 10.100.100.0/24 which also is the management interface and the default route for hosts in network 10.100.100.0/24, but has no vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I solve this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. move the management0/0 to SPECTRA-LAN and give SPECTRA-LAN ip 10.100.100.1?&lt;/P&gt;&lt;P&gt;2. give SPECTRA-LAN a ip address in the 10.100.100.0 range?&lt;/P&gt;&lt;P&gt;3. or ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My routing table and interface list is:&lt;/P&gt;&lt;P&gt;Current available interface(s):&lt;/P&gt;&lt;P&gt;&amp;nbsp; DATA-BACKUP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name of interface Redundant1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp; DMZ&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name of interface Redundant1.900&lt;/P&gt;&lt;P&gt;&amp;nbsp; GUEST&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name of interface Redundant1.990&lt;/P&gt;&lt;P&gt;&amp;nbsp; HOSTING&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name of interface Redundant1.100&lt;/P&gt;&lt;P&gt;&amp;nbsp; Infrastruktur&amp;nbsp;&amp;nbsp; Name of interface Redundant1.20&lt;/P&gt;&lt;P&gt;&amp;nbsp; Intern&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name of interface Management0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp; OUTSIDE-BACKUP&amp;nbsp; Name of interface Redundant1.998&lt;/P&gt;&lt;P&gt;&amp;nbsp; PHONE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name of interface Redundant1.200&lt;/P&gt;&lt;P&gt;&amp;nbsp; SPECTRA-LAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name of interface Redundant1.50&lt;/P&gt;&lt;P&gt;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name of interface Ethernet0/3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 1.2.3.4 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.0.0 255.255.255.0 is directly connected, DMZ&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.200.46 255.255.255.255 [1/0] via 1.2.3.4, outside&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.200.47 255.255.255.255 [1/0] via 1.2.3.4, outside&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; VPN-hosting 255.255.255.0 [1/0] via 192.168.200.1, outside&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 93.167.197.80 255.255.255.240 is directly connected, outside&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.100.110.0 255.255.255.0 [1/0] via 10.100.110.1, outside&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.0 255.255.255.0 is directly connected, GUEST&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.100.100.0 255.255.255.0 is directly connected, Intern&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.100.101.0 255.255.255.0 [5/0] via 10.100.100.252, Intern&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.100.0.0 255.255.0.0 [10/0] via 10.100.100.252, Intern&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.100.0 255.255.252.0 is directly connected, PHONE&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.199.1.0 255.255.255.0 is directly connected, Infrastruktur&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.199.0.0 255.255.255.0 is directly connected, DATA-BACKUP&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.254.0 255.255.255.0 is directly connected, HOSTING&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 1.2.3.4, outside&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.0 255.255.0.0 [5/0] via 192.168.254.1, HOSTING&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986171#M440771</guid>
      <dc:creator>robert</dc:creator>
      <dc:date>2019-03-11T23:20:10Z</dc:date>
    </item>
    <item>
      <title>UDP reverse path check</title>
      <link>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986172#M440773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason why you are seeing that error message is because 10.100.100.102 is connected to the wrong subnet/VLAN. It should have been connected to the Intern subnet/VLAN, however, it has incorrectly assigned/conencted to SPECTRA-LAN subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just configure 10.100.100.102 host correctly by assigning it to the correct VLAN, and you won't have that error anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can't have 2 VLANs in the same subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 03:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986172#M440773</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-17T03:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: UDP reverse path check</title>
      <link>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986173#M440776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I can see it is not the case where I have 2 vlans in the same subnet.&lt;/P&gt;&lt;P&gt;Looking in ASDM I see:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Management0/0 interface = security level 100 = Intern = native vlan (ip address 10.100.100.1)&lt;/P&gt;&lt;P&gt;Redundant1.50 interface = security level 100 = SPECTRA-LAN = vlan50 (no ip address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subnet 10.100.100.0/24 must belong to vlan50.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Redundant1 is ethernet0/0 and ethernet0/1. Configuration allows communication between interfaces with same security level. All acl policies from subnet 10.100.100.0/24 is bound to interface &lt;INTERN&gt; and acl from &lt;SPECTRA-LAN&gt; allows all traffic to any less secure network.&lt;/SPECTRA-LAN&gt;&lt;/INTERN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´m currently not sure how the fysical cabling is connected, but I´ll have to look as it seems traffic from subnet 10.100.100.0/24 can come in from both management0/0 and the redundant interfaces eth0/0 + eth0/1 ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this make sence at all ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 08:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986173#M440776</guid>
      <dc:creator>robert</dc:creator>
      <dc:date>2012-06-17T08:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: UDP reverse path check</title>
      <link>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986174#M440778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As per your above statement, 10.100.100.0/24 belongs to native vlan (Intern), not vlan50 (SPECTRA-LAN).&lt;/P&gt;&lt;P&gt;Eventhough SPECTRA-LAN is not configured with any ip address, the subnet 10.100.100.0/24 can't belong to this vlan50 as it already belong to Intern (native vlan) subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 10:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-reverse-path-check/m-p/1986174#M440778</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-17T10:45:12Z</dc:date>
    </item>
  </channel>
</rss>

