<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic %ASA-4-106023 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910410#M457742</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree, in what way i could make the packet capture?,&amp;nbsp; Sorry if i don´t know .. Thanks&amp;nbsp; For all !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Mar 2012 13:26:15 GMT</pubDate>
    <dc:creator>adansuris16</dc:creator>
    <dc:date>2012-03-28T13:26:15Z</dc:date>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910402#M457719</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one constant syslog message in my ASA 5520, everyday i have this message: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny Deny icmp src DMZ:&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;X&lt;/STRONG&gt;&lt;/SPAN&gt; dst INTERNA: &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Y&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the source is a Public Ip &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;X&lt;/STRONG&gt;&lt;/SPAN&gt; sending to&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Y&lt;/STRONG&gt;&lt;/SPAN&gt; a Private ip in my network. my DMZ have access to the internet .The destinations are the same everyday. this privates ips belong to computers, ups and printers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;why the public ip´s are&amp;nbsp; sending ICMP request to this devices on my internal network? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910402#M457719</guid>
      <dc:creator>adansuris16</dc:creator>
      <dc:date>2019-03-11T22:47:15Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910403#M457728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But the message indicates that the ICMP traffic is coming from your DMZ interface.&amp;nbsp; Do you also have an outside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 18:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910403#M457728</guid>
      <dc:creator>jedavis</dc:creator>
      <dc:date>2012-03-27T18:13:14Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910404#M457734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank for asnwering Jedavis&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes i have a Outside interface is directed connect to other branch´s for the network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ it´s conect to another Firewall watchguard, and the watchguard to the WAN. it´s complicated but it´s a network for one of our customers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;btw i see in the ICMP message that (type 3) (Type 11),&amp;nbsp; i read for this and it´s for Destination Unreachable&amp;nbsp; and Time Exceeded. Could be that my private ips are making a query to those IP's public and the Access List&amp;nbsp; of the&amp;nbsp; ASA deny the reply for this ICMP message request. ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 19:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910404#M457734</guid>
      <dc:creator>adansuris16</dc:creator>
      <dc:date>2012-03-27T19:28:42Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910405#M457735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it sounds like you have an internal client that is generating some traffic to addresses that don't exist.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 19:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910405#M457735</guid>
      <dc:creator>jedavis</dc:creator>
      <dc:date>2012-03-27T19:34:19Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910406#M457736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These are the ip's that may be generating traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.99.20 ups liberti&amp;nbsp; 15 kva&lt;/P&gt;&lt;P&gt;192.168.102.10 Printer &lt;/P&gt;&lt;P&gt;192.168.111.11,192.168.111.12 (2 PC´s )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; It´s posible that the&amp;nbsp; 2 computers generating this traffic, but the printer and the&amp;nbsp; ups, how they can generate that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you recomend me ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; i´m going to scan with a antivirus and spyware those two computer,but the other 2&amp;nbsp; the printer and UPS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 20:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910406#M457736</guid>
      <dc:creator>adansuris16</dc:creator>
      <dc:date>2012-03-27T20:01:45Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910407#M457737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know that I would worry too much about it.&amp;nbsp; Is the destination address the same for all 4 internal IPs or is it different?&amp;nbsp; What are the addresses they are trying to get to?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 20:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910407#M457737</guid>
      <dc:creator>jedavis</dc:creator>
      <dc:date>2012-03-27T20:12:40Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910408#M457738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Diferents sources ip&amp;nbsp; like: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny icmp src DMZ:178.134.240.2 dst INTERNA:192.168.111.12 (type 11, code 0)&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny icmp src DMZ:77.37.254.198 dst INTERNA:192.168.111.12 (type 11, code 0)&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny icmp src DMZ:212.106.216.218 dst INTERNA:192.168.111.12 (type 11, code 0)&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny icmp src DMZ:195.8.10.206 dst INTERNA:192.168.111.12 (type 11, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny icmp src DMZ:112.174.81.21 dst INTERNA:192.168.111.11 (type 11, code 0)&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny icmp src DMZ:195.144.193.102 dst INTERNA:192.168.111.11 (type 11, code 0)&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny icmp src DMZ:78.110.144.136 dst INTERNA:192.168.111.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of this icmp message deny by access-group DMZ-IN [0x0, 0x0]. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 20:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910408#M457738</guid>
      <dc:creator>adansuris16</dc:creator>
      <dc:date>2012-03-27T20:28:15Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910409#M457740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All of these addresses are registered to telecommunications companies in Russia, Georgia, Spain, Portugal, and S. Korea. (I had listed some more specific information but for some reason the forum software refused to accept it)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to know more I would set up some ACLs and run a packet capture to see what ports the internal addresses are trying to connect to.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 21:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910409#M457740</guid>
      <dc:creator>jedavis</dc:creator>
      <dc:date>2012-03-27T21:11:06Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910410#M457742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree, in what way i could make the packet capture?,&amp;nbsp; Sorry if i don´t know .. Thanks&amp;nbsp; For all !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2012 13:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910410#M457742</guid>
      <dc:creator>adansuris16</dc:creator>
      <dc:date>2012-03-28T13:26:15Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910411#M457745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, the ICMP time-exceeded and destination unreachable messages will not come from the final destination of the packet that caused them.&amp;nbsp; They will come from some intermediate router, which helps explain why all the source addresses in your messages are registered to telecoms.&amp;nbsp; So to capture this traffic, you need to focus on the source addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create an access list to identify the traffic you want to capture.&amp;nbsp; Something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap1 permit ip host 192.168.99.2 any&lt;/P&gt;&lt;P&gt;access-list cap1 permit ip host 192.168.102.10 any&lt;/P&gt;&lt;P&gt;.... etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then set up a capture on your DMZ interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture x access-list cap1 interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might want to make the capture buffer circular and possibly increase the buffer size.&amp;nbsp; I don't know how much traffic you are dealing with.&amp;nbsp; You can puzzle that out on the command line with ?, or the full syntax is of course&amp;nbsp; in the command ref:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/customer/docs/security/asa/asa82/command/reference/c1.html#wp2129312"&gt;http://www.cisco.com/en/US/customer/docs/security/asa/asa82/command/reference/c1.html#wp2129312&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can view the capture directly on the appliance with show commands... and I seem to recall that there is some way to do it with a browser too.&amp;nbsp; But I usually copy the captured traffic to somewhere I can get at it with wireshark:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;capture /pcap capture:cap1 t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://"&gt;ftp://&lt;/A&gt;&lt;SPAN&gt;......&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2012 13:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910411#M457745</guid>
      <dc:creator>jedavis</dc:creator>
      <dc:date>2012-03-28T13:58:51Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910412#M457748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jedavis &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i want to open the firts link and the second i can´t open. when i try to open the first link the page send This message&amp;nbsp; &lt;SPAN style="background-color: #ffffff; font-family: Arial, Helvetica, sans-serif; font-size: 14px; text-align: -webkit-auto;"&gt;"Forbidden File or Application", and the second when i try to open the windows doesn´t&amp;nbsp; show anything.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; font-family: Arial, Helvetica, sans-serif; font-size: 14px; text-align: -webkit-auto;"&gt;regards.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 15:30:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910412#M457748</guid>
      <dc:creator>adansuris16</dc:creator>
      <dc:date>2012-03-29T15:30:20Z</dc:date>
    </item>
    <item>
      <title>%ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910413#M457751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The first link works for me.&amp;nbsp; It points to the description of the capture command in the &lt;STRONG&gt;&lt;EM&gt;Cisco ASA 5500 Series Command Reference, 8.2&lt;/EM&gt;&lt;/STRONG&gt;.&amp;nbsp; You need to be logged into CCO to get to it.&amp;nbsp; Here is a link to the same info that doesn't require a login:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/c1.html#wp2129312"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/c1.html#wp2129312&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second link was not even supposed to be a link, it appears the forum software converted it to one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did just notice that my example is a little misleading, in that in the capture command I named the capture "x" and in the copy command I used the name "cap1".&amp;nbsp; The correct copy command in the example would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture /pcap capture:x &amp;lt;&lt;EM&gt;destination url&lt;/EM&gt;&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Mar 2012 13:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/1910413#M457751</guid>
      <dc:creator>jedavis</dc:creator>
      <dc:date>2012-03-30T13:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-4-106023</title>
      <link>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/5325587#M1122455</link>
      <description>&lt;P&gt;ICMP Flood or DDOS attack&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 12:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-4-106023/m-p/5325587#M1122455</guid>
      <dc:creator>keshavkatiyar</dc:creator>
      <dc:date>2025-08-29T12:30:53Z</dc:date>
    </item>
  </channel>
</rss>

