<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deny IP spoof. . . in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-ip-spoof/m-p/1892456#M458487</link>
    <description>&lt;P&gt;Can anyone give me more explanation on the following and is there anything I should be doing?:&lt;/P&gt;&lt;P&gt;&amp;lt;146&amp;gt;Mar 05 2012 11:37:06: %ASA-2-106016: Deny IP spoof from (0.1.0.4) to 0.1.0.4 on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go the following from CISCO site:&lt;/P&gt;&lt;P&gt;106016 &lt;/P&gt;&lt;PRE&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp; %PIX|ASA-2-106016: Deny IP spoof from (&lt;EM&gt;IP_address&lt;/EM&gt;) to &lt;EM style="font-style: italic;"&gt;IP_address&lt;/EM&gt; on 
interface interface_name.
&lt;/PRE&gt;&lt;P&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp; The Cisco ASA&amp;nbsp; discarded a packet with an invalid source address, which may include&amp;nbsp; one of the following or some other invalid address: &lt;/P&gt;&lt;P&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Loopback network (127.0.0.0) &lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Broadcast&amp;nbsp; (limited, net-directed, subnet-directed, and all-subnets-directed) &lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;The destination host (land.c) &lt;/P&gt;&lt;P&gt; To further enhance spoof packet detection, use the conduit command to configure the Cisco ASA&amp;nbsp; to discard packets with source addresses belonging to the internal network. Now that the &lt;STRONG&gt;icmp&lt;/STRONG&gt; command has been implemented, the &lt;STRONG&gt;conduit&lt;/STRONG&gt; command has been deprecated and is no longer guaranteed to work properly. &lt;/P&gt;&lt;P&gt; Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp; Determine if an external user is trying to compromise the protected network.&amp;nbsp; Check for misconfigured clients. &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 22:38:25 GMT</pubDate>
    <dc:creator>1salvarez</dc:creator>
    <dc:date>2019-03-11T22:38:25Z</dc:date>
    <item>
      <title>Deny IP spoof. . .</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof/m-p/1892456#M458487</link>
      <description>&lt;P&gt;Can anyone give me more explanation on the following and is there anything I should be doing?:&lt;/P&gt;&lt;P&gt;&amp;lt;146&amp;gt;Mar 05 2012 11:37:06: %ASA-2-106016: Deny IP spoof from (0.1.0.4) to 0.1.0.4 on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go the following from CISCO site:&lt;/P&gt;&lt;P&gt;106016 &lt;/P&gt;&lt;PRE&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp; %PIX|ASA-2-106016: Deny IP spoof from (&lt;EM&gt;IP_address&lt;/EM&gt;) to &lt;EM style="font-style: italic;"&gt;IP_address&lt;/EM&gt; on 
interface interface_name.
&lt;/PRE&gt;&lt;P&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp; The Cisco ASA&amp;nbsp; discarded a packet with an invalid source address, which may include&amp;nbsp; one of the following or some other invalid address: &lt;/P&gt;&lt;P&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Loopback network (127.0.0.0) &lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Broadcast&amp;nbsp; (limited, net-directed, subnet-directed, and all-subnets-directed) &lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;The destination host (land.c) &lt;/P&gt;&lt;P&gt; To further enhance spoof packet detection, use the conduit command to configure the Cisco ASA&amp;nbsp; to discard packets with source addresses belonging to the internal network. Now that the &lt;STRONG&gt;icmp&lt;/STRONG&gt; command has been implemented, the &lt;STRONG&gt;conduit&lt;/STRONG&gt; command has been deprecated and is no longer guaranteed to work properly. &lt;/P&gt;&lt;P&gt; Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp; Determine if an external user is trying to compromise the protected network.&amp;nbsp; Check for misconfigured clients. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof/m-p/1892456#M458487</guid>
      <dc:creator>1salvarez</dc:creator>
      <dc:date>2019-03-11T22:38:25Z</dc:date>
    </item>
    <item>
      <title>Deny IP spoof. . .</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof/m-p/1892457#M458488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is doing its job, He is seeing a packet with a source ip address of 0.1.0.4, Should this be expected?????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean do you have a public subnet like 0.1.0.4 in the inside of your network ( behind the asa) because he is saying traffic from that ip address as a source going to the same ip address so it is kind of a strange situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would say ASA is doing its job but I would need to have the answers of the previous mentioned questions..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2012 01:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof/m-p/1892457#M458488</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-03-06T01:24:02Z</dc:date>
    </item>
    <item>
      <title>Deny IP spoof. . .</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof/m-p/1892458#M458489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; We had this exact same problem occur.&amp;nbsp; This worked for us:&amp;nbsp;&amp;nbsp; It seems a USB Camera created a new network connection with a description of "Microsoft TV/Video Connection" on one of our PC machines. This connection had an Autoconfiguration IP Address of 0.1.0.4.&amp;nbsp;&amp;nbsp; We tried to just right-click and disable it, but the system would not let us because it was using some resource.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, we opened the TCP/IP properties, then the Advanced TCP/IP settings button, and under the DNS tab we unchecked the box for "Register this connection's addresses in DNS" and rebooted. The connection was no longer shown. This seems to have solved the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2012 22:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof/m-p/1892458#M458489</guid>
      <dc:creator>JohnReam123</dc:creator>
      <dc:date>2012-08-03T22:12:18Z</dc:date>
    </item>
  </channel>
</rss>

