<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cisco asa 5520 how can I get rid of this spoofing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627894#M594112</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the source&lt;SPAN style="background-color: #f8fafd;"&gt; of this ssh connection lives behind the inside interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;sh run route&lt;BR /&gt;route inside 10.10.2.0 255.255.255.0 12.12.7.33&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 15 Jan 2011 16:55:11 GMT</pubDate>
    <dc:creator>west33637</dc:creator>
    <dc:date>2011-01-15T16:55:11Z</dc:date>
    <item>
      <title>cisco asa 5520 how can I get rid of this spoofing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627891#M594109</link>
      <description>&lt;P&gt;Hello all. Everytime I try to ssh to my ASA inside interface (12.12.7.36) from 10.10.2.3. I get the following error in my logs. how can I get rid of this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny IP spoof from (12.12.7.36) to 10.10.2.3 on interface inside.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:35:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627891#M594109</guid>
      <dc:creator>west33637</dc:creator>
      <dc:date>2019-03-11T19:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5520 how can I get rid of this spoofing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627892#M594110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems you have...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try removing it and test.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 04:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627892#M594110</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T04:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5520 how can I get rid of this spoofing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627893#M594111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Doesn't look like the source IP of this SSH connection lives/belongs behind the inside interface. Check "sh run route".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only ping, ssh, asdm or telnet to the closes interface from your source.&lt;/P&gt;&lt;P&gt;You cannot reach the far side interface - this is by design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 15:03:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627893#M594111</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-15T15:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5520 how can I get rid of this spoofing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627894#M594112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the source&lt;SPAN style="background-color: #f8fafd;"&gt; of this ssh connection lives behind the inside interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;sh run route&lt;BR /&gt;route inside 10.10.2.0 255.255.255.0 12.12.7.33&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 16:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627894#M594112</guid>
      <dc:creator>west33637</dc:creator>
      <dc:date>2011-01-15T16:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5520 how can I get rid of this spoofing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627895#M594113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The toplogy looks like this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;10.10.2.3---Router(.33)--(12.12.7.36)ASA---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are seeing this message&lt;/P&gt;&lt;P&gt;Deny IP spoof from (12.12.7.36) to 10.10.2.3 on interface inside.&lt;/P&gt;&lt;P&gt;That message means that the packet that the firewall sent is coming right back to the firewall. I'd check the route on the router to see why it may be sending the packet back to the firewall. Does the router know where 10.10.2.0/24 lives?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;Post the output of "sh run int" pls.&lt;/P&gt;&lt;P&gt;What is the GW configured on 10.10.2.3?&lt;/P&gt;&lt;P&gt;What other logs do you see besides the deny ip spoof for port 22 (ssh) connection?&lt;/P&gt;&lt;P&gt;What is the route on the 12.12.7.33 router? It is pointing its default gateway towards the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 17:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627895#M594113</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-15T17:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5520 how can I get rid of this spoofing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627896#M594114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found a routing loop along the path to the ssh source. Fixing that resolved the issue. Thanks!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 20:36:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627896#M594114</guid>
      <dc:creator>west33637</dc:creator>
      <dc:date>2011-01-15T20:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5520 how can I get rid of this spoofing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627897#M594115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome! Yes, exactly what I thought. Thanks for rating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 22:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-how-can-i-get-rid-of-this-spoofing/m-p/1627897#M594115</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-15T22:08:59Z</dc:date>
    </item>
  </channel>
</rss>

