<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: pix how to NOT block the LAND ATTACK in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534990#M601541</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's was a problem with the webserver application: using the static public public resolved the LAND ATTACK (now the webserver admin need to resolve the application problem).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bye.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Oct 2010 13:17:59 GMT</pubDate>
    <dc:creator>ROBERTO TACCON</dc:creator>
    <dc:date>2010-10-08T13:17:59Z</dc:date>
    <item>
      <title>pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534982#M601533</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;DIV class="jive-thread-post-subject"&gt;&lt;DIV class="jive-thread-post-subject-content"&gt;&lt;H2&gt;&lt;SPAN style="font-weight: normal; font-size: 13px;"&gt;Hi to All,&lt;/SPAN&gt;&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="jive-thread-post-message"&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how can I configure a pix Version 8.0(4) to NOT block the LAND ATTACK ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix# sh log | i 17.12.18.24&lt;/P&gt;&lt;P&gt;Oct 07 2010 15:47:31: %PIX-2-106017: Deny IP due to Land Attack from 17.12.18.24 to 17.12.18.24&lt;/P&gt;&lt;P&gt;Oct 07 2010 15:47:31: %PIX-6-302014: Teardown TCP connection 1264706965 for outside:17.12.18.24/80 to inside:10.12.40.114/59790 duration 0:00:00 bytes 0 looping-address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've already disable the signature 1102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1102&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S473" target="_blank"&gt;http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1102&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S473&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix# sh run | i audit&lt;/P&gt;&lt;P&gt;ip audit signature 1102 disable&lt;/P&gt;&lt;P&gt;pix#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the drop continue ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix# sh log | i 17.12.18.24&lt;/P&gt;&lt;P&gt;Oct 07 2010 15:50:22: %PIX-2-106017: Deny IP due to Land Attack from 17.12.18.24 to 17.12.18.24&lt;/P&gt;&lt;P&gt;Oct 07 2010 15:50:22: %PIX-6-302014: Teardown TCP connection 1264706965 for outside:17.12.18.24/80 to inside:10.12.40.114/59891 duration 0:00:00 bytes 0 looping-address&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534982#M601533</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2019-03-11T18:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534983#M601534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roberto,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are you trying to accomplish with this traffic? A packet in the network shouldn't have the same source and destination IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 15:15:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534983#M601534</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-07T15:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534984#M601535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think (as I have caputerd all the traffic inside and outside interfaces and I can't see any src-dst same IP) the problem is pix bug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BUT the questions are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- how I can DISABLE on the pix the "Deny IP due to Land Attack" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- how can i capture ONLY the ASP DROP packets ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 15:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534984#M601535</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2010-10-07T15:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534985#M601536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roberto,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can disable the syslog message (no logging message &lt;ID&gt;), but you can't disable the actual action of dropping land attack packets.&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To capture dropped packets, you can setup a capture with 'capture drop type asp-drop all' and then do a 'show capture drop' to see the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 16:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534985#M601536</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-07T16:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534986#M601537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;following the questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q1) why you tell me "but you can't disable the actual action of dropping land attack packets" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Cisco docs:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i3.html#wp1837699"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i3.html#wp1837699&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2) May I ask you if the following is the correct command to DISABLE the LAN ATTACK DROP ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit signature 1102 disable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q3) are there any BUG about the "static nat" and "land attack" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 16:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534986#M601537</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2010-10-07T16:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534987#M601538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roberto,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Land attack is a L3 attack that the FW will not allow. It is not part of the IPS, it is part of the basic L3 firewall checks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it is clear. I don't understand why your would want to allow it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 19:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534987#M601538</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-07T19:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534988#M601539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the 17.12.18.24 is a static nat configured on the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 17.12.18.24 10.217.40.114 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any host 17.12.18.24 eq www&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any host 17.12.18.24 eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I try to connect to the PUBLIC IP web server 17.12.18.24 from the outside after 5 minutes of using it (it's a crm web server) the web server not respond and the firewall DENY the connection for the LAND ATTACK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I try to connect to the PRIVATE IP web server 10.217.40.114 from (another PIX interface without the nat) the DMZ ALL is working perfectly !&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't understand why the pix do the LAN attack DENY packet (maybe a bug on the version PIX Version 8.0(4) &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; I've captured the packets from inside and outside but I can't see the LAN attack (source destination same ip packet private or public).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I try to capture the ASP DROP packets to see if the LAND attack packet is present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q.:&lt;/P&gt;&lt;P&gt;- it's possible to configure the PIX as indicated below:&lt;/P&gt;&lt;P&gt;with a static nat IP public IP public&lt;/P&gt;&lt;P&gt;route static the IP public to the private IP of the webserver&lt;/P&gt;&lt;P&gt;configure the webserver with the secondary IP public 17.12.18.24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1.41&lt;/P&gt;&lt;P&gt;vlan 41&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.217.60.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 17.12.18.24 17.12.18.24 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any host 17.12.18.24 eq www&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any host 17.12.18.24 eq https&lt;/P&gt;&lt;P&gt;route inside 17.12.18.24 255.255.255.255 10.217.40.114&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Oct 2010 07:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534988#M601539</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2010-10-08T07:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534989#M601540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The answer to your last questions is Yes, you can do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though, I don't think you understand what the packets dropped due to the Land attack are. These are not legitimate packets. These are packets sourced from 17.12.18.24 and destined to 17.12.18.24. Same source and destination. They are not regular inbound connection packets. For the issue with the webserver that fails something else is probably happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Oct 2010 12:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534989#M601540</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-08T12:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: pix how to NOT block the LAND ATTACK</title>
      <link>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534990#M601541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's was a problem with the webserver application: using the static public public resolved the LAND ATTACK (now the webserver admin need to resolve the application problem).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bye.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Oct 2010 13:17:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-how-to-not-block-the-land-attack/m-p/1534990#M601541</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2010-10-08T13:17:59Z</dc:date>
    </item>
  </channel>
</rss>

