<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP Spoof Attack in CISCO ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562496#M604049</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Iam getting the message id : 106016.&lt;/P&gt;&lt;P&gt;Currently I have the below verions&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(1)&lt;BR /&gt;Device Manager Version 6.2(1)&lt;/P&gt;&lt;P&gt;Please advice..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Sep 2010 09:40:59 GMT</pubDate>
    <dc:creator>tamilvanan.saravanan</dc:creator>
    <dc:date>2010-09-09T09:40:59Z</dc:date>
    <item>
      <title>IP Spoof Attack in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562492#M604045</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;Hi Dudes,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;Iam getting IP Spoof attack in my CISCO ASA Firewall. Though it's denying I want more dig into this.can anyone help me.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;is there any way to discard this logs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;Note : I have already enable IP reverse path command to protect.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;&lt;STRONG&gt;Please ref the logs&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;Deny IP Spoof from (10.111.10.1) to (10.99.100.1) on interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;10.111.10.1 - FW LAN face ip&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;10.99.100.1 - Syslog server IP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;limat&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:36:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562492#M604045</guid>
      <dc:creator>tamilvanan.saravanan</dc:creator>
      <dc:date>2019-03-11T18:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: IP Spoof Attack in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562493#M604046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the IP address &lt;SPAN style="font-family: Verdana;"&gt;10.111.10.1 the IP address of the "inside" interface of the ASA? The ASA is receving a packet on the inside interface with a source IP which is it's own and the destination IP is that of the syslog server &lt;/SPAN&gt;&lt;SPAN style="font-family: Verdana;"&gt;10.99.100.1&lt;/SPAN&gt;&lt;SPAN style="font-family: Verdana;"&gt;. Could you paste the output of "show route" and "show int ip brief" from the ASA?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the ASA sending syslogs to &lt;SPAN style="font-family: Verdana;"&gt;10.99.100.1? If so, is it connected to the "inside" interface of the ASA? If so, it seems like the there is some kind of a routing loop in the network! The device directly connected to the ASA on the "inside" interface is sending this packet back to the ASA for some reason. Please have a look the device connected to the ASA on the inside interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 07:32:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562493#M604046</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-08T07:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: IP Spoof Attack in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562494#M604047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which is the log numbeer. Did you upgrade to version 8.3 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 20:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562494#M604047</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-09-08T20:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: IP Spoof Attack in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562495#M604048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: tahoma,arial,helvetica,sans-serif;"&gt;Hi Prapanch,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: tahoma,arial,helvetica,sans-serif;"&gt;Thanks for you reply,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: tahoma,arial,helvetica,sans-serif;"&gt;Yes u correct, The IP Address : &lt;SPAN style="font-family: Verdana;"&gt;10.111.10.1 is my ASA inside interface.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: tahoma,arial,helvetica,sans-serif;"&gt;but the syslogs is not directly connected in my ASA.. It's located in Mumbai.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: tahoma,arial,helvetica,sans-serif;"&gt;All my devices are synd with syslog server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Tahoma;"&gt;Pls advice..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Tahoma;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Tahoma;"&gt;limat&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 09:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562495#M604048</guid>
      <dc:creator>tamilvanan.saravanan</dc:creator>
      <dc:date>2010-09-09T09:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: IP Spoof Attack in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562496#M604049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Iam getting the message id : 106016.&lt;/P&gt;&lt;P&gt;Currently I have the below verions&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(1)&lt;BR /&gt;Device Manager Version 6.2(1)&lt;/P&gt;&lt;P&gt;Please advice..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 09:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562496#M604049</guid>
      <dc:creator>tamilvanan.saravanan</dc:creator>
      <dc:date>2010-09-09T09:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: IP Spoof Attack in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562497#M604050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well as i said previously my guess is that &lt;EM style="font-family: Verdana; "&gt;The device directly connected to the&amp;nbsp; ASA on the "inside" interface is sending this packet back to the ASA&amp;nbsp; for some reason. &lt;/EM&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; "&gt;Please apply captures on the ASA from the ASA to the syslogs server and vice versa on the inside interface as i had said.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the device that is directly connected to the ASA on the inside interface, that is, in between the ASA and the syslog server. Can you get the routing table of that device and paste it here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 13:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562497#M604050</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-09T13:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: IP Spoof Attack in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562498#M604051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the syslog server connected through a VPN tunnel? If it is, most likely&lt;/P&gt;&lt;P&gt;the next hop device is sending the packets back at the firewall (default&lt;/P&gt;&lt;P&gt;gateway points to firewall) without encrypting the data. Common reasons&lt;/P&gt;&lt;P&gt;would be a break in the tunnel or other routing issues. Please check to see&lt;/P&gt;&lt;P&gt;if the VPN tunnel/Routing is working as expected when you see these&lt;/P&gt;&lt;P&gt;messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 14:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-spoof-attack-in-cisco-asa/m-p/1562498#M604051</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-09T14:06:42Z</dc:date>
    </item>
  </channel>
</rss>

