<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Large ICMP Traffic from multiple sources in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722179#M64857</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it were a single site I'd suspect ICMP tunnleing, but since the target is a DNS server it might be due to MTU path discovery or F5 load balancers. Like Dustin said, untill you identify teh hosts and get some PCAPs it;s just guesswork&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.shmoo.com/mail/firewalls/jan01/msg00052.shtml"&gt;http://www.shmoo.com/mail/firewalls/jan01/msg00052.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.shmoo.com/mail/firewalls/jan01/msg00067.shtml"&gt;http://www.shmoo.com/mail/firewalls/jan01/msg00067.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Jul 2011 16:22:39 GMT</pubDate>
    <dc:creator>rhermes</dc:creator>
    <dc:date>2011-07-13T16:22:39Z</dc:date>
    <item>
      <title>Large ICMP Traffic from multiple sources</title>
      <link>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722177#M64855</link>
      <description>&lt;P&gt;Dear Support,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have deployed Cisco IPS 4240 device which monitor only our company LAN traffic. Monitoring console shows that there are many internal IPs are contacting DNS servers wherein it shows "large ICMP traffic" as below. Let us know whether any action needs to be taken care on this or is it expected behaviour from CISCO IPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name : Large ICMP Traffic&lt;/P&gt;&lt;P&gt;Source : many Internal IPs&lt;/P&gt;&lt;P&gt;Target : DNS servers running in Windows 2000 OS &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="width: 279pt; border-collapse: collapse;" width="371"&gt;&lt;TBODY&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="width: 102pt; height: 15pt;" width="136"&gt;Attacker Address&lt;/TD&gt;&lt;TD style="border-left: medium none; width: 76pt;" width="101"&gt;Target Address&lt;/TD&gt;&lt;TD style="border-left: medium none; width: 101pt;" width="134"&gt;Name&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.28.10&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.28.10&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.28.53&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.28.53&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.36.11&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.36.11&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.36.11&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.36.11&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.70.1.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.70.1.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.36.11&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.129.36.11&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.70.1.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="height: 15pt; border-top: medium none;"&gt;10.70.1.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;10.128.45.13&lt;/TD&gt;&lt;TD style="border-left: medium none; border-top: medium none;"&gt;Large ICMP Traffic&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:24:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722177#M64855</guid>
      <dc:creator>mustafa.papdheen</dc:creator>
      <dc:date>2019-03-10T12:24:13Z</dc:date>
    </item>
    <item>
      <title>Large ICMP Traffic from multiple sources</title>
      <link>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722178#M64856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the information you provided, I assume this is SIG 2151.0 (&lt;EM&gt;Large ICMP Traffic&lt;/EM&gt;) firing, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That particular signature is not enabled by-default (meaning, unless you have manually enabled it, it would not be firing on any traffic). That SIG looks for ICMP packets where the payload is greater-than 1,000 bytes. Back when this signature was first introduced (November, 2000), that was probably a more suspicious condition vs. present day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By itself, that signature is not looking for a specific threat, so you would need to review a packet capture in a protocol analyzer to determine if the trigger traffic is actually malicious or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 13:30:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722178#M64856</guid>
      <dc:creator>Dustin Ralich</dc:creator>
      <dc:date>2011-07-13T13:30:13Z</dc:date>
    </item>
    <item>
      <title>Large ICMP Traffic from multiple sources</title>
      <link>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722179#M64857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it were a single site I'd suspect ICMP tunnleing, but since the target is a DNS server it might be due to MTU path discovery or F5 load balancers. Like Dustin said, untill you identify teh hosts and get some PCAPs it;s just guesswork&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.shmoo.com/mail/firewalls/jan01/msg00052.shtml"&gt;http://www.shmoo.com/mail/firewalls/jan01/msg00052.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.shmoo.com/mail/firewalls/jan01/msg00067.shtml"&gt;http://www.shmoo.com/mail/firewalls/jan01/msg00067.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 16:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722179#M64857</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2011-07-13T16:22:39Z</dc:date>
    </item>
    <item>
      <title>Large ICMP Traffic from multiple sources</title>
      <link>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722180#M64858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Bob,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response. Could you please let me know more details about MTU?.. As you said, all destination IPs are my company DNS server and not sure why clients are sending ICMP packet to DNS server instead of sending DNS query?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your details on this issue will be very much required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Babu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jul 2011 06:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722180#M64858</guid>
      <dc:creator>mustafa.papdheen</dc:creator>
      <dc:date>2011-07-16T06:13:54Z</dc:date>
    </item>
    <item>
      <title>Large ICMP Traffic from multiple sources</title>
      <link>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722181#M64859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While discovering the largest possible Maximum Transmission Unit, your servers may indeed send large packets. This has been particularly noticed as symptom of F5 Load Balancers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://en.wikipedia.org/wiki/Path_MTU_Discovery"&gt;http://en.wikipedia.org/wiki/Path_MTU_Discovery&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2011 17:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/large-icmp-traffic-from-multiple-sources/m-p/1722181#M64859</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2011-07-18T17:05:15Z</dc:date>
    </item>
  </channel>
</rss>

