<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA capture utility / IP spoof in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494352#M665407</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Forman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No worries. If the capture is still in the ASA's memory, take a look at 'show capture &lt;CAPTURE_NAME&gt; detail' and the MAC address on the packets will be shown.&lt;/CAPTURE_NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Jul 2010 15:32:38 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2010-07-22T15:32:38Z</dc:date>
    <item>
      <title>ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494349#M665404</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had received couple of notifications from ASA regarding IP spoof attempts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;:Jul 21 14:06:56 EDT: %ASA-session-2-106016: Deny IPspoof from (127.0.0.1) to 64.x.x.x on interface inside&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;I wanted to get some more info to eliminate any infected clients on my internal network. I research this forum and configured access list to capture suspicious traffic:&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;ciscoasa(config)#access-list incap permit ip host 127.0.0.1 any&lt;BR /&gt;ciscoasa(config)#access-list incap permit ip any host 127.0.0.1&lt;BR /&gt;ciscoasa(config)#capture incap access-list incap interface inside &lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;Could somone tell me if I had done it correctly? &lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;Here's the result of the "show capture incap":&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;6 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 12:13:25.984049 127.0.0.1.37948 &amp;gt; 65.x.x.x.80: S 662274405:662274405(0) win 5840 &amp;lt;mss 1460,sackOK,timestamp 191385139 0,nop,wscale 0&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 12:13:28.975047 127.0.0.1.37948 &amp;gt; 65.x.x.x.80: S 662274405:662274405(0) win 5840 &amp;lt;mss 1460,sackOK,timestamp 191385439 0,nop,wscale 0&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 12:16:45.147239 127.0.0.1.38511 &amp;gt; 65.x.x.x.80: S 850947795:850947795(0) win 5840 &amp;lt;mss 1460,sackOK,timestamp 191405056 0,nop,wscale 0&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 12:16:48.137764 127.0.0.1.38511 &amp;gt; 65.x.x.x.80: S 850947795:850947795(0) win 5840 &amp;lt;mss 1460,sackOK,timestamp 191405356 0,nop,wscale 0&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 14:06:53.636197 127.0.0.1.53661 &amp;gt; 64.x.x.x.80: S 984711035:984711035(0) win 5840 &amp;lt;mss 1460,sackOK,timestamp 243907855 0,nop,wscale 0&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 14:06:56.629789 127.0.0.1.53661 &amp;gt; 64.x.x.x.80: S 984711035:984711035(0) win 5840 &amp;lt;mss 1460,sackOK,timestamp 243908155 0,nop,wscale 0&amp;gt;&lt;BR /&gt;6 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; How can I indentify the offending host on my inside network? Also the x-ed public IPs point to one of the local businesses and seems that it's their totally unsecured IIS server. Is it ok to contact the company's IT dept regarding this? or report it somewhre else?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;forman&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:15:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494349#M665404</guid>
      <dc:creator>forman102</dc:creator>
      <dc:date>2019-03-11T18:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494350#M665405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Forman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try looking at the MAC address of the offender and tracing it back through your switch to find out what machine it is coming from. Depending on your environment though (for example, if the host is a wireless client), this might not be too helpful. If the attacker can spoof their IP address, they could also be spoofing their MAC address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 14:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494350#M665405</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-07-22T14:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494351#M665406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mike. I think I'm missing something obvious here... How can I find the MAC address of the offender?&lt;/P&gt;&lt;P&gt;Sorry if this sounds ignorant, but I don't have much experience with ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;forman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 15:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494351#M665406</guid>
      <dc:creator>forman102</dc:creator>
      <dc:date>2010-07-22T15:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494352#M665407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Forman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No worries. If the capture is still in the ASA's memory, take a look at 'show capture &lt;CAPTURE_NAME&gt; detail' and the MAC address on the packets will be shown.&lt;/CAPTURE_NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 15:32:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494352#M665407</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-07-22T15:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494353#M665408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can do show cap capname detail&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 15:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494353#M665408</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-22T15:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494354#M665409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can either download the PCAP file of the capture, that would give you the full information, and you can view it with ethereal or wireshark. OR/ alternatively you can also do "show capture incap detail" and it will give you the mac address information as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 15:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494354#M665409</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-07-22T15:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494355#M665410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also i would not expect to see any traffic from this local loopback ip 127.0.0.1 on any interface of firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so i guess you should block this ip on all interfaces as many virus/scanning hosts use this ip as source and also i cannot think of any legitimate traffic using this ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probably someone can confirm this&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 15:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494355#M665410</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-22T15:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494356#M665411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you everyone for help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 16:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494356#M665411</guid>
      <dc:creator>forman102</dc:creator>
      <dc:date>2010-07-22T16:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494357#M665412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1 more question: what's the interprentation of this line (sh capture incap detail):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="border-collapse: collapse; width: 1584px;"&gt;&lt;COL span="22" style="width: 54pt;" width="72" /&gt;&lt;TBODY&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD colspan="22" height="17" style="height: 12.75pt; width: 1188pt;" width="1584"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;1: 12:13:25.98404 MAC1 MAC2 0x0800 74: 127.0.0.1.37948 &amp;gt;&amp;nbsp;&amp;nbsp; 65.x.x.x.80: S [tcp sum ok] 662274405:662274405(0) win 5840 &lt;MSS&gt; (DF) (ttl 64, id 53078)&lt;/MSS&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 2 MAC addresses involved: MAC2 is ASA Inside Int and MAC1 is web filter connected directly to ASA's Inside Int. What's exactly happaning here? I assume that the offending device is a web filter, correct? I don't think that there's anything I can do to eliminate this (other than completely blocking traffic to/from loopback int) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;forman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 16:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494357#M665412</guid>
      <dc:creator>forman102</dc:creator>
      <dc:date>2010-07-22T16:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA capture utility / IP spoof</title>
      <link>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494358#M665413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;127.0.0.1 is a loopback ip address. As you advised, that MAC 1 belongs to the web filtering server mac address, you might want to check why it's sending traffic sourcing from its loopback address (127.0.0.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is more information on what that particular syslog actually means:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html#wp4768961"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html#wp4768961&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 20:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-capture-utility-ip-spoof/m-p/1494358#M665413</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-07-22T20:50:21Z</dc:date>
    </item>
  </channel>
</rss>

