<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deny IP spoof event in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-event/m-p/1396179#M736126</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may collect captures and see which mac address is responsible for sending these packets and track it down and see what is wrong with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is on the inside you have good control over fixing the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin int inside match ip host 0.0.0.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the match command will only work if you are running 7.2.4 and above on this PIX otherwise pls. use access-list to collect captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;you can refer here:&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/docs/DOC-1222;jsessionid=A11197443F5D79D04565C4331EFA5806.node0"&gt;https://supportforums.cisco.com/docs/DOC-1222;jsessionid=A11197443F5D79D04565C4331EFA5806.node0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This above command will collect a capture file names capin for all packets sourced and destined to ip address 0.0.0.0 on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh cap capin detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will give you the mac address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then look at the arp table to see which device owns it and see if you can track it down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Mar 2010 21:42:45 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-03-01T21:42:45Z</dc:date>
    <item>
      <title>Deny IP spoof event</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-event/m-p/1396177#M736082</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are continuously receiving following event on Cisco PIX firewall "Deny IP spoof from (0.0.0.0) to x.x.x.x on interface intfx" .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Request you to reply to the following queries:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Whether the event specified can be classified as an attack?&lt;/P&gt;&lt;P&gt;2. Whether relevant IPS signatures available for detecting such events in the IPS device?&lt;/P&gt;&lt;P&gt;3. Will these events get triggered without enabling IP verify reverse-path command on the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arun.L&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:15:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-event/m-p/1396177#M736082</guid>
      <dc:creator>arun_laksh</dc:creator>
      <dc:date>2019-03-11T17:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof event</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-event/m-p/1396178#M736092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. It could since this is not a valid ip source&lt;/P&gt;&lt;P&gt;2. There is &lt;SPAN class="content"&gt;&lt;SPAN&gt;1104, but that is only for local-hosts. You can build your custom one as explained here &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_fwIDS.html"&gt;http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_fwIDS.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;3. If you have the IPS signature catch this packets on the IPS then yes, the reverse patch check will not be necessary on the ASA any more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Mar 2010 16:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-event/m-p/1396178#M736092</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-03-01T16:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof event</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-event/m-p/1396179#M736126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may collect captures and see which mac address is responsible for sending these packets and track it down and see what is wrong with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is on the inside you have good control over fixing the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin int inside match ip host 0.0.0.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the match command will only work if you are running 7.2.4 and above on this PIX otherwise pls. use access-list to collect captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;you can refer here:&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/docs/DOC-1222;jsessionid=A11197443F5D79D04565C4331EFA5806.node0"&gt;https://supportforums.cisco.com/docs/DOC-1222;jsessionid=A11197443F5D79D04565C4331EFA5806.node0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This above command will collect a capture file names capin for all packets sourced and destined to ip address 0.0.0.0 on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh cap capin detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will give you the mac address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then look at the arp table to see which device owns it and see if you can track it down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Mar 2010 21:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-event/m-p/1396179#M736126</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-03-01T21:42:45Z</dc:date>
    </item>
  </channel>
</rss>

