<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deny IP Spoofing - ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-ip-spoofing-asa/m-p/1288783#M765544</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems the packets from the subnet 203.X.X.X are not coming to the correct interface on the ASA.&lt;/P&gt;&lt;P&gt;The route for the subnet 203.X.X.X on the ASA is on some other interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Oct 2009 07:12:10 GMT</pubDate>
    <dc:creator>dhananjoy chowdhury</dc:creator>
    <dc:date>2009-10-07T07:12:10Z</dc:date>
    <item>
      <title>Deny IP Spoofing - ASA</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoofing-asa/m-p/1288782#M765543</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently i am running a Cisco ASA v8.0 IOS w/ UR license.&lt;/P&gt;&lt;P&gt;I have a web server running behind the ASA (In the DMZ network) and an inside network (with access to the internet).&lt;/P&gt;&lt;P&gt;I do run a host -monitoring software which polls the corporate website on my company.&lt;/P&gt;&lt;P&gt;However recently, i noticed that the PCs within the inside network are not able to access the corporate website.&lt;/P&gt;&lt;P&gt;Upon checking up the logs, this is what i get :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny IP spoof from (203.X.X.X) to 58.X.X.X on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 203.X.X.X is my legitimate WAN address for those in the inside network where as 58.X.X.X would refer to the WAN IP for the corp web.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is affecting me from monitoring the status of my corp web.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other users with other IPs are able to view my website with no issues. Is there any way i can stop the ASA from denying the legitimate IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It worked fine previously but it started having problems ever since i tried to implement a web application firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have since removed the web app firewall and rolled - backed to the previous network configuration, but starting having this problem ever since then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help is very much appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoofing-asa/m-p/1288782#M765543</guid>
      <dc:creator>jag_lin84</dc:creator>
      <dc:date>2019-03-11T16:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP Spoofing - ASA</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoofing-asa/m-p/1288783#M765544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems the packets from the subnet 203.X.X.X are not coming to the correct interface on the ASA.&lt;/P&gt;&lt;P&gt;The route for the subnet 203.X.X.X on the ASA is on some other interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Oct 2009 07:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoofing-asa/m-p/1288783#M765544</guid>
      <dc:creator>dhananjoy chowdhury</dc:creator>
      <dc:date>2009-10-07T07:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP Spoofing - ASA</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoofing-asa/m-p/1288784#M765545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;use this command in your configuration...&lt;/P&gt;&lt;P&gt;"  ip verify reverse-path interface outside  "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command help to prevent ip spoofing attacks arising from the outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Oct 2009 10:26:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoofing-asa/m-p/1288784#M765545</guid>
      <dc:creator>uzair syed naveed</dc:creator>
      <dc:date>2009-10-07T10:26:59Z</dc:date>
    </item>
  </channel>
</rss>

