<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deny IP spoof  on interface inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439029#M836305</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way I can allow spoofed packets from one server to another through a PIX firewall (version 8).&amp;nbsp; This is for forwarding syslog packets so the destination thinks they were send from the originating IP adrress.&amp;nbsp; But I get the following message and I can't see how to permit it.&amp;nbsp; No anti-spoofing or threat detection is turned on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny IP spoof from (10.x.x.2) to Server-X on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: Verdana; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:54:32 GMT</pubDate>
    <dc:creator>infosateng</dc:creator>
    <dc:date>2019-03-11T17:54:32Z</dc:date>
    <item>
      <title>Deny IP spoof  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439029#M836305</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way I can allow spoofed packets from one server to another through a PIX firewall (version 8).&amp;nbsp; This is for forwarding syslog packets so the destination thinks they were send from the originating IP adrress.&amp;nbsp; But I get the following message and I can't see how to permit it.&amp;nbsp; No anti-spoofing or threat detection is turned on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny IP spoof from (10.x.x.2) to Server-X on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: Verdana; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439029#M836305</guid>
      <dc:creator>infosateng</dc:creator>
      <dc:date>2019-03-11T17:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439030#M836306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have access to ASDM?&lt;/P&gt;&lt;P&gt;Can you check under Configuration, Firewall, Advanced, Anti-spoofing..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you have it enabled for those interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439030#M836306</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T16:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439031#M836307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm using a PIX 515 v8.0(4)32&lt;/P&gt;&lt;P&gt;I don't have anti spoofing enabled, if I enable it I get Deny UDP reverse path check from 10.x.x.2 to Server-X on interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439031#M836307</guid>
      <dc:creator>infosateng</dc:creator>
      <dc:date>2010-06-03T16:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439032#M836308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I miss it from your original post sorry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if the ASA perform anti-spoofing by default on its interfaces.&lt;/P&gt;&lt;P&gt;If you do enable anti-spoofing the ASA is going to verify that there's a route to the packet towards the interface in which it receive it. If there's not, it will give you that error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are those spoofed packets that you want to allow through the PIX exist in your network somewhere?&lt;/P&gt;&lt;P&gt;The ASA knows how to reach those packets throughout another interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439032#M836308</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T16:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439033#M836309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the spoof packets network exist and there is a route&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439033#M836309</guid>
      <dc:creator>infosateng</dc:creator>
      <dc:date>2010-06-03T16:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439034#M836310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand that purposely the range exist on another interface and you're receiving them on the inside (that's why they are spoofed packets). &lt;/P&gt;&lt;P&gt;However, I believe that if the PIX has a route to those packets via one interface and it receive them via another interface, the PIX will not allow those packets through (and I think there's no way to do it)... unless you don't need the route to the actual packets and put the route to the inside (but then, there are no spoofed packets anymore)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Honestly I don't see a way to allow the packets through without letting the PIX know they should come from that interface (inside in this case).&lt;/P&gt;&lt;P&gt;However I might be missing something...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 17:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439034#M836310</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T17:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439035#M836312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Deny IP spoof from (10.x.x.2) to Server-X on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the 10.x.x2 your ASA's inside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a static route that direct traffic to Sever-X to your core switch? And then have a default route on the core switch to ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, all traffic initially from ASA will go to the core switch and then be directed back to ASA with the source address as ASA's address. ASA deems this as a snooped addresss. This happens when the Server-X route isn't on the core switch. (For example, Server-X is in remote site and the remote site is down).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do not know how to disable this warning msg. I have the same issue in my environment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 04:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439035#M836312</guid>
      <dc:creator>Cameco NetworkAdmin</dc:creator>
      <dc:date>2010-11-25T04:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: Deny IP spoof  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439036#M836314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I turned out to configure static route on the switch for all hosts the ASA needs to talk to with a bigger admin distance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 05:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439036#M836314</guid>
      <dc:creator>Cameco NetworkAdmin</dc:creator>
      <dc:date>2010-11-25T05:19:34Z</dc:date>
    </item>
    <item>
      <title>I have the same issue with</title>
      <link>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439037#M836316</link>
      <description>&lt;P&gt;I have the same issue with syslogs getting forwarded back across the same firewall they were generated from. &amp;nbsp;Did you find a solution?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 19:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-ip-spoof-on-interface-inside/m-p/1439037#M836316</guid>
      <dc:creator>Mark Pottebaum</dc:creator>
      <dc:date>2015-09-17T19:13:23Z</dc:date>
    </item>
  </channel>
</rss>

