<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UDP port 6004 and 137 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419470#M857131</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi karuppu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; thanks for your reply. my worries is that 192.168.1.x is not being used in my network thats why i'm thinking if this is safe. 192.168.1.x is coming from outside internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Mar 2010 12:33:43 GMT</pubDate>
    <dc:creator>Mon Baul</dc:creator>
    <dc:date>2010-03-04T12:33:43Z</dc:date>
    <item>
      <title>UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419468#M857097</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Can anyone tell me if this is ok? i see this two ports that are connecting to my exchange and AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; UDP outside1 192.168.1.106:6004 inside EXCH01:31970, idle 0:00:42, bytes 8, flags -&lt;BR /&gt;UDP outside1 192.168.1.106:6004 inside EXCH01:31959, idle 0:00:42, bytes 8, flags -&lt;BR /&gt;UDP outside1 192.168.1.106:6004 inside EXCH01:31859, idle 0:01:43, bytes 8, flags -&lt;BR /&gt;UDP outside1 192.168.1.106:6004 inside EXCH01:31847, idle 0:01:43, bytes 8, flags -&lt;BR /&gt;UDP outside1 192.168.134.1:123 inside ADDC01:123, idle 0:00:23, bytes 68, flags -&lt;BR /&gt;UDP outside1 192.168.195.1:123 inside ADDC01:123, idle 0:00:23, bytes 68, flags -&lt;BR /&gt;UDP outside1 192.168.0.1:137 inside ADDC01:137, idle 0:00:40, bytes 903, flags -&lt;BR /&gt;UDP outside1 192.168.218.1:137 inside ADDC01:137, idle 0:00:47, bytes 1806, flags -&lt;BR /&gt;UDP outside1 192.168.136.1:137 inside ADDC01:137, idle 0:01:02, bytes 903, flags -&lt;BR /&gt;UDP outside1 192.168.32.1:137 inside ADDC01:137, idle 0:01:03, bytes 903, flags -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Reymon&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419468#M857097</guid>
      <dc:creator>Mon Baul</dc:creator>
      <dc:date>2019-03-11T17:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419469#M857130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per you logs, there is communication is happening between your clients to your AD server &amp;amp; exchange server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because nowadays&amp;nbsp; exchange server is using random ports to connect thier email clients.even i have seen lots of logs like this in my ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;port number 137 is used by Name Resolution Service to resolve the name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so, no worries...&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;karuppu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Mar 2010 06:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419469#M857130</guid>
      <dc:creator>KARUPPUCHAMY MALAIYANDI</dc:creator>
      <dc:date>2010-03-04T06:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419470#M857131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi karuppu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; thanks for your reply. my worries is that 192.168.1.x is not being used in my network thats why i'm thinking if this is safe. 192.168.1.x is coming from outside internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Mar 2010 12:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419470#M857131</guid>
      <dc:creator>Mon Baul</dc:creator>
      <dc:date>2010-03-04T12:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419471#M857132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any VPN connectivity in the same firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not, then somebody is trying to spoof your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should protect your network by configuring &lt;STRONG&gt;ip spoofing&lt;/STRONG&gt; in your firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IP Spoofing feature uses the Unicast Reverse Path Forwarding (Unicast RPF) mechanism, which dictates that for any traffic that you want to allow through the security appliance, the security appliance routing table must include a route back to the source address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If for example our inside interface connects to internal network 192.168.1.0/24, this means that packets arriving at the inside firewall interface must have a source address in the range 192.168.1.0/24 otherwise they will be dropped (if IP Spoofing is configured).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable IP Spoofing protection, enter the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CiscoASA5500(config)# ip verify reverse-path interface "interface_name"&lt;/STRONG&gt;&lt;BR /&gt;For example, to enable IP spoofing on the inside interface, use the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karuppu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Mar 2010 13:54:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419471#M857132</guid>
      <dc:creator>KARUPPUCHAMY MALAIYANDI</dc:creator>
      <dc:date>2010-03-04T13:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419472#M857133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; As of now, i don't have any VPN connection. I already configured&amp;nbsp; &lt;STRONG&gt;CiscoASA5500(config)# ip verify reverse-path interface&amp;nbsp; "interface_name"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;but still i can see those private ip's connecting to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Mar 2010 11:46:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419472#M857133</guid>
      <dc:creator>Mon Baul</dc:creator>
      <dc:date>2010-03-19T11:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419473#M857134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can also configure deny statement on the outside interface denying RFC 1918 towards your Exchange server if you think they are not legitimate ip addresses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Mar 2010 11:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419473#M857134</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-19T11:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419474#M857135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried this configuration but it doesn't work. What i did is block the traffic coming from my inside interface going to RFC1918 and I see a lots of drops packets for this one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Mar 2010 13:01:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419474#M857135</guid>
      <dc:creator>Mon Baul</dc:creator>
      <dc:date>2010-03-20T13:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419475#M857136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;UDP/6004 seems to be Microsoft Exchange server port as per the following doc:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.pc-library.com/ports/tcp-udp-port/6004/"&gt;http://www.pc-library.com/ports/tcp-udp-port/6004/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Mar 2010 13:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419475#M857136</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-20T13:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: UDP port 6004 and 137</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419476#M857137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest you to configure a span session on the switch behind your firewall and then try to filter output based on exact IP address being seen using Wireshark.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you can track down the host behind your network who may be trying to spoof &lt;EM&gt;IP addresses with the help of mac address-table and arp table.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Mar 2010 18:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-6004-and-137/m-p/1419476#M857137</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-03-21T18:32:32Z</dc:date>
    </item>
  </channel>
</rss>

