<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Phantom ICMP Packets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149081#M876087</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran the capture, and also on the entire DMZ and Internal interface... no traces of these IPs in the packet capture....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Feb 2009 19:07:21 GMT</pubDate>
    <dc:creator>entaadmin</dc:creator>
    <dc:date>2009-02-19T19:07:21Z</dc:date>
    <item>
      <title>Phantom ICMP Packets</title>
      <link>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149076#M876066</link>
      <description>&lt;P&gt;I am trying to clean up some items on my network, and I noticed this under my realtime log viewer.  A IP address 10.10.10.158 (old Citrix Web interface server) has been turned off for 3 months, and I'm seeing this packet transfered every 3-5 seconds  It is always a built ICMP followed by a Teardown.  The IP its going to (10.10.11.28) (which is on) is a Citrix netscaler.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any ideas how I can track down these requests coming from this server that is turned off?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb 19 2009	09:59:19	302020	10.10.10.158	0	10.10.11.28	7168	 Built outbound ICMP connection for faddr 10.10.10.158/0 gaddr 10.10.11.28/7168 laddr 10.10.11.28/7168&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149076#M876066</guid>
      <dc:creator>entaadmin</dc:creator>
      <dc:date>2019-03-11T14:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: Phantom ICMP Packets</title>
      <link>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149077#M876069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how about a "clear xlate" on that firewall!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 17:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149077#M876069</guid>
      <dc:creator>joe19366</dc:creator>
      <dc:date>2009-02-19T17:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Phantom ICMP Packets</title>
      <link>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149078#M876077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cody,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do a packet capture on the interface that the source is behind? The capture will give you the MAC address of the source host and this might give you some insight into where the packet is coming from. Your capture might look something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# access-list cap-acl permit icmp host 10.10.10.158 host 10.10.11.28&lt;/P&gt;&lt;P&gt;ASA(config)# capture cap1 access-list cap-acl interface &lt;INT_NAME&gt; packet-length 1518&lt;/INT_NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can watch the progress of the capture with the 'show capture' command. If you have HTTP access to the firewall enabled, simply browse to &lt;A class="jive-link-custom" href="https://" target="_blank"&gt;https://&lt;/A&gt;&lt;ASA_IP&gt;/capture/cap1/pcap to download the capture file that you can then open in Wireshark to see the MAC address of the packet.&lt;/ASA_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 18:03:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149078#M876077</guid>
      <dc:creator>robertson.michael</dc:creator>
      <dc:date>2009-02-19T18:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Phantom ICMP Packets</title>
      <link>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149079#M876080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have very little experiance with Cisco or IOS.  What does the clear xlate command do and how could it adversly affect our network?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 18:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149079#M876080</guid>
      <dc:creator>entaadmin</dc:creator>
      <dc:date>2009-02-19T18:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Phantom ICMP Packets</title>
      <link>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149080#M876082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do I have to turn off the capture once its complete?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 18:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149080#M876082</guid>
      <dc:creator>entaadmin</dc:creator>
      <dc:date>2009-02-19T18:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Phantom ICMP Packets</title>
      <link>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149081#M876087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran the capture, and also on the entire DMZ and Internal interface... no traces of these IPs in the packet capture....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 19:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149081#M876087</guid>
      <dc:creator>entaadmin</dc:creator>
      <dc:date>2009-02-19T19:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: Phantom ICMP Packets</title>
      <link>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149082#M876090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I noticed these two are repeatly showing up in arp broadcasts, would that cause this type of traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 19:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phantom-icmp-packets/m-p/1149082#M876090</guid>
      <dc:creator>entaadmin</dc:creator>
      <dc:date>2009-02-19T19:14:51Z</dc:date>
    </item>
  </channel>
</rss>

