<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Spoofing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/spoofing/m-p/1084973#M893503</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Per Cisco:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explanation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This message is generated when a packet arrives at the security appliance interface that has a destination IP address of 0.0.0.0 and a destination MAC address of the security appliance interface. In addition, this message is generated when the security appliance discarded a packet with an invalid source address, which can include one of the following or some other invalid address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      Loopback network (127.0.0.0)&lt;/P&gt;&lt;P&gt;    *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      Broadcast (limited, net-directed, subnet-directed, and all-subnets-directed)&lt;/P&gt;&lt;P&gt;    *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      The destination host (land.c)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to further enhance spoof packet detection, use the icmp command to configure the security appliance to discard packets with source addresses belonging to the internal network. This is because the access-list command has been deprecated and is no longer guaranteed to work correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Recommended Action: Determine if an external user is trying to compromise the protected network. Check for misconfigured clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Nov 2008 15:42:27 GMT</pubDate>
    <dc:creator>John Blakley</dc:creator>
    <dc:date>2008-11-19T15:42:27Z</dc:date>
    <item>
      <title>Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/spoofing/m-p/1084970#M893500</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have installed ASA 5505 in production and getting huge following logs:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;(106016) Deny IP spoof from(1.1.1.1) to 2.2.2.2 on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.1.1.1 ----Outside Interface IP&lt;/P&gt;&lt;P&gt;2.2.2.2 ----Its a Internal Machine Public IP which is static using in static nat for internal machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advice, its an attack and what action need to be taken. Ray&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofing/m-p/1084970#M893500</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2019-03-11T14:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/spoofing/m-p/1084971#M893501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can anyone respond on this as we are getting same huge logs so I wud request to all experts kindly advice me what to do with it as our production services are being affected. Please advice on priority basis. Thanks Ray&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 13:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofing/m-p/1084971#M893501</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-11-19T13:51:44Z</dc:date>
    </item>
    <item>
      <title>Re: Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/spoofing/m-p/1084972#M893502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What does your topology look like? It would be much easier to answer I think.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 15:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofing/m-p/1084972#M893502</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-11-19T15:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/spoofing/m-p/1084973#M893503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Per Cisco:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explanation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This message is generated when a packet arrives at the security appliance interface that has a destination IP address of 0.0.0.0 and a destination MAC address of the security appliance interface. In addition, this message is generated when the security appliance discarded a packet with an invalid source address, which can include one of the following or some other invalid address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      Loopback network (127.0.0.0)&lt;/P&gt;&lt;P&gt;    *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      Broadcast (limited, net-directed, subnet-directed, and all-subnets-directed)&lt;/P&gt;&lt;P&gt;    *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      The destination host (land.c)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to further enhance spoof packet detection, use the icmp command to configure the security appliance to discard packets with source addresses belonging to the internal network. This is because the access-list command has been deprecated and is no longer guaranteed to work correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Recommended Action: Determine if an external user is trying to compromise the protected network. Check for misconfigured clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 15:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofing/m-p/1084973#M893503</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-11-19T15:42:27Z</dc:date>
    </item>
  </channel>
</rss>

