<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Spoofing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074413#M914578</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are very wellcome,  please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Aug 2008 16:17:16 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2008-08-13T16:17:16Z</dc:date>
    <item>
      <title>ASA Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074410#M914560</link>
      <description>&lt;P&gt;I'm in the process of setting up 2 ASA 5510 with Active/Standby Failover. I'm in the process of testing right now. I have a question about the Anti-spoofing feature. I've done some reading and got some mixed suggestions. Should just be turned on my outside and 2 DMZ interfaces so that RPF can be done on a sourced IP address? Or is this only done on the Inside interface which is where I want everthing protected?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:30:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074410#M914560</guid>
      <dc:creator>kareem.afifi</dc:creator>
      <dc:date>2019-03-11T13:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074411#M914562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should have RPF on DMZ interfaces enabled as well, it also provides additional protection even if enabled on the inside interface as well. In fact RFP is used as best practice for security even from within your inside network, is not a requirement though for inside network devices. Personally I do have all interfaces on of our firewalls configured for RPF checks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Guide to Harden Cisco IOS Devices&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Understanding Unicast Reverse Path Forwarding &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html" target="_blank"&gt;http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Aug 2008 15:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074411#M914562</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-08-13T15:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074412#M914572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Aug 2008 15:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074412#M914572</guid>
      <dc:creator>kareem.afifi</dc:creator>
      <dc:date>2008-08-13T15:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074413#M914578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are very wellcome,  please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Aug 2008 16:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074413#M914578</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-08-13T16:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074414#M914585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;done&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Aug 2008 16:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-spoofing/m-p/1074414#M914585</guid>
      <dc:creator>kareem.afifi</dc:creator>
      <dc:date>2008-08-13T16:18:02Z</dc:date>
    </item>
  </channel>
</rss>

