<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: what does this ASA Syslog message signafy? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-does-this-asa-syslog-message-signafy/m-p/991004#M938220</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I looked up the syslog message on &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/pix/pix63/system/message/pixemsgs.html#wp1146532" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/system/message/pixemsgs.html#wp1146532&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I can not ping 192.168.1.182 on our lAN.  Any suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explanation    The firewall received an ARP packet, and the MAC address in the packet differs from the ARP cache entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recommended Action    This traffic might be legitimate, or it might indicate that an ARP poisoning attack is in progress. Check the source MAC address to determine where the packets are coming from and check to see if it belongs to a valid host. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 May 2008 14:39:26 GMT</pubDate>
    <dc:creator>saidfrh</dc:creator>
    <dc:date>2008-05-06T14:39:26Z</dc:date>
    <item>
      <title>what does this ASA Syslog message signafy?</title>
      <link>https://community.cisco.com/t5/network-security/what-does-this-asa-syslog-message-signafy/m-p/991003#M938219</link>
      <description>&lt;P&gt;05-06-2008	08:03:22	Local4.Warning	192.168.1.10	May 06 2008 08:02:30: %ASA-4-405001: Received ARP request collision from 192.168.1.182/001d.7e0a.0a70 on interface Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;05-06-2008	08:02:17	Local4.Warning	192.168.1.10	May 06 2008 08:01:25: %ASA-4-405001: Received ARP request collision from 192.168.1.182/001d.7e0a.0a70 on interface Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;05-06-2008	08:01:52	Local4.Warning	192.168.1.10	May 06 2008 08:01:00: %ASA-4-405001: Received ARP request collision from 192.168.1.182/0012.f07e.b6b9 on interface Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-this-asa-syslog-message-signafy/m-p/991003#M938219</guid>
      <dc:creator>saidfrh</dc:creator>
      <dc:date>2019-03-11T12:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: what does this ASA Syslog message signafy?</title>
      <link>https://community.cisco.com/t5/network-security/what-does-this-asa-syslog-message-signafy/m-p/991004#M938220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I looked up the syslog message on &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/pix/pix63/system/message/pixemsgs.html#wp1146532" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/system/message/pixemsgs.html#wp1146532&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I can not ping 192.168.1.182 on our lAN.  Any suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explanation    The firewall received an ARP packet, and the MAC address in the packet differs from the ARP cache entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recommended Action    This traffic might be legitimate, or it might indicate that an ARP poisoning attack is in progress. Check the source MAC address to determine where the packets are coming from and check to see if it belongs to a valid host. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 May 2008 14:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-this-asa-syslog-message-signafy/m-p/991004#M938220</guid>
      <dc:creator>saidfrh</dc:creator>
      <dc:date>2008-05-06T14:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: what does this ASA Syslog message signafy?</title>
      <link>https://community.cisco.com/t5/network-security/what-does-this-asa-syslog-message-signafy/m-p/991005#M938221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As the recommended action dictates verify whether the MAC address that corresponds to 192.168.1.182 is legitimate or is it an ARP poisoning (spoofing) attack. You should be able to verify that by checking the MAC address table of the switch(s) and look for the logged MAC address and that would lead you to the port the PC or whatever device is connected to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 May 2008 23:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-this-asa-syslog-message-signafy/m-p/991005#M938221</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2008-05-06T23:23:53Z</dc:date>
    </item>
  </channel>
</rss>

