<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FWSM Critical message in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-critical-message/m-p/913246#M960655</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it sounds like a valid dns response has already been detected and allowed through the firewall. i would do some testing and see if this is the case. you may need to do a packet capture and verify this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Oct 2007 04:57:50 GMT</pubDate>
    <dc:creator>palomoj</dc:creator>
    <dc:date>2007-10-26T04:57:50Z</dc:date>
    <item>
      <title>FWSM Critical message</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-critical-message/m-p/913245#M960654</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is the message i get from FWSM. The IP's always change but what i see is its always any of the Windows DC's located across globe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2007-10-26 00:42:18	Local4.Critical	&amp;lt;FWSM IP&amp;gt;	Oct 26 2007 00:42:51: %FWSM-2-106007: Deny inbound UDP from &amp;lt;IP/53&amp;gt; to &amp;lt;IP/dynamic port&amp;gt; due to DNS Response&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any clue on what could cause and why suddenly these message bombard in the logs. We have DNS inspect enabled since scratch. Please advice.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-critical-message/m-p/913245#M960654</guid>
      <dc:creator>jaravinthan</dc:creator>
      <dc:date>2019-03-11T11:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Critical message</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-critical-message/m-p/913246#M960655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it sounds like a valid dns response has already been detected and allowed through the firewall. i would do some testing and see if this is the case. you may need to do a packet capture and verify this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2007 04:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-critical-message/m-p/913246#M960655</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2007-10-26T04:57:50Z</dc:date>
    </item>
  </channel>
</rss>

