cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5103
Views
0
Helpful
6
Replies

ASA-2-106016 on same interface, but two subnets

Hi,

I get a strange problem here. We got another subnet from our ISP because we needed another block of IPs. Everything works fine, except one thing:

  Deny IP spoof from (XXX.XXX.XXX.XXX) to XXX.XXX.XXX.XXX on interface outside

The source IP is our main IP from our primary subnet and the destination is one of the IP in the new subnet. Do I need to add a special rule to allow this trafic??

Cisco ASA 5510

ASA Version 9.1(1)

6 Replies 6

Richard Burts
Hall of Fame
Hall of Fame

Could you tell us how you are using the second subnet that the ISP provided? And it might help if you would post from the config at least the parts that deal with both of the subnets? It is difficult to know if you need to add something until we know what you already have.

HTH

Rick

HTH

Rick

Hi Richard,

XXX.XXX.XXX is the primary subnet, YYY.YYY.YYY is the secondary.

Interface Ethernet0/1 "outside", is up, line protocol is up

  Hardware is i82546GB rev03, BW 100 Mbps, DLY 100 usec

Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)

Input flow control is unsupported, output flow control is off

IP address XXX.XXX.XXX.42, subnet mask 255.255.255.248

interface Ethernet0/1

nameif outside

security-level 0

ip address XXX.XXX.XXX.42 255.255.255.248

related config:

object network bloc-externe-supp

subnet YYY.YYY.YYY.32 255.255.255.248

object network YYY.YYY.YYY.34

host YYY.YYY.YYY.34

route outside 0.0.0.0 0.0.0.0 XXX.XXX.XXX.41 1

route outside YYY.YYY.YYY.32 255.255.255.248 YYY.YYY.YYY.33 1

that's almost normal behavior on ASA if you don't enable the Proxy ARP on that interface and enabled anti-spoofing.

try with this.

ip verify reverse-path interface [interface_name (inside/outside/dmz)]




and this one

 arp permit-nonconnected

and this other one.

 no sysopt noproxyarp [interface_name (inside/outside/dmz)]

let us know if fix your problem !!!

had a great day!

had a great day . best regards, and rate if you'll find this post useful

Hi,

I do have "arp permit-nonconnected", but not the other two. I will try it early next week.

I hate to resurrect an old thread, but a very similar issue led me to this thread, and I tried the fix suggested above and ended up keeping the flood of logs, but now it's a different log entry:

%ASA-1-106021: Deny UDP reverse path check from <IP bound inside interface> to <IP of server behind inside interface> on interface inside

 

Any ideas?

John Calvin
Level 1
Level 1

From a reliable source:

 

"These messages [ASA-2-106016] indicate, as the documentation mentions, that the FW is receiving packets on the mentioned interfaces with dest IP of 0.0.0.0 and dest MAC that matches our FW interface. It seems that these messages are possible when we have a HA pair in which the standby ASA interfaces are left without IP and unaddressed. The standby appliance performs a FQDN lookup on its ACEs, and due to the fact that there is no IP to use those requests are sent with 0.0.0.0."

 

"We should be able to resolve this by adding a standby IP to interfaces in standby context."

 

interface Ethernet 0/1
  nameif inside
  security-level 100
  ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2

 

Review Cisco Networking for a $25 gift card