02-19-2014 12:18 PM - edited 03-11-2019 08:47 PM
Hi,
I get a strange problem here. We got another subnet from our ISP because we needed another block of IPs. Everything works fine, except one thing:
Deny IP spoof from (XXX.XXX.XXX.XXX) to XXX.XXX.XXX.XXX on interface outside
The source IP is our main IP from our primary subnet and the destination is one of the IP in the new subnet. Do I need to add a special rule to allow this trafic??
Cisco ASA 5510
ASA Version 9.1(1)
02-19-2014 01:19 PM
Could you tell us how you are using the second subnet that the ISP provided? And it might help if you would post from the config at least the parts that deal with both of the subnets? It is difficult to know if you need to add something until we know what you already have.
HTH
Rick
02-20-2014 06:25 AM
Hi Richard,
XXX.XXX.XXX is the primary subnet, YYY.YYY.YYY is the secondary.
Interface Ethernet0/1 "outside", is up, line protocol is up
Hardware is i82546GB rev03, BW 100 Mbps, DLY 100 usec
Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)
Input flow control is unsupported, output flow control is off
IP address XXX.XXX.XXX.42, subnet mask 255.255.255.248
interface Ethernet0/1
nameif outside
security-level 0
ip address XXX.XXX.XXX.42 255.255.255.248
related config:
object network bloc-externe-supp
subnet YYY.YYY.YYY.32 255.255.255.248
object network YYY.YYY.YYY.34
host YYY.YYY.YYY.34
route outside 0.0.0.0 0.0.0.0 XXX.XXX.XXX.41 1
route outside YYY.YYY.YYY.32 255.255.255.248 YYY.YYY.YYY.33 1
02-19-2014 01:47 PM
that's almost normal behavior on ASA if you don't enable the Proxy ARP on that interface and enabled anti-spoofing.
try with this.
ip verify reverse-path interface [interface_name (inside/outside/dmz)]
and this one
arp permit-nonconnected
and this other one.
no sysopt noproxyarp [interface_name (inside/outside/dmz)]
let us know if fix your problem !!!
had a great day!
02-20-2014 06:28 AM
Hi,
I do have "arp permit-nonconnected", but not the other two. I will try it early next week.
01-09-2020 06:39 AM
I hate to resurrect an old thread, but a very similar issue led me to this thread, and I tried the fix suggested above and ended up keeping the flood of logs, but now it's a different log entry:
%ASA-1-106021: Deny UDP reverse path check from <IP bound inside interface> to <IP of server behind inside interface> on interface inside
Any ideas?
02-27-2021 05:09 AM
From a reliable source:
"These messages [ASA-2-106016] indicate, as the documentation mentions, that the FW is receiving packets on the mentioned interfaces with dest IP of 0.0.0.0 and dest MAC that matches our FW interface. It seems that these messages are possible when we have a HA pair in which the standby ASA interfaces are left without IP and unaddressed. The standby appliance performs a FQDN lookup on its ACEs, and due to the fact that there is no IP to use those requests are sent with 0.0.0.0."
"We should be able to resolve this by adding a standby IP to interfaces in standby context."
interface Ethernet 0/1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide