FMANFP-6-IPACCESSLOGP log message displays IP addresses in reverse order. The Cisco bug ID CSCvn40315 identifies this bug.
The explanation references an outgoing network package that may have been affected by this bug, indicating that an IP address on the network may have sent out data during the error. A potential security issue? Is it possible that malicious activity could perform some sort of DNS reconnaissance while masking its IP address and reporting back to an unknown source? Or is the "1 packet" simply a part of the error message?
While the FMANFP-6-IPACCESSLOGP message bug does not directly enable or facilitate DNS attacks, it can cause confusion or make it more confusing to troubleshoot network issues affected by this bug.
BUG INFO below:
Symptom: ACE in ACL such as:
#sh ip access-lists DIALER_IN Extended IP access list DIALER_IN 5 permit tcp any any eq 2022 2443 log (31 matches)