cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1439
Views
0
Helpful
3
Replies

Ip local source spoof attack on ips

szamin125
Level 1
Level 1

Hi Guys,

we have ip local source spooof attack on our cisco ips the signature id on ips is 1104..what will be the proper metigation for this attack...

Regards

Sher

3 Replies 3

praprama
Cisco Employee
Cisco Employee

Here are details of this signature:

http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1104&signatureSubId=0&softwareVersion=6.0&releaseVersion=S2

You will want to track by using captures where the packets with a source of 127.0.0.1 are coming from (using MAC addresses).

You can use the packet display command on the sensor as well.

If there are any layer 3 hops, you will again have to capture on that layer 3 device.

regards,

Prapanch

Hi Prapanch,

the ips logs for the attack is following..i used packet dispaly command on my senson but couldnt find any any mac address ...

 

participants:  

    attacker:  

      addr: 127.0.0.1  locality=OUT 

    target:  

      addr: 108.122.0.0  locality=OUT 

      os:   idSource=unknown  type=unknown  relevance=relevant 

  actions:  

    denyPacketRequestedNotPerformed: true 

  riskRatingValue: 100  targetValueRating=medium  attackRelevanceRating=relevant 

  threatRatingValue: 100 

    protocol: IP protocol 0 

Regards

Sher

Hi Sher,

You can try using the packet capture command and then copy of the captured file to an ftp server and view it using wiresark. here's the document on using the packet capture command and also explains how to copy the capture file for analysis:

http://www.cisco.com/en/US/docs/security/ips/5.0/configuration/guide/cli/clipack.html

Regards,

Prapanch

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card