We get a lot of "Deny protocol reverse path check" log error messages
from our Cisco ASA's to our QRadar SIEM
related to IP Spoofing attacks from our Cisco ASA's. I've
been reading up on this, and if I understand correctly, I can tune
these logs out as a non-issues...as long as the 'ip verify reverse-path
interface (interface_name)" command is applied to the proper interfaces
on our ASA's.
Is this correct? Can anyone confirm this?