06-18-2010 06:42 AM - edited 03-06-2019 11:38 AM
Morning
I came into work this morning to find our primary ASA Firewall spamming reverse path check errors from a RFC1918 DHCP address port scanning through all the ranges in the RFC1918 DHCP address space, source of 169.254.98.168. My hunch is someone has a virtual machine that is mis-configured. This IP isn't a valid IP on our network and certainly isn't specifically in our routing table however due to gateway of last resort its being deposited onto our firewall.
My question is, is there a way to track this IP back to its source switch/interface? It doesn't appear in routing tables or arp tables. Its not really hurting anything, its just terribly annoying.
*
thanks
e-
06-18-2010 06:44 AM
You could try to put yourself on that same subnet, ping the device, check the arp tables on the switch to find the mac and then find the mac address in the table to find the port that it's connected to......
HTH,
John
06-18-2010 06:53 AM
I'm doing that very thing right now, however there are many subnets so its going to take some time.
e-
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide