05-09-2008 11:39 PM - edited 03-11-2019 05:42 AM
Hi,
The following are from syslogs on ASA5510 firewall. Are the following TCP sessions being spoofed in the SYN phase?
07:40:25: %ASA-4-419002: Duplicate TCP SYN from Inside: 192.168.1.170/3229 to outside:82.42.69.140/4219 with different initial sequence number
(I can not find who has IP 192.168.1.170. Trend Micro shows no one on the LAN .170
The following shows an original udp payload, yet there seems to be a ICMP transmission.
ASA-4-313005 : No matching connection for ICMP error message: icmp src outside: 76.189.113.82 dst inside: 207.105.y.x (type 3, code 1) on outside interface: Original payload: udp src 207.105.y.x/3919 dst 192.168.1.100/49593
05-15-2008 02:28 PM
Because connection limits are configured for a good reason, this system log message could indicate a possible DoS attack, in which case the source of the traffic could likely be a spoofed IP address. If the source IP address is not totally random, identifying the source and blocking it using an access-list might help. In other cases, getting sniffer traces and analyzing the source of the traffic would help in isolating unwanted traffic from legitimate traffic.
05-16-2008 08:50 AM
Is it best to sniff the traffic on the LAN or in between the perimeter router and the firewall?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide