I am getting flooded with "Deny IP spoof from (192.168.50.XXX) to 192.168.102.XXX on interface inside"
The 192.168.50.XXX in actually the ip address of the inside interface of the ASA and the 192.168.102.XXX is actually the ip address of a switch on a remote network over MPLS - essentially set up as a local LAN.
The MPLS network is attched to a seperate interface on the ASA.
Hopefully someone can help me resolve this issue.
I was wondering if I need a reverse NAT in place or something like that.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...