We use our ASA as a VPN concentrator and I am seeing a ton of messages that read
Deny IP spoof from (0.0.0.1) to 10.x.2.91 on interface UntrustedDMZ
The 10.x.x.x address is a user on the vpn logged in from a hotel. he tells me that he only has outlook open at this point. Any idea what might be causing this message. Ciscoworks reports over 1200 messages already today from this one user.
First 0.0.0.1 is not internet routable so it could be anything in your DMZ, you will need to use packet capture to track the source MAC address of 0.0.0.1 that is comming from your untrustedDMZ network.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...