Did you try pinging the address reported in the scan. It could be possible that someone on the inside is spoofing address. If that possibility is ruled out or if the address does not exist, you need to relook at the audit tools themselves to figue out a reason for the this.
I don't see how they could be spoofing it. The addresses don't exist, but I like the idea of pinging just to make sure nothing unexpected is happening at the time. Mind you - we have ping responses turned off.
I agree, ultimately I expect to go back to the provider to discuss the audit tools.
The very strange thing is that these IPs are all NATted by the PIX. And aside from the PIX, these IPs don't exist. There isn't even an entry for them - so what the heck is the security audit picking up on.
Or, if we have a mail server on one IP, and a web on the other, what's responding such that it thinks there's a web server on the mail server as well as the mail server, and vice versa.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...