%ASA-1-106021: Deny UDP reverse path check from 169.254.213.25 to 169.254.255.255 on interface Networkmgmt
I am wondering if anyone has any information for me beyond what the explanation that Cisco provides. I am sure this is an inside attack, as my outer layers have not picked up this IP. I am looking for a good way to track down what machine this IP belongs to.
You were probably looking for the security->firewall forum, you somehow ended up in the Wireless security forums. However, at a glance that address is an automatic private IP address. All that that means is that a client failed to get a DHCP address, and is trying work around it. A good description is at:
The error you got is because the firewall knows that APIPA addresses are not valid on it's interface. I would not be concerned about this for security reasons, but you may need to figure out what client is not working.
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...