Solved

PIX Log Entry

Posted on 2004-08-19
4
355 Views
Last Modified: 2013-11-16
Can someone please help me with identifying exactly what is happeneing when I get the following log entry on my Pix firewall

 deny tcp src outside:64.154.80.148 (ehg.fedex.com) /443 dst inside:x.x.x.x (name.company.com) /6969 by access-group "permit_in"
I realize it is coming from port 443 of fedex.com and trying to go to port 6969 on our network.
My Question is Why?  I have seen other blocks like this and the destination port number changes.
We had a linksys firewall before this and the log wasnt quite as detailed as the Pix. Its not even on the same planet.
If someone could explain why these requsts come in it would be much appreciated.
0
Comment
Question by:pauls681
  • 2
  • 2
4 Comments
 
LVL 36

Accepted Solution

by:
grblades earned 100 total points
ID: 11842849
In this particular example port 6969 is used by the Gatecrasher trojen. It is someone scanning a range of addresses (including yours)  in order to try and fine machines with that trojen installed so they can take over them for things like sending out spam or launching denial of service attacks.

The PIX is blocking them so there is nothing to worry about.
0
 

Author Comment

by:pauls681
ID: 11842903
OK, But why does it say its comming from fedex.com? Is this a spoofed address?
0
 
LVL 36

Expert Comment

by:grblades
ID: 11844541
It could be that the address is spoofed but this is unlikly. Their server could be compromised.

Or probably the most likly reason is that it is someone spoofing your IP address and sending a packet to port 443 in order to perform a denial of service attack against them. They are sending back a response to you which your firewall denies. These attacks normally use random IP addresses and with the large number going on you will occasionally get these replies back.
0
 

Author Comment

by:pauls681
ID: 11844565
Thanks for the explanation.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Concerto Cloud Services, a provider of fully managed private, public and hybrid cloud solutions, announced today it was named to the 20 Coolest Cloud Infrastructure Vendors Of The 2017 Cloud  (http://www.concertocloud.com/about/in-the-news/2017/02/0…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question