Solved

PIX Log Entry

Posted on 2004-08-19
4
353 Views
Last Modified: 2013-11-16
Can someone please help me with identifying exactly what is happeneing when I get the following log entry on my Pix firewall

 deny tcp src outside:64.154.80.148 (ehg.fedex.com) /443 dst inside:x.x.x.x (name.company.com) /6969 by access-group "permit_in"
I realize it is coming from port 443 of fedex.com and trying to go to port 6969 on our network.
My Question is Why?  I have seen other blocks like this and the destination port number changes.
We had a linksys firewall before this and the log wasnt quite as detailed as the Pix. Its not even on the same planet.
If someone could explain why these requsts come in it would be much appreciated.
0
Comment
Question by:pauls681
  • 2
  • 2
4 Comments
 
LVL 36

Accepted Solution

by:
grblades earned 100 total points
ID: 11842849
In this particular example port 6969 is used by the Gatecrasher trojen. It is someone scanning a range of addresses (including yours)  in order to try and fine machines with that trojen installed so they can take over them for things like sending out spam or launching denial of service attacks.

The PIX is blocking them so there is nothing to worry about.
0
 

Author Comment

by:pauls681
ID: 11842903
OK, But why does it say its comming from fedex.com? Is this a spoofed address?
0
 
LVL 36

Expert Comment

by:grblades
ID: 11844541
It could be that the address is spoofed but this is unlikly. Their server could be compromised.

Or probably the most likly reason is that it is someone spoofing your IP address and sending a packet to port 443 in order to perform a denial of service attack against them. They are sending back a response to you which your firewall denies. These attacks normally use random IP addresses and with the large number going on you will occasionally get these replies back.
0
 

Author Comment

by:pauls681
ID: 11844565
Thanks for the explanation.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Have you experienced traffic destined through a Cisco ASA firewall disappears and you do not know if the traffic stops in the firewall or somewhere else? The solution is the capture feature. This feature was released in 6.2(1) and works in all firew…
I recently updated from an old PIX platform to the new ASA platform.  While upgrading, I was tremendously confused about how the VPN and AnyConnect licensing works.  It turns out that the ASA has 3 different VPN licensing schemes. "site-to-site" …
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now