[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

PIX Log Entry

Posted on 2004-08-19
4
Medium Priority
?
365 Views
Last Modified: 2013-11-16
Can someone please help me with identifying exactly what is happeneing when I get the following log entry on my Pix firewall

 deny tcp src outside:64.154.80.148 (ehg.fedex.com) /443 dst inside:x.x.x.x (name.company.com) /6969 by access-group "permit_in"
I realize it is coming from port 443 of fedex.com and trying to go to port 6969 on our network.
My Question is Why?  I have seen other blocks like this and the destination port number changes.
We had a linksys firewall before this and the log wasnt quite as detailed as the Pix. Its not even on the same planet.
If someone could explain why these requsts come in it would be much appreciated.
0
Comment
Question by:pauls681
  • 2
  • 2
4 Comments
 
LVL 36

Accepted Solution

by:
grblades earned 400 total points
ID: 11842849
In this particular example port 6969 is used by the Gatecrasher trojen. It is someone scanning a range of addresses (including yours)  in order to try and fine machines with that trojen installed so they can take over them for things like sending out spam or launching denial of service attacks.

The PIX is blocking them so there is nothing to worry about.
0
 

Author Comment

by:pauls681
ID: 11842903
OK, But why does it say its comming from fedex.com? Is this a spoofed address?
0
 
LVL 36

Expert Comment

by:grblades
ID: 11844541
It could be that the address is spoofed but this is unlikly. Their server could be compromised.

Or probably the most likly reason is that it is someone spoofing your IP address and sending a packet to port 443 in order to perform a denial of service attack against them. They are sending back a response to you which your firewall denies. These attacks normally use random IP addresses and with the large number going on you will occasionally get these replies back.
0
 

Author Comment

by:pauls681
ID: 11844565
Thanks for the explanation.
0

Featured Post

Rewarding opportunities for women in IT

Across the nation, technology jobs are vacant because there aren’t enough qualified professionals to fill them. With a degree from WGU, you can get the credentials it takes to become an in-demand IT professional. Plus, WGU’s IT programs include industry certifications.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For months I had no idea how to 'discover' the IP address of the other end of a link (without asking someone who knows), and it drove me batty. Think about it. You can't use Cisco Discovery Protocol (CDP) because it's not implemented on the ASAs.…
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month18 days, 10 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question