[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

PIX Log Entry

Posted on 2004-08-19
4
Medium Priority
?
367 Views
Last Modified: 2013-11-16
Can someone please help me with identifying exactly what is happeneing when I get the following log entry on my Pix firewall

 deny tcp src outside:64.154.80.148 (ehg.fedex.com) /443 dst inside:x.x.x.x (name.company.com) /6969 by access-group "permit_in"
I realize it is coming from port 443 of fedex.com and trying to go to port 6969 on our network.
My Question is Why?  I have seen other blocks like this and the destination port number changes.
We had a linksys firewall before this and the log wasnt quite as detailed as the Pix. Its not even on the same planet.
If someone could explain why these requsts come in it would be much appreciated.
0
Comment
Question by:pauls681
  • 2
  • 2
4 Comments
 
LVL 36

Accepted Solution

by:
grblades earned 400 total points
ID: 11842849
In this particular example port 6969 is used by the Gatecrasher trojen. It is someone scanning a range of addresses (including yours)  in order to try and fine machines with that trojen installed so they can take over them for things like sending out spam or launching denial of service attacks.

The PIX is blocking them so there is nothing to worry about.
0
 

Author Comment

by:pauls681
ID: 11842903
OK, But why does it say its comming from fedex.com? Is this a spoofed address?
0
 
LVL 36

Expert Comment

by:grblades
ID: 11844541
It could be that the address is spoofed but this is unlikly. Their server could be compromised.

Or probably the most likly reason is that it is someone spoofing your IP address and sending a packet to port 443 in order to perform a denial of service attack against them. They are sending back a response to you which your firewall denies. These attacks normally use random IP addresses and with the large number going on you will occasionally get these replies back.
0
 

Author Comment

by:pauls681
ID: 11844565
Thanks for the explanation.
0

Featured Post

Identify and Prevent Potential Cyber-threats

Become the white hat who helps safeguard our interconnected world. Transform your career future by earning your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

590 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question