Solved

router log

Posted on 2010-09-08
1
302 Views
Last Modified: 2012-05-10
Can anyone help me interpret these logs and determine a plan of action?  One says ACCESS PERMITTED.  The source is a 66. IP. The other is an ATTACK  and the source is my domain?  The ATTACK destination is 75. IP  The 192. IP is my domain, I think.  That number matches up, except for the last 3 digits.

17  2010-09-08 09:48:57 Firewall rule match: TCP (W to L, rule:1) 66.162.203.122:8093 192.168.10.21:80 ACCESS PERMITTED

18  2010-09-08 09:23:54 ip spoofing - WAN TCP (W to W/ZW) 192.168.10.102:80 75.109.218.9:12551 ATTACK
0
Comment
Question by:rodynetwork
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 21

Accepted Solution

by:
Rick_O_Shay earned 250 total points
ID: 33629315
The first one is saying you are allowing outside access to a web server at 192.168.10.21. If that is not expected you need to change your firewall rules.

The second one is saying something on the outside is trying to fool your router by using an inside address.
0

Featured Post

Business Impact of IT Communications

What are the business impacts of how well businesses communicate during an IT incident? Targeting, speed, and transparency all matter. Find out more in this infographic.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Building highly redundant OnPremise ADFS service ? 15 67
Dropbox phishing tutorial 5 69
How can i protect my data from ransomware 12 104
GPO denied - but why ? 6 55
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question