Solved

Secondary IP Range causing IP Spoofing Errors

Posted on 2010-11-29
3
585 Views
Last Modified: 2012-06-21
Hello,

I have a sonicwall 2040 PRO, OS ENHANCED 4.0 and I recently switched my internet service to Embarq.  Unlike my old provider my primary WAN IP and my additional IPs are on different subnets/ranges.

XXX.XX.227.238 255.255.255.252 is the Primary
and XXX.XX.165.120 / 29 on 255.255.255.248 is the secondary.

I have the Primary working find on X2 (I still have my old ISP on X1)

I setup an ARP entry for the secondary at XXX.XX.165.121 in X2 published

I have an address object for XXX.XX.165.120, WAN, Network, 255.255.255.248 and a Route for
ANY to that Address Object, Service ANY, Gateway 0.0.0.0, Interface X2

and I have setup an Access Rule from there to my private Ip for my webserver.

When I hit the XXX.XX.165.121 the request times out and there is an error in the log that the:
IP spoof dropped XXX.XX.160.132, 45424, X2 XXX.XX.165.121, 8, X2 MAC address XXX

in a packet capture it shows: X2*(i) -- XXX.XX.160.132  XXX.XX.165.121 IP TCP 47569,80 DROPPED 78[78]

Any suggestions?  I have never had two different subnets and ranges before from the ISP.
0
Comment
Question by:EFLRobert
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 33

Accepted Solution

by:
digitap earned 500 total points
ID: 34236334
i have a client that has this configuration as well.  it is a little confusing at first.  however, your ISP will handle the routing to the primary public IP address assigned to your WAN interface.  if you want to use one of the IPs, for example, an MX record, then you simply run the public server wizard, specify the public IP address that you want to use and you're done.  when mail is routed to the public IP, your ISP will send that traffic to the primary WAN IP.

make sense?
0
 
LVL 70

Expert Comment

by:Qlemo
ID: 34429053
This question has been classified as abandoned and is being closed as part of the Cleanup Program.  See my comment at the end of the question for more details.
0

Featured Post

Webinar May 25: Cloud Security Strategies for SMBs

Small and mid-sized businesses are a driving force behind cloud adoption, and it’s no wonder: cloud benefits are BIG.  But for all the convenience that moving to the cloud provides, where does security come into play?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ASA 5520 problem with Failover in Active/Standby 8 165
How to configure this in fortinet firewall 2 105
Check Spoof email 6 71
NAT on Fortigate 2 41
I recently had the displeasure of buying a new firewall at one of the buildings I play Sys Admin at. I had to get a better firewall than the cheap one that I had there since I was reconnecting the main office to the satellite office via point-to-poi…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question