Link to home
Start Free TrialLog in
Avatar of YOlanie_Visser
YOlanie_VisserFlag for Monaco

asked on

TMG with many Vlans blocking subnets (IP spoof)

hi guys


i installed a fresh TMG server at a client
internet was working for the Server Vlan ( same subnet as the TMG server) (10.10.3.x)
but for all the users the internet did not work (10.10.4.x)
i added the 10.10.4.x range to the internal network in TMG yet is still didnt work
i checked the logs and it was blocking traffic from those IP addresses saying it was a IP spoof attack

please help
Avatar of Keith Alabaster
Keith Alabaster
Flag of United Kingdom of Great Britain and Northern Ireland image

Add the .0 and the .255 addresses of eah subnet on the internal local address table as well.
Avatar of YOlanie_Visser

ASKER

yeah i added the full Range from .0-.255

Can you post a screenshot of how you have entered the local address table?
yeah this fixit didnt work:-(
is this a common issue with TMG??
Yes - but not sure why you think it would have fixed anything. The Fixit is to enable the spoof detection - and you already have it enabled.
PS - it is not an issue with TMG, it is an issue with your configuration
here is the properties like i added them in internal User generated image
Thanks - behind the screen shot I could see that you have a permiter network that looked like it had a start address of x.x.x.1.
Spoofing can also be caused from other defined networks and the rules are the same for each - the whole subnet must be defined. Check the perimeter network local address table and make sure this also has the .0 through to the .255 address defined.

Also, run up the best practice analyser for FTMG and this will tell you exactly where the spoof issue is being reported from.
ok is there a real use for a permiter network? as all i have is users- TMG-firewal-router-internet?
so in the first setup should i select Edge firewall or back firelwall?? because in this instalation i selected back firewall..
Please correct me if I understand wrong:

1.you have VLANs
2. VLANs configured on L3 switch or router.
3.then this router routes traffic to TMG server then Internet.
4. you network topology looks like VLANs --> Router--> TMG server--> internet.

If that the case then TMG will service a-only its VLAN. and will identify the other VLANs as spoofed addresses. because TMG server will try to resolve the source ip address to MAC address. in your case all other VLANs addresses will be resolve to the router MAC address. thats why TMG/ISA identify that traffic as spoof attack.

the link provided to disable spoof detection should solve the problem, you may need to restart FW service.

Thanks,
Suliman
well its users> vlans > TMG > Firewall> router > internet
but the problem is it is there are a few vlans
so the TMG allowes traffic on its vlan but not on other vlans??
There is no issue about internal vlans, all FTMG will care about is knowing that ALL ip addresses that are contactable through the internal interface are listed inside the internal nic LAT within the FTMG gui. Disabling spoof protection fixes nothing - you simply stop being notified about the threat or configurration error.

A backend firewall or frontend firewall template is decided by how you want to use the product and the placement of other equipment.
I see.

I order to for VLANs to be able to communicate with each other, there should be a router ( or L3 switch ) connects all VLANs. so It should be like:

users> vlans (router ) > TMG > Firewall> router > internet

make sure the TMG can reach all VLANs.

had you disable spoof detection ? I had the same issue and that resolved it for me.
We can always discuss this further off-line if you wish. You are correct, there has to be 'something' inside at the layer 3 that can interface all of the vlans together but as long as ISA/FTMG can talk to that L3 device, then that is all that is needed, ie the L3 acts as the router for the FTMG tarffic. As long as FTMG knows about all the IP addresses associated with ALL of the internal vlans then that is fine.

The definition of a spoof attack from FTMG's perspective is the receipt of traffic at an FTMG interface when it was not expected. For example, the FTMG INTERNAL nic sees traffic arrive from 10.10.3.9 when 10.10.3.9 is not included in any of the local adress tables within the FTMG gui.

http://technet.microsoft.com/en-us/library/bb794735.aspx

"Before blocking this suspect IP address, ISA Server validates that the source IP address is not spoofed. If the source IP address is found to be malicious, ISA Server triggers an alert with information about the attack and about the attacker. From this point, ISA Server limits traffic from the offending host for one minute. After one minute, ISA Server again allows traffic from that IP address. If the threshold is again exceeded, and if you manually reset the alert, an alert is again triggered and traffic is blocked."
I give up - Yolanie, please run the best practice analyser and post the results regarding the spoofing configuration error.
lol thanks for all your help guys...

@Keith
i have run the setup as the documentation says and all i ran was the web access wizard..and added the other Vlans subnets to the internal ranges within the TMG gui... the reson i ask what tropology i should select is because maybe i am selecting the wrong one to start with in your opinion which would you select for this users> Vlans > TMG >Firewall > Router > internet the two that make the most sense for me are back firewall and edge firewall?? thanks for your help

@Sulimanw

the Vlans all communicate with each other as the servers are on on and the users are on another and i am able to ping all the vlans for the TMG server.. i dont think its a communication problem  i think its the TMG blocking the requests

regarding the IP spoof fixit i figured that it would just be for alerts
Backend/frontend is not relevant to spoofing. The BPA will advise on the cause.
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=8aa01cb0-da96-46d9-a50a-b245e47e6b8b
hi guys..

i have run the BPA it doenst mention anything about spoofing??

what access rule or exception  would i have to add to allow other subnets to be allowed to access the internet??

TMG range 10.10.3.x (can browse the internet)
user range 10.10.4.x (currently cant browse the internet)

all i have done was run the web access wizard and added the 10.10.4.x range to the internal network..

anything else?
Did you add the range 10.10.4.x to internal network ranges ? please see attached.

Do you have in the access rule "internal" network  in the from tab?
a.PNG
yup i have added it in the internal properties:)
hi  guys

to help eliminate tmg as the problem.. i have tried this..
in the web access rules i have added anywhere
and as well as to the all outbound traffic...

this should allow all http/https traffic coming from any source rite??
but it still doesnt work? for some reason?? User generated image
Any particular reason no one has said,..."Add a static route on the ISA/TMG so that it know what routing device to use to get to the other subnets?.

Adding the range to the Internal Network Definition (LAT) is not enough,...the static route is required too,...otherwise you are telling the ISA/TMG that the Internal network has ranges that are part of it that are not reachable from the Internal Nic
....hence the spoofing alerts....
Why does he need a static route if he can already ping all the addresses from the FTMG?
Ok, no problem. But I scanned through the thread looking to see if a route was added and couldn't see that is was and didn't see that he could ping the other segments.  But the symptoms sure implied that there was no route.
Actually you may be right - there have been a whole flurry of these over the past couple of days :)
so the routes could be the issue??
i would have to add them on the TMG server right?
ASKER CERTIFIED SOLUTION
Avatar of pwindell
pwindell
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
yeah this is the case..
i feel the traffic is getting to the TMG server but it is being blocked from there..
but i have added the subnets to the internal network.... this should work then right?
hi guys..

in the internal network...
there is an option to add 'anywhere' to the from tab (see attached)

would this allow all subnets to pass through??

i cant try as im not at the client site..

cheers  User generated image User generated image
No,..."anywhere",...is not going to do "anything",...in this context.   It is not even related to this.
You cannot have the idea that you are never going to see any "denies" in the log,...there are always going to be "denies",...even when everything is working and everything is allowed that is supposed to be allowed there will be "denies" as part of the normal authentication process.  You have to judge things by whether or not something is truely broken,...not by simply seeing a "deny" in the log.
well the denies in the log are from and internal IP address on a different subnet that doenst have internet...
so its not working if this is the case...
i have contacted microsoft with this issue im sure they can help

thanks for all your help
thanks seams to be a problem with the routing... even though the routing table was up to date TMG did not see that so after the routes where added i had to re add the access rule
So basically I was right, even though I only got a "B" for it.