We help IT Professionals succeed at work.
Get Started

Sonicwall IP Spoof in log when accessing internal resource from WAN

1,839 Views
Last Modified: 2012-05-12
I have a Sonicwall NSA 2400 with the following interfaces:
X0: LAN (10.9.0.0/16)
X1: WAN (11.22.33.154/29)
X2: WAN (44.55.66.245/30)

Our X1 WAN zone has a number of NAT policies that translate inbound traffic to private IPs in the X0 LAN zone.  We have an IP webcam at 10.9.50.200, and I want to be able to access port 80 on that webcam from the Internet.  I currently have NAT policies that translate 11.22.33.155:80 to 10.9.50.200:80.  However, when I try to hit 11.22.33.155:80 from a computer outside our network, the connection times out and I see the following log on the Sonicwall:

11/02/2011 13:47:44.688      Alert      Intrusion Prevention      IP spoof dropped      72.66.229.30, 2849, X1, pool-72-66-229-30.ronkva.east.verizon.net      11.22.33.155, 80, X1, 11-22-33-155.unassigned.myisp.net      MAC address: 00:18:b9:0e:4a:65

I will also mention that I have several other similar NAT policies in place that are working fine.  Just this one isn't working.  Thanks for any help!
Comment
Watch Question
Commented:
This problem has been solved!
Unlock 1 Answer and 5 Comments.
See Answer
Why Experts Exchange?

Experts Exchange always has the answer, or at the least points me in the correct direction! It is like having another employee that is extremely experienced.

Jim Murphy
Programmer at Smart IT Solutions

When asked, what has been your best career decision?

Deciding to stick with EE.

Mohamed Asif
Technical Department Head

Being involved with EE helped me to grow personally and professionally.

Carl Webster
CTP, Sr Infrastructure Consultant
Ask ANY Question

Connect with Certified Experts to gain insight and support on specific technology challenges including:

  • Troubleshooting
  • Research
  • Professional Opinions
Did You Know?

We've partnered with two important charities to provide clean water and computer science education to those who need it most. READ MORE