Solved

ip spoof

Posted on 2014-11-26
5
177 Views
Last Modified: 2014-12-02
I just started to see these in our logs

Source       Destination                                  Cisco Event        Result
0.14.2.10    X.X.X.X one of our public IP's 106016             Deny IP spoof

There have been 10 in the last few mins but different source IP's starting with 0.

Excuse my ignorance but what does it mean when the IP address starts from 0.?

Many Thanks!
0
Comment
Question by:Farmerbob212
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 250 total points
ID: 40468122
0.x.x.x is a reserved block that is not available for public use.  http://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xml  It belongs to the Internet Assigned Numbers Authority (IANA).
0
 

Author Comment

by:Farmerbob212
ID: 40469097
So if it is a private IP is it coming from within the network? I usually see (inside-network) 192.168.x.x
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 40469510
Yes but 0.14.2.10 is not a 'private IP'.  It is in a reserved block for the Internet Assigned Numbers Authority (IANA) and you should never see it.   I don't know how they are managing to spoof that IP address.  I think it takes some low level programming to do that.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 40472468
You can spoof the src with a variety of programs, nmap being one of he easiest, it's already built-in. Spoofing isn't very effective outside of UDP. You should have bogons being denied, that's all of RFC 1918 (10.x.x.x, 192.168.x.x, 172.16.x.x) as well as others you don't want:
http://www.cisco.com/web/about/security/intelligence/firewall-best-practices.html#_Toc332806011
https://supportforums.cisco.com/document/12013356/implementing-anti-spoofing-access-list
It's typically nothing to worry about, especially in the TCP protocol.
-rich
0
 

Author Closing Comment

by:Farmerbob212
ID: 40476237
thank you very much for the advice!
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ready for our next Course of the Month? Here's what's on tap for June.
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question