Solved

ip spoof

Posted on 2014-11-26
5
171 Views
Last Modified: 2014-12-02
I just started to see these in our logs

Source       Destination                                  Cisco Event        Result
0.14.2.10    X.X.X.X one of our public IP's 106016             Deny IP spoof

There have been 10 in the last few mins but different source IP's starting with 0.

Excuse my ignorance but what does it mean when the IP address starts from 0.?

Many Thanks!
0
Comment
Question by:Farmerbob212
  • 2
  • 2
5 Comments
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 250 total points
ID: 40468122
0.x.x.x is a reserved block that is not available for public use.  http://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xml  It belongs to the Internet Assigned Numbers Authority (IANA).
0
 

Author Comment

by:Farmerbob212
ID: 40469097
So if it is a private IP is it coming from within the network? I usually see (inside-network) 192.168.x.x
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 40469510
Yes but 0.14.2.10 is not a 'private IP'.  It is in a reserved block for the Internet Assigned Numbers Authority (IANA) and you should never see it.   I don't know how they are managing to spoof that IP address.  I think it takes some low level programming to do that.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 40472468
You can spoof the src with a variety of programs, nmap being one of he easiest, it's already built-in. Spoofing isn't very effective outside of UDP. You should have bogons being denied, that's all of RFC 1918 (10.x.x.x, 192.168.x.x, 172.16.x.x) as well as others you don't want:
http://www.cisco.com/web/about/security/intelligence/firewall-best-practices.html#_Toc332806011
https://supportforums.cisco.com/document/12013356/implementing-anti-spoofing-access-list
It's typically nothing to worry about, especially in the TCP protocol.
-rich
0
 

Author Closing Comment

by:Farmerbob212
ID: 40476237
thank you very much for the advice!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question