Staticfactory
IS-IT--Management
I could really use your help as I'm still fairly wet behind the ears when it comes to this sort of thing.
Our ASA has been flooded with "Deny reverse path check" drops and I can't figure out for the life of me how to find the culprit. I'll elaborate... first, here is an example from the ASA log:
===========================================
Jan 30 2009 14:29:46 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.7 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:46 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.7 on interface inside
Jan 30 2009 14:29:47 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.9 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:47 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.9 on interface inside
Jan 30 2009 14:29:48 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.101 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:48 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.101 on interface inside
Jan 30 2009 14:29:48 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.6 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:48 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.6 on interface inside
Jan 30 2009 14:29:49 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.7 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:49 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.7 on interface inside
Jan 30 2009 14:29:50 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.5 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:50 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.5 on interface inside
Jan 30 2009 14:29:51 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.8 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:51 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.8 on interface inside
Jan 30 2009 14:29:53 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.5 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:53 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.5 on interface inside
Jan 30 2009 14:29:54 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.9 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:54 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.9 on interface inside
Jan 30 2009 14:29:55 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.7 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:55 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.7 on interface inside
Jan 30 2009 14:29:59 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.5 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:59 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.5 on interface inside
Jan 30 2009 14:30:01 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.6 to 65.58.240.105 on interface inside
Jan 30 2009 14:30:01 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.6 on interface inside
Jan 30 2009 14:30:02 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.101 to 65.58.240.105 on interface inside
Jan 30 2009 14:30:02 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.101 on interface inside
Jan 30 2009 14:30:04 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.8 to 65.58.240.105 on interface inside
Jan 30 2009 14:30:04 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.8 on interface inside
Jan 30 2009 14:30:04 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.6 to 65.58.240.105 on interface inside
Jan 30 2009 14:30:04 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.6 on interface inside
===========================================
As you can see, we're seeing up to 10 attempts per second for these connections. The hosts are ALWAYS 10.10.10.X and 65.58.240.105 respectively.
First of all, we do not have anything internally that uses the 10.x.x.x range, nor do we have any routes for that range (besides the default). Based on some packet sniffing, It appears that these 10.0.0.x hosts are trying to establish connections on TCP 10000 to the external host 65.58.240.105 (my only guess is that they are trying to create an IPSEC tunnel over TCP/IP).
The packets only show that the source and destination MAC addresses are the inside interface of the ASA and one of our VLANs on the core switch respectively. I can't find any ARP information or anything else that would help clarify the situation.
This has been happening for days, and I assume I could just deny the traffic entirely, but I would rather STOP the traffic (if possible) and avoid the added load on the ASA.
Can anyone give me a hint as to how to find out where these connections are coming from?? It would be GREATLY appreciated!!
Our ASA has been flooded with "Deny reverse path check" drops and I can't figure out for the life of me how to find the culprit. I'll elaborate... first, here is an example from the ASA log:
===========================================
Jan 30 2009 14:29:46 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.7 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:46 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.7 on interface inside
Jan 30 2009 14:29:47 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.9 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:47 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.9 on interface inside
Jan 30 2009 14:29:48 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.101 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:48 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.101 on interface inside
Jan 30 2009 14:29:48 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.6 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:48 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.6 on interface inside
Jan 30 2009 14:29:49 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.7 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:49 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.7 on interface inside
Jan 30 2009 14:29:50 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.5 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:50 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.5 on interface inside
Jan 30 2009 14:29:51 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.8 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:51 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.8 on interface inside
Jan 30 2009 14:29:53 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.5 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:53 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.5 on interface inside
Jan 30 2009 14:29:54 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.9 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:54 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.9 on interface inside
Jan 30 2009 14:29:55 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.7 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:55 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.7 on interface inside
Jan 30 2009 14:29:59 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.5 to 65.58.240.105 on interface inside
Jan 30 2009 14:29:59 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.5 on interface inside
Jan 30 2009 14:30:01 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.6 to 65.58.240.105 on interface inside
Jan 30 2009 14:30:01 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.6 on interface inside
Jan 30 2009 14:30:02 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.101 to 65.58.240.105 on interface inside
Jan 30 2009 14:30:02 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.101 on interface inside
Jan 30 2009 14:30:04 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.8 to 65.58.240.105 on interface inside
Jan 30 2009 14:30:04 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.8 on interface inside
Jan 30 2009 14:30:04 Firewall : %ASA-1-106021: Deny TCP reverse path check from 10.10.10.6 to 65.58.240.105 on interface inside
Jan 30 2009 14:30:04 Firewall : %ASA-1-106021: Deny TCP reverse path check from 65.58.240.105 to 10.10.10.6 on interface inside
===========================================
As you can see, we're seeing up to 10 attempts per second for these connections. The hosts are ALWAYS 10.10.10.X and 65.58.240.105 respectively.
First of all, we do not have anything internally that uses the 10.x.x.x range, nor do we have any routes for that range (besides the default). Based on some packet sniffing, It appears that these 10.0.0.x hosts are trying to establish connections on TCP 10000 to the external host 65.58.240.105 (my only guess is that they are trying to create an IPSEC tunnel over TCP/IP).
The packets only show that the source and destination MAC addresses are the inside interface of the ASA and one of our VLANs on the core switch respectively. I can't find any ARP information or anything else that would help clarify the situation.
This has been happening for days, and I assume I could just deny the traffic entirely, but I would rather STOP the traffic (if possible) and avoid the added load on the ASA.
Can anyone give me a hint as to how to find out where these connections are coming from?? It would be GREATLY appreciated!!