well I know exactly which server the spoofing is coming from, I just don't know how to get rid of it. It is creating traffic to the firewall at about 10 times greater than that of the Internet traffic.
What do I need to change (probably on the server) to stop these messages being produced?
The traffic is being generated on the side of your trusted interface. If the trusted interface does not know about that network, it will consider it to be spoofed.
Can I assume this is not really a public IP on your trusted interface?
The ip's are valid IP's. The subnet mask is valid.
Both ethernet adaptors on the server or sending out spoofed addresses.
The IP's are registered in DNS on our network, and I can connect via terminal services to the server, ping, nslookup etc
Could it be a routing table issue? I have been trying to set the machine up as a router (without much success)but to try and pinpoint this issue have turned off RRAS.
by public IP do you mean a 10. 172. or 192. IP address?
If so, yes it is one of those. The FB then NAT's it to our Internet IP.
It sounds like it may be an issue with routing. Do your NICS have more than one IP address assigned to them? If so, are any of the IP addresses the same IP address you are seeing in your logs as a spoofed source address?
OK - so both IPs (x.x.1.38 and x.x.2.1) show as spoofed in the FB logs? Are either the x.x.1 subnet or the x.x.2 subnet, subnets that are defined on the FB trusted interface (probably as secondary networks)?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.