Setup: Server Windows 2000 in my LAN and another in my DMZ.
Let's call them LAN1 and DMZ1 to distinguish them.
My firewall sends me messages whenever suspicious activity is noticed, namely: Spoofing. Oddly enough, there is nothing blocked between my DMZ and my LAN. All ports are open between them.
Every 15 minutes or so, during business hours mostly (because of network activity, I'm guessing), I recieve a message from my firewall stating the following:
IP spoof detected - Source:192.168.123.143, 137, DMZ - Destination:10.0.0.9, 137, LAN MAC: 00 04 9B 7E 42 3E
This looks legitimate, but the problem is that 192.168.123.143 does not exist. The MAC address is the LAN NIC for LAN1 I've only got the one machine in the DMZ (DMZ1) and it's in the ranges of 192.168.0.x (mask:255.255.255.0). The spoofing is on port 137 which suggests that it's a NETBIOS Name Service request, but how does a broadcast get spoofed from an address that does not exist? There is no signs of malicious activity. The Computer Browser service on DMZ1 is Disabled.
LAN1 is an Active Directory server.
DMZ1 is a member server only. (No AD). It also serves as a VPN access point which gives out 192.168.0.100 to 200 addresses.
I've tried disabling NetBios over TCP/IP on DMZ1 but no change.
I sometimes get this error when some VPN clients are online, but the spoof will come from a VPN address (192.168.0.101 as for example), which makes more sense since they can be trying to browse the network.
I always get the following three IPs that the spoofs originate from: 192.168.123.143, 192.168.8.18, 192.168.1.147. This last one is in the VPN range, but there is never more than 5 people online at once so it never makes it to .147
Extra info: I get report of spoofing on port 123 (Network Time Protocol) from 192.168.8.18 sometimes also.
I can understand that they can be detected as malicious activity (spoofing), but it's the IP's that don't make sense.
Any clues to how these IPs are being produced?
"In space, nobody can hear you click..."
Let's call them LAN1 and DMZ1 to distinguish them.
My firewall sends me messages whenever suspicious activity is noticed, namely: Spoofing. Oddly enough, there is nothing blocked between my DMZ and my LAN. All ports are open between them.
Every 15 minutes or so, during business hours mostly (because of network activity, I'm guessing), I recieve a message from my firewall stating the following:
IP spoof detected - Source:192.168.123.143, 137, DMZ - Destination:10.0.0.9, 137, LAN MAC: 00 04 9B 7E 42 3E
This looks legitimate, but the problem is that 192.168.123.143 does not exist. The MAC address is the LAN NIC for LAN1 I've only got the one machine in the DMZ (DMZ1) and it's in the ranges of 192.168.0.x (mask:255.255.255.0). The spoofing is on port 137 which suggests that it's a NETBIOS Name Service request, but how does a broadcast get spoofed from an address that does not exist? There is no signs of malicious activity. The Computer Browser service on DMZ1 is Disabled.
LAN1 is an Active Directory server.
DMZ1 is a member server only. (No AD). It also serves as a VPN access point which gives out 192.168.0.100 to 200 addresses.
I've tried disabling NetBios over TCP/IP on DMZ1 but no change.
I sometimes get this error when some VPN clients are online, but the spoof will come from a VPN address (192.168.0.101 as for example), which makes more sense since they can be trying to browse the network.
I always get the following three IPs that the spoofs originate from: 192.168.123.143, 192.168.8.18, 192.168.1.147. This last one is in the VPN range, but there is never more than 5 people online at once so it never makes it to .147
Extra info: I get report of spoofing on port 123 (Network Time Protocol) from 192.168.8.18 sometimes also.
I can understand that they can be detected as malicious activity (spoofing), but it's the IP's that don't make sense.
Any clues to how these IPs are being produced?
"In space, nobody can hear you click..."