Go to original post. You may try to block access from inside network to inside network in an ACL bound to the inside interface as "in" ACL:. This content has been marked as final. You can not post a blank message. The IP address is part of that pool
|Date Added:||26 December 2014|
|File Size:||29.31 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
Its gateway IP I would check who is the user that is using that IP address with the command show vpn-sessiondb anyconnect or if you have the legacy IPsec Remote VPN with the command show vpn-sessiondb ra-ikev1-ipsecand then verify if that laptop has any malware.
Cisco ASDM for ASA help - - The Cisco Learning Network
Currently that IP is blocked from all servers. The IP address is part of that pool You can not post a blank message.
So I am not sure where this interface is picking up the unknown IP From last couple of days, I am seeing an unknown IP You may try to block access from inside network to inside network in an ACL bound to the inside interface as "in" ACL:. I would assume, that disabling that will stop the pings from that MAC address Please type your message and try 66.2.
This interface is on same pool which is assigned to that subnet. Sorry Firewall I meant.
You may try to block access from inside network to inside network in an ACL bound to the inside interface as "in" ACL: This content has been marked as final. Go to original post. In case, that it was VPN traffic, you will see the outside interface as source interface, if it is like i cisck inside host tries to hide his source mac addressyou will see the inside interface as source interface for the traffic.
Please let me know what can be done to fix this. May 15, 2: I don't know, why this happens, but maybe it is an indication of a malware infected host, that tries to scan the network and tries to hide its own MAC address But that may not be possible without breaking something else for example if you use remote-access VPNs with split-tunnel-policy "tunnelall" and want the vpn clients to be able to access the internet.
Is that ip address part of the ip pool of the remote access VPN?
I am facing an weird issue in our environment. Please enter a title.
Solved: ASDM f - for FWSM (1) - Cisco Community
Hi, I am facing an weird issue in our environment. We confirmed thatthat IP is not used anywhere in our env. I would assume, that an inside host in your network sends the pings with destination addresses from the local net cidco the default-gateway the ASA instead of directly to the target host.
Have you enabled "same-security-traffic permit intra-interface"?