Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
For normal trafic (http ftp request...) if the requested IP is in SUB1 but not configured as a VIP, the firewall doesn' t answer the request and drop the packet.That should be normal. Do you have a network-diagram of what you have? The SUb1 and IPX and all of the other lingo is throwing a cloud of confusion ( at least for me ) of what you have. Include the subnet/mask and gateway with real of fake ip_address. Then we could see a better view of what your saying. If you have VIPs and the appropiate Default Gateway (the router ), then your design should work. An traffic that' s not terminate at the VIP, or originates from the firewall, should be simply discard/ignored. Your network is typical a simple design form what we can tell and shouldn' t be all of that complex.
PCNSE
NSE
StrongSwan
conf sys settings set strict-src-check enable Enable to refuse packets from a source IP range if there is a specific route in the routing table for this network (RFC 3704).The meaning hopefully is " ...if there is a route AND traffic is coming in not on the source subnet' s interface" . Then RPF makes sense. You can enable this setting and try it out but with caution. Fortinet might have had other intentions in mind with it, and it might block legitimate traffic. I' m curious what you might find out, and whether your configuration is preventing RPF. But really, the FGT cannot be blamed IMO: just using VIPs is not giving RPF enough information. Rather, the next hop router should be re-configured.
True. The attacker' s access router (at his ISP) should have discarded the traffic with the fake source IP.and
1) The router at 10.10.11.1 is not configured correctly. It should drop packets if their source address is known to be coming from an interface which is not the current source interface.Routers, unless configured for RPF checks, don' t care about the SRC_address. All route decision are based from a DST_Address. f.g I could go to my home and generate traffic w/ a src of 92.92.92.0/24 network and my router or ISP router wouldn' t care ( and yes my ISP don' t have RPF checks enable or unicast-verification enabled ) What' s probably happening; someone , some where, has hijack the OP address or has something misconfigured. So the returning TTL expired messages ( icmp type11 ) is coming to your FGT, and it' s doing it' s job by dropping this traffic This is not nothing to be alarmed about ( imho ), cause the FW is aware and knows it didn' t allow that traffic outbound or doesn' t have the resulting session state. If it' s a big concern you have 2 choices to squash this to some degree, both are easy to do on a cisco router btw; 1> ( the most easiest ), is to enable unicast verification aka RPF checks ! ! int gi 0/1 ip verify unicast source ! ! end 2> option #2; if unicast verifiy is not a support feature, is to apply a ACL on the internet facing interface to drop these packets and at the same time, drop any " martians" . e.g ! ! ip access-list ext blackholes ! remark define any src that matches my networks deny ip 92.92.92.0 0.0.0.255 any remark define any thing that starts with 0.0.0.0 as a source cause we know this can' t be good ;) deny ip 0.0.0.0 0.255.255.255 any ! remark define any 127 networks that are sourced deny ip 127.0.0.0 0.255.255.255 any remark define any AIPA address deny ip 169.254.0.0 0.0.255.255 any remark drop any rfc1918 address ( no way these should be on the network but people do leak them ) deny ip 10.0.0.0 0.255.255.255 any deny ip 172.16.0.0 0.15.255.255 any deny ip 192.168.0.0 0.0.255.255 any remark whenever you are done include a permit any permit ip any any ! or even more tighter ! permit ip any 92.92.92.0 0.0.0.255 ! ! you get the picture now ? ! At the minimum I do the above networks plus the mcasts range and some of the BOGON like the; 1net , experiment network 192.0.2.0,etc.... In some cases, where I don' t have access to my upstream router, I craft a acl on the firewall that does the same. for an update BOGON list of src_address that should never apper on the wire, follow this link http://www.team-cymru.org/Services/Bogons/bogon-dd.html If your in a cisco environment a few website have downloadable ACL that you can just plug-in play or append to your own custom lists. Same for if your running linux iptables or similar dvices. Good luck
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.