Event ID - 15003

Event Id15003
SourceISA Server H.323 Filter
DescriptionISA Server detected a land attack.
Event InformationAccording To Microsoft:
A possible land attack was attempted against a computer protected by ISA Server. This alert occurs when a Transmission Control Protocol (TCP) SYN packet or User Datagram Protocol (UDP) packet is sent with a spoofed source Internet Protocol (IP) address and port number that is identical to that of the destination IP address and port. The effect of this appears as if the host computer has sent a packet to itself. If this attack is successful, a loop is created and the computer crashes.

Resolution:
If logging for dropped packets is enabled, you can view details of this attack in the Firewall log in the log viewer. You can use this log to monitor any further intruder activity. To do this, in the console tree of ISA Server Management click Monitoring, then click the Logging tab. Then edit the log filter to view the relevant details. Take additional steps against intruder activity. For example, you may want to add access rules denying traffic from the source of the intrusion. To do this, in the console tree of ISA Server Management click Firewall Policy. Then, on the Tasks tab, click Create New Access Rule.
Reference LinksMicrosoft product: Internet Security and Acceleration Server Version: 4.0.3443.594 Event Source: ISA Server H.323 Filter Event ID: 15003

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.