Event ID - PIX-1-106021

Message CodePIX-1-106021
SeverityAlert
DescriptionDeny protocol reverse path check from source_address to dest_address on interface interface_name
ExplanationAn attack is in progress. Someone is attempting to spoof an IP address on an inbound connection. Unicast RPF, also known as reverse route lookup, detected a packet that does not have a source address represented by a route and assumes that it is part of an attack on your Cisco ASA.This message appears when you have enabled Unicast RPF with the ip verify reverse-path command. This feature works on packets input to an interface; if it is configured on the outside, then the Cisco ASA checks packets arriving from the outside. The Cisco ASA looks up a route based on the source_address. If an entry is not found and a route is not defined, then this system log message appears and the connection is dropped. If there is a route, the Cisco ASA checks which interface it corresponds to. If the packet arrived on another interface, it is either a spoof or there is an asymmetric routing environment that has more than one path to a destination. The Cisco ASA does not support asymmetric routing. If the Cisco ASA is configured on an internal interface, it checks static route command statements or RIP, and if the source_address is not found, then an internal user is spoofing their address.
User ActionEven though an attack is in progress, if this feature is enabled, no user action is required. The Cisco ASA repels the attack.
Reference Links

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.