Thanks for your help.

With this I sent a small description about how network has bean
setting up and the hardware that the we are using.

Network 1 : 10.10.X.X / 255.255.0.0 (The Other Company/Firewall)

Network 2 : 192.168.5.X.X / 255.255.0.0 (My company)

The Switch we have 2 Vlans.

The Switch and Gateway/Firewall is controlled by the other company.

The Router connect us to the internet. The router is controlled by ISP


--------     --------    -------------
|Router|     |HUB   |    |Comp. (Win)|(192.168.X.X)
|Cisco |---->|      |--->|Network 2  |
--------     --------    -------------
(192.168.X.X)   | |_____________________
(10.10.X.X)     |                      |(port Vlan2)
                v                      v
            ----------             ----------(Vlan 2)         192.168.X.X
            |Gateway |             |Switch  |-------->NetWork 2 (Windows)
            |FireWall|------------>|3Com    |(Vlan 1)
            |(Linux) | (port Vlan1)|        |-------->NetWork 1 (Windows)
            ----------             ----------                  10.10.X.X
            (10.10.X.X)            (10.10.X.X)



----- Original Message -----
From: "Tarragon Allen" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, November 20, 2001 11:32 PM
Subject: Re: [expert] Firewall Log Question


> On Wed, 21 Nov 2001 14:09, Eduardo Bencomo wrote:
> > We are in a mixed network, which includes a router Cisco, a 3COM swich
> > common to the two networks and a hub where gateway/fire wall linux
computer
> > is connected.
> >
> > One of the network is my company network (192.168.X.X / 255.255.0.0. I
am
> > in charge of it) and the other network belongs to other company
(10.10.X.X
> > / 255.255.0.0). This company has a VPN. Now, they are accusing me as
> > hacker, alleging we have tried to go into their VPN. As prove of tha t ,
> > they are showing the following type of message:
>
> How do they know it's your network?  The 192.168.x.x range is used by many
> many many people out there to define their internal networks, and is in
fact
> supplied on spec (in one of the RFC's) for this very purpose.  Just
showing
> some logs with that IP in it doesn't seem to constitute any proof
whatsoever
> that your particular network was involved.
>
> The actual packets they've listed here appear to be NetBIOS broadcasts.
> These are sent by Windows clients when they are trying to poll the network
> for other Windows machines.  It looks to me like Windows machines using
> 192.168.x.x is trying to poll something on their network.  Again, no
> indication that it's neccesarily from *your* network, it could be any
machine
> using those IPs with a subnet mask of 255.255.0.0.
>
> If they are seeing these packets, how did they make it there?  If they are
> running a VPN, the only way they could see these packets from your network
> would be if someone using that IP connected to their VPN and then
forwarded
> packets to them.  Unless they can provide more proof (perhaps with
> explanations of where they think the traffic is coming from, rather than a
> pile of oblique logs from a network and host you have no more information
> about) there's not much you can do.
>
> A "more information is required" situation.  Also, I'd assume it's not
> "hacking" - it feels more like some sort of misconfiguration to me.
>
> Btw, is this other company on the same network or share network hardware?
> What connections do you have to this company?  Could it be something as
> simple as a patch lead connecting two hubs together?
>
> t
>
> > Oct 21 04:09:49 localhost kernel: Packet log: input REJECT eth0 PROTO=6
> >
> > 213.107.153.72:4512 216.72.44.186:27374 L=48 S=0x00 I=24273 F=0x4000
T=109
> > SYN (#70)
> >
> > Oct 21 04:09:55 localhost kernel: Packet log: input DENY eth0 PROTO=17
> > 192.168.2.185:138
> >
> > 192.168.255.255:138 L=229 S=0x00 I=43989 F=0x000 T=128 (#71)
> >
> > Oct 21 04:10:01 localhost kernel: Packet log: input REJECT eth0 PROTO=6
> >
> > 213.107.153.72:4512 216.72.44.186:27374 L=48 S=0x00 I=24273 F=0x4000
T=109
> > SYN (#70)
>
> --
> PGP key : http://n12turbo.com/tarragon/public.key
>
>


----------------------------------------------------------------------------
----


> Want to buy your Pack or Services from MandrakeSoft?
> Go to http://www.mandrakestore.com
>

Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to