<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Possible CLDAP DDoS - But how is traffic coming from outside to inside with no open ports or NAT to pubic IP? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4051628#M1068165</link>
    <description>&lt;P&gt;I noticed numerous amount of CLDAP traffic to one of my DC starting 3/17/20.&amp;nbsp; &amp;nbsp;The device is a Firepower 1010 running FTD 6.5.0.4.&amp;nbsp; &amp;nbsp;The FTD has no open ports and only two NAT rules.&amp;nbsp; One rule for a site to site VPN and the other rule for devices from the inside to the outside.&amp;nbsp; &amp;nbsp;From vFMC,&amp;nbsp; I can see the connections attempt from the outside source (Initiator) hitting my internal DC at 192.168.50.5 (Responder) with my Firepower rule to block udp/389,&amp;nbsp; see Figure 1.&amp;nbsp; Figure 2 is Wireshark capture prior to the block rule which seems to indicate the DC is repsonding to the CLDAP queries.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;How is this network connection possible if there are no open ports on the FTD and no NAT to public IP?&amp;nbsp; Am I reading this correctly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Figure 1: Outside source to inside DC&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CLDAP Traffic.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/69873i6892078F85512DE6/image-size/large?v=v2&amp;amp;px=999" role="button" title="CLDAP Traffic.png" alt="CLDAP Traffic.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Figure 2: Wireshark prior to blocking port 389&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CLDAP Traffic from DC.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/69874i67A48354F4D3198F/image-size/large?v=v2&amp;amp;px=999" role="button" title="CLDAP Traffic from DC.png" alt="CLDAP Traffic from DC.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Mar 2020 20:46:01 GMT</pubDate>
    <dc:creator>dotran</dc:creator>
    <dc:date>2020-03-24T20:46:01Z</dc:date>
    <item>
      <title>Possible CLDAP DDoS - But how is traffic coming from outside to inside with no open ports or NAT to pubic IP?</title>
      <link>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4051628#M1068165</link>
      <description>&lt;P&gt;I noticed numerous amount of CLDAP traffic to one of my DC starting 3/17/20.&amp;nbsp; &amp;nbsp;The device is a Firepower 1010 running FTD 6.5.0.4.&amp;nbsp; &amp;nbsp;The FTD has no open ports and only two NAT rules.&amp;nbsp; One rule for a site to site VPN and the other rule for devices from the inside to the outside.&amp;nbsp; &amp;nbsp;From vFMC,&amp;nbsp; I can see the connections attempt from the outside source (Initiator) hitting my internal DC at 192.168.50.5 (Responder) with my Firepower rule to block udp/389,&amp;nbsp; see Figure 1.&amp;nbsp; Figure 2 is Wireshark capture prior to the block rule which seems to indicate the DC is repsonding to the CLDAP queries.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;How is this network connection possible if there are no open ports on the FTD and no NAT to public IP?&amp;nbsp; Am I reading this correctly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Figure 1: Outside source to inside DC&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CLDAP Traffic.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/69873i6892078F85512DE6/image-size/large?v=v2&amp;amp;px=999" role="button" title="CLDAP Traffic.png" alt="CLDAP Traffic.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Figure 2: Wireshark prior to blocking port 389&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CLDAP Traffic from DC.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/69874i67A48354F4D3198F/image-size/large?v=v2&amp;amp;px=999" role="button" title="CLDAP Traffic from DC.png" alt="CLDAP Traffic from DC.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 20:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4051628#M1068165</guid>
      <dc:creator>dotran</dc:creator>
      <dc:date>2020-03-24T20:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Possible CLDAP DDoS - But how is traffic coming from outside to inside with no open ports or NAT to pubic IP?</title>
      <link>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4081954#M1070004</link>
      <description>Just had this exact problem myself on a FP2110. I disabled a default inspect rule that was somehow letting CLDAP through.</description>
      <pubDate>Fri, 08 May 2020 13:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4081954#M1070004</guid>
      <dc:creator>DecopacCo</dc:creator>
      <dc:date>2020-05-08T13:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: Possible CLDAP DDoS - But how is traffic coming from outside to inside with no open ports or NAT to pubic IP?</title>
      <link>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4082005#M1070006</link>
      <description>&lt;P&gt;Did you work with Cisco on this or were you able to determine this on your own.&amp;nbsp; I had a TAC case opened and Cisco told me the connection started from the inside which xlate then allowed back in.&amp;nbsp; &amp;nbsp;This was after 3 hours of going to packets trace.&amp;nbsp; &amp;nbsp;However,&amp;nbsp; I wasn't fully convince.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you confirmed with Cisco this is a bug or at the very least this is "as expected" behavior"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Doug&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 13:57:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4082005#M1070006</guid>
      <dc:creator>dotran</dc:creator>
      <dc:date>2020-05-08T13:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: Possible CLDAP DDoS - But how is traffic coming from outside to inside with no open ports or NAT to pubic IP?</title>
      <link>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4082022#M1070007</link>
      <description>&lt;P&gt;I figured it out on my own by combing through various Firepower reports, specifically the connection events. I had an inspect rule that was ingesting traffic for inspection (I followed Lammle's configuration videos); however, that rule somehow allowed outside CLDAP traffic to reflect off a domain controller on the inside network. This reflection ramped up recently to the point where my carrier was dropping packets to throttle me.&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 14:12:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4082022#M1070007</guid>
      <dc:creator>DecopacCo</dc:creator>
      <dc:date>2020-05-08T14:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: Possible CLDAP DDoS - But how is traffic coming from outside to inside with no open ports or NAT to pubic IP?</title>
      <link>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4082037#M1070008</link>
      <description>Great, I'm new to these FTD and so far I'm not that happy with them especially the separate management interface to connect to FMC. I thought by switching from the ASA with Firepower to these FTD, it would be easier to manage as in updates and such. So far, I've had nothing but problems.&lt;BR /&gt;Would you mind sharing your link as to know where to adjust these inspection rules?&lt;BR /&gt;</description>
      <pubDate>Fri, 08 May 2020 14:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4082037#M1070008</guid>
      <dc:creator>dotran</dc:creator>
      <dc:date>2020-05-08T14:28:20Z</dc:date>
    </item>
    <item>
      <title>Re: Possible CLDAP DDoS - But how is traffic coming from outside to inside with no open ports or NAT to pubic IP?</title>
      <link>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4082064#M1070009</link>
      <description>&lt;P&gt;I'm using a virtual FMC. I went to Policies - Access Control and edited an "inspect all traffic" rule I made about a year ago. I learned that rule was at fault when I checked connection events and drilled into one of the many CLDAP events.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With my FP2110s, I followed Todd Lammle's video series for configuration (I recommend it). FTD is sluggish and arcane, but if you update your boxes fully and understand their quirks, they're decent.&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 15:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-cldap-ddos-but-how-is-traffic-coming-from-outside-to/m-p/4082064#M1070009</guid>
      <dc:creator>DecopacCo</dc:creator>
      <dc:date>2020-05-08T15:00:47Z</dc:date>
    </item>
  </channel>
</rss>

