<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic alert tcp $EXTERNAL_NET any - in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053146#M18205</link>
    <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;alert tcp $EXTERNAL_NET any&amp;nbsp;-&amp;gt; $HOME_NET 22 (msg:"SSH brute force flowbit 1"; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flow:from_server,established; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;content:"SSH-";depth:4;nocase; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;pcre:"/^SSH-[12]\.\d+/smi"; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flowbits:set,ssh_server_banner; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flowbits:noalert; sid:1100000;)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;alert tcp&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;$EXTERNAL_NET any&amp;nbsp;-&amp;gt; $HOME_NET 22&lt;/SPAN&gt;&lt;/STRONG&gt; (msg:"SSH Brute Force Attack"; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flow:from_server,established; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flowbits:isset,ssh_server_banner; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;content:"|00 00|"; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;content:"|14|"; distance:3; within:1; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;detection_filter:track by_dst, count 10, seconds 25; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;sid:11000001; )&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 01 Jun 2017 02:28:07 GMT</pubDate>
    <dc:creator>atatistc</dc:creator>
    <dc:date>2017-06-01T02:28:07Z</dc:date>
    <item>
      <title>(1:1000122) Local - BAD-TRAFFIC SSH brute force login attempt</title>
      <link>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053142#M18157</link>
      <description>&lt;P&gt;IPS RULE:&lt;/P&gt;
&lt;P&gt;alert tcp $EXTERNAL_NET any -&amp;gt; $HOME_NET 22 (sid:1000122; gid:1; flow:established,to_server;&lt;STRONG&gt; content:"SSH-"&lt;/STRONG&gt;; depth:4; detection_filter:track by_src, count 30, seconds 60; msg:"Local - BAD-TRAFFIC SSH brute force login attempt"; classtype:High; rev:1; metadata:service ssh; )&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Observed numerous false positive events, Please suggest to avoid false positive. Most of the false positive are internal traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 13:28:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053142#M18157</guid>
      <dc:creator>ramachandran.gunasekaran</dc:creator>
      <dc:date>2017-05-24T13:28:37Z</dc:date>
    </item>
    <item>
      <title>Why do you think that</title>
      <link>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053143#M18169</link>
      <description>&lt;P&gt;Why do you think that signature triggered is false positive? Could you provide pcap capture from IPS event that triggered the IPS events? If not, please start with validation of source and destination IP's and ports in pcap, does it match properly variable set?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 18:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053143#M18169</guid>
      <dc:creator>Veronika Klauzova</dc:creator>
      <dc:date>2017-05-24T18:02:44Z</dc:date>
    </item>
    <item>
      <title>Hi Veronika,</title>
      <link>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053144#M18184</link>
      <description>&lt;P&gt;Hi Veronika,&lt;/P&gt;
&lt;P&gt;thanks for the response.&lt;/P&gt;
&lt;P&gt;Here most of them are internal traffic, If that possible to exclude internal IP in the source.&lt;/P&gt;
&lt;P&gt;Even though it is mentioned as external in IPS rule, it also triggers the alert for internal IP.&lt;/P&gt;
&lt;P&gt;I want to reduce the alerts in order to locate the actual brute force attack.&lt;/P&gt;
&lt;P&gt;Kindly suggest some inputs.&lt;/P&gt;
&lt;P&gt;below is one of the example packet text: Since the packet text is having the content "SSH-", IPS throws the alert.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;L..%.ITu......E..H4.@.&amp;lt;...
2..
....X.....G'[ro...}F1.....
T..N...;SSH-2.0-JSCH-0.1.53&lt;/PRE&gt;</description>
      <pubDate>Thu, 25 May 2017 10:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053144#M18184</guid>
      <dc:creator>ramachandran.gunasekaran</dc:creator>
      <dc:date>2017-05-25T10:20:14Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053145#M18196</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;by default system have in EXTERNAL_NET and HOME_NET variables &lt;STRONG&gt;any&lt;/STRONG&gt; value, which includes all networks (internal, external). You can verify what networks are included in those variables under FMC GUI Objects -&amp;gt; Object Management -&amp;gt; Variable set -&amp;gt; Default-Set -&amp;gt; Edit, this will display all available variable set.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It is recommended to change HOME_NET default setting and include the network range/s that the active IPS policy protects, basically all of your internal networks. EXTERNAL_NET can be kept with default settings which is any (0.0.0.0/0 network).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This will eliminate false positives that you are seeing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if you will have more questions on this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Veronika&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 10:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053145#M18196</guid>
      <dc:creator>Veronika Klauzova</dc:creator>
      <dc:date>2017-05-25T10:42:07Z</dc:date>
    </item>
    <item>
      <title>alert tcp $EXTERNAL_NET any -</title>
      <link>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053146#M18205</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;alert tcp $EXTERNAL_NET any&amp;nbsp;-&amp;gt; $HOME_NET 22 (msg:"SSH brute force flowbit 1"; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flow:from_server,established; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;content:"SSH-";depth:4;nocase; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;pcre:"/^SSH-[12]\.\d+/smi"; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flowbits:set,ssh_server_banner; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flowbits:noalert; sid:1100000;)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;alert tcp&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;$EXTERNAL_NET any&amp;nbsp;-&amp;gt; $HOME_NET 22&lt;/SPAN&gt;&lt;/STRONG&gt; (msg:"SSH Brute Force Attack"; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flow:from_server,established; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;flowbits:isset,ssh_server_banner; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;content:"|00 00|"; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;content:"|14|"; distance:3; within:1; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;detection_filter:track by_dst, count 10, seconds 25; \&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;sid:11000001; )&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 02:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1-1000122-local-bad-traffic-ssh-brute-force-login-attempt/m-p/3053146#M18205</guid>
      <dc:creator>atatistc</dc:creator>
      <dc:date>2017-06-01T02:28:07Z</dc:date>
    </item>
  </channel>
</rss>

