<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Did you remember to fill in a in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965191#M43401</link>
    <description>&lt;P style="padding-left: 30px;"&gt;Did you remember to fill&amp;nbsp;in a "Watch IP" or range?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can always add these hosts to the "Ignore scanners" list.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Nov 2016 19:02:25 GMT</pubDate>
    <dc:creator>Dennis Perto</dc:creator>
    <dc:date>2016-11-28T19:02:25Z</dc:date>
    <item>
      <title>Firepower portscan detection tuning</title>
      <link>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965190#M43400</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have ASA with Firepower module controled by Firepower Management Center. ASA protect some network segments from other WAN. I have enabled signature PSNG_TCP_PORTSCAN and PSNG_TCP_PORTSWEEP. Portscan Detection Sensitivity Level is Low (or Medium).&lt;BR /&gt;I get hundreds of events PSNG_TCP_PORTSCAN (122:1:1) where my hosts try to establish 5 connections with no result to different port:&lt;BR /&gt;Priority Count: 5&lt;BR /&gt;Connection Count: 5&lt;BR /&gt;IP Count: 1&lt;BR /&gt;Port/Proto Count: 5&lt;BR /&gt;Can I change count of ports/host by default, which generate this type of signature to 30-50 value (typical host/port scanner scans more then 5 port I think)?&lt;BR /&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965190#M43400</guid>
      <dc:creator>v.kolosov</dc:creator>
      <dc:date>2019-03-10T13:43:23Z</dc:date>
    </item>
    <item>
      <title>Did you remember to fill in a</title>
      <link>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965191#M43401</link>
      <description>&lt;P style="padding-left: 30px;"&gt;Did you remember to fill&amp;nbsp;in a "Watch IP" or range?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can always add these hosts to the "Ignore scanners" list.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2016 19:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965191#M43401</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-11-28T19:02:25Z</dc:date>
    </item>
    <item>
      <title>Can you explain me what do </title>
      <link>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965192#M43402</link>
      <description>&lt;P&gt;Can you explain me what do&amp;nbsp;&lt;SPAN&gt;"Watch IP" field? By documentation: "&lt;SPAN&gt;If you want to monitor specific hosts for signs of portscan activity, enter the host IP address in the &lt;SPAN&gt;&lt;B&gt;Watch IP&amp;nbsp;&lt;/B&gt;&lt;SPAN&gt;field&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;", but by default all host (whitch hit in Access control rule with Intrusion Prevention policy) in my network monitored with portscan detection, or not?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I remember fields "Ignore scanners/scanned" but they are my "last resort".&amp;nbsp;&lt;SPAN id="result_box" class="" lang="en"&gt;&lt;SPAN class=""&gt;I will have to&lt;/SPAN&gt; add&amp;nbsp;so &lt;SPAN id="result_box" class="short_text" lang="en"&gt;&lt;SPAN class=""&gt;large&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;number of hosts, that I find it easier to disable the signature at all.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 05:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965192#M43402</guid>
      <dc:creator>v.kolosov</dc:creator>
      <dc:date>2016-11-29T05:01:30Z</dc:date>
    </item>
    <item>
      <title>I'm not sure that you are</title>
      <link>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965193#M43403</link>
      <description>&lt;P&gt;I'm not sure that you are right about your assumptions with hitting the Access Control Policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These settings are in the Network Analysis Policy, so I figure that they are global for all your $HOME_NET hosts, both ingress and egress.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would imagine that you only need to know when your hosts are being scanned from the outside. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 06:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965193#M43403</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-11-29T06:18:49Z</dc:date>
    </item>
    <item>
      <title>You are right :) </title>
      <link>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965194#M43404</link>
      <description>&lt;P&gt;You are right &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But "outside" for me is a global corporate network with a large number of legitimate users who connect to servers on LAN&amp;nbsp;network. One client can establish up to 20 connections to 10 servers simultaneously. And such behavior is considered a violation by Firepower.&lt;BR /&gt;Maybe I can customize anyway Portscan detector to Alert when the user to establish 50 simultaneous connection , instead of 5-10, as now?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 06:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965194#M43404</guid>
      <dc:creator>v.kolosov</dc:creator>
      <dc:date>2016-11-29T06:30:32Z</dc:date>
    </item>
    <item>
      <title>You might have a look at the</title>
      <link>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965195#M43405</link>
      <description>&lt;P&gt;You might have a look at the Rate-Based Attack Prevention instead of the port scan detection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A combination of those might be what you need. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 06:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965195#M43405</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-11-29T06:41:05Z</dc:date>
    </item>
    <item>
      <title>Ok, I will try this. Thank</title>
      <link>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965196#M43406</link>
      <description>&lt;P&gt;Ok, I will try this. Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 05:03:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-portscan-detection-tuning/m-p/2965196#M43406</guid>
      <dc:creator>v.kolosov</dc:creator>
      <dc:date>2016-11-30T05:03:53Z</dc:date>
    </item>
  </channel>
</rss>

