<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Any update about this problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960921#M43698</link>
    <description>&lt;P&gt;Any update about this problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I want to enable this feature and rate-based&amp;nbsp;For simultaneous connection, but I am not sure how to configure it correctly.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I enabled rate-based for sumultaneous connection for 200 connectios for destination ip address - without the drop option.&lt;/P&gt;
&lt;P&gt;In intrusion events I cas see alot of events GID:135 .&lt;/P&gt;
&lt;P&gt;Traffic that matched access control rule with intrusion policy with drop, droped one IP because of this signature while in the NAP policy I did not check the drop check box.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What is happening?!?!&lt;/P&gt;</description>
    <pubDate>Wed, 18 Jan 2017 20:22:06 GMT</pubDate>
    <dc:creator>Kfir Mesika</dc:creator>
    <dc:date>2017-01-18T20:22:06Z</dc:date>
    <item>
      <title>Block host when it starts multiple sessions within a predefined time frame</title>
      <link>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960918#M43692</link>
      <description>&lt;P&gt;Is it possible with the&amp;nbsp;asa5516 to automatically deny&amp;nbsp;a host if&amp;nbsp;it starts&amp;nbsp;multiple sessions to&amp;nbsp;a specific destination IP and specific destination port in a predefined time frame?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;An example:&lt;/P&gt;
&lt;P&gt;When a host sends 10 tcp packets with the syn flag to a specific destination on&amp;nbsp;let's say port 3389 within 30 seconds, block the source IP address in the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This should&amp;nbsp;migitate failed login attempts within our network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960918#M43692</guid>
      <dc:creator>Rutger Luuk Dost</dc:creator>
      <dc:date>2019-03-10T13:39:31Z</dc:date>
    </item>
    <item>
      <title>The feature "Preventing SYN</title>
      <link>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960919#M43693</link>
      <description>&lt;P&gt;The feature "Preventing&amp;nbsp;SYN Attack Prevention" which is found under Network Analysis Policy -&amp;gt; Settings -&amp;gt; Rate-Bassed Attack Prevention in FirePOWER Management Center 6.0.1 seems&amp;nbsp;exactly what I'm looking for at first hand. Unfortunatly it's not always doing what the following article is saying:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Detecting_Specific_Threats.html.&lt;/P&gt;
&lt;P&gt;It should block only the malicious Source IP addresses, but&amp;nbsp;it's blocking all Source IP addresses when the treshold is reached multiple time &lt;SPAN&gt;simultaneously&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;I used the following test set-up:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;One client Computer&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;One Windows Server&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The client computer was used to login with wrong credentials on the Windows Server and when it reached the treshold and couldn't establish a connection anymore I switched the IP address of the client. Sometimes I could establish a connection (like it should) and sometimes when I had 2 or 3 IP addresses locked out because of reaching the treshold, the FirePOWER module was blocking all source IP addresses.&lt;/P&gt;
&lt;P&gt;Cisco, can you plse explain to me why it's blocking all Source IP addresses?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 21:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960919#M43693</guid>
      <dc:creator>Rutger Luuk Dost</dc:creator>
      <dc:date>2016-07-26T21:14:57Z</dc:date>
    </item>
    <item>
      <title>Ok, the problem with the SYN</title>
      <link>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960920#M43696</link>
      <description>&lt;P&gt;Ok, the problem with the SYN Attack Prevention seems to be a bug in the Rate-Based attack preprocessor. They have created a bug ticket to fix this issue:&lt;/P&gt;
&lt;P&gt;https://tools.cisco.com/bugsearch/bug/CSCvb36855&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2016 20:18:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960920#M43696</guid>
      <dc:creator>Rutger Luuk Dost</dc:creator>
      <dc:date>2016-09-17T20:18:27Z</dc:date>
    </item>
    <item>
      <title>Any update about this problem</title>
      <link>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960921#M43698</link>
      <description>&lt;P&gt;Any update about this problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I want to enable this feature and rate-based&amp;nbsp;For simultaneous connection, but I am not sure how to configure it correctly.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I enabled rate-based for sumultaneous connection for 200 connectios for destination ip address - without the drop option.&lt;/P&gt;
&lt;P&gt;In intrusion events I cas see alot of events GID:135 .&lt;/P&gt;
&lt;P&gt;Traffic that matched access control rule with intrusion policy with drop, droped one IP because of this signature while in the NAP policy I did not check the drop check box.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What is happening?!?!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 20:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960921#M43698</guid>
      <dc:creator>Kfir Mesika</dc:creator>
      <dc:date>2017-01-18T20:22:06Z</dc:date>
    </item>
    <item>
      <title>Hi Kfir, are you sure the</title>
      <link>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960922#M43700</link>
      <description>&lt;P&gt;Hi Kfir, are you sure the preprocessor with GID:135 was responsible for the blocking? Was it not some other Intrustion Rule which blocked it?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Feb 2017 19:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-host-when-it-starts-multiple-sessions-within-a-predefined/m-p/2960922#M43700</guid>
      <dc:creator>Rutger Luuk Dost</dc:creator>
      <dc:date>2017-02-11T19:51:08Z</dc:date>
    </item>
  </channel>
</rss>

