<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CIsco IPS-   Condition for TCP null packet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ips-condition-for-tcp-null-packet/m-p/2429123#M45555</link>
    <description>&lt;P&gt;What are the conditions for this event to trigger ? does it trigger even if there is one packet without any of the flags syn, ack,fin,rst or if there are 10 in 50 packets without the flags set ?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:12:02 GMT</pubDate>
    <dc:creator>Shadowknight14</dc:creator>
    <dc:date>2019-03-10T13:12:02Z</dc:date>
    <item>
      <title>CIsco IPS-   Condition for TCP null packet</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ips-condition-for-tcp-null-packet/m-p/2429123#M45555</link>
      <description>&lt;P&gt;What are the conditions for this event to trigger ? does it trigger even if there is one packet without any of the flags syn, ack,fin,rst or if there are 10 in 50 packets without the flags set ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ips-condition-for-tcp-null-packet/m-p/2429123#M45555</guid>
      <dc:creator>Shadowknight14</dc:creator>
      <dc:date>2019-03-10T13:12:02Z</dc:date>
    </item>
    <item>
      <title>Benign trigger states This</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ips-condition-for-tcp-null-packet/m-p/2429124#M45556</link>
      <description>&lt;P&gt;Benign trigger states&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: Arial; font-size: 12px; line-height: normal;"&gt;This alarm may fire if large amounts of random network traffic are transmitted across the network, such as during a denial of service attack. To reduce number of unverifiable alarms being generated, this signature will begin throttling the creation of new alarms if more than one event of this type is detected per second. The first alarm will be sent, but all subsequent alarms will be summarized and periodically reported. The summarization alarm will report NULL IP addresses / port numbers and will contain this message in the data field, Global Summary: XX alarms this interval, where XX is the number of alarms received and summarized.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 May 2014 11:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ips-condition-for-tcp-null-packet/m-p/2429124#M45556</guid>
      <dc:creator>Shadowknight14</dc:creator>
      <dc:date>2014-05-18T11:30:56Z</dc:date>
    </item>
    <item>
      <title>Hello Shadowknight14,I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ips-condition-for-tcp-null-packet/m-p/2429125#M45557</link>
      <description>&lt;P&gt;Hello Shadowknight14,&lt;/P&gt;&lt;P&gt;I presume you are talking about Cisco IPS signature 3040-0?&lt;BR /&gt;Essentially, that signature is defined as&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;atomic-ip/fragment-status : no-fragments&lt;BR /&gt;atomic-ip/l4-protocol/tcp/dst-port : 1-1024&lt;BR /&gt;atomic-ip/l4-protocol/tcp/tcp-flags:&lt;BR /&gt;atomic-ip/l4-protocol/tcp/tcp-mask : urg|ack|psh|rst|syn|fin&lt;BR /&gt;alert-frequency/summary-mode/fire-once/global-summary-threshold : 200&lt;BR /&gt;alert-frequency/summary-mode/fire-once/summary-interval : 30&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If you look at the Atomic-IP section of &lt;A href="http://www.cisco.com/web/about/security/intelligence/ips_custom_sigs.html#6"&gt;http://www.cisco.com/web/about/security/intelligence/ips_custom_sigs.html#6&lt;/A&gt;&lt;BR /&gt;you'll see the description of tcp-flags and tcp-mask parameters.&lt;/P&gt;&lt;P&gt;The flags in the packet are compared for equality to the tcp-flags &amp;amp; tcp-mask&lt;BR /&gt;so the above is&lt;BR /&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp-flags 000000&lt;BR /&gt;and tcp-mask&amp;nbsp; 111111&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----------------&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 000000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;so if your packet does not have 000000 for its flags, it won't trigger the packet.&lt;/P&gt;&lt;P&gt;In English, sig 3040-0 is going to fire on any TCP packets destined to the privileged ports 1-1024 but lacking all 6 TCP flags.&lt;/P&gt;&lt;P&gt;The summary settings mean that it will fire up to 1 time per 30 seconds per attacker (until it hits the global summary threshold of 200 events, at which time you switch to global-summary mode which summarizes all attackers once per interval).&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2014 17:39:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ips-condition-for-tcp-null-packet/m-p/2429125#M45557</guid>
      <dc:creator>shepp</dc:creator>
      <dc:date>2014-05-20T17:39:39Z</dc:date>
    </item>
  </channel>
</rss>

