<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic static nat statement allowed IPS to miss a potential attack? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-statement-allowed-ips-to-miss-a-potential-attack/m-p/2420882#M53164</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your answer. that makes sense to me. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Dec 2013 19:20:57 GMT</pubDate>
    <dc:creator>misscat123</dc:creator>
    <dc:date>2013-12-24T19:20:57Z</dc:date>
    <item>
      <title>static nat statement allowed IPS to miss a potential attack?</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-statement-allowed-ips-to-miss-a-potential-attack/m-p/2420880#M53159</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a question about static nat statement and the IPS module. Customer says that there was a brute force attack against a server on port 3389 RDP.&lt;/P&gt;&lt;P&gt;The IPS did not report any attack in progress, nor does it show in history there was an attack.&lt;/P&gt;&lt;P&gt;I think because this statement was in the router: ip nat inside source static tcp x.x.x.x 3389 (external address x.x.x.x) 3389 extendable&lt;/P&gt;&lt;P&gt;that the IPS did not see any problem, and therefore the traffic was not classified as rogue. &lt;/P&gt;&lt;P&gt;Can anyone confirm this is why IPS did not alert on the traffic, or add your thoughts?&lt;/P&gt;&lt;P&gt;Every 2 minutes someone was trying to login to the server from the outside. Server logs alerted customer there was a problem.&lt;/P&gt;&lt;P&gt;Customer removed the statement from the router, and attack ceased.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have &lt;/P&gt;&lt;P&gt;internet-&amp;gt;3925 router-&amp;gt;asa512 w/IPS module-&amp;gt;inside lan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:06:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-statement-allowed-ips-to-miss-a-potential-attack/m-p/2420880#M53159</guid>
      <dc:creator>misscat123</dc:creator>
      <dc:date>2019-03-10T13:06:37Z</dc:date>
    </item>
    <item>
      <title>static nat statement allowed IPS to miss a potential attack?</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-statement-allowed-ips-to-miss-a-potential-attack/m-p/2420881#M53162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason that the attack ceased when you remove the NAT is probably due to that no external access is possible any more without that NAT-statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason that you missed the attack on the IPS has two reasons:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) To my knowledge there is no signature for failed logins to an RDP-service. So the IPS can't act on it.&lt;/P&gt;&lt;P&gt;2) If there had been a signature, the thresholds had to be quite tight for an attack that only happens every two minutes. That leads to higher false-positive rate or missed attacks if the thresholds are set higher.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here it seems that your security is working as you have a second soource of input (your log-files).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Dec 2013 08:34:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-statement-allowed-ips-to-miss-a-potential-attack/m-p/2420881#M53162</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-12-19T08:34:05Z</dc:date>
    </item>
    <item>
      <title>static nat statement allowed IPS to miss a potential attack?</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-statement-allowed-ips-to-miss-a-potential-attack/m-p/2420882#M53164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your answer. that makes sense to me. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Dec 2013 19:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-statement-allowed-ips-to-miss-a-potential-attack/m-p/2420882#M53164</guid>
      <dc:creator>misscat123</dc:creator>
      <dc:date>2013-12-24T19:20:57Z</dc:date>
    </item>
  </channel>
</rss>

