<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix Firewall Blocking in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-firewall-blocking/m-p/224770#M566105</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you enable the IDS function within the PIX, the PIX will flag this as an attack and if configured to drop attack-type packets, will do so.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1101884" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1101884&lt;/A&gt; for the configuration details for "ip audit".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/63syslog/pixemsgs.htm#1055451" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/63syslog/pixemsgs.htm#1055451&lt;/A&gt; for details about the specific signatures the PIX IDS picks up.  Signature 3041 is the one you're interested in.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 May 2004 04:23:31 GMT</pubDate>
    <dc:creator>gfullage</dc:creator>
    <dc:date>2004-05-06T04:23:31Z</dc:date>
    <item>
      <title>Pix Firewall Blocking</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-blocking/m-p/224769#M566104</link>
      <description>&lt;P&gt;Whats the most effiecent way to block packets with both the SYN and FIN flags set in a PIX running 6.3?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:22:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-blocking/m-p/224769#M566104</guid>
      <dc:creator>m-hennigan</dc:creator>
      <dc:date>2020-02-21T07:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Firewall Blocking</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-blocking/m-p/224770#M566105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you enable the IDS function within the PIX, the PIX will flag this as an attack and if configured to drop attack-type packets, will do so.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1101884" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1101884&lt;/A&gt; for the configuration details for "ip audit".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/63syslog/pixemsgs.htm#1055451" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/63syslog/pixemsgs.htm#1055451&lt;/A&gt; for details about the specific signatures the PIX IDS picks up.  Signature 3041 is the one you're interested in.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 May 2004 04:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-blocking/m-p/224770#M566105</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2004-05-06T04:23:31Z</dc:date>
    </item>
  </channel>
</rss>

