<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Preventing web server scans on IPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/preventing-web-server-scans-on-ips/m-p/1717402#M64939</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know the answer but I am interested in a solution to this also. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Jun 2011 15:08:24 GMT</pubDate>
    <dc:creator>Justin Westover</dc:creator>
    <dc:date>2011-06-28T15:08:24Z</dc:date>
    <item>
      <title>Preventing web server scans on IPS</title>
      <link>https://community.cisco.com/t5/network-security/preventing-web-server-scans-on-ips/m-p/1717401#M64935</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IS there anyone who knows how to prevent a web server scan from getting the version of the IIS web server through a cisco IPS. I tried to set all the signatures that fired to ( drop packet, reset TCP connecction and drop connection inline ) but none worked. The results of a the vulnerability scan through the IPS are still showing the DNS version, IIS version. Can something be done on the IPS level?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/preventing-web-server-scans-on-ips/m-p/1717401#M64935</guid>
      <dc:creator>k.abillama</dc:creator>
      <dc:date>2019-03-10T12:23:20Z</dc:date>
    </item>
    <item>
      <title>Preventing web server scans on IPS</title>
      <link>https://community.cisco.com/t5/network-security/preventing-web-server-scans-on-ips/m-p/1717402#M64939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know the answer but I am interested in a solution to this also. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 15:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/preventing-web-server-scans-on-ips/m-p/1717402#M64939</guid>
      <dc:creator>Justin Westover</dc:creator>
      <dc:date>2011-06-28T15:08:24Z</dc:date>
    </item>
    <item>
      <title>Preventing web server scans on IPS</title>
      <link>https://community.cisco.com/t5/network-security/preventing-web-server-scans-on-ips/m-p/1717403#M64943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello k.abillama,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide a packet capture of the scan? Please gather full-length packets so that the payload is included.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Blayne Dreier&lt;/P&gt;&lt;P&gt;Cisco TAC Escalation Team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Please check out our Podcasts**&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC Security Show: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/tacsecuritypodcast"&gt;http://www.cisco.com/go/tacsecuritypodcast&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC IPS Media Series: &lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-12758"&gt;https://supportforums.cisco.com/docs/DOC-12758&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jul 2011 18:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/preventing-web-server-scans-on-ips/m-p/1717403#M64943</guid>
      <dc:creator>Christopher Dreier</dc:creator>
      <dc:date>2011-07-05T18:29:07Z</dc:date>
    </item>
  </channel>
</rss>

