<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zero window Probe in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zero-window-probe/m-p/1612311#M65785</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kiran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Modify Packet Inline action of signature 1317.0 removes data from the Zero-Window Probe packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFCs 793/1122 allow no data, 1 byte of data, or even a complete data packet in the Zero-Window Probe.&amp;nbsp; If the window opens while the packet is in transit, the receiving end can accept the data.Since the IPS has no way of knowing if the data will be accepted on the receiving end or not, it removes the data. The IPS forces the packet to be a legitimate zero window probe, and removes the possible ambiguity about what data has been processed. Zero window probes are not malicious. The signature exist as a way to control the normalizer behaviour.&amp;nbsp; The behaviour is required so that the normalizer can maintain proper stream state.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Disabling this signature can cause the normalizer to false positive in the following scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server&lt;/P&gt;&lt;P&gt;------------------Syn&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SYN-ACK----------&gt;&lt;/SYN-ACK----------&gt;&lt;/P&gt;&lt;P&gt;-------------------ACK&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;DATA-----------------&gt;&lt;/DATA-----------------&gt;&lt;/P&gt;&lt;P&gt;---------ZeroWindow&amp;gt;&lt;/P&gt;&lt;P&gt;---------ZeroWindow&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;ZEROWINDOWPROBEWITH1500BYTEDATA------&gt;&lt;/ZEROWINDOWPROBEWITH1500BYTEDATA------&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the receiver window opens while the above ZWP packet is in flight, the client will accept the packet, Normalizer will have ignored it, and the normalizer is then out of sync with the stream. The Normalizer will then start producing false alarms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If signature 1317.0 is enabled, all of the data will be stripped out of the ZeroWindowProbe and there is no potential ambiguity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if I can help you with anything further within the context of this thread. If your question has been Answered, please mark the thread as such so that it will be helpful to other users. Also, please feel free to Rate this thread to reflect your experience.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Blayne Dreier&lt;/P&gt;&lt;P&gt;Cisco TAC Escalation Team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Please check out our Podcasts**&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC Security Show: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/tacsecuritypodcast"&gt;http://www.cisco.com/go/tacsecuritypodcast&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC IPS Media Series: &lt;/SPAN&gt;&lt;A class="jive-link-community-small" href="https://community.cisco.com/community/netpro/security/intrusion-prevention"&gt;https://supportforums.cisco.com/community/netpro/security/intrusion-prevention?view=tags&amp;amp;tags=tac_ips_media_series&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 27 Jan 2011 23:01:35 GMT</pubDate>
    <dc:creator>Christopher Dreier</dc:creator>
    <dc:date>2011-01-27T23:01:35Z</dc:date>
    <item>
      <title>Zero window Probe</title>
      <link>https://community.cisco.com/t5/network-security/zero-window-probe/m-p/1612310#M65784</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have observed Zero Windows Probe events and its default action says "Modify Packet" . Please let me know what will be exact action taken by IPS as i need to thoroughly understand it. Please guide me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Kiran&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-window-probe/m-p/1612310#M65784</guid>
      <dc:creator>kiran.raj1</dc:creator>
      <dc:date>2019-03-10T12:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: Zero window Probe</title>
      <link>https://community.cisco.com/t5/network-security/zero-window-probe/m-p/1612311#M65785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kiran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Modify Packet Inline action of signature 1317.0 removes data from the Zero-Window Probe packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFCs 793/1122 allow no data, 1 byte of data, or even a complete data packet in the Zero-Window Probe.&amp;nbsp; If the window opens while the packet is in transit, the receiving end can accept the data.Since the IPS has no way of knowing if the data will be accepted on the receiving end or not, it removes the data. The IPS forces the packet to be a legitimate zero window probe, and removes the possible ambiguity about what data has been processed. Zero window probes are not malicious. The signature exist as a way to control the normalizer behaviour.&amp;nbsp; The behaviour is required so that the normalizer can maintain proper stream state.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Disabling this signature can cause the normalizer to false positive in the following scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server&lt;/P&gt;&lt;P&gt;------------------Syn&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SYN-ACK----------&gt;&lt;/SYN-ACK----------&gt;&lt;/P&gt;&lt;P&gt;-------------------ACK&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;DATA-----------------&gt;&lt;/DATA-----------------&gt;&lt;/P&gt;&lt;P&gt;---------ZeroWindow&amp;gt;&lt;/P&gt;&lt;P&gt;---------ZeroWindow&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;ZEROWINDOWPROBEWITH1500BYTEDATA------&gt;&lt;/ZEROWINDOWPROBEWITH1500BYTEDATA------&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the receiver window opens while the above ZWP packet is in flight, the client will accept the packet, Normalizer will have ignored it, and the normalizer is then out of sync with the stream. The Normalizer will then start producing false alarms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If signature 1317.0 is enabled, all of the data will be stripped out of the ZeroWindowProbe and there is no potential ambiguity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if I can help you with anything further within the context of this thread. If your question has been Answered, please mark the thread as such so that it will be helpful to other users. Also, please feel free to Rate this thread to reflect your experience.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Blayne Dreier&lt;/P&gt;&lt;P&gt;Cisco TAC Escalation Team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Please check out our Podcasts**&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC Security Show: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/tacsecuritypodcast"&gt;http://www.cisco.com/go/tacsecuritypodcast&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC IPS Media Series: &lt;/SPAN&gt;&lt;A class="jive-link-community-small" href="https://community.cisco.com/community/netpro/security/intrusion-prevention"&gt;https://supportforums.cisco.com/community/netpro/security/intrusion-prevention?view=tags&amp;amp;tags=tac_ips_media_series&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jan 2011 23:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-window-probe/m-p/1612311#M65785</guid>
      <dc:creator>Christopher Dreier</dc:creator>
      <dc:date>2011-01-27T23:01:35Z</dc:date>
    </item>
  </channel>
</rss>

