<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failed Telnet cannot monitor in IPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556419#M65962</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it is enabled by default and fires on 3rd attempt of failed logins. If you can provide a pcap of the traffic that you are passing to generate this traffic we can analyze the reason for false negative. Also if you can let us know the sensor model and the software version that would help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;Madhu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Dec 2010 01:06:13 GMT</pubDate>
    <dc:creator>mkodali</dc:creator>
    <dc:date>2010-12-15T01:06:13Z</dc:date>
    <item>
      <title>Failed Telnet cannot monitor in IPS</title>
      <link>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556416#M65955</link>
      <description>&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I just created a new and simple&amp;nbsp; signature. signature 60002 for failed telnet. My setup is Promiscous mode . &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;signature 60002&lt;/P&gt;&lt;P&gt;engine string-tcp&lt;/P&gt;&lt;P&gt;service-ports 23&lt;/P&gt;&lt;P&gt;direction from-service&lt;/P&gt;&lt;P&gt;regex-string % Bad passwords&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alert-frequency fire-all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I miss something here? There is no events generated in my IPS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:12:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556416#M65955</guid>
      <dc:creator>ericohermoso</dc:creator>
      <dc:date>2019-03-10T12:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Telnet cannot monitor in IPS</title>
      <link>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556417#M65958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you check the built in sig 6251 subsig 0 on the sensor for this particular purpose. I know this signature works. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=======================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;qsensor-204# conf t&lt;/P&gt;&lt;P&gt;qsensor-204(config)# ser sig sig0&lt;/P&gt;&lt;P&gt;qsensor-204(config-sig)# si 6251 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;qsensor-204(config-sig-sig)# sh set&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;PROTECTED entry=""&gt;&lt;/PROTECTED&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; sig-id: 6251&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; subsig-id: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; engine&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; string-tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; regex-string: [Ll]ogin[ ]incorrect &lt;PROTECTED&gt;&lt;/PROTECTED&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-ports: 23-23 &lt;DEFAULTED&gt;&lt;/DEFAULTED&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; direction: from-service &lt;DEFAULTED&gt;&lt;/DEFAULTED&gt;&lt;/P&gt;&lt;P&gt;==============&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have not tried the regex you have suggested in the question though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;Madhu&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Dec 2010 19:30:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556417#M65958</guid>
      <dc:creator>mkodali</dc:creator>
      <dc:date>2010-12-13T19:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Telnet cannot monitor in IPS</title>
      <link>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556418#M65959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature is enabled by default so in my opinion, once there is a failed telnet then automatically IPS will generate an events. I checked it again but there is no events generated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Dec 2010 06:09:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556418#M65959</guid>
      <dc:creator>ericohermoso</dc:creator>
      <dc:date>2010-12-14T06:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Telnet cannot monitor in IPS</title>
      <link>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556419#M65962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it is enabled by default and fires on 3rd attempt of failed logins. If you can provide a pcap of the traffic that you are passing to generate this traffic we can analyze the reason for false negative. Also if you can let us know the sensor model and the software version that would help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;Madhu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Dec 2010 01:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556419#M65962</guid>
      <dc:creator>mkodali</dc:creator>
      <dc:date>2010-12-15T01:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Telnet cannot monitor in IPS</title>
      <link>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556420#M65965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sensor model is&amp;nbsp; IPS4270&lt;/P&gt;&lt;P&gt;version : 7.0(2)E3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Promiscous mode.&lt;/P&gt;&lt;P&gt;Switch type : 3750&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Dec 2010 06:12:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556420#M65965</guid>
      <dc:creator>ericohermoso</dc:creator>
      <dc:date>2010-12-15T06:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Telnet cannot monitor in IPS</title>
      <link>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556421#M65968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp; I had a 4270 running 7.0(2)E3 version sniffing traffic in both promiscuous and inline modes and I could see the below sig fire :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1292419721230871357 severity=informational vendor=Cisco &lt;BR /&gt;&amp;nbsp; originator: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: qsensor-8094&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 460&lt;BR /&gt;&amp;nbsp; time: 2010/12/15 15:19:09 2010/12/15 15:19:09 UTC&lt;BR /&gt;&amp;nbsp; signature: description=Telnet Authorization Failure id=6251 created=20010202 type=anomaly version=S2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: Failed Telnet Attempts&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Penetrate/GuessPassword/System/Non-root&lt;BR /&gt;&amp;nbsp; interfaceGroup: vs0&lt;BR /&gt;&amp;nbsp; vlan: 0&lt;BR /&gt;&amp;nbsp; participants: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: locality=OUT 10.20.2.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 32770&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: locality=OUT 10.20.2.3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 23&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os: idSource=learned relevance=relevant type=linux &lt;BR /&gt;&amp;nbsp; context: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fromTarget: &lt;BR /&gt;000000&amp;nbsp; FF FD 18 FF FD 20 FF FD&amp;nbsp; 23 FF FD 27 FF FB 03 FF&amp;nbsp; ..... ..#..'....&lt;BR /&gt;000010&amp;nbsp; FD 1F FF FD 21 FF FE 22&amp;nbsp; FF FB 05 FF FA 20 01 FF&amp;nbsp; ....!.."..... ..&lt;BR /&gt;000020&amp;nbsp; F0 FF FA 27 01 FF F0 FF&amp;nbsp; FA 18 01 FF F0 FF FD 01&amp;nbsp; ...'............&lt;BR /&gt;000030&amp;nbsp; FF FB 01 52 65 64 20 48&amp;nbsp; 61 74 20 4C 69 6E 75 78&amp;nbsp; ...Red Hat Linux&lt;BR /&gt;000040&amp;nbsp; 20 72 65 6C 65 61 73 65&amp;nbsp; 20 39 20 28 53 68 72 69&amp;nbsp;&amp;nbsp; release 9 (Shri&lt;BR /&gt;000050&amp;nbsp; 6B 65 29 0D 0A 4B 65 72&amp;nbsp; 6E 65 6C 20 32 2E 34 2E&amp;nbsp; ke)..Kernel 2.4.&lt;BR /&gt;000060&amp;nbsp; 32 30 2D 38 20 6F 6E 20&amp;nbsp; 61 6E 20 69 36 38 36 0D&amp;nbsp; 20-8 on an i686.&lt;BR /&gt;000070&amp;nbsp; 0A 6C 6F 67 69 6E 3A 20&amp;nbsp; 75 73 65 72 31 0D 0A 50&amp;nbsp; .login: user1..P&lt;BR /&gt;000080&amp;nbsp; 61 73 73 77 6F 72 64 3A&amp;nbsp; 20 0D 0A 4C 6F 67 69 6E&amp;nbsp; assword: ..Login&lt;BR /&gt;000090&amp;nbsp; 20 69 6E 63 6F 72 72 65&amp;nbsp; 63 74 0D 0A 0D 0A 6C 6F&amp;nbsp;&amp;nbsp; incorrect....lo&lt;BR /&gt;0000A0&amp;nbsp; 67 69 6E 3A 20 75 73 65&amp;nbsp; 72 31 0D 0A 50 61 73 73&amp;nbsp; gin: user1..Pass&lt;BR /&gt;0000B0&amp;nbsp; 77 6F 72 64 3A 20 0D 0A&amp;nbsp; 4C 6F 67 69 6E 20 69 6E&amp;nbsp; word: ..Login in&lt;BR /&gt;0000C0&amp;nbsp; 63 6F 72 72 65 63 74 0D&amp;nbsp; 0A 0D 0A 6C 6F 67 69 6E&amp;nbsp; correct....login&lt;BR /&gt;0000D0&amp;nbsp; 3A 20 75 73 65 72 31 0D&amp;nbsp; 0A 50 61 73 73 77 6F 72&amp;nbsp; : user1..Passwor&lt;BR /&gt;0000E0&amp;nbsp; 64 3A 20 0D 0A 4C 6F 67&amp;nbsp; 69 6E 20 69 6E 63 6F 72&amp;nbsp; d: ..Login incor&lt;BR /&gt;0000F0&amp;nbsp; 72 65 63 74&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rect&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fromAttacker: &lt;BR /&gt;000000&amp;nbsp; FF FD 03 FF FB 18 FF FB&amp;nbsp; 1F FF FB 20 FF FB 21 FF&amp;nbsp; ........... ..!.&lt;BR /&gt;000010&amp;nbsp; FB 22 FF FB 27 FF FD 05&amp;nbsp; FF FC 23 FF FA 1F 00 50&amp;nbsp; ."..'.....#....P&lt;BR /&gt;000020&amp;nbsp; 00 18 FF F0 FF FA 20 00&amp;nbsp; 39 36 30 30 2C 39 36 30&amp;nbsp; ...... .9600,960&lt;BR /&gt;000030&amp;nbsp; 30 FF F0 FF FA 27 00 FF&amp;nbsp; F0 FF FA 18 00 56 54 31&amp;nbsp; 0....'.......VT1&lt;BR /&gt;000040&amp;nbsp; 30 30 FF F0 FF FC 01 FF&amp;nbsp; FD 01 75 73 65 72 31 0D&amp;nbsp; 00........user1.&lt;BR /&gt;000050&amp;nbsp; 00 61 64 66 61 64 66 0D&amp;nbsp; 00 75 73 65 72 31 0D 00&amp;nbsp; .adfadf..user1..&lt;BR /&gt;000060&amp;nbsp; 61 64 66 61 64 66 0D 00&amp;nbsp; 75 73 65 72 31 0D 00 61&amp;nbsp; adfadf..user1..a&lt;BR /&gt;000070&amp;nbsp; 64 66 66 0D 00&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dff..&lt;BR /&gt;&amp;nbsp; riskRatingValue: attackRelevanceRating=relevant targetValueRating=medium 35&lt;BR /&gt;&amp;nbsp; threatRatingValue: 35&lt;BR /&gt;&amp;nbsp; interface: ge3_1&lt;BR /&gt;&amp;nbsp; protocol: tcp&lt;/P&gt;&lt;P&gt;---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The trigger traffic is shown below :&lt;/P&gt;&lt;P&gt;--------&lt;/P&gt;&lt;P&gt;[root@qaips-attacker root]# telnet 10.20.2.3 &lt;BR /&gt;Trying 10.20.2.3...&lt;BR /&gt;Connected to 10.20.2.3.&lt;BR /&gt;Escape character is '^]'.&lt;BR /&gt;Red Hat Linux release 9 (Shrike)&lt;BR /&gt;Kernel 2.4.20-8 on an i686&lt;BR /&gt;login: user1&lt;BR /&gt;Password: &lt;BR /&gt;Login incorrect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login: user1&lt;BR /&gt;Password: &lt;BR /&gt;Login incorrect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login: user1&lt;BR /&gt;Password: &lt;BR /&gt;Login incorrect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think we have to look at the traffic capture that sensor is inspecting, to debug this further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;Madhu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Dec 2010 20:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556421#M65968</guid>
      <dc:creator>mkodali</dc:creator>
      <dc:date>2010-12-15T20:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Telnet cannot monitor in IPS</title>
      <link>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556422#M65970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just check in using inline mode and make a new signature for string tcp. I can get events. But when i change to promiscous mode i cannot get any events. Anyway I will check again the signature 6251.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Dec 2010 08:33:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failed-telnet-cannot-monitor-in-ips/m-p/1556422#M65970</guid>
      <dc:creator>ericohermoso</dc:creator>
      <dc:date>2010-12-16T08:33:05Z</dc:date>
    </item>
  </channel>
</rss>

