<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPS upnp signature in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386204#M67628</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a LAN IDSM in promiscusous mode wherre I'm seing too much of the below alerts, I've researched it and found out that it should be stopped! since it is a high severity alert!! however I guess summarization is preventing me from knowing the attacker and targets because of the 0.0.0.0 source and destination, right? IS&amp;nbsp; this the case? and how can I solve it?&lt;/P&gt;&lt;P&gt;Should I disable summary for that specific signature? what's the best practice? Should it be stopped?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1262106216512606028&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; &lt;BR /&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: LAN-IDSM2&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 25921&amp;nbsp; &lt;BR /&gt;&amp;nbsp; time: Mar 03, 2010 07:38:23 UTC&amp;nbsp; offset=60&amp;nbsp; timeZone=GMT+02:00&amp;nbsp; &lt;BR /&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=UPnP LOCATION Overflow&amp;nbsp; id=4058&amp;nbsp; version=S433&amp;nbsp; type=vulnerability&amp;nbsp; created=20050603&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 2&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: LOCATION \x3c100+ Chars&amp;gt;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Penetrate/BufferOverflow/Misc&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interfaceGroup: vs0&amp;nbsp; &lt;BR /&gt;&amp;nbsp; vlan: 120&amp;nbsp; &lt;BR /&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 1900&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipv6Address: fe80::9d91:b37c:be42:5387&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 1900&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipv6Address: ff02::c&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=unknown&amp;nbsp; type=unknown&amp;nbsp; relevance=unknown&amp;nbsp; &lt;BR /&gt;&amp;nbsp; actions:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; denyPacketRequestedNotPerformed: true&amp;nbsp; &lt;BR /&gt;&amp;nbsp; riskRatingValue: 90&amp;nbsp; targetValueRating=medium&amp;nbsp; &lt;BR /&gt;&amp;nbsp; threatRatingValue: 90&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interface: ge0_7&amp;nbsp; &lt;BR /&gt;&amp;nbsp; protocol: udp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1262106216512606029&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; &lt;BR /&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: LAN-IDSM2&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 25921&amp;nbsp; &lt;BR /&gt;&amp;nbsp; time: Mar 03, 2010 07:38:38 UTC&amp;nbsp; offset=60&amp;nbsp; timeZone=GMT+02:00&amp;nbsp; &lt;BR /&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=UPnP LOCATION Overflow&amp;nbsp; id=4058&amp;nbsp; version=S433&amp;nbsp; type=vulnerability&amp;nbsp; created=20050603&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 2&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: LOCATION \x3c100+ Chars&amp;gt;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Penetrate/BufferOverflow/Misc&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interfaceGroup: vs0&amp;nbsp; &lt;BR /&gt;&amp;nbsp; vlan: 120&amp;nbsp; &lt;BR /&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 0&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipv6Address: fe80::9d91:b37c:be42:5387&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 0&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipv6Address: ::&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=unknown&amp;nbsp; type=unknown&amp;nbsp; relevance=unknown&amp;nbsp; &lt;BR /&gt;&amp;nbsp; summary: 24&amp;nbsp; final=true&amp;nbsp; initialAlert=1262106216512606028&amp;nbsp; summaryType=Regular&amp;nbsp; &lt;BR /&gt;&amp;nbsp; alertDetails: Regular Summary: 24 events this interval ;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; riskRatingValue: 90&amp;nbsp; targetValueRating=medium&amp;nbsp; &lt;BR /&gt;&amp;nbsp; threatRatingValue: 90&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interface: ge0_7&amp;nbsp; &lt;BR /&gt;&amp;nbsp; protocol: udp&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 11:57:50 GMT</pubDate>
    <dc:creator>k.abillama</dc:creator>
    <dc:date>2019-03-10T11:57:50Z</dc:date>
    <item>
      <title>IPS upnp signature</title>
      <link>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386204#M67628</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a LAN IDSM in promiscusous mode wherre I'm seing too much of the below alerts, I've researched it and found out that it should be stopped! since it is a high severity alert!! however I guess summarization is preventing me from knowing the attacker and targets because of the 0.0.0.0 source and destination, right? IS&amp;nbsp; this the case? and how can I solve it?&lt;/P&gt;&lt;P&gt;Should I disable summary for that specific signature? what's the best practice? Should it be stopped?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1262106216512606028&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; &lt;BR /&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: LAN-IDSM2&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 25921&amp;nbsp; &lt;BR /&gt;&amp;nbsp; time: Mar 03, 2010 07:38:23 UTC&amp;nbsp; offset=60&amp;nbsp; timeZone=GMT+02:00&amp;nbsp; &lt;BR /&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=UPnP LOCATION Overflow&amp;nbsp; id=4058&amp;nbsp; version=S433&amp;nbsp; type=vulnerability&amp;nbsp; created=20050603&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 2&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: LOCATION \x3c100+ Chars&amp;gt;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Penetrate/BufferOverflow/Misc&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interfaceGroup: vs0&amp;nbsp; &lt;BR /&gt;&amp;nbsp; vlan: 120&amp;nbsp; &lt;BR /&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 1900&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipv6Address: fe80::9d91:b37c:be42:5387&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 1900&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipv6Address: ff02::c&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=unknown&amp;nbsp; type=unknown&amp;nbsp; relevance=unknown&amp;nbsp; &lt;BR /&gt;&amp;nbsp; actions:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; denyPacketRequestedNotPerformed: true&amp;nbsp; &lt;BR /&gt;&amp;nbsp; riskRatingValue: 90&amp;nbsp; targetValueRating=medium&amp;nbsp; &lt;BR /&gt;&amp;nbsp; threatRatingValue: 90&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interface: ge0_7&amp;nbsp; &lt;BR /&gt;&amp;nbsp; protocol: udp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1262106216512606029&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; &lt;BR /&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: LAN-IDSM2&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 25921&amp;nbsp; &lt;BR /&gt;&amp;nbsp; time: Mar 03, 2010 07:38:38 UTC&amp;nbsp; offset=60&amp;nbsp; timeZone=GMT+02:00&amp;nbsp; &lt;BR /&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=UPnP LOCATION Overflow&amp;nbsp; id=4058&amp;nbsp; version=S433&amp;nbsp; type=vulnerability&amp;nbsp; created=20050603&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 2&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: LOCATION \x3c100+ Chars&amp;gt;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Penetrate/BufferOverflow/Misc&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interfaceGroup: vs0&amp;nbsp; &lt;BR /&gt;&amp;nbsp; vlan: 120&amp;nbsp; &lt;BR /&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 0&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipv6Address: fe80::9d91:b37c:be42:5387&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 0&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipv6Address: ::&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=unknown&amp;nbsp; type=unknown&amp;nbsp; relevance=unknown&amp;nbsp; &lt;BR /&gt;&amp;nbsp; summary: 24&amp;nbsp; final=true&amp;nbsp; initialAlert=1262106216512606028&amp;nbsp; summaryType=Regular&amp;nbsp; &lt;BR /&gt;&amp;nbsp; alertDetails: Regular Summary: 24 events this interval ;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; riskRatingValue: 90&amp;nbsp; targetValueRating=medium&amp;nbsp; &lt;BR /&gt;&amp;nbsp; threatRatingValue: 90&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interface: ge0_7&amp;nbsp; &lt;BR /&gt;&amp;nbsp; protocol: udp&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386204#M67628</guid>
      <dc:creator>k.abillama</dc:creator>
      <dc:date>2019-03-10T11:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPS upnp signature</title>
      <link>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386205#M67629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Best practise is to find out which Windows machines are affected and apply the patch accordingly, otherwise, the machine will be vulnerable to UPnP vulnerability as per the following:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewAlert.x?alertId=2986"&gt;http://tools.cisco.com/security/center/viewAlert.x?alertId=2986&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Apr 2010 13:33:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386205#M67629</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-19T13:33:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPS upnp signature</title>
      <link>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386206#M67630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand that I have to patch the machines but how can I know what are the machines that should be patches if I'm getting a source and destination ip addresse of 0.0.0.0 on the IPS&lt;/P&gt;&lt;P&gt;If I disable event summary for this specific sig, will I be able to see the source and destination ip addresses?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Apr 2010 14:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386206#M67630</guid>
      <dc:creator>k.abillama</dc:creator>
      <dc:date>2010-04-19T14:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPS upnp signature</title>
      <link>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386207#M67631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you are absolutely right. You would need to disable the "summarization" to see the source and destination IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Apr 2010 21:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386207#M67631</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-19T21:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPS upnp signature</title>
      <link>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386208#M67632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed summarization on a signature basis by forcing it to be fire all instead of summarize but still the source and destionation ip are 0.0.0.0&lt;/P&gt;&lt;P&gt;What could it be? the customer is very picky and asking about it&lt;/P&gt;&lt;P&gt;Please advise&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 06:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386208#M67632</guid>
      <dc:creator>k.abillama</dc:creator>
      <dc:date>2010-04-23T06:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPS upnp signature</title>
      <link>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386209#M67633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking back at the event that you have attached earlier, the attacker is using IPv6 address:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; ipv6Address: fe80::9d91:b37c:be42:5387&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Apr 2010 07:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386209#M67633</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-24T07:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPS upnp signature</title>
      <link>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386210#M67634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please pick up on the last comment made?&amp;nbsp; I am seeing the exact same signature in my IDS output with the attacker having an IPv6 ip.&amp;nbsp; How do I resolve the IPv6 to understand who is attacking me?&amp;nbsp; From the fe80 I can tell it is a link local ip so the attacker must be from the inside?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jul 2010 21:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-upnp-signature/m-p/1386210#M67634</guid>
      <dc:creator>racquel.mays</dc:creator>
      <dc:date>2010-07-13T21:24:28Z</dc:date>
    </item>
  </channel>
</rss>

