<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Alert after 20 attempts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/alert-after-20-attempts/m-p/1260053#M76822</link>
    <description>&lt;P&gt;Is there some way to create a signature that would produce an alert (eventually changing this to a deny connection)  after any IP address hits the server 20 times in 60 seconds? I have tried using automatic IP which did not work and the Flood service engine does not allow a specific IP address to be specified. We are only concerned with one specific server, other servers in our network may be hit more then this.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 11:41:00 GMT</pubDate>
    <dc:creator>hclauss</dc:creator>
    <dc:date>2019-03-10T11:41:00Z</dc:date>
    <item>
      <title>Alert after 20 attempts</title>
      <link>https://community.cisco.com/t5/network-security/alert-after-20-attempts/m-p/1260053#M76822</link>
      <description>&lt;P&gt;Is there some way to create a signature that would produce an alert (eventually changing this to a deny connection)  after any IP address hits the server 20 times in 60 seconds? I have tried using automatic IP which did not work and the Flood service engine does not allow a specific IP address to be specified. We are only concerned with one specific server, other servers in our network may be hit more then this.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alert-after-20-attempts/m-p/1260053#M76822</guid>
      <dc:creator>hclauss</dc:creator>
      <dc:date>2019-03-10T11:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Alert after 20 attempts</title>
      <link>https://community.cisco.com/t5/network-security/alert-after-20-attempts/m-p/1260054#M76823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Harry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This solution is probably not ideal, but if you can create the appropriate flood signature that you mentioned you could setup an Event Action Filter to remove all actions from the signature when the IP address is anything but the one you want to alert on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe someone else has a better way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jun 2009 19:07:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alert-after-20-attempts/m-p/1260054#M76823</guid>
      <dc:creator>robertson.michael</dc:creator>
      <dc:date>2009-06-30T19:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: Alert after 20 attempts</title>
      <link>https://community.cisco.com/t5/network-security/alert-after-20-attempts/m-p/1260055#M76824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;take stroll through the IPS signatures on your device especially the ones that set to deny/block hosts and just clone one and modify it to your liking.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jul 2009 06:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/alert-after-20-attempts/m-p/1260055#M76824</guid>
      <dc:creator>michael.d.brown</dc:creator>
      <dc:date>2009-07-01T06:01:06Z</dc:date>
    </item>
  </channel>
</rss>

