<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Akamai and auto-shun/blocking in IDS/IPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947223#M84533</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ouch.  That certainly would be show stopper for me using the service. I agree that the only way in IDS would be to create an event filter, probably using a variable for every edge server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Mar 2008 18:51:59 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2008-03-06T18:51:59Z</dc:date>
    <item>
      <title>Akamai and auto-shun/blocking in IDS/IPS</title>
      <link>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947218#M84528</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can anyone share how you deal in IDS/IPS with applications that are based on Akamai content delivery services?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a concern that if â&amp;#128;&amp;#156;Akamizedâ&amp;#128;&amp;#157; web-server is targeted in web-based attack - it will be recognized as initiated from one of Akamai Edge servers and that server will be blocked by IDS/IPS - that will affect all users using this particular Edge server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947218#M84528</guid>
      <dc:creator>DSmirnov</dc:creator>
      <dc:date>2019-03-10T11:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Akamai and auto-shun/blocking in IDS/IPS</title>
      <link>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947219#M84529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you explain why a connection from an Akamai edge server would be the source of an attack (or something perceived by IPS as being one)? Are they doing more than just hosting data?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2008 22:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947219#M84529</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-02-27T22:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: Akamai and auto-shun/blocking in IDS/IPS</title>
      <link>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947220#M84530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I understand correct EdgeServer will forward the request to source server if content is not cached (with source IP of EdgeServer itself).&lt;/P&gt;&lt;P&gt;Probably all requests are going to be proxied that way during the typical vulnerability scan and Edge server blocked as a result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2008 07:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947220#M84530</guid>
      <dc:creator>DSmirnov</dc:creator>
      <dc:date>2008-03-04T07:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Akamai and auto-shun/blocking in IDS/IPS</title>
      <link>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947221#M84531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for giving me the opportunity to look into this. I didn't make much progress though.  As near as I could tell it appears that the edge servers could function as reverse caching proxies. I found references that indicated "uncached" objects will be fetched (not necessarily using HTTP, but that's an option) from the origin server. But there were no specifics. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be really suprised if *every* request that could not be fulfilled was proxied to the origin server. But I digress...you're saying that you use the edgeserver service right and that some exploit attempts are being proxied to your source server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2008 15:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947221#M84531</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-03-04T15:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: Akamai and auto-shun/blocking in IDS/IPS</title>
      <link>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947222#M84532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, this is that we observe at the moment. Requests for non-existent content (typically 90% of web-vulnerability scans) are proxied to origin server.&lt;/P&gt;&lt;P&gt;I guess it can be mitigated for IPS mode with connection blocks but there is no solution for IDS in promiscuous mode (except filters to disable blocking for Akamized sites).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2008 18:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947222#M84532</guid>
      <dc:creator>DSmirnov</dc:creator>
      <dc:date>2008-03-06T18:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: Akamai and auto-shun/blocking in IDS/IPS</title>
      <link>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947223#M84533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ouch.  That certainly would be show stopper for me using the service. I agree that the only way in IDS would be to create an event filter, probably using a variable for every edge server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2008 18:51:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/akamai-and-auto-shun-blocking-in-ids-ips/m-p/947223#M84533</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-03-06T18:51:59Z</dc:date>
    </item>
  </channel>
</rss>

