<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS Sig 3030 Event Action Filter not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920518#M85428</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, I hope that is what the problem is.  Would it be a bad idea to make the filter (From:internal To:ALL) ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Oct 2007 18:51:21 GMT</pubDate>
    <dc:creator>jnommensen</dc:creator>
    <dc:date>2007-10-29T18:51:21Z</dc:date>
    <item>
      <title>IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920514#M85424</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;On my 4240 and IDSM2 IPS I tried applying an event action filter to filter this sig from firing from internal IPs and going to internal IPs on all ports.  The signature is still being reported to my respective MARS boxes.  I've tried different combinations of internal IP addresses and the filter still won't work.  I've also moved the filter up to the first position in the list.  This  is the only filter out of dozens that does not work, btw.  &lt;/P&gt;&lt;P&gt;Has anyone else encountered a similar problem or have a possible solution?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920514#M85424</guid>
      <dc:creator>jnommensen</dc:creator>
      <dc:date>2019-03-10T10:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920515#M85425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you show us one of the alarms?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 14:14:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920515#M85425</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-10-29T14:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920516#M85426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the info from the event viewer.  Is this enough?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1190445584386567352  vendor=Cisco  severity=informational  &lt;/P&gt;&lt;P&gt;  originator:   &lt;/P&gt;&lt;P&gt;    hostId:  &lt;/P&gt;&lt;P&gt;    appName: sensorApp  &lt;/P&gt;&lt;P&gt;    appInstanceId: 563  &lt;/P&gt;&lt;P&gt;  time: October 29, 2007 6:14:48 PM UTC   &lt;/P&gt;&lt;P&gt;  signature:   description=TCP SYN Host Sweep  id=3030  version=S2  &lt;/P&gt;&lt;P&gt;    subsigId: 0  &lt;/P&gt;&lt;P&gt;    marsCategory: Probe/SpecificPorts  &lt;/P&gt;&lt;P&gt;  interfaceGroup: vs0  &lt;/P&gt;&lt;P&gt;  vlan:  &lt;/P&gt;&lt;P&gt;  participants:   &lt;/P&gt;&lt;P&gt;    attacker:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      port: 1148  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=windows-nt-2k-xp  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=windows-nt-2k-xp  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=unknown  type=unknown  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=windows-nt-2k-xp  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=windows-nt-2k-xp  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=unknown  type=unknown  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=unknown  type=unknown  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=linux  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=unknown  type=unknown  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 10.x.x.x  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=unknown  type=unknown  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: (external IP)  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=unknown  type=unknown  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: (external IP)  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=bsd  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: (external IP)  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=unknown  type=unknown  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: (external IP)  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=unknown  type=unknown  relevance=relevant  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: (external IP)  locality=OUT  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=linux  relevance=relevant  &lt;/P&gt;&lt;P&gt;  riskRatingValue: 31  targetValueRating=medium  attackRelevanceRating=relevant  &lt;/P&gt;&lt;P&gt;  threatRatingValue: 31  &lt;/P&gt;&lt;P&gt;  interface: ge0_x  &lt;/P&gt;&lt;P&gt;  protocol: tcp  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 18:28:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920516#M85426</guid>
      <dc:creator>jnommensen</dc:creator>
      <dc:date>2007-10-29T18:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920517#M85427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I know what is happening. Remember, the event action filters are simply removing actions for the alarm. This particular alarm contains a few destination IP addresses outside your filter, so the actions aren't being removed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 18:43:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920517#M85427</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-10-29T18:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920518#M85428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, I hope that is what the problem is.  Would it be a bad idea to make the filter (From:internal To:ALL) ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 18:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920518#M85428</guid>
      <dc:creator>jnommensen</dc:creator>
      <dc:date>2007-10-29T18:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920519#M85429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Edit:  That solved the problem!  Thanks so much for the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 19:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920519#M85429</guid>
      <dc:creator>jnommensen</dc:creator>
      <dc:date>2007-10-29T19:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920520#M85430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue here is what addresses are checked by the filter.&lt;/P&gt;&lt;P&gt;The filter does NOT check all of the destination addresses.  &lt;/P&gt;&lt;P&gt;The filter ONLY checks the one source adddress and the last destination address that actually triggered the alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 2 problems that this causes:&lt;/P&gt;&lt;P&gt;1) If you connect to 10 addresses (assuming 10 addresses is the trigger for the signature), then whether or not the alert is generated is determined solely by that 10th address regardless of the first 9.&lt;/P&gt;&lt;P&gt;If you try to filter by Inside addresses, then the first 9 could be Inside, and the 10th be Outside and the sig WILL generate an Alert.&lt;/P&gt;&lt;P&gt;By the same token the first 9 could be Outside, and the 10th be Inside nad the Alert will NOT generate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is usually not what users want when trying to filter on sweep signatures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) There is a second problem in that determining that trigger address is not always easy.  In many sweep signature the trigger destination address is not necessarily seen in the Alert.&lt;/P&gt;&lt;P&gt;To see the trigger address you have to enable the produce-verbose-alert event action.  This adds a trigger packet to the alert, and you can look at that actual trigger packet to determine the trigger destination address.&lt;/P&gt;&lt;P&gt;(NOTE: This is a bug in the sweep engine, and will be resolved in a future update so the trigger destination address gets seen in the Alert itself as well.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The result is that you really can't use the event action filters to get what you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HOWEVER, there is a workaround.&lt;/P&gt;&lt;P&gt;Instead of relying solely on event action fitlers you woud need to use the signature address filters that are built into the signature itself.&lt;/P&gt;&lt;P&gt;Edit the 3030 signature and look for the "specify-src-addr-filter" and "specify-dst-addr-filter" parameters.  You can fitler out addresses directly on the signature itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get what you want use a combination of the 2 types of filters and cloned signatures.&lt;/P&gt;&lt;P&gt;Create a clone of 3030, and let's call it 63030.&lt;/P&gt;&lt;P&gt;Create an Event Action Filter for 3030 for Inside Source Addresses and remove all actions.  This signature will only then Alert on Outside addresses scanning ANY (Inside or Outside) Destination Addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the new 63030 edit the signature itself and edit the specify-dst-addr-filter to filter out all Inside addresses (note: you will need to specify the actual addresses and can not just say $Inside)&lt;/P&gt;&lt;P&gt;Now create an Event Action Filter for 63030 for Outside source addresses and removes all actions.  So now 63030 wll only trigger for Inside Source Addresses scanning Outside Addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you don't use destination addresses in any Event Action Filters.  Instead the destination address type filters are done on the signature itself in 63030.&lt;/P&gt;&lt;P&gt;The filter within the signature itself prevents the signature from even looking at those packets in the first place.  So the Inside addresses won't even be counted as scanned hosts.  So 63030 will only track the scanning of Outside hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 20:27:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920520#M85430</guid>
      <dc:creator>marcabal</dc:creator>
      <dc:date>2007-10-29T20:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920521#M85431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks very much for the info Marco.  I saw these parameters in the sig but was unsure if it would cause the signature to only fire if it saw these IP addresses...or the opposite.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 20:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920521#M85431</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-10-29T20:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920522#M85433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on my memory it should filter out (not fire on) those addresses.&lt;/P&gt;&lt;P&gt;Though it has been well over a year since I have dealt with those parameters.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 20:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920522#M85433</guid>
      <dc:creator>marcabal</dc:creator>
      <dc:date>2007-10-29T20:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Sig 3030 Event Action Filter not working</title>
      <link>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920523#M85436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So if I want to only filter out external destination addresses I could input 0.0.0.0-9.255.255.255,11.0.0.0-255.255.255.255 in the "dst-addr-filter" field and that should work?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Dec 2008 02:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sig-3030-event-action-filter-not-working/m-p/920523#M85436</guid>
      <dc:creator>jnommensen</dc:creator>
      <dc:date>2008-12-19T02:41:13Z</dc:date>
    </item>
  </channel>
</rss>

