<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help/m-p/1049339#M896661</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I blocked the address from any inside hosts as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any suggestion/idea how to prevent this from happening? Is any product or script that we can implement to automatically block the IP for both ASA and PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Sep 2008 19:36:48 GMT</pubDate>
    <dc:creator>gpan667788</dc:creator>
    <dc:date>2008-09-10T19:36:48Z</dc:date>
    <item>
      <title>help</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/1049337#M896652</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two PIX-515 with ver 6.3(4) failover to each one. My monitoring tool tells us a hacker from China is hacking our SQL database. I blocked the hacker's IP address on the outside interface of PIX and clear the session. After that, I don't see it by issuing "sh conn | i x.x.x.x". But my monitoring tool still tells us the hacker still in our network. Can anyone help me to find out how to block/stop the hacker?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Gene&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/1049337#M896652</guid>
      <dc:creator>gpan667788</dc:creator>
      <dc:date>2019-03-11T13:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: help</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/1049338#M896657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;somtimes the hackers install a spy or hosting sofware in PC in the private lan so the connection will be established from the inside to outside then the firewall wall will not block it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;scan ur LAN as well&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Sep 2008 06:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/1049338#M896657</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-10T06:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: help</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/1049339#M896661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I blocked the address from any inside hosts as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any suggestion/idea how to prevent this from happening? Is any product or script that we can implement to automatically block the IP for both ASA and PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Sep 2008 19:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/1049339#M896661</guid>
      <dc:creator>gpan667788</dc:creator>
      <dc:date>2008-09-10T19:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: help</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/1049340#M896663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried routing the offending address to Null your routers and seeing if the monitoring tool still picks it up?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 14:36:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/1049340#M896663</guid>
      <dc:creator>Mel Popple</dc:creator>
      <dc:date>2008-09-16T14:36:45Z</dc:date>
    </item>
  </channel>
</rss>

