<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP SYN Host Sweep at 5.1.1p1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529539#M90278</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I noticed the same thing between our sensors running v4.1(5)S201 against our v5.1(1e)S237 sensors.  The v4 sensors do store the victim port number.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checking sig 3030 on the v4 sensor, the storage-key is indeed Axxb.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Jul 2006 17:29:23 GMT</pubDate>
    <dc:creator>npham</dc:creator>
    <dc:date>2006-07-07T17:29:23Z</dc:date>
    <item>
      <title>TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529530#M90269</link>
      <description>&lt;P&gt;With SecMon 2.2, the TCP SYN Host Sweep (3030.0) fails to display the victim&amp;#146;s port in the console. The console shows &amp;lt;n/a&amp;gt; in the port field. The sensors are at version 5.1.1p1. The command &amp;#147;Show Events Alert Info&amp;#148; on the sensor reveals that the destination port is not capture by the sensor event.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;upgrade history of the sensor:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* IPS-sig-S221-minreq-5.0-5  &lt;/P&gt;&lt;P&gt;  IPS-K9-patch-5.1-1p1.pkg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a reason for no longer capturing the destination porton this signature?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529530#M90269</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2019-03-10T09:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529531#M90270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Was it capturing the port information *prior* to p1 or the last update applied? I'm just trying to get a grasp on if this is an issue with an update or maybe you just noticed it now and are wondering about how/why it disaplys what it does.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2006 18:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529531#M90270</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2006-03-17T18:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529532#M90271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason it does not show an IP address is that a host sweep, by definition, hits a bunch of hosts.  I believe the raw alarm has 0.0.0.0 as the ip address; sounds like SecMon is changing this to n/a (correctly I would say).&lt;/P&gt;&lt;P&gt;I don't remember this alarm ever displaying all of the destination IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2006 21:28:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529532#M90271</guid>
      <dc:creator>scothrel</dc:creator>
      <dc:date>2006-03-17T21:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529533#M90272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i dont have a problem with the destination ip address, its the destination port that is not displayed. i can understand not having all of the destination hosts as this may be summerised but the destination port should remain constant across all of the hosts&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Mar 2006 01:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529533#M90272</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2006-03-19T01:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529534#M90273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;looks like i have the answer to my own question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the answer is to modify the signature "storage key" to "attacker address and victim port". the default is only attackers address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Mar 2006 13:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529534#M90273</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2006-03-20T13:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529535#M90274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure it ever did capture the port.  See my post from back in October:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Intrusion%20Prevention%20Systems/IDS&amp;amp;CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1dd99469" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Intrusion%20Prevention%20Systems/IDS&amp;amp;CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1dd99469&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Somebody from Cisco tried to explain it to me...but it doesn't make a lot of sense.  Cisco did update the MySDN information to only say:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"This signature fires when a series of TCP SYN packets have been sent from one single host to a number of different hosts. This could, for example, be an attempt to map the network..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure about SecMon, but the Cisco Event Viewer NSDB copies do not match MySDN.  This is unfortunate because MySDN is a pain to use.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Mar 2006 15:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529535#M90274</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2006-03-22T15:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529536#M90275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It actually goes a little bit further than that, changing the storage key changes the behavior somewhat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 5.x sweep engine provides coverage for the following types of sweeps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Host (Axxx)&lt;/P&gt;&lt;P&gt;Port (AxBx)&lt;/P&gt;&lt;P&gt;Service (Axxb)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you change the 'storage-key' (NOT summary-key) from Axxx to Axxb the sigs will change behavior from a "host sweep"  to a "service sweep". So more than just changing what the alert reports, you are also changing the sweep trigger. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your change may be okay if that is the desired behavior.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that a service sweep will typically fire less than a host sweep because it is more restrictive (i.e. only counts unique on a specific port instead of any port).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Mar 2006 16:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529536#M90275</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2006-03-22T16:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529537#M90276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this ICMP traffic?  If it's an ICMP packet then the port destination will be displayed as 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.1/0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Mar 2006 19:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529537#M90276</guid>
      <dc:creator>normalit</dc:creator>
      <dc:date>2006-03-23T19:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529538#M90277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This signature had me checking access-lists trying to figure out how TCP port 0 was getting to the hosts in the alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree that with the description of the signature that the port would be known and displayable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI...CS-MARS displays the port as TCP/0 as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jul 2006 12:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529538#M90277</guid>
      <dc:creator>MARK BAKER</dc:creator>
      <dc:date>2006-07-07T12:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SYN Host Sweep at 5.1.1p1</title>
      <link>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529539#M90278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I noticed the same thing between our sensors running v4.1(5)S201 against our v5.1(1e)S237 sensors.  The v4 sensors do store the victim port number.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checking sig 3030 on the v4 sensor, the storage-key is indeed Axxb.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jul 2006 17:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-syn-host-sweep-at-5-1-1p1/m-p/529539#M90278</guid>
      <dc:creator>npham</dc:creator>
      <dc:date>2006-07-07T17:29:23Z</dc:date>
    </item>
  </channel>
</rss>

