<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic net flood tcp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634478#M92430</link>
    <description>&lt;P&gt;There seams to be a problem with the signature Net Flood TCP. The Cisco Intrusion Prevention sensor is installed in promiscuous mode and is at version 5.1(2) S247.0. The signature is enabled for rate 0 and to produce at alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;signatures 6920 0 &lt;/P&gt;&lt;P&gt;status  &lt;/P&gt;&lt;P&gt;enabled true&lt;/P&gt;&lt;P&gt;rate: 0 &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;event-action: produce-alert &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is that we do not receive any alert. Is there a logical reason for this and if so what is it?&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 10:12:51 GMT</pubDate>
    <dc:creator>darin.marais</dc:creator>
    <dc:date>2019-03-10T10:12:51Z</dc:date>
    <item>
      <title>net flood tcp</title>
      <link>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634478#M92430</link>
      <description>&lt;P&gt;There seams to be a problem with the signature Net Flood TCP. The Cisco Intrusion Prevention sensor is installed in promiscuous mode and is at version 5.1(2) S247.0. The signature is enabled for rate 0 and to produce at alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;signatures 6920 0 &lt;/P&gt;&lt;P&gt;status  &lt;/P&gt;&lt;P&gt;enabled true&lt;/P&gt;&lt;P&gt;rate: 0 &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;event-action: produce-alert &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is that we do not receive any alert. Is there a logical reason for this and if so what is it?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:12:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634478#M92430</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2019-03-10T10:12:51Z</dc:date>
    </item>
    <item>
      <title>Re: net flood tcp</title>
      <link>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634479#M92431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This happens probably due to a corrupt image.  Try reloading the IPS image from a backup&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Sep 2006 16:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634479#M92431</guid>
      <dc:creator>smahbub</dc:creator>
      <dc:date>2006-09-15T16:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: net flood tcp</title>
      <link>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634480#M92432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i think it is a bug in 5.x. TAC are working on a solution right now....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Sep 2006 18:17:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634480#M92432</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2006-09-15T18:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: net flood tcp</title>
      <link>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634481#M92433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me say this again. It?s not a bug with the sensor as the alert is received. The problem is that the vms server does not pull the alert from the sensor database.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Sep 2006 22:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634481#M92433</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2006-09-15T22:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: net flood tcp</title>
      <link>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634482#M92434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;for those having the same problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;quote:&lt;/P&gt;&lt;P&gt;Patch for CSCsg09932 - SecMon does not display any alert for sig6920&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rate if it helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Sep 2006 11:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/net-flood-tcp/m-p/634482#M92434</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2006-09-26T11:32:21Z</dc:date>
    </item>
  </channel>
</rss>

