<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco IDS-4230 - TCP Reset Problem  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341642#M97453</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the explaination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to rule out any issues with SPAN, I have terminated both the IDS sniffing and the router interface on a hub.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an IDS command that I use to see &lt;/P&gt;&lt;P&gt;if the it has sent out a RST for a particulater signature ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zahid &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Jan 2005 10:24:53 GMT</pubDate>
    <dc:creator>zahid.hassan</dc:creator>
    <dc:date>2005-01-04T10:24:53Z</dc:date>
    <item>
      <title>Cisco IDS-4230 - TCP Reset Problem</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341640#M97451</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am testing a custom signature on Cisco a 4230 running Version 4.1(4)S91.&lt;/P&gt;&lt;P&gt;I am seeing alerts on the IEV but not getting any connection resets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature config output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IDS-1# sh configuration | include SIGID 20000&lt;/P&gt;&lt;P&gt;signatures SIGID 20000 SubSig 0 &lt;/P&gt;&lt;P&gt;IDS-1# sh configuration | begin SIGID 20000  &lt;/P&gt;&lt;P&gt;signatures SIGID 20000 SubSig 0 &lt;/P&gt;&lt;P&gt;AlarmSeverity high&lt;/P&gt;&lt;P&gt;AlarmThrottle FireAll&lt;/P&gt;&lt;P&gt;EventAction log|reset&lt;/P&gt;&lt;P&gt;RegexString&lt;/P&gt;&lt;P&gt;testattack&lt;/P&gt;&lt;P&gt;ServicePorts 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug IP Packet Detail on the routers are also not showing &lt;/P&gt;&lt;P&gt;any RST flags being sent from the IDS sniffing interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any pointers or comments would be highly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zahid &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341640#M97451</guid>
      <dc:creator>zahid.hassan</dc:creator>
      <dc:date>2019-03-10T09:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IDS-4230 - TCP Reset Problem</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341641#M97452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RST's will be sent out the sniffing interface, with the MAC/IP address of the intended victim, so if the switch has been set up with a SPAN port you have to make sure of two things:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Disable learning on the SPAN port, since the Sensor is going to spoof the source IP and MAC address of the destination of the original packet, so the switch has to allow this through.&lt;/P&gt;&lt;P&gt;# Allow input on the SPAN port so the switch will accept the RST packet, since normally they are only one way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    * set span &lt;VLAN&gt;|&lt;PORT&gt; &lt;DEST&gt; learning disable inpkts enable&lt;/DEST&gt;&lt;/PORT&gt;&lt;/VLAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or on an IOS switch (2950, 3550, etc), do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    * monitor session 1 source vlan 40 rx&lt;/P&gt;&lt;P&gt;    * monitor session 1 destination int fa0/5 ingress vlan 40&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jan 2005 22:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341641#M97452</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2005-01-03T22:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IDS-4230 - TCP Reset Problem</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341642#M97453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the explaination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to rule out any issues with SPAN, I have terminated both the IDS sniffing and the router interface on a hub.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an IDS command that I use to see &lt;/P&gt;&lt;P&gt;if the it has sent out a RST for a particulater signature ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zahid &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2005 10:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341642#M97453</guid>
      <dc:creator>zahid.hassan</dc:creator>
      <dc:date>2005-01-04T10:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IDS-4230 - TCP Reset Problem</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341643#M97454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the CLI of the sensor, do a "sho event", this will show all new events as the sensor detects them (CTRL-C to exit when you're done).  When it detects your custom signature you should see something like the following (obviously the sig and IP address parameters will be different):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evAlert: eventId=1049973625558217119 severity=high &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;originator: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;hostId: 4230-2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;appName: sensorApp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;appInstanceId: 1096&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;time: 2005/01/05 09:38:25 2005/01/05 09:48:25 AEST&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;interfaceGroup: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;vlan: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;signature: sigId=3338 sigName=Windows LSASS RPC Overflow subSigId=0 version=S91 LSASS RPC Overflow over SMB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;participants: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;attack: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;attacker: proxy=false &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;addr: locality=IN 10.67.44.203&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;port: 9403&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;victim: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;addr: locality=IN 10.67.20.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;port: 445&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;B&gt;actions: &lt;/B&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;tcpResetSent: true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;alertDetails: Traffic Source: int0 ; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2005 23:31:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341643#M97454</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2005-01-04T23:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IDS-4230 - TCP Reset Problem</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341644#M97455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will need a third interface on the IDS for TCP RST to work ?&lt;/P&gt;&lt;P&gt;The IDS (Cisco 4230) that I am working on has only two interfces, one command and control and a sniffing interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zahid &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jan 2005 22:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ids-4230-tcp-reset-problem/m-p/341644#M97455</guid>
      <dc:creator>zahid.hassan</dc:creator>
      <dc:date>2005-01-05T22:09:10Z</dc:date>
    </item>
  </channel>
</rss>

