<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [133:27:2] dcerpc2: Connection-oriented DCE/RPC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/2854209#M979714</link>
    <description>&lt;P&gt;I have a lot of mail alert&amp;nbsp; from FireSIGHT systems&amp;nbsp; detail as bellow :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;[133:27:2] dcerpc2: Connection-oriented DCE/RPC - Invalid major version [Impact: Potentially Vulnerable] From "10.31.246.51" at Thu Mar 31 01:23:52 2016 UTC [Classification: Pornography was Detected] [Priority: 2] {tcp} 10.32.3.78:6004-&amp;gt;10.16.3.30:55450&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can help me to verify and fix this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Nathakorn S.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:35:05 GMT</pubDate>
    <dc:creator>samnagbankok1</dc:creator>
    <dc:date>2019-03-10T13:35:05Z</dc:date>
    <item>
      <title>[133:27:2] dcerpc2: Connection-oriented DCE/RPC</title>
      <link>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/2854209#M979714</link>
      <description>&lt;P&gt;I have a lot of mail alert&amp;nbsp; from FireSIGHT systems&amp;nbsp; detail as bellow :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;[133:27:2] dcerpc2: Connection-oriented DCE/RPC - Invalid major version [Impact: Potentially Vulnerable] From "10.31.246.51" at Thu Mar 31 01:23:52 2016 UTC [Classification: Pornography was Detected] [Priority: 2] {tcp} 10.32.3.78:6004-&amp;gt;10.16.3.30:55450&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can help me to verify and fix this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Nathakorn S.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/2854209#M979714</guid>
      <dc:creator>samnagbankok1</dc:creator>
      <dc:date>2019-03-10T13:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: [133:27:2] dcerpc2: Connection-oriented DCE/RPC</title>
      <link>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/3402133#M979729</link>
      <description>&lt;P&gt;What did you do in the end? &lt;BR /&gt;You can apply a suppression which will ignore for what you enter.&lt;/P&gt;
&lt;P&gt;Would't it be nice if there could be a little more information about this.&lt;/P&gt;
&lt;P&gt;Perhaps a suggestion as to what a good major version would be perhaps?&lt;/P&gt;
&lt;P&gt;If it could highlight the particular header that is not equal to 5 would be helpful.&lt;/P&gt;
&lt;P&gt;Perhaps like, "if you ensure all users have teamviewer x.x installed this will avert hitting this rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jun 2018 20:38:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/3402133#M979729</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2018-06-19T20:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: [133:27:2] dcerpc2: Connection-oriented DCE/RPC</title>
      <link>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/3402834#M979741</link>
      <description>&lt;P&gt;I am having this issues as well. Pretty much out of the blue. The traffic is going to internal intranet sites. I check the machines and they aren't opening a browser so I am not sure where the traffic is coming from. Does anyone have any further information. I really want to know what has tripped this all the sudden.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jun 2018 17:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/3402834#M979741</guid>
      <dc:creator>ddevecka</dc:creator>
      <dc:date>2018-06-20T17:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: [133:27:2] dcerpc2: Connection-oriented DCE/RPC</title>
      <link>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/3402935#M979748</link>
      <description>&lt;P&gt;in your case being internal, you might say to yourself, i don't need/want to protect at a preprocessor level for internal flows. You could create a rule in the ACL to apply a different IPS policy that disables the rule (just for internal to internal). Or you could add suppression rules for internal destinations.&lt;/P&gt;
&lt;P&gt;My eg, is internal to outbound, so I do want to leave it in place.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jun 2018 20:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/133-27-2-dcerpc2-connection-oriented-dce-rpc/m-p/3402935#M979748</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2018-06-20T20:35:06Z</dc:date>
    </item>
  </channel>
</rss>

