03-20-2014 05:17 AM - edited 03-11-2019 08:58 PM
We have a ASA 5505 that is being hammered on port 3389... Currently the port is set to allow connections from any which needs to stay the same, currently the port is being smashed by a bot that is trying to guess username/password.
Currently we have basic threat detection enabled and I have now enabled scanning threat detection and Shun hosts for 3600
Currently we arent being attacked so i cant tell if this helps the situation but what else can I apply to stop this... I estiamted that in a 30minute period over the past evening they spammed 1400 attempts.
Looking through the logs on the server, the source IP changes so blocking the IP is only a temporary fix.
Thanks for help in advance.
03-21-2014 07:54 AM
Anyone?
03-24-2014 04:03 PM
03-21-2014 08:38 AM
Are they targeting an ip address specifically or a URL? If they're using a URL you could try changing the public address. If you have a spare one
It's not a great solution but it will buy you some time to come up with something better
Also, you could deny entry to that port, tell your users to use a different port and use NAT to translate the new port to 3389
Another crap idea but it's all I've got
03-21-2014 09:05 AM
They are targetting a IP on port 3389.
Changing the port isnt ideal but if thats what I have to do then I will have to.
Thanks
03-21-2014 08:01 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide