02-02-2018 01:47 PM - edited 02-21-2020 07:16 AM
Hello,
This could be due to pure ignorance on my part, but I noticed odd behavior on one of the ASA's I manage.
There were a couple clients showing as the source IP for a SYN Attack. Of course, I jumped to malware and scanned the heck out of one of the clients. In the meantime, I arrived onsite and jumped on my machine. While montoring, my device was flagged as a SYN Attack.
After doing a little more digging, it looks like some legit traffic (Microsoft, Logmein, etc.) is being flagged. Is this simply because of the breakdown of the TCP handshake?
03-14-2018 01:51 AM
Hello,
It could be a false positive, depends on the feature which triggered these logs - was it threat-detection or MPF policy. If you are sure that its a false positive, you can tweak the policy to increase the values which are a criteria for syn attack on ASA.
Where did you find the false syn attack , was it syslog or some other tool?
-
HTH
AJ
03-14-2018 05:09 AM
Where exactly can IPS TCP Syn threshold can be changed?
Can you share maybe the GUI menu or CLI command if the case?
Thanks!
03-14-2018 09:01 AM
It's a view segment in the ADMIN GUI for the ASA. I check it out occasionally and they always seem to point to legit IP's. I think it's just dropped packets triggering the alert. No issues with the network because of this, just looking into it.
Thanks for the reply.
03-14-2018 09:40 PM
Hello,
If you are referring to 'top usage status', that setting is controlled by threat detection feature which can be played around by below:
configuration > firewall > threat detection
-
HTH
AJ
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide