12-30-2015 04:36 AM - edited 03-10-2019 06:31 AM
This is for AS2 traffic over HTTP/S.
Our current set up is to filter the traffic on firewall (both inbound & outbound) with respect to IP's and ports.
But now we're on the verge of changing the settings on our Firewall to Source= ANY (Inbound traffic) and destination=ANY (for outbound traffic).
Now its the time to activate the IPS blade for this settings to monitor the traffic and block rogue traffic.
Please can someone be helpful in assisting so as to what signatures are required in the protection?
I did look in to the signature list but was not confident enough to point out particular ones.
Also Pros and Cons for changing the white list to "ANY" are welcome.
Solved! Go to Solution.
01-01-2016 12:41 PM
The default configuration only triggers once the IPS is 90% confident an attack is underway.
I would stick with the default set if signatures selected. The selected set will vary as you update the IPS (make sure you update it regularly) based on the current risks in the wild.
12-30-2015 04:53 PM
I thought AS2 had to be configured for point to point data exchanges so I'm surprised you would need to change to an any/any rule.
Are you using a Firepower blade on a modern ASA? I don't think it will need too much protection beyond the defaults.
12-30-2015 08:27 PM
Thanks Dath for your response.
The need is, sometimes partners AS2 URL will be associated with set of IP's and each time it take a different IP may block the inbound/outbound communication (this is a rare condition though).
Its not any to any on a single rule but Source= ANY (Inbound traffic) and destination=ANY (for outbound traffic).
So I was thinking how an IPS can play a role in monitoring this traffic?
Its a modern ASA5540 with IPS capability.
Would you think we need to stay on the current config or can the changes made as I've described?
12-31-2015 02:57 PM
Wouldn't it be just as easy to create a object group for all the partners IP addresses and allow them through as a whole?
I haven't worked with AS2 much, but as I recall, its secured by certificates. Have I remember correctly?
If you have a large number of partners so it is becoming difficult to manage or frequent rule changes are being required then I think I would change to the any/any approach and rely on the certificates to secure the access.
01-01-2016 03:44 AM
Wish you happy New Year Dath :)
You're correct. AS2 is secured by Cert. Our current setup is same as you said. But to ease it up planning to any/any rule on Firewall.
So how IPS can play a role here? (Its over HTTP/s). Any signatures in particular to avoid DOS and rogue traffic?
01-01-2016 12:41 PM
The default configuration only triggers once the IPS is 90% confident an attack is underway.
I would stick with the default set if signatures selected. The selected set will vary as you update the IPS (make sure you update it regularly) based on the current risks in the wild.
01-02-2016 09:21 AM
Sure thing.
So in any case SSL/HTTPS inspection is a compulsion? (just a thought from IPS load perspective).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide