cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1237
Views
0
Helpful
7
Replies

IPS 4255 doesn't detect a Nessus vulnerability scan..

We tested Nessus against our legal IP range, and although the firewalls see the connections and happily deny then, the IPS 4255's (two, in series, running 7.1.6 and 7.0.7 E4 respectively) aren't logging anything on the source IP, not even in the info / low logs.

Is this a consequence of Nessus being very clever, or is there an issue with the scanning thresholds? These are currently set to 100

Gareth

7 Replies 7

jocamare
Level 4
Level 4

Does the traffic go through the ASAs first?

Or it goes through the sensors first?

Is there a signature that should be triggering when detecting the traffic?

Is this about the sensor not logging the source host's information or the scan itself?

The IPS is outside the firewalls, so traffic hits that first. The scanner should detect TCP and UDP scans, but doesn't seem to see the source IP at all.

On the other hand, it does see some other IPs scanning at the same time, so possibly Nessus "spoofs" its source address... does anyone know?

Try to capture the traffic and confirm it is reaching the unit.

Also make sure there are no event action filters that might be affecting this.

It has to go through the IPS, there's no other physical path it can take.

The default action filters are all on and I've re-enabled the retired TCP/UDP scan filters.

Hello Gareth,

Can you let me know if this signatures are enabled:

3001/1

4003/0

3001/0

In fact have some fun with the entire link and check those signatures ( I have done the search and copy the link for you) , those should be able to detect that traffic ASAP

http://tools.cisco.com/security/center/ipshome.x?keyword=Port+Sweep&selectedCriteria=E&dateRange=All&searchType=Basic&Signature+ID=false&Signature+Name=false&Latest+Release+Date=false&Alarm+Severity=false&Release=false&Original+Release=true&Original+...

Remember to rate any of the helpful posts

Regards

Julio Carvajal

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

3001/1 doesn't exist, but the other 2 are both enabled.

For clarification purposes:

We are seeing events related to the scan, the issue is with the reported "attacker" addresses. Is that right?

Can you share one of the logs you mentioned on the reply for my first post in here?

Review Cisco Networking products for a $25 gift card