11-04-2010 04:42 PM - edited 03-10-2019 05:10 AM
Has anyone else ran into an issue with sig 31020 alerting to false positives?
11-05-2010 01:30 AM
Hi. I see the same situation in my LAN environment especialy between Windows Servers. No information about possible benign triggers. It's a fresh signatue (S527) so I guess a little tuning from Cisco can be expected.
Best regards,
Marko
11-05-2010 09:39 AM
Thank you for the reply. Hopefully they tune it sooner than later. We're getting way too many alerts.
-Cory
11-08-2010 04:17 AM
It is very important to check if this traffic is matching agains the signature. Take a packet capture of the traffic and share it with us so we can check if the signature is being triggered for no reason.
Cheers
Mike.
11-08-2010 05:33 AM
11-08-2010 06:15 AM
Marko,
Thanks for the packet capture, I was taking a look at them and I found out that in Frame 36 on capture sig31020-1 the user given is (/) which may be considered a Null username by the IPS, is there a reason as of why users are being logged as (/) ?
Here is the link that explains about the signature
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=31020&signatureSubId=0
Let me know.
Cheers.
Mike
11-08-2010 11:18 PM
Thank you for your answer.
I really don't know the answer. I'll try to find out the reason for this but I have not much hope to find the answer.
Best regards,
Marko
11-17-2010 01:54 PM
This fires all the time for us now. Cisco reports that this sig replaced sig 5577/1. 5577/1 has almost never fired on us. Now 31020 fires from hundreds of sources each day.
What changed from 5577/1 to 31020/0?
Is Cisco looking into this?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide