<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh (or any) threshold? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16814#M12246</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="sshIncident_sample.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15190_sshIncident_sample.png" style="height: 386px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sample&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Aug 2014 13:26:15 GMT</pubDate>
    <dc:creator>VSU_ITSEC</dc:creator>
    <dc:date>2014-08-28T13:26:15Z</dc:date>
    <item>
      <title>ssh (or any) threshold?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16811#M12243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Calibri','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: black;"&gt;I'm experiencing a ton of hits over ssh to servers that must have ssh access. Is there a way to do threat assessment based on SSH,&amp;nbsp; port etc – and then automatically shut the attack down?&amp;nbsp; For example if a certain IP begins sending all that traffic on port 22 within a certain timeframe – we shutdown the traffic and blacklist the IP.&amp;nbsp; What would be better is to limit this rule to a certain scope – say all of China and Korea where we know attacks tend to happen from – this will help keep down false positives.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Calibri','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: black;"&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Calibri','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: black;"&gt;//moe&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 12:44:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16811#M12243</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2014-08-28T12:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: ssh (or any) threshold?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16812#M12244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are You sure that You have properly configured Threat prevention (enabled on policy that allowing ssh access to servers)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look &lt;A href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/40015" title="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/40015"&gt;https://threatvault.paloaltonetworks.com/Home/ThreatDetail/40015&lt;/A&gt;&lt;/P&gt;&lt;P&gt;there is an id40015&amp;nbsp;&amp;nbsp; SSH User Authentication Brute-force Attempt signature exactly for Your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 13:00:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16812#M12244</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-08-28T13:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: ssh (or any) threshold?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16813#M12245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i believe so.&amp;nbsp; the connections don't match that vulnerability, which i have "reset-both" assigned to it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 13:14:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16813#M12245</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2014-08-28T13:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: ssh (or any) threshold?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16814#M12246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="sshIncident_sample.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15190_sshIncident_sample.png" style="height: 386px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sample&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 13:26:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16814#M12246</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2014-08-28T13:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: ssh (or any) threshold?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16815#M12247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi VSU,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try with DOS Protection or Zone Protection. You should be able to cofigure values in it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 17:21:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16815#M12247</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-28T17:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: ssh (or any) threshold?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16816#M12248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi VSU,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following Signature will not trigger fo 10 attemts in 1 hour. Count is much higher than that. I guess its around 60 per minute as long as I know.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/40015" rel="nofollow" style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #779308; text-decoration: underline;"&gt;https://threatvault.paloaltonetworks.com/Home/ThreatDetail/40015&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 19:01:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16816#M12248</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-28T19:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: ssh (or any) threshold?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16817#M12249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi VSU&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can verify using custom reports that more than 10 atemp per hour hapend. If yes, Please make a pcap for further troubleshooting by PA support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 18:37:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16817#M12249</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-08-29T18:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: ssh (or any) threshold?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16818#M12250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/26529"&gt;VSU_ITSEC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with &lt;A href="https://live.paloaltonetworks.com/u1/19490"&gt;hshah&lt;/A&gt; , you could add a DOS profile to your specific SSH rule to throttle sessions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2014 17:20:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-or-any-threshold/m-p/16818#M12250</guid>
      <dc:creator>Dz3015</dc:creator>
      <dc:date>2014-11-28T17:20:11Z</dc:date>
    </item>
  </channel>
</rss>

