<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Brute Force Signatures in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/24000#M17490</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my case, the two vulnerabilities (#1 is the intial sensor for the offending traffic, #2 is the time based vulnerability for it) keep incrementing after the block-ip events.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the log that shows the problem.&amp;nbsp; These are all attacks from the same source IP - I have the block set to 5 minutes, but it never blocks them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI - I have an active case going that's made it to engineering.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 May 2012 13:22:52 GMT</pubDate>
    <dc:creator>cmaier</dc:creator>
    <dc:date>2012-05-24T13:22:52Z</dc:date>
    <item>
      <title>Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23982#M17472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi : In regard to Brute Force Vulnerability Signatures 40015 (ssh) and 40021 (rdp) :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is there not a way to permanently block an IP number that exceeds the configured&amp;nbsp; Number of Hits per time period? Is this possibly in the works fro a future release?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2011 16:19:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23982#M17472</guid>
      <dc:creator>wlu</dc:creator>
      <dc:date>2011-12-08T16:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23983#M17473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Currently there is no way to automatically block IPs permanently using brute force signatures.&amp;nbsp; There is a user-configurable black-hole timeout value, with a maximum of 1 hour.&amp;nbsp; However, you can list the current black hole IPs through the CLI and periodically add repeat offenders to a policy that permanently blocks those addresses.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2011 22:54:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23983#M17473</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2011-12-08T22:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23984#M17474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi tettema&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where can i find the black-hole configuration?&amp;nbsp; or is it only from CLI?&amp;nbsp; I'm using the latest PAN-OS 4.1.0 on a PA2020...&amp;nbsp; and I get tons of brute-force attempts on various servers behind the PA2020...&amp;nbsp; oh, my PA2020 is running in transparent (vwire) mode....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- ron&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Dec 2011 02:14:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23984#M17474</guid>
      <dc:creator>RonaldGo</dc:creator>
      <dc:date>2011-12-13T02:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23985#M17475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Select the brute force signature(s) you're interested in the Exceptions tab, and choose the action "block-ip".&amp;nbsp; Then a pop-up will appear asking you how long you want to block the IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Dec 2011 02:18:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23985#M17475</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2011-12-13T02:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23986#M17476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks!&amp;nbsp; it seems to work well...&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what i did was clone the "strict" policy and added the exceptions and set them to "block-ip" for 3600 (1 hour)...&amp;nbsp; i assume that the rest of the "strict" policy still applies but the exceptions would take over when they are met?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i mean, like if the brute-force RDP is seen, it would block-ip instead of just "drop-all=packets"...&amp;nbsp; but if the PA2020 sees a remote stack overflow, it would still "drop-all-packets"...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- ron &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 10:11:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23986#M17476</guid>
      <dc:creator>RonaldGo</dc:creator>
      <dc:date>2011-12-14T10:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23987#M17477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi : Thanks for the information. What is the CLI command that shows the current temporary blackholes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 18:45:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23987#M17477</guid>
      <dc:creator>wlu</dc:creator>
      <dc:date>2011-12-14T18:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23988#M17478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;show dos-protection zone [zone] blocked source &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 19:01:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23988#M17478</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2011-12-14T19:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23989#M17479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, actions specified per signature in the exceptions tab override actions specified in rules that contain that same signature.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 19:15:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23989#M17479</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2011-12-14T19:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23990#M17480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems block-ip doesn't work for SMB or FTP attacks...&amp;nbsp; when PA detects the brute-force attack, it shows "block-ip" but the attacks continue almost endlessly until i block it on the router (before PA)...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there any workaround for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ronald &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Dec 2011 01:20:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23990#M17480</guid>
      <dc:creator>RonaldGo</dc:creator>
      <dc:date>2011-12-30T01:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23991#M17481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you configure the block-ip action for a brute force signature, you can specify a time span for the block, which currently goes up to 1 hour.&amp;nbsp; You should not see successful attempts from the sampe IP against the same IP that occur inside of the time you've specified for the block-ip action.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jan 2012 18:50:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23991#M17481</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2012-01-03T18:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23992#M17482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the block ip doesn't seem to work for ftp... what i've seen on my system is an ip doing brute force ftp login attempt and the "action" shows "block-ip"... but the attack continues on until i login to our router and block that ip on the router instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just this morning, i had 56,000+ sessions of such brute force ftp login attempts from 3 ip addresses...&amp;nbsp; does the PA "block ip" only stop the tcp session?&amp;nbsp; I'm just guessing here, but it may be because ftp and smb are more udp based?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ronald&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 01:28:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23992#M17482</guid>
      <dc:creator>RonaldGo</dc:creator>
      <dc:date>2012-01-12T01:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23993#M17483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ronald,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It temporarily black lists the IP (up to 1hr, user configurable), so it should work regardless of application/protocol used in the brute force attack.&amp;nbsp; I suggest you open a support ticket so we can get this resolved for you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 01:45:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23993#M17483</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2012-01-12T01:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23994#M17484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it does block ip for the other brute force attacks, but somehow for smb and ftp, it doesn't work... it shows that the action is "block ip"... but the attacks just continue on... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok, i'll request a support ticket and hope this can be resolved...&amp;nbsp; it's not a show-stopper...but it certainly is an irritation and a mystery...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ronald &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 02:03:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23994#M17484</guid>
      <dc:creator>RonaldGo</dc:creator>
      <dc:date>2012-01-12T02:03:57Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23995#M17485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ronald,&lt;/P&gt;&lt;P&gt;Did you get anywhere with this?&amp;nbsp; I have a custom vulnerability that I'm trying to have block IP's, and it won't.&amp;nbsp; Same as you - the action says block-ip in the threat log, but that attack continues.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2012 17:13:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23995#M17485</guid>
      <dc:creator>cmaier</dc:creator>
      <dc:date>2012-05-17T17:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23996#M17486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;unfortunately, no joy at my side on this particular issue...&amp;nbsp; i can see that "block-ip" works for the MS-RDP brute force attack, but not for the FTP or SMB brute force attack... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it's very strange... but my guess is that the "block ip" blocks only TCP and not not UDP... and that's why it does not properly stop the FTP or SMB attacks as these 2 have a UDP side to their protocol...&amp;nbsp; just a working theory...&amp;nbsp; so, it's probable that your vulnerability also has a UDP component to the attack and that's probably why your PA doesn't block it entirely... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my only problem is that paloaltonetworks does not entertain "problem reports" directly from end-users like me and requires me to go through my vendor...&amp;nbsp; quite frustrating...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck and hope you can get a solution...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ronald&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2012 00:37:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23996#M17486</guid>
      <dc:creator>RonaldGo</dc:creator>
      <dc:date>2012-05-18T00:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23997#M17487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ehm FTP uses TCP and not UDP. Perhaps you are confusing this with TFTP which is different?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my opinion this shouldnt matter since both UDP and TCP have srcip and dstip (which is used for the block).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2012 06:53:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23997#M17487</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-18T06:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23998#M17488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;oops... you're right...&amp;nbsp; :smileyblush:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the problem still remains that the PA firewall appliance claims it has the "block ip" action for the type "vulnerability"; name "FTP:login brute force attempt"; from zone "untrust"; to zone "trust"; to port "21"; application "ftp"; severity "high", yet the attack continues on until i manually block the attacker's IP on the router itself (Cisco : deny ip host "attacker"...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;whereas for MS-RDP brute-force attacks, when the console reports block-ip, the attack does actually stop for the next hour...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ronald&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 05:25:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23998#M17488</guid>
      <dc:creator>RonaldGo</dc:creator>
      <dc:date>2012-05-24T05:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23999#M17489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to verify... when you say that the attack continues - do you mean that each attempt is logged as "block-ip" in the PA-logs or do you mean that each attempt is actually reaching the target server (like if you run tcpdump on the server you would still see each attempt)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because if its the first case then I guess it can be because you have a "deny and block" rule as last rule in your ruleset or anyway I think each attempt should still be logged (or have an option if only the first block-ip for a particular srcip should be logged).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 06:01:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/23999#M17489</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-24T06:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/24000#M17490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my case, the two vulnerabilities (#1 is the intial sensor for the offending traffic, #2 is the time based vulnerability for it) keep incrementing after the block-ip events.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the log that shows the problem.&amp;nbsp; These are all attacks from the same source IP - I have the block set to 5 minutes, but it never blocks them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI - I have an active case going that's made it to engineering.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 13:22:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/24000#M17490</guid>
      <dc:creator>cmaier</dc:creator>
      <dc:date>2012-05-24T13:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/24001#M17491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;well, "attack continues" as in the PA console shows that the attack keeps going on and the "action" shows "block-ip" for the next few hours until i notice it and block the connection at the router...&amp;nbsp;&amp;nbsp; and each attempt does reach the server under attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the strange thing is this is part of the vultnerabilities profile and it does work for blocking MS-RDP brute force attacks...&amp;nbsp; but not SMB and FTP brute force attacks...&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2012 03:13:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-signatures/m-p/24001#M17491</guid>
      <dc:creator>RonaldGo</dc:creator>
      <dc:date>2012-05-25T03:13:14Z</dc:date>
    </item>
  </channel>
</rss>

