<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability Protection - Host Type field in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-host-type-field/m-p/46283#M34014</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking for clarification as to how the 'Host Type' field works in a vulnerability protection profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For instance, we have a profile configured to protect our DMZ with six rules as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" class="jiveBorder" style="border: 1px solid #000000; width: 100%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;Rule&lt;/STRONG&gt;&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;Threat Name&lt;/STRONG&gt;&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;CVE&lt;/STRONG&gt;&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;Host Type&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;Severity&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;Action&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;client-critical&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;client&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;critical&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;block&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;client-high&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;client&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;high&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;block&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;client-medium&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;client&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;medium&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;alert&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;server-critical&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;server&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;critical&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;block&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;server-high&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;server&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;high&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;alert&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;server-medium&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;server&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;medium&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;alert&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #575757; font-family: arial, helvetica, sans-serif;"&gt;I've noticed in the threat logs a number of 'FTP: login Brute-force attempt'&amp;nbsp; triggered from the outside to the DMZ with a source of some IP in China. Clicking the detail option beside the log entry shows a direction of 'client-to-server'. Based off the details of the threat ( see below ) I would assume the rule 'client-high' would catch the brute force attempt and 'block' the threat, however, it appears it is matching under the rule 'server-high' which takes an 'alert' action. In the help menus the 'Host' field has the description "Specify whether to limit the signatures for the rule to those that are client &lt;SPAN style="font-size: 12px;"&gt;side, server side, or either (&lt;/SPAN&gt;&lt;SPAN style="font-size: 12px;"&gt;any&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 12px;"&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; color: #575757;"&gt;)."&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: #575757; font-family: arial, helvetica, sans-serif;"&gt;which to me is very vague.&amp;nbsp; Could someone explain to me exactly what the 'host type' field does? &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-5433" style="padding: 3px 3px 3px 0; text-align: right !important;"&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;P&gt;FTP: login Brute-force attempt&lt;/P&gt;&lt;P class="x-form-item" style="margin-bottom: 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-5434" style="padding: 3px 3px 3px 0; text-align: right !important;"&gt;&lt;STRONG&gt;ID&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;P class="x-form-display-field" style="padding: 4px 0 0;"&gt;40001&lt;/P&gt;&lt;P class="x-form-item" style="margin-bottom: 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-5435" style="padding: 3px 3px 3px 0; text-align: right !important;"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;P class="x-form-display-field" style="padding: 4px 0 0;"&gt;This event indicates that someone is using a brute force attack to gain access to an ftp server. An FTP brute force attack is a method of defeating the cryptographic scheme by trying a large number of possible username and passwords.&lt;/P&gt;&lt;P class="x-form-item" style="margin-bottom: 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-5436" style="padding: 3px 3px 3px 0; text-align: right !important;"&gt;&lt;STRONG&gt;Severity&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;P class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;/P&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;&lt;IMG class="jiveImage" src="https://ip1.i.lithium.com/04e5bcbd72a27575dc762965a06976bdaab5f40e/68747470733a2f2f31302e302e32302e3232302f696d616765732f7468726561745f686967682e676966" /&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Dec 2013 18:16:09 GMT</pubDate>
    <dc:creator>MikeBull</dc:creator>
    <dc:date>2013-12-11T18:16:09Z</dc:date>
    <item>
      <title>Vulnerability Protection - Host Type field</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-host-type-field/m-p/46283#M34014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking for clarification as to how the 'Host Type' field works in a vulnerability protection profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For instance, we have a profile configured to protect our DMZ with six rules as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" class="jiveBorder" style="border: 1px solid #000000; width: 100%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;Rule&lt;/STRONG&gt;&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;Threat Name&lt;/STRONG&gt;&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;CVE&lt;/STRONG&gt;&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;Host Type&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;Severity&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;Action&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;client-critical&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;client&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;critical&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;block&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;client-high&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;client&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;high&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;block&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;client-medium&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;client&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;medium&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;alert&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;server-critical&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;server&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;critical&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;block&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;server-high&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;server&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;high&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;alert&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px;"&gt;server-medium&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;any&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;server&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;medium&lt;/TD&gt;&lt;TD style="padding: 2px;"&gt;alert&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #575757; font-family: arial, helvetica, sans-serif;"&gt;I've noticed in the threat logs a number of 'FTP: login Brute-force attempt'&amp;nbsp; triggered from the outside to the DMZ with a source of some IP in China. Clicking the detail option beside the log entry shows a direction of 'client-to-server'. Based off the details of the threat ( see below ) I would assume the rule 'client-high' would catch the brute force attempt and 'block' the threat, however, it appears it is matching under the rule 'server-high' which takes an 'alert' action. In the help menus the 'Host' field has the description "Specify whether to limit the signatures for the rule to those that are client &lt;SPAN style="font-size: 12px;"&gt;side, server side, or either (&lt;/SPAN&gt;&lt;SPAN style="font-size: 12px;"&gt;any&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 12px;"&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; color: #575757;"&gt;)."&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: #575757; font-family: arial, helvetica, sans-serif;"&gt;which to me is very vague.&amp;nbsp; Could someone explain to me exactly what the 'host type' field does? &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-5433" style="padding: 3px 3px 3px 0; text-align: right !important;"&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;P&gt;FTP: login Brute-force attempt&lt;/P&gt;&lt;P class="x-form-item" style="margin-bottom: 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-5434" style="padding: 3px 3px 3px 0; text-align: right !important;"&gt;&lt;STRONG&gt;ID&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;P class="x-form-display-field" style="padding: 4px 0 0;"&gt;40001&lt;/P&gt;&lt;P class="x-form-item" style="margin-bottom: 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-5435" style="padding: 3px 3px 3px 0; text-align: right !important;"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;P class="x-form-display-field" style="padding: 4px 0 0;"&gt;This event indicates that someone is using a brute force attack to gain access to an ftp server. An FTP brute force attack is a method of defeating the cryptographic scheme by trying a large number of possible username and passwords.&lt;/P&gt;&lt;P class="x-form-item" style="margin-bottom: 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-5436" style="padding: 3px 3px 3px 0; text-align: right !important;"&gt;&lt;STRONG&gt;Severity&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;P class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;/P&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;&lt;IMG class="jiveImage" src="https://ip1.i.lithium.com/04e5bcbd72a27575dc762965a06976bdaab5f40e/68747470733a2f2f31302e302e32302e3232302f696d616765732f7468726561745f686967682e676966" /&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:16:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-host-type-field/m-p/46283#M34014</guid>
      <dc:creator>MikeBull</dc:creator>
      <dc:date>2013-12-11T18:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection - Host Type field</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-host-type-field/m-p/46284#M34015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the example you have, the host is the Server, so it'll be a "server-high" with an action of Alert. If it was a server attacking a client, or a client-targeted vulnerability, it would be a "client-high" which does have an action of block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Effectively, the host field is equivalent to the target.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:47:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-host-type-field/m-p/46284#M34015</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-12-11T18:47:55Z</dc:date>
    </item>
  </channel>
</rss>

