<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to block TCP22 connections in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148623#M49616</link>
    <description>&lt;P&gt;depending on what you're seeing exactly you could either create a drop policy or use zone protection's reconnaissance protection:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="reconnaissance protection.png"&gt;&lt;img src="https://live.paloaltonetworks.com/skins/images/5DE745A4213343D2E26844B0146B285E/responsive_peak/images/image_not_found.png" alt="reconnaissance protection.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Mar 2017 12:55:33 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2017-03-21T12:55:33Z</dc:date>
    <item>
      <title>How to block TCP22 connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148152#M49527</link>
      <description>&lt;P&gt;Hi everybody&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I like to know if there is a way to block&amp;nbsp;incoming connections attemps to port TCP 22.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an end-customer which has lots of connections to his public ip range 0.0.0.0/24 to port TCP22 but not hit the vulnerability 40015 (SSH User Authentication Brute-force Attempt) because it neves triggers the child signature&amp;nbsp;&lt;SPAN&gt;31914 (SSH2 Login Attempt) because there no attempt to connect, it just an scanning.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm loooking at DoS Protection, which may works, but I'm not sure what to do in Option/Protection tab. I&amp;nbsp;think I need to configure &amp;nbsp;at Classified option a DoSProteccion Profile, but I'm lost, I donp't know it is better user FloodProtections or Resources Protection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do anybody has resolved this issue?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 09:03:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148152#M49527</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2017-03-17T09:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to block TCP22 connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148175#M49532</link>
      <description>&lt;P&gt;First use firewall rules to only allow traffic from internet to IPs and services which&amp;nbsp;need to be visible from all internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you need to have TCP 22 (SSH?) open from internet, make sure that it's only from specific sources (if possible).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you've closed all not needed ports from internet take a look at:&lt;/P&gt;&lt;P&gt;- IPS profile to detect and block multiple login atempts (brute force) to a server which actually listens on that port,&lt;/P&gt;&lt;P&gt;- Zone Protection (with both Flood and Reconnaissance protection) to protect server and obscure results for scans&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 10:24:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148175#M49532</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-17T10:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to block TCP22 connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148257#M49551</link>
      <description>&lt;P&gt;by default, it should be blocked already. if the logs are showing allowed (safe to assume they're SYN timeouts?), you must have a policy&amp;nbsp; permitting it I imagine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 17:45:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148257#M49551</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-03-17T17:45:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to block TCP22 connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148579#M49602</link>
      <description>&lt;P&gt;SYN cookie doesn't change log entry to 'allow'. PA replies with SYN ACK but log entry remains 'drop' if the port isn't open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2017 08:12:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148579#M49602</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-22T08:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to block TCP22 connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148623#M49616</link>
      <description>&lt;P&gt;depending on what you're seeing exactly you could either create a drop policy or use zone protection's reconnaissance protection:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="reconnaissance protection.png"&gt;&lt;img src="https://live.paloaltonetworks.com/skins/images/5DE745A4213343D2E26844B0146B285E/responsive_peak/images/image_not_found.png" alt="reconnaissance protection.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 12:55:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-tcp22-connections/m-p/148623#M49616</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-03-21T12:55:33Z</dc:date>
    </item>
  </channel>
</rss>

