<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH2 Brute Force events in System Logs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/189324#M57321</link>
    <description>&lt;P&gt;Hi guys,&lt;BR /&gt;&lt;BR /&gt;I've noticed in my System logs that there are SSH2 brute force attempts against our firewall.&lt;BR /&gt;&lt;BR /&gt;Unfortunately nothing is listed in the Traffic or Threat logs under the Monitor tab to indicate from which zone the traffic is originating from.&lt;BR /&gt;&lt;BR /&gt;Why would this be the case and how can I enable logging for this in the Traffic\Threat logs to determine from which zones the traffic is originating from?&lt;/P&gt;</description>
    <pubDate>Thu, 30 Nov 2017 13:11:24 GMT</pubDate>
    <dc:creator>TheRedBar0n</dc:creator>
    <dc:date>2017-11-30T13:11:24Z</dc:date>
    <item>
      <title>SSH2 Brute Force events in System Logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/189324#M57321</link>
      <description>&lt;P&gt;Hi guys,&lt;BR /&gt;&lt;BR /&gt;I've noticed in my System logs that there are SSH2 brute force attempts against our firewall.&lt;BR /&gt;&lt;BR /&gt;Unfortunately nothing is listed in the Traffic or Threat logs under the Monitor tab to indicate from which zone the traffic is originating from.&lt;BR /&gt;&lt;BR /&gt;Why would this be the case and how can I enable logging for this in the Traffic\Threat logs to determine from which zones the traffic is originating from?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2017 13:11:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/189324#M57321</guid>
      <dc:creator>TheRedBar0n</dc:creator>
      <dc:date>2017-11-30T13:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 Brute Force events in System Logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/189338#M57323</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69577"&gt;@TheRedBar0n&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;isn't there a 'from: &amp;lt;IP&amp;gt;' included in the log?&lt;/P&gt;
&lt;P&gt;a good start would be to check incoming ssh sessions from the internet (as this is usually the most likely source)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if these are hitting your management, i would recommend removing access to your management interface from outside or at least configuring some security policy to only allow trusted sources to connect&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2017 13:48:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/189338#M57323</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-11-30T13:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 Brute Force events in System Logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192061#M57751</link>
      <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes there are IP's included in the System logs. I have checked my traffic logs, and the only SSH sessions are those internally outbound that we have explicitly allowed. We have recently further hardended all our public IP's, so no SSH sessions should be hitting my firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How am I able to determine whether the SSH logon attempts is hitting my management IP?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 12:39:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192061#M57751</guid>
      <dc:creator>TheRedBar0n</dc:creator>
      <dc:date>2017-12-18T12:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 Brute Force events in System Logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192063#M57752</link>
      <description>&lt;P&gt;If there is an IP, that should probably give you an indication where the connection is coming from, but if there's nothing in your traffic logs they may be hitting a management profile on a dataplane interface (rather than the management interface):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mgmt profile.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13019i100D54184E065D6F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mgmt profile.png" alt="mgmt profile.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 12:59:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192063#M57752</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-12-18T12:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 Brute Force events in System Logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192064#M57753</link>
      <description>&lt;P&gt;Thanks Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see we previously configured 3 different management profiles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I correct in saying that if there is no IPs listed in the Permitted IP Addresses, this will allow the selected services from any source IP?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 13:18:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192064#M57753</guid>
      <dc:creator>TheRedBar0n</dc:creator>
      <dc:date>2017-12-18T13:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 Brute Force events in System Logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192065#M57754</link>
      <description>That is correct</description>
      <pubDate>Mon, 18 Dec 2017 13:53:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192065#M57754</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-12-18T13:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 Brute Force events in System Logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192224#M57767</link>
      <description>&lt;P&gt;Thank you Reaper, I have adjusted our management profiles and will be monitoring the system logs over the next few days. Appreciate the assistance!&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 08:49:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh2-brute-force-events-in-system-logs/m-p/192224#M57767</guid>
      <dc:creator>TheRedBar0n</dc:creator>
      <dc:date>2017-12-19T08:49:06Z</dc:date>
    </item>
  </channel>
</rss>

