- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
03-17-2017 02:03 AM
Hi everybody
I like to know if there is a way to block incoming connections attemps to port TCP 22.
I have an end-customer which has lots of connections to his public ip range 0.0.0.0/24 to port TCP22 but not hit the vulnerability 40015 (SSH User Authentication Brute-force Attempt) because it neves triggers the child signature 31914 (SSH2 Login Attempt) because there no attempt to connect, it just an scanning.
I'm loooking at DoS Protection, which may works, but I'm not sure what to do in Option/Protection tab. I think I need to configure at Classified option a DoSProteccion Profile, but I'm lost, I donp't know it is better user FloodProtections or Resources Protection.
Do anybody has resolved this issue?
03-17-2017 03:24 AM
First use firewall rules to only allow traffic from internet to IPs and services which need to be visible from all internet.
If you need to have TCP 22 (SSH?) open from internet, make sure that it's only from specific sources (if possible).
Once you've closed all not needed ports from internet take a look at:
- IPS profile to detect and block multiple login atempts (brute force) to a server which actually listens on that port,
- Zone Protection (with both Flood and Reconnaissance protection) to protect server and obscure results for scans
03-21-2017 01:16 AM - edited 03-22-2017 01:12 AM
SYN cookie doesn't change log entry to 'allow'. PA replies with SYN ACK but log entry remains 'drop' if the port isn't open.
03-21-2017 05:55 AM
depending on what you're seeing exactly you could either create a drop policy or use zone protection's reconnaissance protection:
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!