Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
PCNSE
NSE
StrongSwan
Created on 10-09-2009 08:09 AM
Post New Threadhey that looks great. You should take a instructor course ;) Now on the policy order, if you would look at what your originally post and the doc, the ordering is changed ( policy ID 3 & 6 ) Now if you review the attack log, the attack will logged the Policy ID that triggered that event. Lastly a off subject tip, you might need to trim and adjust your dos/ids signatures to reduce false positives. Good job and good luck, your doing it right.
PCNSE
NSE
StrongSwan
order, if you would look at what your originally post and the doc, the ordering is changed ( policy ID 3 & 6 )Thanks for the complements :) Did I set it right? Did I miss a step or otherwise need to make modification? Yes,. ID 3 & 6 were changed following the discussion in this thread, so that the CORRECT order is in the step-by-step document (as well as in the physical machine). I am still facing two issues: 1. For whatever reason, IPs that are in the ALL and not in the IPS group, are seeing " Blocked by IPS" messages. 2. High loads on the CPU of the box. The only thing I can think that might trigger the " Blocked by IPS" in the ALL policy/group (which shouldn' t happen) is actually related to the High Loads of the CPU, possibly due to an aggressive attack. Is that likely? Would FG300A be more resilient to attacks than the FG200A? Does it have a more powerful CPU that can handle higher loads? Or will FG300A handle same CPU load, just with a GB interface compared to the 100Mbit of the FG200A? I recieved a private msg from Ken with the following info in response to my problem: " I don' t see how? Unless the Protection Profile is enable for ips-sensors, the IDS/IPS is disable. Are your 100% sure it' s not permit and being deny with some " log traffic" enable?" Can you comment / explain me this further? What is the ' log traffic' he is referring to and how does that affect my setup? Last, " trim and adjust your dos/ids signatures to reduce false positives." How? or better ask: Which specifically? Today, I actually have only ONE server that is supposed to be behind the IPS protection. The other 20 servers are vanilla firewall. The settings that I have for that server seem to do the work for that server, but if you think I should change values, please provide me with suggested sample values. Thanks, -Sup.
PCNSE
NSE
StrongSwan
Most recent transactions(maximum 20). Date & Time From To Service Attack 2009-10-10 17:09:14 66.249.71.89 XX.YY.141.105 http tcp_reassembler: TCP.Stealth.Activity, paw 2009-10-10 17:08:37 94.230.94.40 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 29 times 2009-10-10 17:08:07 94.230.94.40 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 3 times 2009-10-10 17:07:17 94.230.94.40 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 8 times 2009-10-10 17:04:53 79.183.107.177 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 11 times 2009-10-10 17:04:19 79.183.107.177 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 10 times 2009-10-10 17:03:48 79.183.107.177 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 4 times 2009-10-10 17:01:52 79.177.139.245 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 12 times 2009-10-10 16:59:52 84.228.191.5 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 16 times 2009-10-10 16:58:25 84.108.102.242 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 18 times 2009-10-10 16:57:51 84.108.102.242 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 4 times 2009-10-10 16:55:58 84.111.9.115 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 16 times 2009-10-10 16:55:28 84.111.9.115 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 11 times 2009-10-10 16:54:48 84.111.9.115 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 10 times 2009-10-10 16:54:15 84.111.9.115 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 8 times 2009-10-10 16:53:44 77.125.171.239 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 11 times 2009-10-10 16:53:11 77.125.171.239 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 9 times 2009-10-10 16:52:02 84.0.211.91 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 33 times 2009-10-10 16:51:30 84.0.211.91 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 9 times 2009-10-10 16:50:52 84.0.211.91 XX.YY.141.105 http anomaly: tcp_src_session, 71 > threshold 70, repeats 6 timesAll the traffic being IPS' ed is on a single IP, so it makes things easy to identify. This is a Web Hosting Server, so it serves regular PHP and HTML pages. I don' t think that a single tcp_src_session should exceed 70 sessions. Am I wrong about this? What values would you change to reduce false-positive attacks? My thoughts about migrating from 200A to 300A was related to the how good does it effectively battle attacks, and that was due to the high CPU usage I was seeing. But, if there is no ' stronger' cpu to battle here, then there is no real added value to my current setup. thanks, -Sup.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1714 | |
1093 | |
752 | |
447 | |
232 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.