This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

DOS attack coming from LAN

Hello all,

I was recently hired in my current position(school district) and inherted a UTM 9, a product that prior to coming here I had never worked with before.  Over the last month my organization has been dealing with a DDOS attack, looks like it is coming(spoofed) from Google.  IPS was not enabled at the time of the original attack, I have since enabled it, through my own tinkering(researching this forum and the web) and a few calls to support.  A concern I have, but can accecpt for the time being is the fact that IPS really throttles my connection(1GBps) down to aroung 250mbps.  

The major issue is the fact we use google apps for education, and since enabling IPS it forces each app to timeout or take extended time to open.  The funny thing is, it only happens in Chrome.  I use Linux as my desktop and have no issue, and my windows clients that have firefox have no issue, but there's a strangle on Chrome.  I see the easy fix, but when you have 1100 students using chromebooks, I can't just implement a workaround.  So my question is does anyone have experience in this, do you use GApps through the UTM with IPS enabled?  

I have all the google ipaddresses added in my exception list, and the port exceptions on the Or tab for "using these services" which I created for TCP443 and UDP443. 

I've modified the attack patterns, enabled and disabled the Anti-Dos/Flodding options(currently UDP and ICMP enabled), anti-portscan enabled.

 

I'd appreciate any thoughts or suggestions.  Or if there are any additional details I may have left out, please feel free to ask.

 

Thanks in advance,

Chris



This thread was automatically locked due to age.
  • Hi Chris and welcome to the UTM Community!

    What's the nature of the DDoS - can you show us an example of what is blocked in the Intrusion Prevention log?  What attack patterns have you modified - or do you mean you've changed the attack pattern selections?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • 192.168.45.1 is the internal address of the firewall, all internal traffic goes through this port to my public address on another et0 port.  The 254 subnet is not active on my network, and at the time of the attacks we see all sort of random addresses on that subnet.  Sophos support is suggesting many different things, but they are adamant there is a loop within my network, although the attack typically happens each day at the same time, 10:55am est.  Today it actually happened at 13:15est, for the first time.  I'm at a loss at this point.  I'm not sure what else you might need, but feel free, in dire need of help at this point.  I inherited this box when I took the position in July, there were no problems until November 27th.  Since then, we can almost predict a complete flood of my broadband pipe taking down my internet.   

    9 isa ulogd[21603]: id="2103" severity="info" sys="SecureNet" sub="ips" name="SYN flood detected" action="SYN flood" fwrule="60012" initf="eth2" srcmac="00:21:f7:d7:8c:00" dstmac="00:1a:8c:36:64:08" srcip="192.168.45.1" dstip="192.168.254.46" proto="6" length="60" tos="0x00" prec="0x00" ttl="63" srcport="52993" dstport="80" tcpflags="SYN"
    2018:01:10-10:40:19 isa ulogd[21603]: id="2103" severity="info" sys="SecureNet" sub="ips" name="SYN flood detected" action="SYN flood" fwrule="60012" initf="eth2" srcmac="00:21:f7:d7:8c:00" dstmac="00:1a:8c:36:64:08" srcip="192.168.45.1" dstip="192.168.254.18" proto="6" length="60" tos="0x00" prec="0x00" ttl="63" srcport="51583" dstport="80" tcpflags="SYN"
    2018:01:10-10:40:19 isa ulogd[21603]: id="2103" severity="info" sys="SecureNet" sub="ips" name="SYN flood detected" action="SYN flood" fwrule="60012" initf="eth2" srcmac="00:21:f7:d7:8c:00" dstmac="00:1a:8c:36:64:08" srcip="192.168.45.1" dstip="192.168.254.209" proto="6" length="60" tos="0x00" prec="0x00" ttl="63" srcport="45112" dstport="80" tcpflags="SYN"
    2018:01:10-10:40:19 isa ulogd[21603]: id="2103" severity="info" sys="SecureNet" sub="ips" name="SYN flood detected" action="SYN flood" fwrule="60012" initf="eth2" srcmac="00:21:f7:d7:8c:00" dstmac="00:1a:8c:36:64:08" srcip="192.168.45.1" dstip="192.168.254.33" proto="6" length="60" tos="0x00" prec="0x00" ttl="63" srcport="49023" dstport="80" tcpflags="SYN"
    2018:01:10-10:40:19 isa ulogd[21603]: id="2103" severity="info" sys="SecureNet" sub="ips" name="SYN flood detected" action="SYN flood" fwrule="60012" initf="eth2" srcmac="00:21:f7:d7:8c:00" dstmac="00:1a:8c:36:64:08" srcip="192.168.45.1" dstip="192.168.254.45" proto="6" length="60" tos="0x00" prec="0x00" ttl="63" srcport="38285" dstport="80" tcpflags="SYN"

  • Interesting.  Is 192.168.45.1 your LAN or WAN port?

    Cheers - Bob
    PS The UTM Manager forum is for questions about the SUM application used to manage large numbers of UTMs, so I'll move this to the Network Protection forum.

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA