<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Intrusion Detection for dropped packets</title><link>https://community.sophos.com/utm-firewall/f/management-networking-logging-and-reporting/89092/intrusion-detection-for-dropped-packets</link><description>Sophos UTM 9 model SG230 firmware version 9.411-3. 
 In the past we have had a lot of issues on this firewall with DDOS attacks on our DNS servers. Those DNS servers are long gone and I have added a WAN firewall rule to drop any TCP/UDP port 53 traffic</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Intrusion Detection for dropped packets</title><link>https://community.sophos.com/thread/324469?ContentTypeID=1</link><pubDate>Thu, 02 Mar 2017 17:20:57 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:841210ff-659e-47bb-a2b3-4e94941714f5</guid><dc:creator>Kipland Iles</dc:creator><description>&lt;p&gt;Thanks again, &lt;a href="/members/balfson"&gt;BAlfson&lt;/a&gt;. I bookmarked Rulz this time.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Intrusion Detection for dropped packets</title><link>https://community.sophos.com/thread/324464?ContentTypeID=1</link><pubDate>Thu, 02 Mar 2017 16:46:31 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:0b9fd225-6684-4ceb-99b3-ba02cb9203a9</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;I think you want #2 In &lt;a href="/products/unified-threat-management/f/general-discussion/22065/rulz"&gt;Rulz&lt;/a&gt;, Kipland.&amp;nbsp; You will see from that that the way to drop the traffic before everything else is a blackhole DNAT.&lt;/p&gt;
&lt;p&gt;Cheers - Bob&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Intrusion Detection for dropped packets</title><link>https://community.sophos.com/thread/324267?ContentTypeID=1</link><pubDate>Wed, 01 Mar 2017 11:30:35 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:ecd20bf9-12c1-4504-840b-969b32e10599</guid><dc:creator>Kipland Iles</dc:creator><description>&lt;p&gt;[quote user=&amp;quot;dirkkotte&amp;quot;]the flood protection drop packets before these reach the packetfilter/statefull engine/NAT engine/... to protect the system[/quote]&lt;/p&gt;
&lt;p&gt;Thanks &lt;a href="/members/dirkkotte"&gt;dirkkotte&lt;/a&gt;. That explains the IPS logging. Will want to read &lt;a href="/members/balfson"&gt;BAlfson&lt;/a&gt;&amp;nbsp;packet flow explanation.&lt;/p&gt;
&lt;p&gt;Part of the reason for reaching out on this is that we incurred some additional bandwidth usage charges at the datacenter because of these DDOS attacks. I noticed that our WAN bandwidth usage dropped significantly after applying the new firewall rule but that does not stop the attackers from trying and being turned away. It apparently keeps IPS busy, as well. Perhaps some adjustment to IPS will help prevent them from coming back for more - similar to Fail2Ban that I use on my load balancers.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Intrusion Detection for dropped packets</title><link>https://community.sophos.com/thread/324141?ContentTypeID=1</link><pubDate>Wed, 01 Mar 2017 01:07:24 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:62563cc0-2c65-4819-bf8e-aeff5e674956</guid><dc:creator>dirkkotte</dc:creator><description>&lt;p&gt;the global policy settings are necessary for the snort engine.&lt;/p&gt;
&lt;p&gt;IPS pattern use packet direction&amp;nbsp; &amp;quot;out-&amp;gt;in&amp;quot;&amp;nbsp;&amp;nbsp; &amp;quot;in-&amp;gt;in&amp;quot;&amp;nbsp;&amp;nbsp; &amp;quot;in-&amp;gt;out&amp;quot;&amp;nbsp; to check the applicability of a rule.&lt;/p&gt;
&lt;p&gt;the flood protection drop packets before these reach the packetfilter/statefull engine/NAT engine/... to protect the system.&lt;/p&gt;
&lt;p&gt;Bob (BAlfson) has a great explanation of packet flow. But i have the link at the moment.&lt;/p&gt;
&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>