With the Summary Mode set to "Summarize" (what you did), you will always
see a first alert for the Attacker and then at the end of the interval a
so-called Summary which is a collective-like log for all events seen
generated based on *Summary Key*. Since your Summary Key is "Attacker", it
means that you only care about the IP address of the Attacker (in the
Summaries), and not the IP address of the Victim.

Example - 7.7.3.10 attacked 1.2.3.4 twice and 2.3.4.5 3 times. What you
would see at the end of the Interval is a Summary Log for 7.7.3.10 with the
total number of Events of 2+3=5. So this is when IPS is telling you that it
has seen 5 attacks from 7.7.3.10 total, no matter how many victims there
was in this interval (it replaces Victims' IPs with 0.0.0.0).


Regards,

Piotr Kaluzny : Sr Instructor : iPexpert <http://www.ipexpert.com>
CCIE # 25665 :: Security
*:: World-Class Cisco Certification Training*

Direct: +1.810.332.1444
:: Free Videos <http://www.youtube.com/ipexpertinc>
:: Free Training / Product Offerings <https://www.facebook.com/IPexpert>
:: CCIE Blog <http://blog.ipexpert.com/>
:: Twitter <https://twitter.com/ipexpert>


On Tue, Nov 12, 2013 at 2:27 AM, jeremy co <jeremy.coo...@gmail.com> wrote:

> IM not sure what u mean by "Don't you have any Target Value Rating
> associated with the victim which would bump the RR in the regular event?"
>
> The only thing that I did was following sig wizard. so if u mean adding
> any extra rating to victim (150.1.7.20) .NO
>
> Here is the screenshot of my custom sig. It hits the specific ip address
> but *my problem is why it hist 0.0.0.0 ?*
>
>
> On Mon, Nov 11, 2013 at 5:01 PM, Piotr Kaluzny <pio...@ipexpert.com>wrote:
>
>> Hi
>>
>> This is a summary - looks like the Summary Key was set to the Attacker's
>> address which means that you don't care who the Victim is when you generate
>> a Summary (Summaries are based on Attackers).
>>
>> Don't you have any Target Value Rating associated with the victim which
>> would bump the RR in the regular event?
>>
>> Regards,
>>
>> Piotr Kaluzny : Sr Instructor : iPexpert <http://www.ipexpert.com>
>> CCIE # 25665 :: Security
>> *:: World-Class Cisco Certification Training*
>>
>> Direct: +1.810.332.1444
>> :: Free Videos <http://www.youtube.com/ipexpertinc>
>>  :: Free Training / Product Offerings <https://www.facebook.com/IPexpert>
>> :: CCIE Blog <http://blog.ipexpert.com/>
>> :: Twitter <https://twitter.com/ipexpert>
>>
>>
>> On Tue, Nov 12, 2013 at 1:06 AM, jeremy co <jeremy.coo...@gmail.com>wrote:
>>
>>> Hi,
>>>
>>>
>>> ASA1/2  (7.7.3.10) ------IPS----------- SYSLOG SERVER (150.1.7.20)
>>>
>>> I configured a custom signature for syslog messaging between host A and
>>> B.
>>>
>>> ASA1/ASA2 are in active/standby mode producing syslogs and IPS suppose
>>> to pick this up.
>>>
>>> I can see ips sig triggers when it sees from ipA to IPB port 514 with
>>> "alert high 85"
>>>
>>>
>>> evIdsAlert: eventId=1376465320547002492  vendor=Cisco  severity=high
>>> alarmTraits=32768
>>>   originator:
>>>     hostId: IPS
>>>     appName: sensorApp
>>>     appInstanceId: 1203
>>>   time: Nov 11, 2013 22:12:19 UTC  offset=0  timeZone=UTC
>>>   signature:   description=syslog  id=61000  version=custom  type=other
>>> created=20000101
>>>     subsigId: 0
>>>     sigDetails: My Sig Info
>>>   interfaceGroup: vs0
>>>   vlan: 3
>>>   participants:
>>>     attacker:
>>>       addr: 7.7.3.10  locality=OUT
>>>       port: 514
>>>     target:
>>>       addr: 150.1.7.20  locality=OUT
>>>       port: 514
>>>       os:   idSource=unknown  type=unknown  relevance=relevant
>>>   riskRatingValue: 85  targetValueRating=medium
>>> attackRelevanceRating=relevant
>>>   threatRatingValue: 85
>>>   interface: ge0_0
>>>   protocol: udp
>>>
>>> -------------------------------------------------------------------------------------------------------------------------
>>> $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
>>>
>>> -------------------------------------------------------------------------------------------------------------------------
>>>
>>> *PROBLEM: *
>>>
>>> I can see the same sign triggered with the following: (alert 75 and
>>> destination 0.0.0.0)
>>>
>>> *What is 0.0.0.0 is doing here? I never configured it on my custom
>>> sig.and why alert level is 75 ? and on the above one is 85 ?  my original
>>> config is 75.*
>>>
>>>
>>> evIdsAlert: eventId=1376465320547002493  vendor=Cisco  severity=high
>>> alarmTraits=32768
>>>   originator:
>>>     hostId: IPS
>>>     appName: sensorApp
>>>     appInstanceId: 1203
>>>   time: Nov 11, 2013 22:12:34 UTC  offset=0  timeZone=UTC
>>>   signature:   description=syslog  id=61000  version=custom  type=other
>>> created=20000101
>>>     subsigId: 0
>>>     sigDetails: My Sig Info
>>>   interfaceGroup: vs0
>>>   vlan: 3
>>>   participants:
>>>     attacker:
>>>       addr: 7.7.3.10  locality=OUT
>>>       port: 0
>>>     target:
>>>       addr: 0.0.0.0  locality=OUT
>>>       port: 0
>>>       os:   idSource=unknown  type=unknown  relevance=unknown
>>>   summary: 8  final=true  initialAlert=1376465320547002492
>>> summaryType=Regular
>>>   alertDetails: Regular Summary: 8 events this interval ;
>>>   riskRatingValue: 75  targetValueRating=medium
>>>   threatRatingValue: 75
>>>   interface: ge0_0
>>>   protocol: udp
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::
>>>
>>> iPexpert on YouTube: www.youtube.com/ipexpertinc
>>>
>>
>>
>
_______________________________________________
Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::

iPexpert on YouTube: www.youtube.com/ipexpertinc

Reply via email to