TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------
Thanks for your comments and suggestions.
We have policy rules setup on our firewall. Traffic that doesn't meet the
rule base
are dropped. The UDP port scan that I'm getting are mostly from InterNIC
root DNS server such as
1. I.root-servers.net
2. c.root-server.net
3. g.root-server.net
4. dns5.cp.msft.net
These are just some examples of the source hitting my firewall. My network
engine detects these
traffics as UDP_Port Scan. I may have to create a filter for these traffic.
The thing is there are lots of them. I don't think they are valid UDP_Port
scan from an intruder probing my network.
My procedure is that I respond to the source sending email notifiying them
of the scans.
The UDP_Port scan doesn't have RST_kill. There is not much you can do with
them.
-Jaime
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, April 12, 2000 8:18 PM
To: Fontelera, Jaime C.
Cc: [EMAIL PROTECTED]
Subject: Re: UDP Port Scan -reply
TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any
problems!
----------------------------------------------------------------------------
If your Firewall rules are set correctly, as in DO NOT REPLY TO UDP
Requests for certain services, one should be fine, the fact that you are
logging the event is good.
If you are allowing it past your External firewall that is a different
problem all together.
Refer to "Building Internet Firewalls" for an overall of various firewall
architectures, especially Chapter 8.
Setting up your firewall policy can vary based on the services that are
allowed from the internal user community out through the firewalls, versus
the External rules that allow for external customers to certain network
devices that are in your DMZ.
The big question, do you have a escalation plan documented on what to do
when certain events happen like more than 5 port scans do something.
In ISS RealSecure you can set the thresholds and if the thresholds are met
you can issue an RS_KILL command to kill the entity that is attempting to
port scan you more than 5 times. Now, if each UDP port scan event is from
a different address but within the same IP address range, it is a little
easier to implement the previously mentioned statement. If you are
observing more than 5 UDP Port scans from lots of different places,
generate an exception list, and build a ACL on your external router to
deny packets originating from xxx.xxx.xxx.xxx IP address network range.
With this rule in place, the UDP port scans will no longer get past your
external router, since the packet will be dropped on the floor, therefore
allowing you to monitor valid "Intrusion" attempts that may be creeping
into your network, but could not be observed due to "annoying UDP Port
scan" attempts.
Please refer to the SANS Briefing regarding how to prevent DDOS attacks
and how to implement different ACL's on various brand-name routers.
/mark
"Fontelera, Jaime C." <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
04/04/00 09:56 AM
To: "ISSForum (E-mail)" <[EMAIL PROTECTED]>
cc:
Subject: UDP Port Scan
TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message
to
[EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any
problems!
----------------------------------------------------------------------------
I get UDP port scan on my firewall at least 5 a day. How does one respond
to a probe ?
Any suggestions ?
Thanks,
Jaime