Configuring Portscan Detection
Note | This section applies to Snort 2 preprocessors. For information on Snort 3 inspectors, see https://www.cisco.com/go/snort3-inspectors. |
The portscan detection configuration options allow you to finely tune how the portscan detector reports scan activity.
Procedure
Step 1 | Choose Network Analysis Policy or , then click Network Analysis Policies. , then click
| ||
Step 2 | Click Snort 2 Version next to the policy you want to edit. | ||
Step 3 | Click Edit () next to the policy you want to edit. If View () appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration. | ||
Step 4 | Click Settings. | ||
Step 5 | If Portscan Detection under Specific Threat Detection is disabled, click Enabled. | ||
Step 6 | Click Edit () next to Portscan Detection. | ||
Step 7 | In the Protocol field, specify protocols to enable.
| ||
Step 8 | In the Scan Type field, specify portscan types you want to detect. | ||
Step 9 | Choose a level from the Sensitivity Level list; see Portscan Types, Protocols, and Filtered Sensitivity Levels. | ||
Step 10 | If you want to monitor specific hosts for signs of portscan activity, enter the host IP address in the Watch IP field. You can specify a single IP address or address block, or a comma-separated lists of either or both. Leave the field blank to watch all network traffic. | ||
Step 11 | If you want to ignore hosts as scanners, enter the host IP address in the Ignore Scanners field. You can specify a single IP address or address block, or a comma-separated lists of either or both. | ||
Step 12 | If you want to ignore hosts as targets of a scan, enter the host IP address in the Ignore Scanned field. You can specify a single IP address or address block, or a comma-separated lists of either or both.
| ||
Step 13 | If you want to discontinue monitoring of sessions picked up in mid-stream, clear the Detect Ack Scans check box.
| ||
Step 14 | To save changes you made in this policy since the last policy commit, click Policy Information, then click Commit Changes. If you leave the policy without committing changes, changes since the last commit are discarded if you edit a different policy. |
What to do next
-
If you want portscan detection to detect various portscans and portsweeps, enable rules 122:1 through 122:27. For more information, see Intrusion Rule States and Portscan Event Generation.
-
Deploy configuration changes.