Networking
--
Questions
--
Followers
Top Experts
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Naturally you need to make sure that your hardware is up to the extra load this brings and also it is a good idea to invest in a Sourcefire subscription for getting the up to date Snort rules.
Best is to not keep open ports for no purpose.
I dont think there is a way to detect slow scan of  ports via TOR or done by some botnet.
Best is to not keep open ports for no purpose.
I agree geist, but if we have to be constructive is Snort the better solution regarding pfsense, even if it helps on stopping some script kiddies. I think even port knocking is not helping for slow/deliberate scanning ...






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Someone mentioned not exposing any ports but those which are, are needed otherwise, they would not be showing up.
My Juniper firewalls running ScreenOS have these things by default without any maintenance. Nothing shows, nothing at all. The only way to know if a port exists is to connect to it if you know about it.
So, the best solution is still installing the Snort package, it's not that difficult and really not a lot of work.
Besides that, also Juniper is "vulnerable" for certain port scan, unless you set the treshold really high, but that can cause possible issues with applications.
22/tcp  open  ssh
443/tcp  open  https
902/tcp  open  iss-realsecure-sensor
903/tcp  closed iss-console-mgr
8443/tcp open  https-alt
I've installed it, configured it, enabled portscan monitoring, blocked at the interface and the interface is tarted.
However, ports still show up by scanning from remote. Missing something.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
What kind of port scan are you doing? A general one or a targeted one? Are you seeing warnings in the logging?
[edit] Did you also check if the rule was selected for port scans on the Snort Interface? You can click on "edit" on the right side, go to categories and select the proper rule, called snort_scan.rules ...
Yes, the rule is also checked.
Yes, I do see the port scans from the logging.
Not sure what you mean by what kind of port scans but from another network, I'm doing the following;
# nmap 198.15.79.74
Starting Nmap 4.11 ( http://www.insecure.org/nmap/Â ) at 2015-07-04 08:19 MST
Interesting ports on xx.xx.xx.xx:
Not shown: 1675 filtered ports
PORT Â Â STATE Â SERVICE
22/tcp  open  ssh
443/tcp  open  https
902/tcp  open  iss-realsecure-sensor
903/tcp  closed iss-console-mgr
8443/tcp open  https-alt
Nmap finished: 1 IP address (1 host up) scanned in 21.480 seconds
I will check my setup to see if I'm overlooking something.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
There's quite some settings to go over, all I can say at the moment is to make sure you haven't overlooked any... I will try a port scan this evening probably.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I'm not sure where the difference is, except for the fact I'm a paying customer (personal plan) for the signatures ...
As i mentioned before, you can use fail2ban to scan any log file, and if a ip address is mentioned on a logline that states a violation of your terms of service you can tel fail2ban to convert it to a block on an IP port.
So even login failures to SSH or FTP can be picked up.., n times bad password / Strike out.
mysql login failures... same way.etc.
You can also let iptables create log records (log target) with a prefix for fail2ban so it can tell first time offenders or multiple offenders ... and extend blocks....
Networking
--
Questions
--
Followers
Top Experts
Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.