Forum Discussion
Matt_Fletcher_1
Nimbostratus
Aug 31, 2006FTP Connections
We have a pool for ftp servers. Recently our Infosec department has been making me block specific IPs because of multiple failed logins (even though it's pointless to do so). Our FTP server has the option of blocking IP addresses for a certain amount of time based on x number of failed logins over x seconds, but with the BigIP, all traffic is showing as the internal address, so that's not an option, unless I turn off the SNATing, which is also not an option. Unless there is a way to do that for just one pool. My current solution is to use a rule to discard connections from the whole IP range of the offender (as in 202.x.x.x) since they are all coming from APNIC and RIPE, neither of which would be legit traffic. This is an admin headache, since I get requests from Infosec every few hours with new IPs to block, and also pointless, like I said, because these script kiddies are hammering logins that don't even exist, and usually give up by the time I can add them to the list.
Is there a way to setup a rule to block specific IPs based on any of the following:
a) number of concurrent or conesecutive connections over time from a given IP
b) number of failed FTP logins (can the BigIP even see that???)
Or,
c) to show the FTP server the actual IP address so it does not block all traffic when they hit us
Any other suggestions for how to handle this, or is my bandaid the only solution?
- Martin_MachacekHistoric F5 AccountMatt,
snat disable
- Matt_Fletcher_1
Nimbostratus
That's it? Simple. Thanks! - Martin_MachacekHistoric F5 AccountYes, it is. Exactly the same syntax is supported in v9.x. In v9 you may be even able to implement the dynamic blocking using some creative iRule programming. You should also take a look at iControl. It may allow you to let the server dynamically add (and remove) blocked IP addresses to iRule class based on frequency of login failures. This is however all off-topic for this forum.
- Matt_Fletcher_1
Nimbostratus
One more question. Is it possible to capture the username and filter on that in a rule? These attacks use 'administrator' 90% of the time.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects