Forum Discussion
Nom_55811
Nimbostratus
Aug 31, 2009nPath Triggering Router Intrusion Detection
Hi All,
I hope this is the right forum for this issue.
We've recently deployed a pair of BIG-IP 1600's in a redundant configuration in front of our corporate web site. Since then, we've discovered several customers using Billion (http://au.billion.com/) modems, are having the website blocked by the Intrusion Detection built into their router.
The web servers were previously running under a DSR configuration behind a pair of Foundry ServerIron's (very old, and unstable), so nPath was the best solution for us in the short term, until we had time to properly design and deploy a separate VLAN for F5 powered hardware.
What the customers are seeing is something like:
Aug 26 18:31:38 home.gateway:firewall:info: 1524.121 Intrusion TCP FIN scan(17)
Last week we created a new Fast L4 profile with the following configuration options changed from the default:
- Idle Timeout: 120 seconds
- Loose Initiation: Off
- Loose Close: On
- TCP Close Timeout: 120 seconds
These changes were based on some old F5 documentation we found which described nPath in more detail. Following these changes, users are now seeing the following errors:
Intrusion TCP reset scan(18)
So, it would seem that we've gone from one set of problems to another.
Has anyone else encountered similar problems? Do you have any solution that would rectify this issue?
Thanks in advance.
- samstep
Cirrocumulus
This topic is more suitable for a different forum: Advanced Design & Config. I recommend you re-post your question there.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects