: Reconnaissance Protection
Focus
Focus

Reconnaissance Protection

Table of Contents

Reconnaissance Protection

  • Network > Network Profiles > Zone Protection > Reconnaissance Protection
The following settings define reconnaissance protection:
Zone Protection Profile Settings—Reconnaissance Protection
Configured In
Description
TCP Port Scan
NetworkNetwork ProfilesZone ProtectionReconnaissance Protection
Enable configures protection against TCP port scans.
UDP Port Scan
Enable configures protection against UDP port scans.
Host Sweep
Enable configures protection against host sweeps.
IP Protocol ScanEnable configures protection against IP protocol scans.
Action
Action that the system will take in response to the corresponding reconnaissance attempt:
  • Allow—Permits port scan, host sweep, or IP protocol scan reconnaissance.
  • (Default) Alert—Generates an alert for each port scan, host sweep, or IP protocol scan that meets the specified threshold within the specified time interval.
  • Block—Drops all subsequent packets from the source to the destination for the remainder of the specified time interval.
  • Block IP—Drops all subsequent packets for the specified Duration, in seconds (range is 1-3,600). Track By determines whether to block source or source-and-destination traffic. For example, block attempts above the threshold number per interval that are from a single source (more stringent), or block attempts that have a source and destination pair (less stringent).
Block all reconnaissance scans except your internal vulnerability testing scans.
Interval (sec)
Time interval, in seconds, for TCP or UDP port scan and IP protocol scan detection (range is 2-65,535; default is 2).
Time interval, in seconds, for host sweep detection (range is 2-65,535; default is 10).
Threshold (events)
Number of detected port scan, host sweep, or IP protocol scan events within the specified time interval that triggers the specified action (range is 2-65,535; default is 100).
Use the default event threshold to log a few packets for analysis before blocking reconnaissance attempts.
Source Address Exclusion
IP addresses that you want to exclude from reconnaissance protection. The list supports a maximum of 20 IP addresses or Netmask address objects.
  • Name—Enter a descriptive name for the address to exclude.
  • Address Type—Select IPv4 or IPv6 from the drop-down.
  • Address—Select an address or address object from the drop-down or enter one manually.
Exclude only IP addresses for trusted internal groups that perform vulnerability testing.