IPSec NATT (udp4500) ADP false udp filtered distributed portscan Action
ATP500 fw v5.35
I have logs of ADP:
from WAN to Any, [type:Scan-Detection(49)] udp filtered distributed portscan Action:Drop Packet
Source: {vpn.client.IP}:4500
Destination: {wan.IP}:4500
That logs are with every VPN access connection (L2TP over IPSec with PSK - Windows native client)
I have already changed sensitivity of ADP scan detection to "low" ((portscan) UDP Portscan)
I have added allow list rule for IPSec NATT udp port (udp4500)
How to get exclude rule of ADP to natt udp port - I don't want to disable the "(portscan) UDP Portscan" rule. Or, why zyxel-atp identify vpn-connection as "distributed portscan"??
All Replies
-
I wrote this in the wrong category - it should be in the Security category - someone could change it
0 -
Hi @jurusam,
You can configure allow list rules to let certain IP addresses or services to bypass ADP flood detection.0 -
I already wrote about it - I have enabled that feature - - it doesn' work
…todays logs:
0 -
Test with any service
does the problem happen when client does a speed test?0 -
Hi @jurusam,
In the log, the traffic hits UDP portscan. Try to inactivate "(portscan) UDP Portscan" in ADP profile > Scan Detection and monitor if VPN connection is working. Then give me the remote access information of this ATP500 in private message. We will check if it is false positive.0 -
VPN connection is stable (I think) - users didn't say that have problem.
Today I have 4 vpn clients connected (Windows, Mac and Android) - working with RDP or http browsing of local web. With each of this connection there is log warning of "udp port scan" with action "access block".
I tried with authentication of local ATP accounts or Win AD accounts - same thing
0 -
If this "access block" would cause problems with the connection - I would disable the rule. But now there is only warning in ATP device. I prefer to enable this rule to protect against other true port scans
0 -
The same thing happens to me with my flex500, I have to disable ADP for the ipsec vpn clients to work.
In my case there are 4 clients that connect from the same office with their laptops using the zyxel IPSec VPN client.
I have done the option described by jurusam and it does not solve.0 -
Hi @vsdanie ,
Greeting Forum, We will have Allow List for ADP Port scan to avoid preventing known IPSec UDP packets.
The feature is upcoming next FCS firmware April.
Thank you
0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 145 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.6K Security
- 239 USG FLEX H Series
- 267 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.3K Consumer Product
- 247 Service & License
- 384 News and Release
- 83 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.2K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight