• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Auto-Blocking Suspicious Hosts Found in Traffic Logs

July 11, 2017 By Teri Radichel

Many attackers and hosts infected with malware try to infect other hosts by scanning networks for open ports exposed to the Internet. After finding an open port, a malicious third party will attack software running on that port using known vulnerabilities. These published software flaws can cause damage or allow unauthorized access to hosts and networks. Often vendors publish information about software flaws and offer patches directly to customers. Third parties also track and publish information about common vulnerabilities on web sites like https://cve.mitre.org and https://nvd.nist.gov/.

Although there are some new and sophisticated attacks, many breaches involve vulnerabilities that security professionals and vendors notified the public about years prior to the attack. For example, in the case of WannaCry, the malware used SMB vulnerabilities accessed via port 445. A SANS Internet Storm Center article dating back to October 2009 tells readers they should already know that port 445 needs to be blocked on the firewall.

In some cases, patching all the hosts in a network to fix vulnerable software is not feasible due to the number of hosts, or even possibly due to systems that require outdated software. Knowledge of the ports needed for common vulnerability exploits to work is useful because it allows network administrators to block problematic ports. Even if software is unpatched, the malware will be unable to function correctly if it cannot communicate on required ports.

The WatchGuard Firebox has a feature which allows administrators to easily block a network port. In the WatchGuard Firebox Admin Web Site, click on “Firewall” on the left menu, then “Blocked Ports” to see the list of blocked ports.

Use the buttons at the bottom of the page to add new ports:

The auto-block feature allows administrators to automatically reject connections from hosts generating suspicious traffic. Check the box at the top of the list to auto-block any host that tries to connect to a disallowed port. The Firebox adds the host to the “Blocked Sites” list and rejects any future attempts by the blocked host to connect on any port.

For example, if a network administrator has blocked ports 445, 137, 138, 139 and 23 and a host tries to connect to those blocked ports, there’s a good chance that traffic is coming from an attacker server, an infected or misconfigured host. With the auto-block feature, the WatchGuard Firebox will automatically add that host to the “Blocked Sites” list and block any further connection attempts from that host. Note that this feature will disallow the port on the entire network so make sure it is not required internally or externally by hosts served by that firewall.

With these features enabled, network administers can periodically review the list of hosts that the Firebox automatically blocked by clicking on “System Status” in the left menu and then “Blocked Sites.” This list will tell the administrator which hosts tried to connect on blocked ports. An auto-blocked host will show up with the reason “blocked port.” This information may be useful in creating new firewall rules or troubleshooting network problems.

Auto-blocking rogue hosts not only helps protect the network, it may improve the performance of the firewall as well. If the firewall is completely blocking all traffic from a host, it will not have to perform further inspection on any traffic from that host. The firewall can immediately drop the traffic. This saves processing power and hopefully improves performance for valid hosts on the network. — Teri Radichel (@teriradichel)

Share This:

Related

Filed Under: Editorial Articles, Featured Tagged With: Block, Firebox, firewall, Malware, network, network security, Port, ransomware, security, UTM, wannacry, WatchGuard

Comments

  1. matt says

    July 13, 2017 at 8:39 am

    Is this only active on incoming connections from the untrusted interface or will it block hosts internal to the network who try and connect outbound too?

    Reply
  2. Corey Nachreiner says

    July 14, 2017 at 4:21 pm

    Autoblocking will work both ways, and can apply to internal too. If you are purposely egress filtering, you shouldn’t turn autoblocking on for those ports as it could affect internet devices too (or so support tells me).

    Reply
    • matt says

      July 19, 2017 at 9:07 am

      Thanks, It would be really useful to be able to lock this to the untrusted interface so we can allow outbound from trusted and internal to DMZ connections without people getting blocked. As an untrusted inbound defense this would be really useful as you can see the same IP’s slowly scanning through ports continuously.

      Reply
      • Teri Radichel says

        July 20, 2017 at 5:02 pm

        One customer wrote to me and says she successfully uses the auto-blocking feature to protect against DDOS attacks but yes, it must be implemented correctly. Auto-blocking can also be applied to individual rules. More info in this post: Using Firewall Policies to Auto-Block Rogue Hosts on External Networks

        Reply
        • matt says

          July 21, 2017 at 8:01 am

          That actually works quite well. I didn’t notice there was an auto-block per rule option (which release did that appear in?)
          Just added an autoblock on any external IP trying to connect over SMB and my block list has gone from about ten to a few hundred.

          Reply
    • James Deck says

      August 3, 2017 at 6:20 am

      I create firewall polices for telnet, SMB/CIFS, LDAP and various other ports with an action of auto block. By making them firewall policies, I can control that they only apply to “external” traffic.

      I have a feature request lodged with Watchguard for an API to register an IP that should be blocked, for example if a web app we have written running on a server in trusted detects a brute force, it would be great to trigger a ban at the edge (like Fail2Ban). Let’s hope this gets implemented.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • 3CX Supply Chain Attack
  • Here Come The Regulations

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • 3CX Supply Chain Attack
  • The NSA’s Guidance on Securing Authentication
  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use