Blocking Hacking Attempts
I'm not sure if this question should be in this forum or one of the firewall forums, but given that this is being done via SSL VPN, I figured to try here first.
We have a TZ 370 and are using SSL VPN for VPN connections via NetExtender.
Since yesterday I've been trying to deal with repeated attempts to hack into our network via SSL VPN. Whoever's doing it is either using NetExtender or a substitute. They're not succeeding, but the problem is that they're chewing up license usage, preventing legitimate VPN access. I can tell these are hacking attempts since the usernames are wrong or they're trying to use names like "it" and "contract".
What I've done to try to stem the tide:
- Enabled Geo-IP filter
- Enabled IPS for High Priority and Medium Priority and turned it on for the SSLVPN zone.
- Changed the SSL Server domain name from the default "LocalDomain"
Unfortunately, this all seems to have only been partially successful. The Geo-IP filter basically knocked out all the attempts that were being routed through overseas routers. Those that had US IP addresses were still occurring. I would have thought that (3) would have done something since if I use NetExtender and enter the wrong domain name, it errors out right away. In the Network → SSL VPN → Status screen I see the connection attempt, but it quickly goes away. The login attempts appear to know that the domain name has changed - how?
Is there anything else that we could do?
Answers
So I would have 2 questions. First have you changed the default SSLVPN port on the server settings page? May be a good idea. Second, under the Portal Settings make sure you enable the disable virtual office on non-lan interfaces. Then you should change the domain again. If you do not have that option you may need to update the firmware. It has only been available for a few of the more recent firmware versions.
Thanks for the response. For your questions:
Update: Based on the new post (
) we're seeing the spray attack that's going on. I agree with the comment that having the license being chewed up while these idiots try to hack in is insane.
I was forced to change the port number for the SSL VPN. I was trying to avoid doing that since I figured that once they know there's an SSL VPN at that IP address, they could just do a port scan until they found the port being used. However, it seems to have terminated the attempts for now.
If someone could clarify the whole "Disable Virtual Office on Non-Lan Interfaces" and domain name link I'd appreciate it.
Disable Virtual Office on Non-Lan Interfaces - disabled the UI accessible via a browser, leaving only access via the app Netextender SW mobile etc..
This is a large scale attack. Does SonicWall have an official response to this? What is SonicWall's official way to mitigate these attacks?
@TonyA
https://blog.talosintelligence.com/large-scale-brute-force-activity-targeting-vpns-ssh-services-with-commonly-used-login-credentials/
Hi @JackBurton
Please see the following kb articles:
https://www.sonicwall.com/support/knowledge-base/sslvpn-license-exhaustion-on-gen7-firewalls/240325115738957/
https://www.sonicwall.com/support/knowledge-base/ssl-vpn-ip-pool-exhaustion-issue-on-sonicwall-gen6-firewalls/230619103039980/
@TonyA
DUDE! You made my day! Thank you very much!