1

I recently began to receive a huge (600 thousand to 2 million per day) number of FWX_E_TCP_NOT_SYN_PACKET_DROPPED, 0xc0040017 entries in my Forefront TMG logs.

If the top 3 source IPs are any indication there is no legitimate traffic to or from the IPs initiating these scans. How can I suppress these from being logged by Forefront?

Unfortunately using a standard suppression rule does not work work. I already had a suppression list in place for certain traffic, including the multicast range. This was at the top of my rule set. The rule listed is 'None - see Result Code', even for traffic being suppressed.

Tim Brigham
  • 15,465
  • 7
  • 72
  • 113

2 Answers2

1

It appears that the Fwengmon tool has been replaced and the netsh tmg commands do not provide a ready way to suppress these alerts. I have moved up the food chain - we collect these logs in Splunk and have Syslog-NG available as a filter. I suppressed these spurious events at the syslog-ng level by blocking the 0xc0040017 code.

Tim Brigham
  • 15,465
  • 7
  • 72
  • 113
0

Create an access rule:

Deny / All Traffic / From -> New Computer Set "Blocked Without Logging" -> add the IPs ("computers") to this list / To Anywhere / All Users / Finish.

Order it first in the list, then disable the "Log requests matching this rule" setting - on the General tab, from memory.

TristanK
  • 8,953
  • 2
  • 27
  • 39