{"id":8189,"date":"2022-06-01T23:25:43","date_gmt":"2022-06-01T23:25:43","guid":{"rendered":"https:\/\/www.use-snip.com\/kb\/?post_type=ht_kb&#038;p=8189"},"modified":"2022-06-14T18:54:33","modified_gmt":"2022-06-14T18:54:33","slug":"managing-unwanted-user-connections","status":"publish","type":"ht_kb","link":"https:\/\/www.use-snip.com\/kb\/knowledge-base\/managing-unwanted-user-connections\/","title":{"rendered":"Managing Unwanted User Connections"},"content":{"rendered":"<p>In this article we consider the general approach to detecting and blocking (banning) repeated connections coming from unwanted users.\u00a0 When such bad connections repeat constantly for hours on end, they become a problem and must be dealt with.\u00a0 In a broad sense these connections fall into two categories:<\/p>\n<ul>\n<li>Your legitimate users who have simply mis-configured their <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/question-what-is-an-ntrip-client\/\" target=\"_blank\" rel=\"noopener\">NTRIP Client<\/a> devices.<\/li>\n<li>Unknown and unauthorized users who are probing your Caster with curiosity or ill-intent.<\/li>\n<\/ul>\n<p>As a first line of defense, make sure your Caster is set to accept connections only from users with preexisting accounts rather than being open for anyone to connect.\u00a0 This is controlled by the <strong>Manage User Accounts <\/strong>dialog (which is reached with the menu command <em>Setup<\/em> \u21d2 <em>Manage Users Accounts\u2026<\/em>) Ensure the check box \u201cAllow Anonymous Access\u201d is unchecked.\u00a0 While you can run your Caster in an <em>Open<\/em> mode (no user account required), this makes it more vulnerable to attacks.<\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/CloseTheCaster.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8186 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/CloseTheCaster.png?_t=1654121355\" alt=\"\" width=\"395\" height=\"144\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/CloseTheCaster.png 395w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/CloseTheCaster-300x109.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/CloseTheCaster-50x18.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/CloseTheCaster-320x117.png 320w\" sizes=\"auto, (max-width: 395px) 100vw, 395px\" \/><\/a><\/p>\n<p>Then, assign any missing but needed User Accounts so that every valid user is registered with the Caster, and ensure they use the provided credentials.<\/p>\n<p style=\"padding-left: 40px;\">If the problem connection is coming from one of your legitimate users, the next step is typically to contact that user and work out the issues.\u00a0 It is fairly common for a user to enter incorrect settings and then leave the NTRIP Client device on for many hours.<\/p>\n<p style=\"padding-left: 40px;\">If the connection is unknown and unauthorized, it presents greater challenges and most of the remainder of this article is devoted to managing that issue.<\/p>\n<p>We next consider the various tools<span style=\"color: #0000ff;\"><strong> SNIP<\/strong><\/span> and the Host Windows machine provide to block such connections for varying periods of time.\u00a0 We then review the general process to detect and track such abuses.<\/p>\n<h2><strong>Lines of Defense<\/strong><\/h2>\n<p>Once your Caster is closed (so a user account is required), there are three primary lines of defense used to block unwanted connections; each is considered further in turn.<\/p>\n<ol>\n<li>The threshold setting in the<strong> IP Ban Settings<\/strong> dialog<\/li>\n<li><strong>Manually<\/strong> Blocking an IP at the Caster (for a temporary period or permanently)<\/li>\n<li>Blocking on the Host machine using the <strong>Windows Firewall<\/strong><\/li>\n<\/ol>\n<p>For the most part, legitimate users are well handled by the first point. In the event of multiple bad connection attempts (greater than the threshold levels you have set in the below dialog), such users are banned for a fairly short period of time you have set.\u00a0 If your Caster has the <a href=\"https:\/\/www.use-snip.com\/downloads\/email-support\/\" target=\"_blank\" rel=\"noopener\">eMail Plug-In<\/a>, the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> operator will receive an eMail alerting them when a user is blocked (as well as the reason for the block).<\/p>\n<h3><strong>The threshold setting in the IP Ban Settings dialog<\/strong><\/h3>\n<p>The use of these settings is described further <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/banning-abusive-users-simple\/\" target=\"_blank\" rel=\"noopener\">here<\/a> and <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/banning-abusive-users-editing\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.\u00a0 \u00a0Access this dialog with the menu command <em>SetUp<\/em> \u21d2 <em>IP Ban Settings\u2026<\/em>\u00a0\u00a0\u00a0 You will see the below dialog.<\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/IP_Dialog.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8187 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/IP_Dialog.png?_t=1654121464\" alt=\"\" width=\"540\" height=\"500\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/IP_Dialog.png 540w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/IP_Dialog-300x278.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/IP_Dialog-50x46.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/IP_Dialog-320x296.png 320w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><\/p>\n<p>The key point to be observed is that the various controls shown on the upper section of the dialog allow you to set the thresholds for various events that will result in a temporary ban for the offending source IP.<\/p>\n<p>The ban time is set with the 2<sup>nd<\/sup> control (\u201cBan length time\u201d &#8211; here set for 300 seconds, or 5 minutes).\u00a0 You will typically want to set this in a range of no more than a few hours.\u00a0\u00a0 When you <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/banning-abusive-users-editing\/\" target=\"_blank\" rel=\"noopener\">edit a banned entry<\/a>, a drop\u2013down combo allows selecting much longer time periods.\u00a0 These can span up to 4 weeks in length.\u00a0 This is usually only required for &#8220;problem&#8221; cases. \u00a0You can also make any IP ban permanent in that dialog.\u00a0 This is discussed further in the next section.<\/p>\n<p>The three buttons deserve further discussion.<\/p>\n<p style=\"padding-left: 40px;\"><strong>Ban by MountPt<\/strong>; \u00a0Enable the \u201cAuto Ban by MountPt&#8221; checkbox whenever a problem base station or user is connecting to a specific mountPt using multiple IPs in a small subset.\u00a0\u00a0 Press \u201c<strong>Edit<\/strong>\u201d and enter the mountPt name in the list of prohibited mountPt names.\u00a0\u00a0\u00a0 If the connection attempt comes only from a single IP, there is no need to use this method.<\/p>\n<p style=\"padding-left: 40px;\">The<strong> Exempt IPs<\/strong>\u2026 \u00a0button is used to create a list of IPs which you NEVER want to have banned.\u00a0 Such IPs are typically trusted devices used to monitor aspects of the Caster\u00a0 For example, you might have a 3<sup>rd<\/sup> party monitoring service that is checking the caster or a specific mountPt in the caster.\u00a0 [Aside: Tracking and reporting any base station that has gone offline is much better handled by the NTRIP Server Warnings which are part of the automatic eMail reports; see <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/ntrip-server-warnings\/\" target=\"_blank\" rel=\"noopener\">this article<\/a> for more details.]<\/p>\n<p style=\"padding-left: 40px;\">The <strong>Exempt\u00a0 Agents\u2026<\/strong> button does that same thing for known agents string.\u00a0 Use this button (rather than Exempt IPs\u2026) if a trusted devices may connect from multiple IPs.<\/p>\n<h3><strong>Manually Blocking an IP at the Caster<br \/>\n(for a temporary period or permanently) <\/strong><\/h3>\n<p>When an IP is blocked, it is listed in the lower section of the above dialog.\u00a0 You can also examine the current list by pressing the <strong>Edit<\/strong> button. \u00a0This brings up a display of the currently blocked IPs.\u00a0 The radio buttons can be used to show\/hide the temporary or permanent blocked IPs in the display.<\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Example_IPbanDialog.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8185 size-full aligncenter\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Example_IPbanDialog.png?_t=1654121495\" alt=\"\" width=\"590\" height=\"510\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Example_IPbanDialog.png 590w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Example_IPbanDialog-300x259.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Example_IPbanDialog-50x43.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Example_IPbanDialog-320x277.png 320w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/a><\/p>\n<p>In the Edit dialog you can extend the ban period for any entry by selecting it and then selecting a longer time period.\u00a0\u00a0 You can also\u00a0 use the <strong>Add\u2026<\/strong> button to create a new entry.\u00a0 And the <strong>Remove<\/strong> button deletes the selected entry.\u00a0\u00a0\u00a0 Both <strong>Add<\/strong> and <strong>Edit<\/strong> bring up the below dialog.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8184 size-full alignright\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Edit_IP_Ban.png?_t=1654121531\" alt=\"\" width=\"307\" height=\"466\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Edit_IP_Ban.png 307w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Edit_IP_Ban-198x300.png 198w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Edit_IP_Ban-33x50.png 33w\" sizes=\"auto, (max-width: 307px) 100vw, 307px\" \/><\/p>\n<p>If you check the box for <strong>Permanent<\/strong> then the IP will never be removed from the blocked list.\u00a0 Do this only when you have an IP which you will never allow to connect to your Caster.<\/p>\n<p>Use the \u201cNote:\u201d section to (optionally) add a short textual message regarding why this IP was blocked.\u00a0 This will be of value to you when you next look at the IP.\u00a0 Some customer report settings can allow other parties to see this text, so politeness should be considered to avoid embarrassment.<\/p>\n<p>The blocked IP entry also allows for the use for a <em>subrange<\/em> for the lower byte, using the \u201c*\u201d character.\u00a0 An entry like \u201c1.2.3.*\u201d will block every IP between the ranges of 1.2.3.0\u00a0 to 1.2.3.255\u00a0 This has great value if the problem connection comes from a limited range of IPs that often changes.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Adding an IP manually (or editing an existing one to persist for longer period of time) is your primary defense for problem connections that are not sufficiently handled by the automatic logic above.\u00a0<\/strong><\/span>\u00a0 It is not uncommon to block such connections for several days or more at a time on the presumption that the device owner will notice that their connections are blocked and correct things.<\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #008000;\"><strong>Aside<\/strong><\/span>:\u00a0 If you have the <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/setting-up-email\/\" target=\"_blank\" rel=\"noopener\">eMail Plug-In<\/a> and the <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/user-accounts-vs-customer-accounts\/\" target=\"_blank\" rel=\"noopener\">Enhanced User Management<\/a> (EUM) Plug-In, then the owner of the user account can be automatically emailed when the offending device is first blocked.\u00a0 The email (which is CCed to the Caster operator as well) contains a summary of the error cause.\u00a0\u00a0 This is often enough to resolve the problem without further technical support.<\/p>\n<p>When a customer informs you that they have corrected the issue or requests that an IP block be removed, bring up the above dialog, select that IP, and press <strong>Remove<\/strong> to clear it.<\/p>\n<h3><strong>Blocking on the Host machine using the Windows Firewall<\/strong><\/h3>\n<p>Whenever <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> has blocked an IP, that IP can still establish a connection to <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> (or to any other open port on the host machine). \u00a0\u00a0In the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> process flow, new connections are checked against the blocked list and if found are then promptly disconnected.\u00a0 This requires a small amount of processing effort which can be noticeable in very heavily loaded Casters.<\/p>\n<p>Another way to block such connection is the use the firewall logic on the host machine that is running <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span>.\u00a0 \u00a0An IP blocked at the host firewall will never connect to <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> and is discarded without ever interacting with the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> application.\u00a0 As a result; such IPs do not leave any traces in the connection logs.<\/p>\n<p>On a Windows server host this is called the <strong>Windows Defender Firewall;<\/strong> on Windows 7 machines it is called <strong>Windows Firewall<\/strong>, changing the name for Windows 8 and 10.\u00a0 The interface details vary in small ways.\u00a0 You will want to make changes with the Advanced Settings, in the section called <strong>Inbound Rules<\/strong>.\u00a0 \u00a0Here you can add multiple IPs (or ranges of IPs) to be blocked.<\/p>\n<p>Adding a new IP involves three dialog box, shown below.\u00a0 From the advanced settings, proceed as follows.\u00a0 Create an inbound \u201cport\u201d rule for port 2101 (or whatever port your Caster uses).\u00a0 This will be set to \u201cblock\u201d any \u201cTCP\/IP\u201d type connection from the IPs you enter.\u00a0\u00a0 We suggest you name this rule \u201cBlock InBound SNIP Connections.\u201d\u00a0\u00a0 You then use the \u201cScope\u201d tab to enter and review the remote IP addresses you wish to block. \u00a0If you press the \u201cAdd\u201d button the dialog in the foreground below is displayed.\u00a0 You can enter either a single IP or a range of IPs here.\u00a0 If you enter an ill-formed one or a duplicate, the dialog will not accept it and will warn you.<\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Firewall_IPblock.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8183 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Firewall_IPblock.png?_t=1654121568\" alt=\"\" width=\"760\" height=\"700\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Firewall_IPblock.png 760w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Firewall_IPblock-300x276.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Firewall_IPblock-50x46.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Firewall_IPblock-600x553.png 600w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/Firewall_IPblock-320x295.png 320w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/a><\/p>\n<p>This is basically the opposite action of the in-bound rule you may have created when you first set up <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> to ALLOW traffic on port 2101 to reach your Caster.\u00a0 [An example of doing this can be found in this article on <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/setting-ips-for-aws-deployments\/\" target=\"_blank\" rel=\"noopener\">AWS firewall setups<\/a>.]<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Blocking an IP at the host machine firewall should be considered a drastic and final step to take for devices that repeatedly attempt \u00a0to connect over a long periods of time.\u00a0<\/strong><\/span> It would generally be unusual \u00a0to take this step for a known customer who could be contacted offline and the problem resolved.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Detecting and Watching Bad Connections<\/strong><\/h2>\n<p><em>How do you monitor or observe bad connections?\u00a0\u00a0\u00a0 <\/em><\/p>\n<p>There are several ways including using the console log, the events view, looking at various IP reports, and watching live user connection attempts using the <strong>Connected Users<\/strong> dialog.<\/p>\n<h3>The Console Log<\/h3>\n<p>Well, the first place to look in real time is the console log itself. There you will see any connection as they occur in real time. If you set the console log to be \u201c<em>Minor<\/em>\u201d (mid-screen combo button) and check the box marked \u201c<em>Show Protocol Details<\/em>\u201d\u00a0 (found in the <em>Caster and Clients<\/em> tab) &#8211; then you will see the details of the connection as well as the way the connection was handled.\u00a0 Use the <strong>Pause<\/strong> button (mid-screen right side) to stop the console from scrolling when there are many entries occurring.<\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/consoleControls.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8188 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/consoleControls.png?_t=1654121603\" alt=\"\" width=\"620\" height=\"110\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/consoleControls.png 620w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/consoleControls-300x53.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/consoleControls-50x9.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/consoleControls-600x106.png 600w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/consoleControls-320x57.png 320w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<h3>The Event View<\/h3>\n<p>The \u201cMajor Events\u201d view along the right side also provides a quick color-highlighted summary of good\/bad connections for both Base Stations and User Connections.\u00a0 [This is a <span style=\"color: #993300;\"><strong><em>Pro<\/em> <\/strong><\/span>model feature only; enable its display with the <em>Show Sums<\/em> check box]\u00a0 You can easily see repeating\u00a0 connection problems over short time spans this way.\u00a0 See <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/the-major-events-windows\/\" target=\"_blank\" rel=\"noopener\">this article<\/a> for further details.<\/p>\n<h3>An IP Report<\/h3>\n<p>To get a summary of recent Blocked IPs (both active and those in the past) a report can be used.\u00a0 \u00a0The Network Traffic reports are useful for this (menu: <em>Reports<\/em> \u21d2 <em>Network Traffic<\/em>\u00a0 then select the desired report).<\/p>\n<p>The <strong>IP_Ban_Report<\/strong> report provides a summary of current and past Blocked IPs. It often provides both the MountPt involved and the reason for the block.\u00a0 This report also provides a prior history of the past ~100 blocked IPs which is useful when checking for problems that have occurred over the past few days.\u00a0 An example report (without user identities and supporting report links removed) can be found here (to be provided).<\/p>\n<h3>Watching live User Connections<\/h3>\n<p>Bad connections from any IPs which are currently being blocked can also be easily tracked using the <strong>Connected Users<\/strong> dialog (open with the menu command <em>SetUp<\/em> \u21d2 <em>Display Current Users<\/em>).\u00a0 \u00a0You can sort the columns to see who is connecting.\u00a0 Click on the header in either the <strong>BAN<\/strong> column or the <strong>Duration <\/strong>column so that the display is sorted by this value.\u00a0 Press <strong>Pause<\/strong> to stop updating the display when one of more banned entries are shown you wish to examine.\u00a0 [<span style=\"color: #008000;\"><strong>Note<\/strong><\/span>: Any IPs blocked by the host firewall will not be displayed here because they never reach the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> application.]<\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8181 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean.png?_t=1654121618\" alt=\"\" width=\"1110\" height=\"620\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean.png 1110w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean-300x168.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean-1024x572.png 1024w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean-768x429.png 768w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean-50x28.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean-920x514.png 920w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean-600x335.png 600w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/connectedUsers-clean-320x179.png 320w\" sizes=\"auto, (max-width: 1110px) 100vw, 1110px\" \/><\/a><\/p>\n<p>In the above we see two block IPs attempting to connect, one coming from Japan, the other from Poland (this caster handles international users).\u00a0 If the reported City seems odd it may indicate a remote connection that should not occur.\u00a0 Or it may indicate a nearby cellular phone user (Cellular networks do not maintain their reverse Geo IP mappings very well).\u00a0 The reported countries are generally quite accurate. \u00a0Be sure to <strong><em>Pause<\/em><\/strong> the display updates when examining the entries. \u00a0\u00a0\u00a0Recall that hovering the mouse over the User Account, the IP, or the Base Station will bring up more details about that connection.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8182 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/ConnectedUsers-banned.png?_t=1654121653\" alt=\"\" width=\"800\" height=\"165\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/ConnectedUsers-banned.png 800w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/ConnectedUsers-banned-300x62.png 300w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/ConnectedUsers-banned-768x158.png 768w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/ConnectedUsers-banned-50x10.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/ConnectedUsers-banned-600x124.png 600w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2022\/06\/ConnectedUsers-banned-320x66.png 320w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>In cases of jamming (hostile or inadvertent) you may see the same IP connection multiple times.\u00a0 This indicates it reconnected very quickly (which a correctly designed NTRIP device will not do).\u00a0 In the case of non-NTRIP devices the connection may not request a suitable mountPt.\u00a0 Alternately, NTRIP devices may request a mountPt that is not present on the caster, including ones that have never been present on the Caster.\u00a0 If you see a large or recurring block of red \u201cbanned\u201d entries, this indicates you should look at the failing connections to see if action should be taken.<\/p>\n<p>You may want to increase the duration of the ban time for such connections as described in the prior section.\u00a0\u00a0 In more extreme cases you might want to select a duration spanning multiple weeks.\u00a0 In truly extreme cases, you may decide to mark the ban as permanent.\u00a0 Beyond that, you can block the IP at the host firewall so it never reaches <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span>. \u00a0These are all described in the preceding sections.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article we consider the general approach to detecting and blocking (banning) repeated connections coming from unwanted users.\u00a0 When such bad connections repeat constantly for hours on end, they become a problem and must be dealt with.\u00a0 In a broad sense these connections fall into two categories: Your legitimate [&hellip;]<\/p>\n","protected":false},"author":13,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"ht-kb-category":[283],"ht-kb-tag":[346,457,517,177],"class_list":["post-8189","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-managing-user-accounts","ht_kb_tag-ban","ht_kb_tag-connections","ht_kb_tag-ip-blocking","ht_kb_tag-users"],"_links":{"self":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/8189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/comments?post=8189"}],"version-history":[{"count":12,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/8189\/revisions"}],"predecessor-version":[{"id":8269,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/8189\/revisions\/8269"}],"wp:attachment":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/media?parent=8189"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb-category?post=8189"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb-tag?post=8189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}