Download Print this page

Cisco ASA 5506-X Configuration Manual page 326

Cli
Hide thumbs Also See for ASA 5506-X:

Advertisement

Detecting Threats
Basic Threat Detection Statistics
Using basic threat detection statistics, the ASA monitors the rate of dropped packets and security events
due to the following reasons:
When the ASA detects a threat, it immediately sends a system log message (733100). The ASA tracks
two types of rates: the average event rate over an interval, and the burst event rate over a shorter burst
interval. The burst rate interval is 1/30th of the average rate interval or 10 seconds, whichever is higher.
For each received event, the ASA checks the average and burst rate limits; if both rates are exceeded,
then the ASA sends two separate system messages, with a maximum of one message for each rate type
per burst period.
Basic threat detection affects performance only when there are drops or potential threats; even in this
scenario, the performance impact is insignificant.
Advanced Threat Detection Statistics
Advanced threat detection statistics show both allowed and dropped traffic rates for individual objects
such as hosts, ports, protocols, or ACLs.
Enabling advanced statistics can affect the ASA performance, depending on the type of statistics
Caution
enabled. The threat-detection statistics host command affects performance in a significant way; if you
have a high traffic load, you might consider enabling this type of statistics temporarily. The
threat-detection statistics port command, however, has modest impact.
Cisco ASA Series Firewall CLI Configuration Guide
15-2
Denial by ACLs.
Bad packet format (such as invalid-ip-header or invalid-tcp-hdr-length).
Connection limits exceeded (both system-wide resource limits, and limits set in the configuration).
DoS attack detected (such as an invalid SPI, Stateful Firewall check failure).
Basic firewall checks failed. This option is a combined rate that includes all firewall-related packet
drops in this list. It does not include non-firewall-related drops such as interface overload, packets
failed at application inspection, and scanning attack detected.
Suspicious ICMP packets detected.
Packets failed application inspection.
Interface overload.
Scanning attack detected. This option monitors scanning attacks; for example, the first TCP packet
is not a SYN packet, or the TCP connection failed the 3-way handshake. Full scanning threat
detection takes this scanning attack rate information and acts on it by classifying hosts as attackers
and automatically shunning them, for example.
Incomplete session detection such as TCP SYN attack detected or no data UDP session attack
detected.
Chapter 15
Threat Detection

Hide quick links:

Advertisement

loading