<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower DDOS attack prevention in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-ddos-attack-prevention/m-p/3054181#M1017378</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to use the firepower, in my ASA 5555-x with firepower services, in order to protect from a&amp;nbsp;DDOS attack.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I encountered the following DDOS attack:&lt;/P&gt;
&lt;P&gt;A lot of global&amp;nbsp;IP addresses sent http connections to my inside web server. The firepower allowed all traffic and my web server crashed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried to enable rate-based attack prevention in the Network Analysis Policy without the drop checkbox, just for monitoring, but in the intrusion events I can see a lot of events even from my local network trying to access my web server in the DMZ. It looks like that feature will cause a lot of False-Positive events.&lt;/P&gt;
&lt;P&gt;In the rate-based I configured the control simultaneous connection with 350 connections...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What is the best way to gain protection from this kind of&amp;nbsp;attack with the firepower?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Dor.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 13:15:58 GMT</pubDate>
    <dc:creator>doraz</dc:creator>
    <dc:date>2019-03-12T13:15:58Z</dc:date>
    <item>
      <title>Firepower DDOS attack prevention</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ddos-attack-prevention/m-p/3054181#M1017378</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to use the firepower, in my ASA 5555-x with firepower services, in order to protect from a&amp;nbsp;DDOS attack.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I encountered the following DDOS attack:&lt;/P&gt;
&lt;P&gt;A lot of global&amp;nbsp;IP addresses sent http connections to my inside web server. The firepower allowed all traffic and my web server crashed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried to enable rate-based attack prevention in the Network Analysis Policy without the drop checkbox, just for monitoring, but in the intrusion events I can see a lot of events even from my local network trying to access my web server in the DMZ. It looks like that feature will cause a lot of False-Positive events.&lt;/P&gt;
&lt;P&gt;In the rate-based I configured the control simultaneous connection with 350 connections...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What is the best way to gain protection from this kind of&amp;nbsp;attack with the firepower?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Dor.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ddos-attack-prevention/m-p/3054181#M1017378</guid>
      <dc:creator>doraz</dc:creator>
      <dc:date>2019-03-12T13:15:58Z</dc:date>
    </item>
    <item>
      <title>First of all, how did you</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ddos-attack-prevention/m-p/3054182#M1017379</link>
      <description>&lt;P&gt;First of all, how did you configure the tracking? Based on source or destination?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you want the local network to not be checked against it, you should create another NAP without rate based preproc enabled and assign it only to your network, though a NAP rule. This way, the local traffic will not be checked.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 13:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ddos-attack-prevention/m-p/3054182#M1017379</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-01-26T13:00:06Z</dc:date>
    </item>
  </channel>
</rss>

