<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall High CPU utilization due to spurious traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-high-cpu-utilization-due-to-spurious-traffic/m-p/5099699#M1112312</link>
    <description>&lt;P&gt;Why you not use ACL applying to Outside interface direction IN allow any to real server IP(private IP) for specific ports.&lt;/P&gt;
&lt;P&gt;That prevent any access to server for any other udp/tcp port and also icmp (since icmp dont have l4 ports)&lt;/P&gt;
&lt;P&gt;For other attack you can use thread detection&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where if&amp;nbsp; asa detect tcp&amp;nbsp; flood is reach specific number the clinet public IP will shun for specific time or forever (depending on your config)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Also you can use&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Policy map to drop connection&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c01844881" target="_blank"&gt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c01844881&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Fri, 10 May 2024 11:47:36 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-05-10T11:47:36Z</dc:date>
    <item>
      <title>Firewall High CPU utilization due to spurious traffic</title>
      <link>https://community.cisco.com/t5/network-security/firewall-high-cpu-utilization-due-to-spurious-traffic/m-p/5099634#M1112309</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JITINKALYANI_0-1715338836848.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218027iC4865964DFF36EFE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JITINKALYANI_0-1715338836848.png" alt="JITINKALYANI_0-1715338836848.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Situation&lt;/STRONG&gt;:-&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Server Will have a private IP natted with a public IP from firewall&lt;/LI&gt;&lt;LI&gt;Firewall outside interface will have a public IP of same pool&lt;/LI&gt;&lt;LI&gt;All incoming traffic on outside interface from internet will be blocked on firewall and only Client IP address will be whitelisted&lt;/LI&gt;&lt;LI&gt;Client will have access to 2-3 ports on server&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Requirement:-&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;How to stop open discovery of public IP of firewall or server from spammers or hackers&lt;/LI&gt;&lt;LI&gt;If spammers try to send spurious traffic to server or firewall, how to avoid such traffic otherwise firewall CPU utilization will increase and bandwidth might also choke&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Note – &lt;/STRONG&gt;VPN is not an option&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 11:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-high-cpu-utilization-due-to-spurious-traffic/m-p/5099634#M1112309</guid>
      <dc:creator>JITINKALYANI</dc:creator>
      <dc:date>2024-05-10T11:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall High CPU utilization due to spurious traffic</title>
      <link>https://community.cisco.com/t5/network-security/firewall-high-cpu-utilization-due-to-spurious-traffic/m-p/5099699#M1112312</link>
      <description>&lt;P&gt;Why you not use ACL applying to Outside interface direction IN allow any to real server IP(private IP) for specific ports.&lt;/P&gt;
&lt;P&gt;That prevent any access to server for any other udp/tcp port and also icmp (since icmp dont have l4 ports)&lt;/P&gt;
&lt;P&gt;For other attack you can use thread detection&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where if&amp;nbsp; asa detect tcp&amp;nbsp; flood is reach specific number the clinet public IP will shun for specific time or forever (depending on your config)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Also you can use&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Policy map to drop connection&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c01844881" target="_blank"&gt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c01844881&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 11:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-high-cpu-utilization-due-to-spurious-traffic/m-p/5099699#M1112312</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-10T11:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall High CPU utilization due to spurious traffic</title>
      <link>https://community.cisco.com/t5/network-security/firewall-high-cpu-utilization-due-to-spurious-traffic/m-p/5101440#M1112315</link>
      <description>&lt;P&gt;What you described in the "situation" section is sufficient. Just open those 2-3 ports to the server and block everything else. By default ASA/FTD doesn't send ICMP unreachable or TCP RST in response to inbound requests which are blocked by the ACL, which makes "discovery" of the firewall a bit more difficult. Also, ASA/FTD doesn't listen on any port, unless explicitly configured to do so. Don't configure any other "protection", like threat detection, unless you want to shoot yourself in the foot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 20:34:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-high-cpu-utilization-due-to-spurious-traffic/m-p/5101440#M1112315</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-05-10T20:34:34Z</dc:date>
    </item>
  </channel>
</rss>

