<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Shun configured but not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/shun-configured-but-not-working/m-p/3676586#M13185</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The shun command&amp;nbsp;is&amp;nbsp;used independently of threat-detection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shuns, when entered manually, are ephemeral and not saved in running-config. So if your shun list has been cleared out, that just means that the&amp;nbsp;&lt;SPAN&gt;ephemeral shun list has been cleared. You would see the same behavior if you rebooted your device.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Typically, the way I understand it, shun was designed&amp;nbsp;to be used in this fashion:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You are seeing malicious traffic from a source IP, let's say 9.9.9.9. I would normally add this IP to a blacklist, deny ACL on my edge, ingress ACL. However adding the IP to the ACL will not stop any EXISTING sessions &lt;EM&gt;previously&lt;/EM&gt;&amp;nbsp;made by the bad actor. So in addition to the blacklist, we issue a shun, which clears the tcp connection tables and the NAT translation tables for the offending IP address at 9.9.9.9. This way, any previously successful connections by 9.9.9.9 are immediately&amp;nbsp;dropped by the shun. If there were a reboot of the box, even though shun has been cleared, the bad actor at 9.9.9.9 would still not be able to initiate any new connections because our ACL black-list would prevent any new connections.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s15.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s15.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"Because the&amp;nbsp;&lt;STRONG class="cBold"&gt;shun&lt;/STRONG&gt;&amp;nbsp;command is used to block attacks dynamically, it is not displayed in the ASA configuration."&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps!&lt;/P&gt;
&lt;P&gt;-A&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jul 2018 21:38:49 GMT</pubDate>
    <dc:creator>aaron.hackney</dc:creator>
    <dc:date>2018-07-27T21:38:49Z</dc:date>
    <item>
      <title>Shun configured but not working</title>
      <link>https://community.cisco.com/t5/network-security/shun-configured-but-not-working/m-p/3676359#M13181</link>
      <description>&lt;P&gt;have had scanning threat enabled for years.&amp;nbsp; New assistant typed "no shun" instead of "clear shun" and now the "show shun" doesn't show anything.&amp;nbsp; Usually have about 100 in a matter of minutes.&amp;nbsp; Have turned on and off via GUI and verified the config via CLI.&amp;nbsp; Attached is screenshot and below is config.&amp;nbsp; Any help appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa-1# sh run | begin shun&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 10.1.2.0 255.255.255.0&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 10.10.10.0 255.255.255.0&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 10.17.4.0 255.255.252.0&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 10.200.0.0 255.255.0.0&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 10.200.31.0 255.255.255.0&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 10.33.2.50 255.255.255.255&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 172.16.0.0 255.255.240.0&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 192.168.0.0 255.255.0.0&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:01:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shun-configured-but-not-working/m-p/3676359#M13181</guid>
      <dc:creator>spunner</dc:creator>
      <dc:date>2020-02-21T16:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: Shun configured but not working</title>
      <link>https://community.cisco.com/t5/network-security/shun-configured-but-not-working/m-p/3676586#M13185</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The shun command&amp;nbsp;is&amp;nbsp;used independently of threat-detection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shuns, when entered manually, are ephemeral and not saved in running-config. So if your shun list has been cleared out, that just means that the&amp;nbsp;&lt;SPAN&gt;ephemeral shun list has been cleared. You would see the same behavior if you rebooted your device.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Typically, the way I understand it, shun was designed&amp;nbsp;to be used in this fashion:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You are seeing malicious traffic from a source IP, let's say 9.9.9.9. I would normally add this IP to a blacklist, deny ACL on my edge, ingress ACL. However adding the IP to the ACL will not stop any EXISTING sessions &lt;EM&gt;previously&lt;/EM&gt;&amp;nbsp;made by the bad actor. So in addition to the blacklist, we issue a shun, which clears the tcp connection tables and the NAT translation tables for the offending IP address at 9.9.9.9. This way, any previously successful connections by 9.9.9.9 are immediately&amp;nbsp;dropped by the shun. If there were a reboot of the box, even though shun has been cleared, the bad actor at 9.9.9.9 would still not be able to initiate any new connections because our ACL black-list would prevent any new connections.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s15.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s15.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"Because the&amp;nbsp;&lt;STRONG class="cBold"&gt;shun&lt;/STRONG&gt;&amp;nbsp;command is used to block attacks dynamically, it is not displayed in the ASA configuration."&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps!&lt;/P&gt;
&lt;P&gt;-A&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jul 2018 21:38:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shun-configured-but-not-working/m-p/3676586#M13185</guid>
      <dc:creator>aaron.hackney</dc:creator>
      <dc:date>2018-07-27T21:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Shun configured but not working</title>
      <link>https://community.cisco.com/t5/network-security/shun-configured-but-not-working/m-p/3676605#M13188</link>
      <description>I appreciate your explanation.  However, I could type "show shun" and it would give me a list of all IP's that are currently being shunned.  I type that in now, and there is no list.  Tells me nothing is being shunned.  I usually get over 100 on the list within the first couple minutes after doing a clear shun command.&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Jul 2018 23:17:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shun-configured-but-not-working/m-p/3676605#M13188</guid>
      <dc:creator>spunner</dc:creator>
      <dc:date>2018-07-27T23:17:47Z</dc:date>
    </item>
  </channel>
</rss>

