<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Jens, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990887#M155516</link>
    <description>&lt;P&gt;Hi Jens,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This seems to be affecting all ASAs, we ran those tests yesterday and a 5545 increased to 42% CPU and a 5585 ssp20 took a 9% cpu-hit from just one computer with the same test. The fewer cores your ASA has the worse the impact seems to be.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you are under attack I think your best bet is to filter it out further out in the network. I.e. configure a PACL on a switch between your ISP and your ASA that blocks icmp unreachable before it hits your ASA, that is until the original issue has been solved properly.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Nov 2016 13:23:15 GMT</pubDate>
    <dc:creator>CSvensson87</dc:creator>
    <dc:date>2016-11-16T13:23:15Z</dc:date>
    <item>
      <title>prevent BlackNurse DDOS attacked on ASA</title>
      <link>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990884#M155513</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;prevent BlackNurse&amp;nbsp;DoS attack on ASA. What commands should be configured to prevent it etc. Thanks in advance for any help&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990884#M155513</guid>
      <dc:creator>H122610517</dc:creator>
      <dc:date>2019-03-12T08:32:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990885#M155514</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can read more about it on the links below, there are some suggestions. Please be aware that I have not yet tested it myself on any ASA that is in production so I don't know how well the suggestions actually work. &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://blacknurse.dk&lt;/P&gt;
&lt;P&gt;http://soc.tdc.dk/blacknurse/blacknurse.pdf&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"Mitigation&lt;BR /&gt;Different kinds of mitigations can be implemented to minimise the impact of the attack. On firewalls and other kinds of equipment a list of trusted sources for which ICMP is allowed could be configured. Disabling ICMP Type 3 Code 3 on the WAN interface can mitigate the attackquite easily. This is the best mitigation weknow of so far."&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2016 10:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990885#M155514</guid>
      <dc:creator>CSvensson87</dc:creator>
      <dc:date>2016-11-15T10:16:43Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990886#M155515</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;We have testet it against a ASA5516 firewall with the linux command hping3 -1 -C 3 -K 3 -i u20.&lt;/P&gt;
&lt;P&gt;We have the following config as stated in the suggestions.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;icmp deny any time-exceeded WAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;icmp deny any unreachable WAN&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The firewall reaches 80%-90% CPU and max 20.000 new connections pr second and is practically unreachable.&lt;/P&gt;
&lt;P&gt;This is on version 9.6(2)1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Not sure which versions the workaround works on, but is seems to not work on 9.6(2)1 (or I might be missing something)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2016 12:55:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990886#M155515</guid>
      <dc:creator>Sentia NOC</dc:creator>
      <dc:date>2016-11-16T12:55:10Z</dc:date>
    </item>
    <item>
      <title>Hi Jens,</title>
      <link>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990887#M155516</link>
      <description>&lt;P&gt;Hi Jens,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This seems to be affecting all ASAs, we ran those tests yesterday and a 5545 increased to 42% CPU and a 5585 ssp20 took a 9% cpu-hit from just one computer with the same test. The fewer cores your ASA has the worse the impact seems to be.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you are under attack I think your best bet is to filter it out further out in the network. I.e. configure a PACL on a switch between your ISP and your ASA that blocks icmp unreachable before it hits your ASA, that is until the original issue has been solved properly.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2016 13:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990887#M155516</guid>
      <dc:creator>CSvensson87</dc:creator>
      <dc:date>2016-11-16T13:23:15Z</dc:date>
    </item>
    <item>
      <title>Hi CSvensson87</title>
      <link>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990888#M155517</link>
      <description>&lt;P&gt;Hi CSvensson87&lt;/P&gt;
&lt;P&gt;Good to hear some results from others as well.&amp;nbsp; We are not under attack and our egde routers are handling the problem right now as you also state.&lt;/P&gt;
&lt;P&gt;We will await Cisco...&lt;/P&gt;
&lt;P&gt;Thank you for your feedback.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2016 13:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990888#M155517</guid>
      <dc:creator>Sentia NOC</dc:creator>
      <dc:date>2016-11-16T13:39:42Z</dc:date>
    </item>
    <item>
      <title>check also</title>
      <link>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990889#M155518</link>
      <description>&lt;P&gt;check also&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/13165791/blacknurse-icmp-flooding&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 22:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-blacknurse-ddos-attacked-on-asa/m-p/2990889#M155518</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2016-11-18T22:24:28Z</dc:date>
    </item>
  </channel>
</rss>

