<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes, that is what I am in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578237#M206009</link>
    <description>&lt;P&gt;Yes, that is what I am seeking help on.&amp;nbsp; I am looking for suggestions/tips on what to change these values to as these defaults are not effective enough.&amp;nbsp; Nothing is ever shunned unless I manually add an IP to shun.&lt;/P&gt;</description>
    <pubDate>Fri, 17 Oct 2014 12:58:40 GMT</pubDate>
    <dc:creator>Mark^</dc:creator>
    <dc:date>2014-10-17T12:58:40Z</dc:date>
    <item>
      <title>ASA 5505 Shunning help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578233#M205977</link>
      <description>&lt;P&gt;I have read a few posts regarding shunning already.&amp;nbsp; I just don't feel like the ASA is shunning as much as I'd like it to.&amp;nbsp; In fact - it doesn't ever seem to shun anything unless I manually add it.&lt;/P&gt;&lt;P&gt;Running 8.3(2)13&lt;/P&gt;&lt;P&gt;My config looks like this:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Result of the command: "show run | include threat"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;threat-detection rate syn-attack rate-interval 600 average-rate 30 burst-rate 45&lt;BR /&gt;no threat-detection rate syn-attack rate-interval 3600 average-rate 80 burst-rate 160&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun except ip-address x.x.x.x x.x.x.x&lt;BR /&gt;threat-detection scanning-threat shun except ip-address x.x.x.x x.x.x.x&lt;BR /&gt;threat-detection scanning-threat shun duration 18000&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port number-of-rate 2&lt;BR /&gt;threat-detection statistics protocol number-of-rate 2&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I am just looking for feedback or tips on what I should do to improve on this and begin to actually shun scans, etc.&amp;nbsp; What are others seeing and what do those configs look like?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578233#M205977</guid>
      <dc:creator>Mark^</dc:creator>
      <dc:date>2019-03-12T04:56:04Z</dc:date>
    </item>
    <item>
      <title>Hi,You can actually fine tune</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578234#M205978</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can actually fine tune the statistics on the ASA device.&lt;/P&gt;&lt;P&gt;You can check the default values using this command:-&lt;/P&gt;&lt;P&gt;show run all threat-detection&lt;/P&gt;&lt;P&gt;This would show you all the default counters values on the ASA device which ASA would use for shunning the IP on the ASA device.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 05:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578234#M205978</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-16T05:40:57Z</dc:date>
    </item>
    <item>
      <title>ok perfect.  That gives me</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578235#M205982</link>
      <description>&lt;P&gt;ok perfect.&amp;nbsp; That gives me this (I edited since previous post):&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;show run all threat-detection&lt;BR /&gt;threat-detection rate dos-drop rate-interval 600 average-rate 100 burst-rate 400&lt;BR /&gt;threat-detection rate dos-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;BR /&gt;threat-detection rate bad-packet-drop rate-interval 600 average-rate 100 burst-rate 400&lt;BR /&gt;threat-detection rate bad-packet-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;BR /&gt;threat-detection rate acl-drop rate-interval 600 average-rate 400 burst-rate 800&lt;BR /&gt;threat-detection rate acl-drop rate-interval 3600 average-rate 320 burst-rate 640&lt;BR /&gt;threat-detection rate conn-limit-drop rate-interval 600 average-rate 100 burst-rate 400&lt;BR /&gt;threat-detection rate conn-limit-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;BR /&gt;threat-detection rate icmp-drop rate-interval 600 average-rate 100 burst-rate 400&lt;BR /&gt;threat-detection rate icmp-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;BR /&gt;threat-detection rate scanning-threat rate-interval 600 average-rate 5 burst-rate 10&lt;BR /&gt;threat-detection rate scanning-threat rate-interval 3600 average-rate 4 burst-rate 8&lt;BR /&gt;threat-detection rate syn-attack rate-interval 600 average-rate 30 burst-rate 45&lt;BR /&gt;threat-detection rate syn-attack rate-interval 3600 average-rate 80 burst-rate 160&lt;BR /&gt;threat-detection rate fw-drop rate-interval 600 average-rate 400 burst-rate 1600&lt;BR /&gt;threat-detection rate fw-drop rate-interval 3600 average-rate 320 burst-rate 1280&lt;BR /&gt;threat-detection rate inspect-drop rate-interval 600 average-rate 400 burst-rate 1600&lt;BR /&gt;threat-detection rate inspect-drop rate-interval 3600 average-rate 320 burst-rate 1280&lt;BR /&gt;threat-detection rate interface-drop rate-interval 600 average-rate 2000 burst-rate 8000&lt;BR /&gt;threat-detection rate interface-drop rate-interval 3600 average-rate 1600 burst-rate 6400&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun except ip-address x.x.x.x x.x.x.x&lt;BR /&gt;threat-detection scanning-threat shun except ip-address x.x.x.x x.x.x.x&lt;BR /&gt;threat-detection scanning-threat shun duration 18000&lt;BR /&gt;threat-detection statistics host number-of-rate 1&lt;BR /&gt;threat-detection statistics port number-of-rate 2&lt;BR /&gt;threat-detection statistics protocol number-of-rate 2&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But I am wondering if these thresholds should/could be lower?&amp;nbsp; I see scanning in the logs that I would like to see shunned.&amp;nbsp; I know the firewall is working and blocking where appropriate, but I would like to shun these malicious IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 14:02:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578235#M205982</guid>
      <dc:creator>Mark^</dc:creator>
      <dc:date>2014-10-16T14:02:54Z</dc:date>
    </item>
    <item>
      <title>Hi,Yes , these values can be</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578236#M206005</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Yes , these values can be modified on the ASA device. The value depends on your requirement and your setup.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2014 10:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578236#M206005</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-17T10:41:09Z</dc:date>
    </item>
    <item>
      <title>Yes, that is what I am</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578237#M206009</link>
      <description>&lt;P&gt;Yes, that is what I am seeking help on.&amp;nbsp; I am looking for suggestions/tips on what to change these values to as these defaults are not effective enough.&amp;nbsp; Nothing is ever shunned unless I manually add an IP to shun.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2014 12:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578237#M206009</guid>
      <dc:creator>Mark^</dc:creator>
      <dc:date>2014-10-17T12:58:40Z</dc:date>
    </item>
    <item>
      <title>Hi,You have to understand</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578238#M206016</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You have to understand that these values are actually the rate at which packets are dropped/denied on the ASA device due to policy check failures.&lt;/P&gt;&lt;P&gt;It will be different for every other network depending on the traffic passing through and different access/deny policies.&lt;/P&gt;&lt;P&gt;You can lower the values of these counters and check for which value you are seeing the correct SHUN behavior. This has to be done on hit and trial basis.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2014 13:11:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578238#M206016</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-17T13:11:10Z</dc:date>
    </item>
    <item>
      <title>Ok, I can accept that.  I was</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578239#M206017</link>
      <description>&lt;P&gt;Ok, I can accept that.&amp;nbsp; I was hoping for a working example but I see that may be useless to me anyway.&lt;/P&gt;&lt;P&gt;Thanks for your help Vibhor, it is much appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2014 13:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-shunning-help/m-p/2578239#M206017</guid>
      <dc:creator>Mark^</dc:creator>
      <dc:date>2014-10-17T13:22:55Z</dc:date>
    </item>
  </channel>
</rss>

