<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Query on Cisco ASA Configuration. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379645#M271207</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Hi&lt;/STRONG&gt; &lt;STRONG&gt;Mariusz Bochen,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thank you so much for your response.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Can't ASA handle these kind of attacks by default?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Anyways your answer is helpful.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks &amp;amp; Best Regards,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Mahi&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Jan 2014 07:32:43 GMT</pubDate>
    <dc:creator>Mahi Gurram</dc:creator>
    <dc:date>2014-01-24T07:32:43Z</dc:date>
    <item>
      <title>Query on Cisco ASA Configuration.</title>
      <link>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379643#M271203</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-color: #000000; line-height: 1.2; margin-top: 0in; margin-bottom: 0in;"&gt;How can i protect my ASA firewall against:&lt;/P&gt;&lt;P style="border-color: #000000; line-height: 1.2; margin-top: 0in; margin-bottom: 0in;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1. Denial of Service (Land Attack) &lt;/P&gt;&lt;P style="border-color: #000000; line-height: 1.2; margin-top: 0in; margin-bottom: 0in;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2. SYN Flood attack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-color: #000000; line-height: 1.2; margin-top: 0in; margin-bottom: 0in;"&gt;Please let me know the CLI commands to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-color: #000000; line-height: 1.2; margin-top: 0in; margin-bottom: 0in;"&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-color: #000000; line-height: 1.2; margin-top: 0in; margin-bottom: 0in;"&gt;-Mahi&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379643#M271203</guid>
      <dc:creator>Mahi Gurram</dc:creator>
      <dc:date>2019-03-12T03:32:42Z</dc:date>
    </item>
    <item>
      <title>Query on Cisco ASA Configuration.</title>
      <link>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379644#M271204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Simple and effective way to prevent some of these is to set embryonic connection limit on all static NAT entries which are facing outside interface.&lt;/P&gt;&lt;P&gt;Command depend on which IOS you are running. More info here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Table 11 shows both (old and new) config example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Obviously the best solution is to get an IPS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mariusz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jan 2014 16:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379644#M271204</guid>
      <dc:creator>Mariusz Bochen</dc:creator>
      <dc:date>2014-01-20T16:15:25Z</dc:date>
    </item>
    <item>
      <title>Query on Cisco ASA Configuration.</title>
      <link>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379645#M271207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Hi&lt;/STRONG&gt; &lt;STRONG&gt;Mariusz Bochen,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thank you so much for your response.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Can't ASA handle these kind of attacks by default?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Anyways your answer is helpful.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks &amp;amp; Best Regards,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Mahi&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 07:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379645#M271207</guid>
      <dc:creator>Mahi Gurram</dc:creator>
      <dc:date>2014-01-24T07:32:43Z</dc:date>
    </item>
    <item>
      <title>Query on Cisco ASA Configuration.</title>
      <link>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379646#M271210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mahi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually it does.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean for Land Attacks the ASA will generate the following message:&lt;/P&gt;&lt;P&gt;%ASA-session-2-106017: Deny IP due to Land Attack from &lt;IP address=""&gt; to &lt;IP address=""&gt;&lt;/IP&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Know for SYN flood attack you can relay on things such as treath detection but you could also configure more restrictive security policies with MPF to avoid the unnecesary flood of traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 12:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-on-cisco-asa-configuration/m-p/2379646#M271210</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-01-24T12:28:07Z</dc:date>
    </item>
  </channel>
</rss>

