<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA-5520 Monitoring Attacks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401466#M271556</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The first alarm that I normally see if the connections count rasing quite high.&amp;nbsp;&amp;nbsp; I would look at limiting the max embrionic connections on the ASA to reduce the ammout of hal fopen connections permitted.&amp;nbsp; When we see similar attacks like this we normally shun the host providing that its just a single host taking part in the attack. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We monitor our ASA's via snmp so get alerted when the connection count gets obove a certain threshold which allows us to jump on the ASA and begin to monitor the traffic normally via the real time logging &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Jan 2014 16:36:21 GMT</pubDate>
    <dc:creator>steven fitzpatrick</dc:creator>
    <dc:date>2014-01-15T16:36:21Z</dc:date>
    <item>
      <title>ASA-5520 Monitoring Attacks</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401465#M271554</link>
      <description>&lt;P&gt;Hello ASA experts, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you caught a syn flooding attacks against your ASA, what is the best approach to mitigate/prevent that from occuring? Also, what is the best method to monitor such attacks? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best, ~sK&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401465#M271554</guid>
      <dc:creator>sadik.bash</dc:creator>
      <dc:date>2019-03-12T03:29:43Z</dc:date>
    </item>
    <item>
      <title>ASA-5520 Monitoring Attacks</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401466#M271556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The first alarm that I normally see if the connections count rasing quite high.&amp;nbsp;&amp;nbsp; I would look at limiting the max embrionic connections on the ASA to reduce the ammout of hal fopen connections permitted.&amp;nbsp; When we see similar attacks like this we normally shun the host providing that its just a single host taking part in the attack. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We monitor our ASA's via snmp so get alerted when the connection count gets obove a certain threshold which allows us to jump on the ASA and begin to monitor the traffic normally via the real time logging &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 16:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401466#M271556</guid>
      <dc:creator>steven fitzpatrick</dc:creator>
      <dc:date>2014-01-15T16:36:21Z</dc:date>
    </item>
    <item>
      <title>ASA-5520 Monitoring Attacks</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401467#M271559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response!&amp;nbsp; That's exactaly what we did; however, we enabled the scanning thread detection and implemented a threat-detection policy to shun any suspecious attacker. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use Whatsup Gold and do have all of our ASAs monitored but don't have an snmp for the connection count. Can you please share the snmp active monitor used to monitor the connection count? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much appreciated.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best, ~sK &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bd3913.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bd3913.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scanning Threat Detection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Scanning Threat Detection is used in order to keep track of suspected attackers who create connections too many hosts in a subnet, or many ports on a host/subnet. Scanning Threat Detection is disabled by default.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Scanning Threat Detection builds on the concept of Basic Threat Detection, which already defines a threat category for a scanning attack. Therefore, the rate-interval, average rate (ARI), and burst rate (BRI) settings are shared between Basic and Scanning Threat Detection. The difference between the 2 features is that while Basic Threat Detection only indicates that the average or burst rate thresholds were crossed, Scanning Threat Detection maintains a database of attacker and target IP addresses that can help provide more context around the hosts involved in the scan. Additionally, only traffic that is actually received by the target host/subnet is considered by Scanning Threat Detection. Basic Threat Detection can still trigger a Scanning threat even if the traffic is dropped by an ACL.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Scanning Threat Detection can optionally react to an attack by shunning the attacker IP. This makes Scanning Threat Detection the only subset of the Threat Detection feature that can actively affect connections through the ASA.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;When Scanning Threat Detection detects an attack, %ASA-4-733101 is logged for the attacker and/or target IPs. If the feature is configured to shun the attacker, %ASA-4-733102 is logged when Scanning Threat Detection generates a shun. %ASA-4-733103 is logged when the shun is removed. The show threat-detection scanning-threat command can be used in order to view the entire Scanning Threat database.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 19:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401467#M271559</guid>
      <dc:creator>sadik.bash</dc:creator>
      <dc:date>2014-01-15T19:19:27Z</dc:date>
    </item>
    <item>
      <title>ASA-5520 Monitoring Attacks</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401468#M271561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;for the connections see snmp details below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="dependencies"&gt; &lt;STRONG&gt; CISCO-FIREWALL-MIB &lt;/STRONG&gt; &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.1.3.6.1.4.1.9.9.147.1.2.2.2.1.5.40.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?objectInput=1.3.6.1.4.1.9.9.147.1.2.2.2.1.5.&amp;amp;translate=Translate&amp;amp;submitValue=SUBMIT&amp;amp;submitClicked=true"&gt;http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?objectInput=1.3.6.1.4.1.9.9.147.1.2.2.2.1.5.&amp;amp;translate=Translate&amp;amp;submitValue=SUBMIT&amp;amp;submitClicked=true&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use Caccti to graph this as well and poll it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We played around with the automatic shun of suspicious behavour but have had&amp;nbsp; a few faule positives which cause some issues for us where we are providing multi tenant internet access. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from the above we average between 1-6k total connections for our environment so as soon as this hits the 15-20k mark our threshold kicks in and alerts us. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This worked well for us in the last week alone with alerting as one of our hosts was being vigourously scanned and another was being syn flooded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="5" cellspacing="1" height="39" style="width: 76px;"&gt;&lt;TBODY&gt;&lt;TR bgcolor="#FFFFFF"&gt;&lt;TD align="left" width="25%"&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR bgcolor="#FFFFFF"&gt;&lt;TD align="left" width="25%"&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jan 2014 09:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-monitoring-attacks/m-p/2401468#M271561</guid>
      <dc:creator>steven fitzpatrick</dc:creator>
      <dc:date>2014-01-16T09:14:25Z</dc:date>
    </item>
  </channel>
</rss>

