<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 2100 with ASA software ( SYN Attack ) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4006583#M29512</link>
    <description>&lt;P&gt;I'm still stuck with this behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the next few days, I'll have to open a TAC case I suppose to try to solve it before in production.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other input is really much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Sun, 05 Jan 2020 09:19:26 GMT</pubDate>
    <dc:creator>Moneta82</dc:creator>
    <dc:date>2020-01-05T09:19:26Z</dc:date>
    <item>
      <title>Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003053#M29498</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm running a firepoower 2100 with asa image 9.12.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An interface of the firewall is connected to production network in a uncontrolled space. For this reason I was trying to check some sort of network attack on that interface to double check my production network security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was able to pass all my test except for a syn flood attack. During the attack my ASA get stuck on 100% CPU. The attack was tracked, the IP address of the attacker was shun, but the FW remain stuck at 100%.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My asa config is the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun duration 240&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map PROD-class-TCP&lt;BR /&gt;match access-list PROD_mpc&lt;/P&gt;&lt;P&gt;Policy-map PROD-policy-TCP&lt;BR /&gt;description TCP Intercept&lt;BR /&gt;class PROD-class-TCP&lt;BR /&gt;set connection embryonic-conn-max 20 per-client-embryonic-max 5&lt;/P&gt;&lt;P&gt;service-policy PROD-policy-TCP interface PROD&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;access-list PROD_mpc extended permit tcp 192.168.100.0 255.255.255.0 host 192.168.10.35&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my PROD NET I connect a Kali linux VM and I launched this command: hping3 -c 15000 -d 120 -S -w 64 -p 8080 --flood 192.168.10.35&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Raffaele&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2019 11:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003053#M29498</guid>
      <dc:creator>Moneta82</dc:creator>
      <dc:date>2019-12-24T11:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003092#M29500</link>
      <description>&lt;P&gt;what is your KALI IP address. ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is the good document and verification, your config ok, but make sure Kali not in trusted device ?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2018/01/07/prevent-tcp-attacks-on-cisco-asa/" target="_blank" rel="noopener"&gt;https://integratingit.wordpress.com/2018/01/07/prevent-tcp-attacks-on-cisco-asa/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also check with : is this process is same ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show processes cpu-usage sorted non-zero&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2019 12:39:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003092#M29500</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-12-24T12:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003108#M29502</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;what is your KALI IP address. ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is the good document and verification, your config ok, but make sure Kali not in trusted device ?&lt;/P&gt;&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2018/01/07/prevent-tcp-attacks-on-cisco-asa/" target="_blank" rel="noopener"&gt;https://integratingit.wordpress.com/2018/01/07/prevent-tcp-attacks-on-cisco-asa/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also check with : is this process is same ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show processes cpu-usage sorted non-zero&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hi Balaji,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for the link, the configuration proposed is the pretty much the same of mine poste above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My Kali Ip is 192.168.100.200 and I'm attaking the 192.168.10.35&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and here the output reqested:&lt;/P&gt;&lt;P&gt;ciscoasa# show processes cpu-usage sorted non-zero&lt;BR /&gt;Hardware: FPR-2120&lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 9.12(2)&lt;BR /&gt;ASLR enabled, text region aab8237000-aabca09c34&lt;BR /&gt;PC Thread 5Sec 1Min 5Min Process&lt;BR /&gt;- - 12.5% 7.1% 2.7% DATAPATH-6-1463&lt;BR /&gt;- - 12.4% 7.1% 2.7% DATAPATH-0-1457&lt;BR /&gt;- - 12.4% 7.1% 2.7% DATAPATH-7-1464&lt;BR /&gt;- - 12.4% 7.1% 2.7% DATAPATH-1-1458&lt;BR /&gt;- - 12.3% 7.1% 2.7% DATAPATH-4-1461&lt;BR /&gt;- - 12.3% 7.1% 2.7% DATAPATH-3-1460&lt;BR /&gt;- - 12.3% 7.1% 2.7% DATAPATH-2-1459&lt;BR /&gt;- - 12.3% 7.1% 2.7% DATAPATH-5-1462&lt;BR /&gt;0x000000aab95c0e30 0x000000ffeaf74280 0.4% 0.2% 0.1% CP Processing&lt;BR /&gt;0x000000aabaf58af0 0x000000ffeaf86ce0 0.3% 0.2% 0.1% Logger&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show CPU give me 100 %&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2019 13:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003108#M29502</guid>
      <dc:creator>Moneta82</dc:creator>
      <dc:date>2019-12-24T13:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003188#M29504</link>
      <description>&lt;P&gt;A small update.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After several tests I realized that the configuration looks good. If on the Kali Vm I launch the command hping3 -c 15000 -d 120 -S -w 64 -p 8080 192.168.10.35 without "--flood" the ASA perfectly handle the exception and the embryonics connection. CPU run smooth and other traffic flow normally&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue seems to be related to the flood commands that send several packets every second but I'm stunned that that kind of machine ( 2120 ) can't handle that kind of load. There's somenthing missing I hope.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Raffaele&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2019 15:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003188#M29504</guid>
      <dc:creator>Moneta82</dc:creator>
      <dc:date>2019-12-24T15:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003218#M29507</link>
      <description>&lt;P&gt;as per my understanding, we use always&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;--flood = Sending packets as fast as possible, without taking care to show incoming replies. Flood mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this always used in my testing with random source, that means kali generates different IP address with SYN Attack. this more of stress test for web servers - same the way you do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2019 16:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003218#M29507</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-12-24T16:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003414#M29511</link>
      <description>&lt;P&gt;A small update after few tests. The CPU stuck at 100% seems to be not due to neither the thread detection policy nor the TCP inspection.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I simply disabled the two check and block all the incoming traffic on the external interface with an ACL ( deny IP any any ).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Once issued the usual flood command on the kali machine placed on the external interface ( where the Deny IP any any is deployed ) the firewall CPU rised up to 100% and the firewall has stopped to work.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Someone can help me? I can't belive that it's so simple to have a DoS attack to this firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 25 Dec 2019 17:35:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4003414#M29511</guid>
      <dc:creator>Moneta82</dc:creator>
      <dc:date>2019-12-25T17:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4006583#M29512</link>
      <description>&lt;P&gt;I'm still stuck with this behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the next few days, I'll have to open a TAC case I suppose to try to solve it before in production.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other input is really much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jan 2020 09:19:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4006583#M29512</guid>
      <dc:creator>Moneta82</dc:creator>
      <dc:date>2020-01-05T09:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4006642#M29513</link>
      <description>&lt;P&gt;At this stage not much input I can provide, suggest to raise a TAC, they can have access to your Device and collect the information and suggest the solution.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jan 2020 15:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4006642#M29513</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-01-05T15:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 with ASA software ( SYN Attack )</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4009103#M29514</link>
      <description>&lt;P&gt;I had a TAC with a Cisco Engineer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This firewall can't handle correctly this kind of attack. During the attack the CPU rise up to 100% due to a quantity of SYS packet even enabling the thread detection ( with shun ) or using a service-policy limiting the embryonic-connection.&lt;/P&gt;&lt;P&gt;Even with a "deny any any" ACL the firewall perform in this way because, as the engineer told me, not using the fast path but it's check each packet against the CPU, so many packets lead to high CPU use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm quite disappointed because I can freeze a quite big machine with an old PC running a VM with kali but the no more thing to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks anyway for the help&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 22:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-with-asa-software-syn-attack/m-p/4009103#M29514</guid>
      <dc:creator>Moneta82</dc:creator>
      <dc:date>2020-01-09T22:03:41Z</dc:date>
    </item>
  </channel>
</rss>

