<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Attacks that simply overload the ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/attacks-that-simply-overload-the-asa/m-p/2251675#M357688</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would actually recommend you to go to your ISP and explain them what is going on so they can avoid that traffic to waste your bandwith,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 May 2013 16:37:48 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-05-08T16:37:48Z</dc:date>
    <item>
      <title>Attacks that simply overload the ASA</title>
      <link>https://community.cisco.com/t5/network-security/attacks-that-simply-overload-the-asa/m-p/2251673#M357685</link>
      <description>&lt;P&gt;We have an ASA 5505 and we keep getting short bursts of ICMP packets (5000 in one second) They will do this and it just simply overloads the ASA and it crashes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this since it is 1000 past the 4000 connections per second capacity of the ASA 5505 or do we have a setting wrong some place that could prevent this type of overload from happening? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are looking to prevent DoS and other attacks that prevent even a short loss of connection since the servers are getting attacked daily and we have voice streaming on through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.3(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;hostname XXXXXXXXXXXX&lt;/P&gt;&lt;P&gt;domain-name XXXXXXXXXXXX.com&lt;/P&gt;&lt;P&gt;enable password XXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server XXX.XXX.XXX&lt;/P&gt;&lt;P&gt; name-server XXX.XXX.XXX&lt;/P&gt;&lt;P&gt; domain-name privatedns.com&lt;/P&gt;&lt;P&gt;object network XXX.XXX.XXX &lt;/P&gt;&lt;P&gt; host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;object network server2 &lt;/P&gt;&lt;P&gt; host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;object network server1 &lt;/P&gt;&lt;P&gt; host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;object-group network www_servers&lt;/P&gt;&lt;P&gt; description Serveurs web&lt;/P&gt;&lt;P&gt; network-object host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt; network-object host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt; network-object host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt; network-object host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt; network-object object XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;object-group service www_srv tcp&lt;/P&gt;&lt;P&gt; description les services www tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 3389&lt;/P&gt;&lt;P&gt;object-group service www_srv_udp udp&lt;/P&gt;&lt;P&gt; description les services udp&lt;/P&gt;&lt;P&gt; port-object eq 3389&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt; network-object host XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;/P&gt;&lt;P&gt; icmp-object traceroute&lt;/P&gt;&lt;P&gt; icmp-object echo&lt;/P&gt;&lt;P&gt;object-group network Whitelist&lt;/P&gt;&lt;P&gt; description Allowed External Hosts&lt;/P&gt;&lt;P&gt; network-object host XXX.XXX.XXX.XXX&lt;/P&gt;&lt;P&gt; network-object object 2server&lt;/P&gt;&lt;P&gt; network-object object 1server&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit ip object-group Whitelist object-group www_servers &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp host XXX.XXX.XXX.XXX any &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp host XXX.XXX.XXX.XXX any &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any object-group www_servers object-group DM_INLINE_ICMP_1 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq imap4 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 465 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 587 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 993 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 995 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 2021 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 52258 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 21111 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 31133 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 8290 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 8191 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 8221 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers range 5000 5100 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 2238 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit object-group TCPUDP any object-group www_servers range 62338 64838 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object-group www_servers eq 41234 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit object-group TCPUDP any object-group www_servers range 7000 7500 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit object-group TCPUDP any object-group www_servers range 20 21 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit object-group TCPUDP any object-group www_servers range 9000 9500 &lt;/P&gt;&lt;P&gt;access-list outside_in remark switch&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit object-group TCPUDP object-group DM_INLINE_NETWORK_1 host 224.0.0.2 eq 1985 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list global_mpc extended permit ip object-group Whitelist any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging list e-mail-notification level critical&lt;/P&gt;&lt;P&gt;logging list e-mail-notification message 713050&lt;/P&gt;&lt;P&gt;logging list e-mail-notification message 611101-611102&lt;/P&gt;&lt;P&gt;logging buffered warnings&lt;/P&gt;&lt;P&gt;logging asdm warnings&lt;/P&gt;&lt;P&gt;logging mail emergencies&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;logging from-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:email1@email.com" target="_blank"&gt;email1@email.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;logging recipient-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:email1@email.com" target="_blank"&gt;email1@email.com&lt;/A&gt;&lt;SPAN&gt; level warnings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;logging recipient-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:email2@email.com" target="_blank"&gt;email2@email.com&lt;/A&gt;&lt;SPAN&gt; level emergencies&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;logging message 733102 level emergencies&lt;/P&gt;&lt;P&gt;logging message 733100 level emergencies&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address XXX.XXX.XXX.XXX 255.255.255.224&lt;/P&gt;&lt;P&gt;ip audit name Attack attack action alarm drop&lt;/P&gt;&lt;P&gt;ip audit interface outside Attack&lt;/P&gt;&lt;P&gt;ip audit attack action alarm drop&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit host XXX.XXX.XXX.XXX echo outside&lt;/P&gt;&lt;P&gt;icmp permit host XXX.XXX.XXX.XXX echo outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-711-52.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 XXX.XXX.XXX 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh scopy enable&lt;/P&gt;&lt;P&gt;ssh timeout 1&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address XX.XX.XXX.XXX 255.255.255.255&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun duration 3600&lt;/P&gt;&lt;P&gt;threat-detection statistics host number-of-rate 3&lt;/P&gt;&lt;P&gt;threat-detection statistics port number-of-rate 3&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol number-of-rate 3&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server XXX.XXX.XXX.XXX source outside prefer&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; description Flooding&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map global-class1&lt;/P&gt;&lt;P&gt; match access-list global_mpc&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; description Flooding&lt;/P&gt;&lt;P&gt; class global-class1&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection embryonic-conn-max 100 per-client-max 30 per-client-embryonic-max 10 &lt;/P&gt;&lt;P&gt;policy-map flood&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global-policy global&lt;/P&gt;&lt;P&gt;smtp-server XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;hpm topN enable&lt;/P&gt;&lt;P&gt;Cryptochecksum:394907dc0408efcd8628b56dd2464b65&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/attacks-that-simply-overload-the-asa/m-p/2251673#M357685</guid>
      <dc:creator>The_Gatsu</dc:creator>
      <dc:date>2019-03-12T01:40:24Z</dc:date>
    </item>
    <item>
      <title>Attacks that simply overload the ASA</title>
      <link>https://community.cisco.com/t5/network-security/attacks-that-simply-overload-the-asa/m-p/2251674#M357686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it's only icmp packet, you can try adding following commands:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any unreachable outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp deny any outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so it will only allow ping/icmp packet from host x.x.x.x and deny the rest.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 07:50:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/attacks-that-simply-overload-the-asa/m-p/2251674#M357686</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2013-05-08T07:50:09Z</dc:date>
    </item>
    <item>
      <title>Attacks that simply overload the ASA</title>
      <link>https://community.cisco.com/t5/network-security/attacks-that-simply-overload-the-asa/m-p/2251675#M357688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would actually recommend you to go to your ISP and explain them what is going on so they can avoid that traffic to waste your bandwith,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 16:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/attacks-that-simply-overload-the-asa/m-p/2251675#M357688</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-08T16:37:48Z</dc:date>
    </item>
  </channel>
</rss>

