<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA firewalls,basic IPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188857#M360440</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, had a tough time trying to understand that reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what i got.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;----There is no syslog server configured&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check the logs locally on the ASA, they should appear in there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;---You are using ASDM 6.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Update it to the latest version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;----You are getting this log: &lt;EM&gt;resource asdm limit 5 reached&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It means the ASA is running in multiple context mode and the resources are shared and limited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run the "&lt;STRONG&gt;show resource usage system counter all 0&lt;/STRONG&gt;" to determine how the resources are being distributed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;---It seems that the attack is coming from DMZ going to a public IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, that's bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the information the ASA is providing you with and track the host down, analyze it and solve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;----You want to know how to configure the ASA in order to block the attack.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat detection is a global feature, meaning it scans and can even affect the traffic is classifies as malicious.&lt;/P&gt;&lt;P&gt;If the source of the attack has been identified, proceed with a sanitation of the unit/units.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can block the traffic from those units using different methods.&amp;nbsp; ACLs and shuns are some of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have an IPS [i believe that you are refering to the ip-audit feature, but anyway] you can create check its configuration and modify it in order to stop the attack while you attack the root cause.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Mar 2013 21:08:05 GMT</pubDate>
    <dc:creator>jocamare</dc:creator>
    <dc:date>2013-03-11T21:08:05Z</dc:date>
    <item>
      <title>ASA firewalls,basic IPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188854#M360435</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;need bit of guidance i have asa 5505 with software 8.2....when i log in via asdm it shows loads of scanning attacks and few syn...i have enabled threat detection&amp;nbsp; basic and scanning i have also enabled ip audit attack and info.....lil concerned about attacks when i do show threat detection statistic top tcp&lt;/P&gt;&lt;P&gt;it shows public ip&amp;nbsp; then source ip which is my dmz server ip address ....this commands show top ten server under attack...does this comand shows server which are under attack or servers which were attacked but the attcak was thwarted....also i can no longer see cpu util and memory stats on asdm....i see errror signal 11 caught in process fiber unicorn admin handler....can any one advise how i can thwart these errors as i h ave enabled shun with scanning threat its just i see my dmz server as attacker is lil concerning....many thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188854#M360435</guid>
      <dc:creator>farooq_0923@hotmail.com</dc:creator>
      <dc:date>2019-03-12T01:12:45Z</dc:date>
    </item>
    <item>
      <title>ASA firewalls,basic IPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188855#M360436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check for these logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;%ASA-4-733104&lt;/STRONG&gt; and/or &lt;STRONG&gt;%ASA-4-733105&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;%ASA-4-733104&lt;/STRONG&gt; and &lt;STRONG&gt;%ASA-4-733105&lt;/STRONG&gt; lists the host targeted by the attack &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; that is currently being protected by TCP intercept. &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taken from:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bd3913.shtml#action4"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bd3913.shtml#action4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, what version of ASDM are you running on your unit?&lt;/P&gt;&lt;P&gt;In case you are not using the latest version, can you try to use it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 18:24:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188855#M360436</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-11T18:24:17Z</dc:date>
    </item>
    <item>
      <title>ASA firewalls,basic IPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188856#M360437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks jocamare, today was my first day with firewall and company doesnt have syslog enabled no server configured......iam using asdm 6.2....still coming up as connection lost for visual stats of cpu and memory and attacks showing lso generating logs resource asdm limit 5 reached not sure if basic ips attack and info config caused it but highly doubt it also can see from command line alof of free mem and 10 percent cpu utilization....plus when i do show threat detetction scanning threat it shows me target as public ip address belong to service provider which provide us diff mpls network and source as server for default gateway server in dmz which is default gateway&amp;nbsp; for guest wiresless on dmz.......&lt;/P&gt;&lt;P&gt;wana know wt thwarts attcks ( scanning and syn) shown by dmz asdm...i have two interface with public ip one outside and one DMZ shall i apply below setting to DMZ too as all the attacks are coming from there ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have &lt;/P&gt;&lt;P&gt;basic threat detection&lt;/P&gt;&lt;P&gt;advance threat detection &lt;/P&gt;&lt;P&gt;scannning threat with shu host configured&lt;/P&gt;&lt;P&gt;ips with attck and info signature configured reset opion selceted and applied to outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 20:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188856#M360437</guid>
      <dc:creator>farooq_0923@hotmail.com</dc:creator>
      <dc:date>2013-03-11T20:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewalls,basic IPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188857#M360440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, had a tough time trying to understand that reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what i got.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;----There is no syslog server configured&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check the logs locally on the ASA, they should appear in there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;---You are using ASDM 6.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Update it to the latest version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;----You are getting this log: &lt;EM&gt;resource asdm limit 5 reached&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It means the ASA is running in multiple context mode and the resources are shared and limited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run the "&lt;STRONG&gt;show resource usage system counter all 0&lt;/STRONG&gt;" to determine how the resources are being distributed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;---It seems that the attack is coming from DMZ going to a public IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, that's bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the information the ASA is providing you with and track the host down, analyze it and solve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;----You want to know how to configure the ASA in order to block the attack.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat detection is a global feature, meaning it scans and can even affect the traffic is classifies as malicious.&lt;/P&gt;&lt;P&gt;If the source of the attack has been identified, proceed with a sanitation of the unit/units.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can block the traffic from those units using different methods.&amp;nbsp; ACLs and shuns are some of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have an IPS [i believe that you are refering to the ip-audit feature, but anyway] you can create check its configuration and modify it in order to stop the attack while you attack the root cause.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewalls-basic-ips/m-p/2188857#M360440</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-11T21:08:05Z</dc:date>
    </item>
  </channel>
</rss>

