<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Utilizing ASA 5510 SP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/utilizing-asa-5510-sp/m-p/926498#M419316</link>
    <description>&lt;P&gt;Hello, our organization is purchasing an ASA 5510 SP. One of the major goals of this device is to stop abusive crawlers/scrapers/dos attacks. Apart from looking up the user manual (which I'm in the process of doing) I'd like to know how exactly does this device detect the attack, and then how to administer this. Can someone point me in the right direction? Questions exist with this like 'how do we detect an attack', 'how do we become aware of an attack', 'how do we use the asa to either block or unblock ip's or abusive domains?'. I know this is generic but a quick up to speed is needed as we are getting this device really soon and need to hit the ground running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tia&lt;/P&gt;&lt;P&gt;Charles&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 10:53:47 GMT</pubDate>
    <dc:creator>netperception</dc:creator>
    <dc:date>2020-02-21T10:53:47Z</dc:date>
    <item>
      <title>Utilizing ASA 5510 SP</title>
      <link>https://community.cisco.com/t5/network-security/utilizing-asa-5510-sp/m-p/926498#M419316</link>
      <description>&lt;P&gt;Hello, our organization is purchasing an ASA 5510 SP. One of the major goals of this device is to stop abusive crawlers/scrapers/dos attacks. Apart from looking up the user manual (which I'm in the process of doing) I'd like to know how exactly does this device detect the attack, and then how to administer this. Can someone point me in the right direction? Questions exist with this like 'how do we detect an attack', 'how do we become aware of an attack', 'how do we use the asa to either block or unblock ip's or abusive domains?'. I know this is generic but a quick up to speed is needed as we are getting this device really soon and need to hit the ground running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tia&lt;/P&gt;&lt;P&gt;Charles&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 10:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/utilizing-asa-5510-sp/m-p/926498#M419316</guid>
      <dc:creator>netperception</dc:creator>
      <dc:date>2020-02-21T10:53:47Z</dc:date>
    </item>
    <item>
      <title>Re: Utilizing ASA 5510 SP</title>
      <link>https://community.cisco.com/t5/network-security/utilizing-asa-5510-sp/m-p/926499#M419317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Charles, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration guides are the best way to learn it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/ips/6.0/configuration/guide/idm/idmguide.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/ips/6.0/configuration/guide/idm/idmguide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring the ASA to inspect traffic-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/search/display?url=http%3A%2F%2Fwww.cisco.com%2Fen%2FUS%2Fproducts%2Fps6120%2Fproducts_configuration_example09186a00807335ca.shtml&amp;amp;pos=1&amp;amp;strqueryid=9&amp;amp;websessionid=BlqYTeNVkFOqGWqWQ9LZR1T" target="_blank"&gt;http://tools.cisco.com/search/display?url=http%3A%2F%2Fwww.cisco.com%2Fen%2FUS%2Fproducts%2Fps6120%2Fproducts_configuration_example09186a00807335ca.shtml&amp;amp;pos=1&amp;amp;strqueryid=9&amp;amp;websessionid=BlqYTeNVkFOqGWqWQ9LZR1T&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration Examples (ASA)-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/prod_configuration_examples_list.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/prod_configuration_examples_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Managing the AIP SSM-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/ssm.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/ssm.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope these help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jun 2008 16:12:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/utilizing-asa-5510-sp/m-p/926499#M419317</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2008-06-25T16:12:17Z</dc:date>
    </item>
  </channel>
</rss>

