<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ask the Expert: Mitigating Network Attacks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007427#M435146</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I have a small doubt about telnet, am not sure if this is the right forum to post this query.&lt;/P&gt;&lt;P&gt;I wanted to know if we can use telnet on a non standard port, lets say 6189. I wanted to configure this on a cisco router. May I know the commands to do this&lt;/P&gt;&lt;P&gt;I have used PAT and port-map to do this.&lt;/P&gt;&lt;P&gt;Is there any other way to achieve this?&lt;/P&gt;&lt;P&gt;Plz help. Thanks in advance.......&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Dec 2012 17:28:17 GMT</pubDate>
    <dc:creator>philips_006</dc:creator>
    <dc:date>2012-12-13T17:28:17Z</dc:date>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007403#M435120</link>
      <description>&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/9/9/5998-kusankar.jpg" align="left" alt="Read the bio" border="0" hspace="10" style="padding-right: 10px; padding-bottom: 10px;" width="90" /&gt;&lt;STRONG&gt;With Kureli Sankar&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn from Cisco expert Kureli Sankar how to identify and mitigate network attacks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kureli Sankar is an engineer supporting Cisco's firewall team in Research Triangle Park, North Carolina. Her team supports the Cisco Adaptive Security Appliance, Firewall Services Module, Cisco Security Manager, the Content Security and Control module, and the Zone Based Firewall module in Cisco IOS Software. Prior to joining Cisco, Sankar worked for the John Morrell Co., where she was the network administrator in charge of the company's enterprise network covering 27 locations in the United States. She also was an adjunct professor at the University of Cincinnati, teaching undergraduate level networking courses. Sankar holds an engineering degree in electrical and electronic engineering from Regional Engineering College, Trichirappalli, India, and holds CCSP and CCIE Security #35505 certifications. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to use the rating system to let Kureli know if you have received an adequate response.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kureli might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Security sub-community &lt;A __default_attr="2024" __jive_macro_name="community" _modifiedtitle="Firewalling" class="jive_macro jive_macro_community" modifiedtitle="Firewalling" title="Firewalling" target="_blank"&gt;&lt;/A&gt; discussion forum shortly after the event. &lt;STRONG&gt;This event lasts through June 15, 2012.&lt;/STRONG&gt; Visit this forum often to view responses to your questions and the questions of other community members. &lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007403#M435120</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2019-03-11T23:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007404#M435121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana, geneva;"&gt;&lt;STRONG&gt;apart from using the SSM, is there any other way I could prevent nmaps on my asa wan interface??&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jun 2012 12:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007404#M435121</guid>
      <dc:creator>mikull.kiznozki</dc:creator>
      <dc:date>2012-06-02T12:38:52Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007405#M435122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mikull,&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/1/5/90515-packet-processing.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are asking about the IPS module, the packet may not even reach the module, depending on the other checks it has to go through. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless you have other devices in the perimeter to detect these sort of attacks, the ASA will simply drop these packets when they arrive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2012 15:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007405#M435122</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2012-06-03T15:03:54Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007406#M435123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kureli did an excellent job summarizing this. I would like to add some notes/thoughts. There are several ways that you can protect against scanners on the Cisco ASA (this includes protection against nmap scan and others). Some types of active scans depend on logical network location and will not work though a firewall / IPS depending on your configuration. First you can protect against spoofed scans by usint the Unicast Reverse Path Forwarding (uRPF) feature on the outside interface. Unicast RPF protects against IP spoofing by making sure that all packets have a source IP address that matches the correct source interface according to the routing table.&lt;/P&gt;&lt;P&gt;You can also configure the Scanning Threat Detection on the Cisco ASA. The following link includes information on how to protect against scanning attacks using Thread Detection:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/protect_threat.html#wp1072953"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/protect_threat.html#wp1072953&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In some cases with network scanners, the first TCP packet may not even be a SYN packet, or the TCP connection failed the 3-way handshake. Full scanning threat detection takes this into consideration and acts on it by classifying hosts as attackers and automatically shunning them. In most cases, scanners create incomplete sessions and as such they sometimes are already blocked by TCP SYN attack protection and enbryonic protection limits. Now, one thing to highlight is that vulnerability scanning traffic can stress network equipment and may flood links. In some cases, you should block this traffic upstream to even avoid this traffic to enter your network link. There are several service providers that provide this protection to their customers by using the Clean Pipes solution. Clean Pipes allows service providers to offer pervasive DDoS mitigation services on a subscription basis or on-demand. These services provide customers with DDoS protection within the provider cloud, preserving network bandwidth and ensuring the availability of applications and services. Arbor has some information on how the Cisco/Arbor Clean Pipes 2.0 solution works:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.arbornetworks.com/clean-pipes-2-0-a-complete-ddos-defense-solution.html"&gt;http://www.arbornetworks.com/clean-pipes-2-0-a-complete-ddos-defense-solution.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 03:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007406#M435123</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2012-06-04T03:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007407#M435124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Omar.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mikull,&lt;/P&gt;&lt;P&gt;Pls. keep this link handy.&amp;nbsp; Has the details that Omar mentioned above. I thought I included the link in my response but, missed it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; How to identify and mitigate network attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A class="active_link" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml" rel="nofollow"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as what Omar is talking about which is to block the attack traffic from even entering your network, you got to read this very very very interesting white paper on RTBH (Remotely Triggered Black Hole).&amp;nbsp; The explains the setup that major ISP have already in place. All you need to do is to provide them with the source IP address or destination IP address and they will route that traffic to NULL thus black holing &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/web/about/security/intelligence/blackhole.pdf" rel="nofollow"&gt;http://www.cisco.com/web/about/security/intelligence/blackhole.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 11:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007407#M435124</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2012-06-04T11:56:17Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007408#M435125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kureli,&lt;/P&gt;&lt;P&gt;I have a quick question for you. What is the easiest way to identify a DoS attack and the best way to restore and prevent these type of attacks on a wireless network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 17:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007408#M435125</guid>
      <dc:creator>John Ventura</dc:creator>
      <dc:date>2012-06-08T17:01:32Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007409#M435126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks heaps both! I just need to fine tune my threat detection configs on my asa.&lt;/P&gt;&lt;P&gt;That whitepaper is a scorcher!! &lt;/P&gt;&lt;P&gt;time to null0 all those unwanted chinese and taiwanese traffic! lol &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 02:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007409#M435126</guid>
      <dc:creator>mikull.kiznozki</dc:creator>
      <dc:date>2012-06-09T02:25:31Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007410#M435127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, it depends on the attack.&amp;nbsp; Most of them spike the CPU of the box and the unit will start dropping packets. You will notice heavy bandwidth unitlization is this is an internet facing device. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. If you have NetFlow enabled it might be able to show you the spike in traffic and the sources that are responsible for this. &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/prod_white_paper0900aecd80406232.html"&gt;http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/prod_white_paper0900aecd80406232.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Source track is another method: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/ipst.html#wp1015331"&gt;http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/ipst.html#wp1015331&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Use categorization acl to see what kind of traffic is overwhelming the device and from where:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080149ad6.shtml"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080149ad6.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Follow RFC 2827:&lt;/P&gt;&lt;P&gt;1. Only allow traffic sourced from your network address space to leave the outside interface.&lt;/P&gt;&lt;P&gt;2. Do not allow your network address space from sourcing a packet from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801afc76.shtml"&gt;http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801afc76.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; You need to try to do everything possible so, the firewall will not see this attack traffic.&amp;nbsp; Block it at the upstream L-3 device or reach out to the ISP and have them block the traffic at their end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Read the links that we have included in the previous responses as well.&amp;nbsp; All of them are worth book marking. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For wireless as well as wired networks, most of the companies and schools do, some sort of content filtering to stop them from getting infected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2012 16:02:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007410#M435127</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2012-06-10T16:02:52Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007411#M435128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kureli,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to we detect and stop any network scan activities (using nmap or any other tools) automatically using cisco IPS and firewalls.(or any other security devices)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any default signatures what detect those types of scans or do we need to configure some custom signatures to detect such activties..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2012 21:23:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007411#M435128</guid>
      <dc:creator>pemasirid</dc:creator>
      <dc:date>2012-06-10T21:23:05Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007412#M435129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pemasirid,&lt;/P&gt;&lt;P&gt;Like Omar mentioned above you could use TD (Threat Detection) on the ASA: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/protect_threat.html#wp1096812"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/protect_threat.html#wp1096812&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the IPS, as you can see here: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/search.x?currentPage=&amp;amp;itemsPerPage=15&amp;amp;toggle=2&amp;amp;search=Signature&amp;amp;keyWords=nmap&amp;amp;selectedCriteria=O&amp;amp;date1=&amp;amp;date2=&amp;amp;severity=1+-+5&amp;amp;urgency=1+-+5&amp;amp;sigDate1=&amp;amp;sigDate2=&amp;amp;alarmSeverity=All&amp;amp;release="&gt;http://tools.cisco.com/security/center/search.x?currentPage=&amp;amp;itemsPerPage=15&amp;amp;toggle=2&amp;amp;search=Signature&amp;amp;keyWords=nmap&amp;amp;selectedCriteria=O&amp;amp;date1=&amp;amp;date2=&amp;amp;severity=1+-+5&amp;amp;urgency=1+-+5&amp;amp;sigDate1=&amp;amp;sigDate2=&amp;amp;alarmSeverity=All&amp;amp;release=&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" id="searchresults" style="font-family: Arial,Helvetica,sans-serif; font-size: 12px; color: #333333; line-height: 14px; background-color: #ffffff; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-transform: none; white-space: normal; widows: 2;" summary="Search Results" width="710"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;3002/0&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left;"&gt;&lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=3002&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S630" style="text-decoration: none; color: #2970a6; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;TCP SYN Port Sweep&lt;/A&gt;&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;March 07, 2012&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;Low&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;S630&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;5725/0&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left;"&gt;&lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=5725&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S624" style="text-decoration: none; color: #2970a6; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;Novell NMAP Agent Buffer Overflow&lt;/A&gt;&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;February 09, 2012&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;High&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;S624&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;4062/0&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left;"&gt;&lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=4062&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S591" style="text-decoration: none; color: #2970a6; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;Cisco CSS 11000 Malformed UDP DoS&lt;/A&gt;&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;August 26, 2011&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;Medium&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;S591&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;4001/0&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left;"&gt;&lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=4001&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S573" style="text-decoration: none; color: #2970a6; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;UDP Port Sweep&lt;/A&gt;&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;June 13, 2011&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;High&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;S573&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;4003/0&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left;"&gt;&lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=4003&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S423" style="text-decoration: none; color: #2970a6; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;Nmap UDP Port Sweep&lt;/A&gt;&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;August 06, 2009&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;High&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;S423&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;3003/0&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left;"&gt;&lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=3003&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S388" style="text-decoration: none; color: #2970a6; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;TCP Frag SYN Port Sweep&lt;/A&gt;&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;March 26, 2009&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;High&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom: 1px solid #f0f1f2; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;S388&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-bottom-style: none; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;3046/0&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom-style: none; vertical-align: top; text-align: left;"&gt;&lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=3046&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S3" style="text-decoration: none; color: #2970a6; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;NMAP OS Fingerprint&lt;/A&gt;&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom-style: none; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;May 01, 2001&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom-style: none; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;Medium&lt;/TD&gt;&lt;TD style="padding: 5px; border-bottom-style: none; vertical-align: top; text-align: left; font-family: arial,helvetica,clean,sans-serif; font-size: 11px;"&gt;S3&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3002, 4001, 4003, 3003 and 3046 are the ones that you would want to enable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 20:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007412#M435129</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2012-06-12T20:40:36Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007413#M435130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kureli,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your response on my post, this will be really in handy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In fact we were asked by one of our clients that they did network scan but they failed to find that activity on their security devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pemasiri&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 08:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007413#M435130</guid>
      <dc:creator>pemasirid</dc:creator>
      <dc:date>2012-06-13T08:30:06Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007414#M435131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kureli,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have few questions about ASA threat detection and DOS attack prevention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.Can we use class-maps or route-maps on the ASA to dynamically learn an IP adress that sends more than certain number of HTTP requests/sec and block that IP for certain time period?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.We have basic threat detection enabled on our ASA and getting a lot of SCAN threshold exceeded alerts, is it possible to find out which hosts are exceeding the thresholds without shunning them?--TAC said only way to find out the hosts is to shun them, then only they will show up in ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;164&amp;gt;Jun 13 2012 13:09:05: %ASA-4-733100: [ Scanning] drop rate-1&amp;nbsp; exceeded. Current burst rate is 12 per second, max configured rate is&amp;nbsp; 10; Current average rate is 15 per second, max configured rate is 5;&amp;nbsp; Cumulative total count is 9083&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 18:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007414#M435131</guid>
      <dc:creator>siddhartham</dc:creator>
      <dc:date>2012-06-13T18:14:45Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007415#M435132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi was wondering if there were any syslogs messages for DOS attacks?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 21:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007415#M435132</guid>
      <dc:creator>John Peterson</dc:creator>
      <dc:date>2012-06-13T21:15:28Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007416#M435133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Every packet that the ASA sees will be logged. It depends on what level of logging is configured and what feature logging you expect and what kind of attack it is. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the syslog guide link: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/system/message/logsevp.html#wp1009233"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/system/message/logsevp.html#wp1009233&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the Thread Detection Feature link:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/protect_threat.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/protect_threat.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look for "syslog" in that above link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the packets are dropped due to asp drop then you can see them when you issue "sh asp drop" after a "clear asp drop"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is command reference for that: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/s2.html#wp1471978"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/s2.html#wp1471978&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 02:51:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007416#M435133</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2012-06-15T02:51:31Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007417#M435134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Siddhartham,&lt;/P&gt;&lt;P&gt;1. What you can do is say for example you have a webserver behind the ASA, you can configure acl/class-map and set connection &lt;/P&gt;&lt;P&gt;per-client-max and &lt;/P&gt;&lt;P&gt;per-client-embryonic-max&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for that particular class.&amp;nbsp; What you are asking is possible with the IDS device.&amp;nbsp; With the ASA you can limit as to how many connections each host can establish with a server that the ASA is protecting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer this link: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/s1.html#wp1447178"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/s1.html#wp1447178&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Check this command out will show you about the scanning host: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/s7.html#wp1330552"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/s7.html#wp1330552&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 1px 0em 6px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;The following is sample output from the &lt;STRONG&gt;show threat-detection scanning-threat &lt;/STRONG&gt;command:&lt;/P&gt;&lt;P&gt;&lt;A name="wp1330643" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;hostname# &lt;STRONG&gt;show threat-detection scanning-threat
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330645" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;Latest Target Host &amp;amp; Subnet List:
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330646" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330647" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.249
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330648" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp; Latest Attacker Host &amp;amp; Subnet List:
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330649" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.234
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330650" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.0
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330651" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.2
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330652" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.3
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330653" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.4
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330654" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.5
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330655" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.6
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330656" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.7
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330657" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.8
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1330658" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.9&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 03:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007417#M435134</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2012-06-15T03:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007418#M435135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kureli,&lt;/P&gt;&lt;P&gt;on my ASA, I can see this output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;ASA5520# sh threat-detection rate scanning-threat &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Average(eps)&amp;nbsp;&amp;nbsp;&amp;nbsp; Current(eps) Trigger&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total events&lt;BR /&gt;&amp;nbsp; 10-min&amp;nbsp; Scanning:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 90&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 964&lt;BR /&gt;&amp;nbsp; 1-hour&amp;nbsp; Scanning:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 21&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5303&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but with this, I can't see anything: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5520# sh threat-detection scanning-threat target &lt;BR /&gt;Latest Target Host &amp;amp; Subnet List:&lt;BR /&gt;ASA5520# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5520# sh threat-detection scanning-threat attacker &lt;BR /&gt;Latest Attacker Host &amp;amp; Subnet List:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How I can see the address of attackers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 08:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007418#M435135</guid>
      <dc:creator>emilio1973</dc:creator>
      <dc:date>2012-06-15T08:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007419#M435136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its the same thing for my case also, I don't see anything with sh threat-detection scanning-threat attacker command but we are getting around 10 syslog messages every min saying the thresholds are exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA/pri/act# sh threat-detection rate scanning-threat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Average(eps)&amp;nbsp;&amp;nbsp;&amp;nbsp; Current(eps) Trigger&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total events&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10-min&amp;nbsp; Scanning:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp; 22170&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2323&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1-hour&amp;nbsp; Scanning:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp; 5362&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12814&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA/pri/act# sh threat-detection scanning-threat attacker&lt;/P&gt;&lt;P&gt;ASA/pri/act#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 13:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007419#M435136</guid>
      <dc:creator>siddhartham</dc:creator>
      <dc:date>2012-06-15T13:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007420#M435137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The command is "&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;show threat-detection scanning-threat" &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;not &lt;STRONG&gt;"show threat-detection&lt;EM style="text-decoration: underline;"&gt; rate&lt;/EM&gt; scanning-threat"&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="color: #2f6681;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; You can also try the following:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/protect_threat.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/protect_threat.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;hostname# &lt;STRONG&gt;show threat-detection statistics host
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;DIV style="color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px; margin: -0.55em 0em; background-color: #ffffff;"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Average(eps)&amp;nbsp;&amp;nbsp;&amp;nbsp; Current(eps) Trigger&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total events
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px;"&gt;Host:10.0.0.1: tot-ses:289235 act-ses:22571 fw-drop:0 insp-drop:0 null-ses:21438 bad-acc:0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px;"&gt;&amp;nbsp; 1-hour Sent byte:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2938&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10580308&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: 'Courier New', Courier, mono; font-size: 10px;"&gt;hour Sent byte:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 367&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10580308&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt; 24-hour Sent byte:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 122&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10580308&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; -Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 17:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007420#M435137</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2012-06-15T17:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007421#M435138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Yes I tried "&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;show threat-detection scanning-threat" &lt;/STRONG&gt;but it didn't produce any output&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;ASA/pri/act# show threat-detection scanning-threat&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;ASA/pri/act#&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 17:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007421#M435138</guid>
      <dc:creator>siddhartham</dc:creator>
      <dc:date>2012-06-15T17:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Mitigating Network Attacks</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007422#M435139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Siddhartham,&lt;/P&gt;&lt;P&gt;Today is the last day of this ATE event.&amp;nbsp; I am not sure if I can get to the bottom of this. Would you mind opening a TAC case so, we can take a look at it. Feel free to mention my name on the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. copy and paste the "sh run threat" output from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be there aren't any scanning threats at the moment.&amp;nbsp; If the rate exceeded syslog is seen then, you probably have to tweek the settings and increase &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="color: #000000; text-align: -webkit-auto; font-size: 12px; white-space: pre-wrap; word-wrap: break-word;"&gt;Issue "show run all threat-detection".
The number of triggers of different thresholds can be checked in "show
threat-detection rate".

Syslog 733100 is related to scanning-rate, adjusting this parameter should be
able to resolve too many messages showing up in the syslogs.

In this case, tuning the command "threat-detection rate scanning-rate 3600
average-rate 15" stopped too many of these messages being logged. In other
cases one may have to increase the scanning-rate and average-rate to a higher
value.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 18:09:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-mitigating-network-attacks/m-p/2007422#M435139</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2012-06-15T18:09:50Z</dc:date>
    </item>
  </channel>
</rss>

