<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Luke, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975800#M43569</link>
    <description>&lt;P&gt;Hi Luke,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1- yes there is a shun table.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use the &lt;/SPAN&gt;&lt;STRONG&gt;show threat-detection shun&lt;/STRONG&gt;&lt;SPAN&gt; command in order to view a full list of attackers that have been shunned by Threat Detection specifically. Use the &lt;/SPAN&gt;&lt;STRONG&gt;show shun&lt;/STRONG&gt;&lt;SPAN&gt;command in order to view the full list of all IPs that are actively being shunned by the ASA (including from sources other than Threat Detection).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ans 2- Yes packet is firstly checked for Shuns.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ans3,4 and 5-:- Answer is below&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;The shun command lets you block connections from an attacking host. All future connections from the source IP address are dropped and logged until the blocking function is removed manually or by the Cisco IPS sensor. The blocking function of the shun command is applied whether or not a connection with the specified host address is currently active.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1556794"&gt;&lt;/A&gt;If you specify the destination address, source and destination ports, and the protocol, then you drop the matching connection as well as placing a shun on all future connections from the source IP address; all future connections are shunned, not just those that match these specific connection parameters.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1556795"&gt;&lt;/A&gt;You can only have one &lt;B class="cBold"&gt;shun&lt;/B&gt; command per source IP address.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1556798"&gt;&lt;/A&gt;Because the &lt;B class="cBold"&gt;shun&lt;/B&gt; command is used to block attacks dynamically, it is not displayed in the ASA configuration.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1556800"&gt;&lt;/A&gt;Whenever an interface configuration is removed, all shuns that are attached to that interface are also removed. If you add a new interface or replace the same interface (using the same name), then you must add that interface to the IPS sensor if you want the IPS sensor to monitor that interface.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Dubey,Shivam&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 10 Oct 2016 04:48:41 GMT</pubDate>
    <dc:creator>shivdube</dc:creator>
    <dc:date>2016-10-10T04:48:41Z</dc:date>
    <item>
      <title>Threat Detection - Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975798#M43566</link>
      <description>&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Afternoon,&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;I am trying to understand how the threat detection feature shuns attackers. From my understanding, taking in to consideration the line of configuration below, if a host were to send 45 SYNs in 1 second then it would be logged as a threat and as a result&amp;nbsp;the host shunned - thus denying all further communication, regardless of whether it is legitimate or not.&lt;/SPAN&gt;&lt;/H6&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;threat-detection rate syn-attack rate-interval 600 average-rate 30 burst-rate 45&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/PRE&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Taking this example in to consideration, I have a few questions.&lt;/SPAN&gt;&lt;/H6&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Is this shun entry stored in some kind of shun table?&lt;/SPAN&gt;&lt;/H6&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;In what&amp;nbsp;order is the packet processed&amp;nbsp;upon arrival? Is it checked&amp;nbsp;against&amp;nbsp;existing shuns before it hits ACL, NAT, and so on?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Does this shun entry have a timeout or lifetime, where after a certain period of time the shun is revoked?&lt;/SPAN&gt;&lt;/H6&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Are shuns cleared with a reload, or do they persist until some means of manual clearing?&lt;/SPAN&gt;&lt;/H6&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Disregarding all the above questions - do shuns just exist for the single SYN that hits the burst-rate, or will they apply to all further communication attempted from that source address and port?&lt;/SPAN&gt;&lt;/H6&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H6&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Thank you in advance for your help.&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Regards,&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Luke&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;SPAN itemprop="author"&gt;Please rate helpful posts and mark correct answers.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975798#M43566</guid>
      <dc:creator>Luke Oxley</dc:creator>
      <dc:date>2019-03-10T13:41:11Z</dc:date>
    </item>
    <item>
      <title>Luke,</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975799#M43568</link>
      <description>&lt;P&gt;Luke,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please review this document and if still you have doubt, let me know :&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2016 03:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975799#M43568</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2016-10-10T03:30:54Z</dc:date>
    </item>
    <item>
      <title>Hi Luke,</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975800#M43569</link>
      <description>&lt;P&gt;Hi Luke,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1- yes there is a shun table.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use the &lt;/SPAN&gt;&lt;STRONG&gt;show threat-detection shun&lt;/STRONG&gt;&lt;SPAN&gt; command in order to view a full list of attackers that have been shunned by Threat Detection specifically. Use the &lt;/SPAN&gt;&lt;STRONG&gt;show shun&lt;/STRONG&gt;&lt;SPAN&gt;command in order to view the full list of all IPs that are actively being shunned by the ASA (including from sources other than Threat Detection).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ans 2- Yes packet is firstly checked for Shuns.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ans3,4 and 5-:- Answer is below&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;The shun command lets you block connections from an attacking host. All future connections from the source IP address are dropped and logged until the blocking function is removed manually or by the Cisco IPS sensor. The blocking function of the shun command is applied whether or not a connection with the specified host address is currently active.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1556794"&gt;&lt;/A&gt;If you specify the destination address, source and destination ports, and the protocol, then you drop the matching connection as well as placing a shun on all future connections from the source IP address; all future connections are shunned, not just those that match these specific connection parameters.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1556795"&gt;&lt;/A&gt;You can only have one &lt;B class="cBold"&gt;shun&lt;/B&gt; command per source IP address.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1556798"&gt;&lt;/A&gt;Because the &lt;B class="cBold"&gt;shun&lt;/B&gt; command is used to block attacks dynamically, it is not displayed in the ASA configuration.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1556800"&gt;&lt;/A&gt;Whenever an interface configuration is removed, all shuns that are attached to that interface are also removed. If you add a new interface or replace the same interface (using the same name), then you must add that interface to the IPS sensor if you want the IPS sensor to monitor that interface.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Dubey,Shivam&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2016 04:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975800#M43569</guid>
      <dc:creator>shivdube</dc:creator>
      <dc:date>2016-10-10T04:48:41Z</dc:date>
    </item>
    <item>
      <title>@Pulkit Saxena and @shivdube,</title>
      <link>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975801#M43570</link>
      <description>&lt;H6&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;A href="https://supportforums.cisco.com/users/pusaxena"&gt;pusaxena&lt;/A&gt; and &lt;A href="https://supportforums.cisco.com/users/shivdube"&gt;shivdube&lt;/A&gt;,&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Thank you both very much for your help.&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Kind regards,&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Luke Oxely&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Please rate helpful posts and mark correct answers.&lt;/SPAN&gt;&lt;/H6&gt;</description>
      <pubDate>Mon, 10 Oct 2016 14:35:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-detection-cisco-asa/m-p/2975801#M43570</guid>
      <dc:creator>Luke Oxley</dc:creator>
      <dc:date>2016-10-10T14:35:34Z</dc:date>
    </item>
  </channel>
</rss>

