<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Correct connection limits on asa 5510 for LAN behind in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970463#M440185</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for provided information!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 31 Jul 2012 09:43:09 GMT</pubDate>
    <dc:creator>mirage__SK</dc:creator>
    <dc:date>2012-07-31T09:43:09Z</dc:date>
    <item>
      <title>Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970454#M440174</link>
      <description>&lt;P&gt;Dear All!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to configure connection limitis for LAN behind asa. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What quantity I must use&amp;nbsp; :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;per client&lt;/P&gt;&lt;P&gt; per client embrionic &lt;/P&gt;&lt;P&gt;totally Per client&lt;/P&gt;&lt;P&gt;per client embrionic&lt;/P&gt;&lt;P&gt;(For which interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To providing them internet access (http, https, pop3, pop3s, smtp, smtps), and protect internet channel from overloading?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970454#M440174</guid>
      <dc:creator>mirage__SK</dc:creator>
      <dc:date>2019-03-11T23:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970455#M440175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I need parameters for following optios:&lt;/P&gt;&lt;P&gt;(now they are unlimited)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maximum TCP and UDP connection&lt;/P&gt;&lt;P&gt;Maximum embrionic connections&lt;/P&gt;&lt;P&gt;Maximum per client connections&lt;/P&gt;&lt;P&gt;Maximum per client embrionic connectios&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 09:18:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970455#M440175</guid>
      <dc:creator>mirage__SK</dc:creator>
      <dc:date>2012-07-02T09:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970456#M440176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;To meet your requirements, you'll need to configure QOS (TCP-MAPS), coupled with MPF. Here's a sample &lt;A href="http://www.networkstraining.com/configuring-connection-limits-on-cisco-asa-firewalls-protect-from-dos/" rel="nofollow"&gt;http://www.networkstraining.com/configuring-connection-limits-on-cisco-asa-firewalls-protect-from-dos/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2012 19:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970456#M440176</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-28T19:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970457#M440177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am interesting, which values are optimal for these parameters( which are correct quantities). For example I use the following(see below), are they correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection rate dos-drop rate-interval 600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate dos-drop rate-interval 3600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate bad-packet-drop rate-interval 600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate bad-packet-drop rate-interval 3600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate acl-drop rate-interval 600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate acl-drop rate-interval 3600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate conn-limit-drop rate-interval 600 average-rate 3 burst-rate 3&lt;/P&gt;&lt;P&gt;threat-detection rate conn-limit-drop rate-interval 3600 average-rate 3 burst-rate 3&lt;/P&gt;&lt;P&gt;threat-detection rate icmp-drop rate-interval 600 average-rate 100 burst-rate 400&lt;/P&gt;&lt;P&gt;threat-detection rate icmp-drop rate-interval 3600 average-rate 80 burst-rate 320&lt;/P&gt;&lt;P&gt;threat-detection rate scanning-threat rate-interval 600 average-rate 3 burst-rate 3&lt;/P&gt;&lt;P&gt;threat-detection rate scanning-threat rate-interval 3600 average-rate 3 burst-rate 3&lt;/P&gt;&lt;P&gt;threat-detection rate syn-attack rate-interval 600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate syn-attack rate-interval 3600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate fw-drop rate-interval 600 average-rate 400 burst-rate 1600&lt;/P&gt;&lt;P&gt;threat-detection rate fw-drop rate-interval 3600 average-rate 320 burst-rate 1280&lt;/P&gt;&lt;P&gt;threat-detection rate inspect-drop rate-interval 600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate inspect-drop rate-interval 3600 average-rate 2 burst-rate 2&lt;/P&gt;&lt;P&gt;threat-detection rate interface-drop rate-interval 600 average-rate 2000 burst-rate 8000&lt;/P&gt;&lt;P&gt;threat-detection rate interface-drop rate-interval 3600 average-rate 1600 burst-rate 6400&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address xx.xx.xx.xx 255.255.255.240&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address xx.xx.xx.xx 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun duration 1800&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics host number-of-rate 2&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 15 burst-rate 30 average-rate 30&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun duration 1800&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics host number-of-rate 2&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 15 burst-rate 30 average-rate 30&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 06:29:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970457#M440177</guid>
      <dc:creator>mirage__SK</dc:creator>
      <dc:date>2012-07-30T06:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970458#M440178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Having threat-detection is great, but you need to know the best values for your environment. Customizing each values is good, if you know what are the good values for your environment but as for me, I opt to remain with the default values. Hence, in most of my deployments here's a sample of what I normally do, and that's it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW01# show run threat-detection&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 172.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 08:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970458#M440178</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-30T08:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970459#M440179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Ramraj, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I calculate best values for my environment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have used default values, but botnet DDos attack downed my servers, I have received large TCP SYN packets from&amp;nbsp; many hosts, and Appliance does not shun them, so I desided do re-configure my asa 5510 for strict protection and enter these values, which you can see above&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;Also I create tcp normalization map with following options: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP CHECK RETRANSMISSION&lt;/P&gt;&lt;P&gt;CLEAR URGENT FLAG&lt;/P&gt;&lt;P&gt;PAST-WINDOW SEQUENCE DROP&lt;/P&gt;&lt;P&gt;DROP SYN WITH DATA&lt;/P&gt;&lt;P&gt;VERIFY TCP CHECKSUM&lt;/P&gt;&lt;P&gt;SYNACK DATA DROP&lt;/P&gt;&lt;P&gt;INVLAID ACK DROP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I displayed my config, maybe I have mistake somwhere and want to know what more parameters I can configure for TCP and UDP flood proection (if yes, pease, give me a litte example)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S. I do not have any advenced security module on asa, only SEC PLUS licence.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 08:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970459#M440179</guid>
      <dc:creator>mirage__SK</dc:creator>
      <dc:date>2012-07-30T08:57:19Z</dc:date>
    </item>
    <item>
      <title>Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970460#M440180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Did you follow the URL link i gave you, as shown below&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;STEP1: Identify the traffic to apply connection limits using a class map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# access list CONNS-ACL extended permit ip any 10.1.1.1 255.255.255.255&lt;BR /&gt;ASA(config)# class-map CONNS-MAP&lt;BR /&gt;ASA(config-cmap)# match access-list CONNS-ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;STEP2: Add a policy map to set the actions to take on the class map traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# policy-map CONNS-POLICY&lt;BR /&gt;ASA(config-pmap)# class CONNS-MAP&lt;BR /&gt;&lt;EM&gt;! The following sets connection number limits&lt;/EM&gt;&lt;BR /&gt;ASA(config-pmap-c)# set connection {[conn-max n] [embryonic-conn-max n]&lt;BR /&gt;[per-client-embryonic-max n] [per-client-max n] [random-sequence-number {enable | disable}]}&lt;/P&gt;&lt;P&gt;where the &lt;STRONG&gt;conn-max&lt;/STRONG&gt; n argument sets the maximum number of simultaneous TCP and/or UDP connections that are allowed, between 0 and 65535. &lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;embryonic-conn-max&lt;/STRONG&gt; n argument sets the maximum number of simultaneous embryonic connections allowed, between 0 and 65535. &lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;per-client-embryonic-max&lt;/STRONG&gt; n argument sets the maximum number of simultaneous embryonic connections allowed per client, between 0 and 65535. &lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;per-client-max&lt;/STRONG&gt; n argument sets the maximum number of simultaneous connections allowed per client, between 0 and 65535.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;! The following sets connection timeouts&lt;/EM&gt;&lt;BR /&gt;ASA(config-pmap-c)# set connection timeout {[embryonic hh:mm:ss] {tcp hh:mm:ss&lt;BR /&gt;[reset]] [half-closed hh:mm:ss] [dcd hh:mm:ss [max_retries]]}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;STEP3: Apply the Policy on one or more interfaces or Globaly&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# service-policy CONNS-POLICY {global | interface interface_name}&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 10:21:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970460#M440180</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-30T10:21:32Z</dc:date>
    </item>
    <item>
      <title>Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970461#M440181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Ramraj, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question about calculation method of correct values for following parameters:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config-pmap-c)# set connection {[conn-max n] [embryonic-conn-max n]&lt;/P&gt;&lt;P&gt;[per-client-embryonic-max n] [per-client-max n] [random-sequence-number {enable | disable}]}&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config-pmap-c)# set connection {[conn-max n] [embryonic-conn-max n]&lt;/P&gt;&lt;P&gt;[per-client-embryonic-max n] [per-client-max n] [random-sequence-number {enable | disable}]}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; between 0 and 65535&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is a wery big range... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell me about recommended values per host for connections and embrionic connections quantities ?&lt;/P&gt;&lt;P&gt;or give me link, how can I calculate them in range between 0 and 65535&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 12:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970461#M440181</guid>
      <dc:creator>mirage__SK</dc:creator>
      <dc:date>2012-07-30T12:24:12Z</dc:date>
    </item>
    <item>
      <title>Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970462#M440184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;I don’t think Cisco has a guide on the best values possible with regards to this matter. These values are very subjective from one environment to another.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco’s default values are clearly seen in all Cisco AS FW, a sample as shown below;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if you want to tune it for a particular source / destination, TCP MAPS is the right way to go. I can’t provide you any more information than I have already provided. This is the best I can do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For further details, please kindly refer to this Cisco document &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/conns_connlimits.html#wp1080734"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/conns_connlimits.html#wp1080734&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 18:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970462#M440184</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-30T18:29:56Z</dc:date>
    </item>
    <item>
      <title>Correct connection limits on asa 5510 for LAN behind</title>
      <link>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970463#M440185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for provided information!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 09:43:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/correct-connection-limits-on-asa-5510-for-lan-behind/m-p/1970463#M440185</guid>
      <dc:creator>mirage__SK</dc:creator>
      <dc:date>2012-07-31T09:43:09Z</dc:date>
    </item>
  </channel>
</rss>

