<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It appears this is till not in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906504#M457006</link>
    <description>&lt;P&gt;It appears this is till not supported. It strikes me that this is exactly the kind of thing that you want to be able to track using SNMP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Come on Cisco!&lt;/P&gt;</description>
    <pubDate>Mon, 05 May 2014 13:58:23 GMT</pubDate>
    <dc:creator>Tormod Macleod</dc:creator>
    <dc:date>2014-05-05T13:58:23Z</dc:date>
    <item>
      <title>Monitoring threat-detection statistics on ASA 8.3</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906500#M456992</link>
      <description>&lt;P&gt;Hello all,&amp;nbsp; I am interested in gathering cumulative threat-detection statistics from an ASA running 8.3, and displaying number of attacks over time.&lt;/P&gt;&lt;P&gt;I am already capturing traffic information via netflow, but am interested in getting threat information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to capture the statistics via SNMP or any other method?&lt;/P&gt;&lt;P&gt;Has anyone attempted to gather such statistics?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Dmitry.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906500#M456992</guid>
      <dc:creator>dtochilovsky</dc:creator>
      <dc:date>2019-03-11T22:54:22Z</dc:date>
    </item>
    <item>
      <title>Monitoring threat-detection statistics on ASA 8.3</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906501#M456993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dmitry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to search on it and as of now there is no MIB support for threat-detection on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2012 12:15:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906501#M456993</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-04-17T12:15:03Z</dc:date>
    </item>
    <item>
      <title>Monitoring threat-detection statistics on ASA 8.3</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906502#M456997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Varun. That is what I figured. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did however found a workaround by monitoring syslog messages # 733100 - 733105. &lt;/P&gt;&lt;P&gt;That way I can get some statistics of how often the threat detection is active.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Got the info from this link : &lt;/P&gt;&lt;P&gt;&lt;A class="vt-p" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/protect_threat.html#wp1094068"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/protect_threat.html#wp1094068&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #336666; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif; "&gt;Information About Scanning Threat Detection&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;A class="vt-p" name="wp1065283" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin-bottom: 6px; margin-left: 0em; margin-right: 0em; margin-top: 1px; background-color: #ffffff;"&gt;&lt;EM&gt;A typical scanning attack consists of a host that tests the accessibility of every IP address in a subnet (by scanning through many hosts in the subnet or sweeping through many ports in a host or subnet). The scanning threat detection feature determines when a host is performing a scan. Unlike IPS scan detection that is based on traffic signatures, the adaptive security appliance scanning threat detection feature maintains an extensive database that contains host statistics that can be analyzed for scanning activity.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;A class="vt-p" name="wp1065517" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;A class="vt-p" name="wpmkr1076631" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin-bottom: 6px; margin-left: 0em; margin-right: 0em; margin-top: 1px; background-color: #ffffff;"&gt;&lt;EM&gt;The host database tracks suspicious activity such as connections with no return activity, access of closed service ports, vulnerable TCP behaviors such as non-random IPID, and many more behaviors.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;A class="vt-p" name="wp1065502" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin-bottom: 6px; margin-left: 0em; margin-right: 0em; margin-top: 1px; background-color: #ffffff;"&gt;&lt;EM&gt;If the scanning threat rate is exceeded, then the adaptive security appliance sends a syslog message (&lt;STRONG&gt;733101&lt;/STRONG&gt;), and optionally shuns the attacker. The adaptive security appliance tracks two types of rates: the average event rate over an interval, and the burst event rate over a shorter burst interval. The burst event rate is 1/30th of the average rate interval or 10 seconds, whichever is higher. For each event detected that is considered to be part of a scanning attack, the adaptive security appliance checks the average and burst rate limits. If either rate is exceeded for traffic sent from a host, then that host is considered to be an attacker. If either rate is exceeded for traffic received by a host, then that host is considered to be a target.&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-left: -0.3in; margin-right: 0em; margin-bottom: -10px; text-indent: -0.5em; color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;EM&gt;&lt;IMG src="http://www.cisco.com/en/US/i/templates/caut.gif" /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2012 21:48:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906502#M456997</guid>
      <dc:creator>dtochilovsky</dc:creator>
      <dc:date>2012-04-18T21:48:04Z</dc:date>
    </item>
    <item>
      <title>Monitoring threat-detection statistics on ASA 8.3</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906503#M457001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can configure syslogging for sending the threat-detection events, but this would not constantly provide you the real-time data, these would be generated only if any limit for it is exceeded. You can refer this for configuring logging:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-18813"&gt;https://supportforums.cisco.com/docs/DOC-18813&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2012 08:31:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906503#M457001</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-04-19T08:31:16Z</dc:date>
    </item>
    <item>
      <title>It appears this is till not</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906504#M457006</link>
      <description>&lt;P&gt;It appears this is till not supported. It strikes me that this is exactly the kind of thing that you want to be able to track using SNMP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Come on Cisco!&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2014 13:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-threat-detection-statistics-on-asa-8-3/m-p/1906504#M457006</guid>
      <dc:creator>Tormod Macleod</dc:creator>
      <dc:date>2014-05-05T13:58:23Z</dc:date>
    </item>
  </channel>
</rss>

