<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Asa Scanning attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712013#M535534</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Emilio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be fixed by using threat detection feature on ASA. Here's a link for your help:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml#sol6"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml#sol6&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&amp;nbsp; &lt;/STRONG&gt;If you do not want the drop rate exceed warning to appear, you can disable it by running the &lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;no threat-detection basic-threat&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Sian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Jul 2011 10:20:58 GMT</pubDate>
    <dc:creator>Parminder Sian</dc:creator>
    <dc:date>2011-07-27T10:20:58Z</dc:date>
    <item>
      <title>Cisco Asa Scanning attack</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712012#M535533</link>
      <description>&lt;P&gt;How to see the ip address of the attack host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show the logging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jul 19 09:43:15 10.239.67.1 Jul 19 2011 09:43:11: %ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 1 per second, max configured rate is 10; Current average rate is 5 per second, max configured rate is 5; Cumulative total count is 3113&lt;/P&gt;&lt;P&gt;Jul 19 09:43:15 10.239.67.1 Jul 19 2011 09:43:15: %ASA-4-733100: [ Scanning] drop rate-2 exceeded. Current burst rate is 0 per second, max configured rate is 8; Current average rate is 5 per second, max configured rate is 4; Cumulative total count is 21589&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Jul 19 09:43:15 10.239.67.1 Jul 19 2011 09:43:11: %ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 1 per second, max configured rate is 10; Current average rate is 5 per second, max configured rate is 5; Cumulative total count is 3113&lt;/P&gt;&lt;P&gt;Jul 19 09:43:15 10.239.67.1 Jul 19 2011 09:43:15: %ASA-4-733100: [ Scanning] drop rate-2 exceeded. Current burst rate is 0 per second, max configured rate is 8; Current average rate is 5 per second, max configured rate is 4; Cumulative total count is 21589&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712012#M535533</guid>
      <dc:creator>emilioj.romero</dc:creator>
      <dc:date>2019-03-11T21:00:51Z</dc:date>
    </item>
    <item>
      <title>Cisco Asa Scanning attack</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712013#M535534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Emilio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be fixed by using threat detection feature on ASA. Here's a link for your help:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml#sol6"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml#sol6&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&amp;nbsp; &lt;/STRONG&gt;If you do not want the drop rate exceed warning to appear, you can disable it by running the &lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;no threat-detection basic-threat&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Sian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 10:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712013#M535534</guid>
      <dc:creator>Parminder Sian</dc:creator>
      <dc:date>2011-07-27T10:20:58Z</dc:date>
    </item>
    <item>
      <title>Cisco Asa Scanning attack</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712014#M535535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Parminder&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I shun&amp;nbsp; a host or a network?&amp;nbsp; My ASA is under scanning attack now.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 14:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712014#M535535</guid>
      <dc:creator>tranquocphu</dc:creator>
      <dc:date>2011-07-27T14:57:32Z</dc:date>
    </item>
    <item>
      <title>Cisco Asa Scanning attack</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712015#M535536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just use the shun command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# shun ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hostname or A.B.C.D&amp;nbsp; Specify source IP address of a mischievous host&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 15:14:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712015#M535536</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-07-27T15:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Asa Scanning attack</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712016#M535538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi lcaruso&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use the shun command shun x.x.x.x&amp;nbsp; x.x.x.x source port (need to specify a range of ports or shun all source ports)&amp;nbsp;&amp;nbsp; 80 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I shun all or a range of ports of the source port?&amp;nbsp; Source ports are showing dynamically on ASA screen.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 15:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712016#M535538</guid>
      <dc:creator>tranquocphu</dc:creator>
      <dc:date>2011-07-27T15:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Asa Scanning attack</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712017#M535540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure i dunderstand your requirement well enough to be answering this. Are you looking at shunning a range of ports for a particular IP address on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Aug 2011 21:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-scanning-attack/m-p/1712017#M535540</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-08-10T21:04:13Z</dc:date>
    </item>
  </channel>
</rss>

