<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 threat-detection question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461063#M662839</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please remove the exisiting configuration first, and configure the new threat detection rating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To remove:&lt;/P&gt;&lt;P&gt;no threat-detection rate scanning-threat rate-interval 600 average-rate 5 burst-rate 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then add your new configuration line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Jun 2010 03:09:40 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2010-06-22T03:09:40Z</dc:date>
    <item>
      <title>ASA 5505 threat-detection question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461062#M662831</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Someone on the IDS group suggested I post this here instead.&amp;nbsp; Apologies if this has been covered before, I did a quick scan of forums here only found one relevant post, which didn't help in my case...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am dealing with a 'base license' Cisco 5505 ASA 8.0(2) using ASDM 6.0(2).&amp;nbsp; I've noticed that normal background network traffic across the wire on my outbound interface tends to trip the default triggers on the Cisco 5505's "scanning-threat" rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Average(eps)&amp;nbsp;&amp;nbsp;&amp;nbsp; Current(eps) Trigger&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total events&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; 10-min&amp;nbsp; Scanning:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 338&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3673&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; 1-hour&amp;nbsp; Scanning:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7&amp;nbsp;&amp;nbsp; 32859&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23525&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default triggers are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;threat-detection rate scanning-threat rate-interval 600 average-rate 5 burst-rate 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;threat-detection rate scanning-threat rate-interval 3600 average-rate 4 burst-rate 8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This results in a flood of log messages like so:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;[Scanning] drop rate-1 exceeded. Current burst rate is 10 per second, max configured rate is 10; Current average rate is 6 per second, max configured rate is 5; Cumulative total count is 3673.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to increase the trigger values on these rules so that only unusual traffic will trip them.&amp;nbsp; I believe the relevant CLI command for creating a new rule would be similar to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;threat-detection rate scanning-threat rate-interval 600 average-rate 15 burst-rate 25&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, attempting to do so earns me an "ERROR: rate-interval 600 already exists."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd guess there is a different command to overwrite an already existing policy line, or perhaps one to remove (clear?) an existing one, but I've been unable to locate such a command in the device manual or via the web.&amp;nbsp; To clarify, I am trying to alter an existing config value.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have a SmartNet contract and could call support, but thought I would check here first.&amp;nbsp; I'd much appreciate any info or advice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461062#M662831</guid>
      <dc:creator>dave.kinsley</dc:creator>
      <dc:date>2019-03-11T18:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 threat-detection question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461063#M662839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please remove the exisiting configuration first, and configure the new threat detection rating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To remove:&lt;/P&gt;&lt;P&gt;no threat-detection rate scanning-threat rate-interval 600 average-rate 5 burst-rate 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then add your new configuration line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jun 2010 03:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461063#M662839</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-06-22T03:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 threat-detection question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461064#M662879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSCso51544&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA overwirtes default config when rate-interval is set to 600&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jun 2010 07:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461064#M662879</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2010-06-22T07:25:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 threat-detection question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461065#M662944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much!&amp;nbsp; The 'no' command is just what I was looking for...&amp;nbsp; clearing the existing rule allows me to re-establish with updated thresholds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks also for the pointer to the CSC number; upgrading the firmware might be something I try as a longer term solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jun 2010 12:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-threat-detection-question/m-p/1461065#M662944</guid>
      <dc:creator>dave.kinsley</dc:creator>
      <dc:date>2010-06-22T12:11:29Z</dc:date>
    </item>
  </channel>
</rss>

