<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [scanning] drop rate-1 exceeded messages??? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297279#M818704</link>
    <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;I am testing a new ASA firewall and am repeatedly getting the following mesages in Syslog&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ Scanning] drop rate-1 exceeded. Current burst rate is 10 per second, max configured rate is 10; Current average rate is 7 per second, max configured rate is 5; Cumulative total count is 4400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone please explain what these messages actually mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although the "scanning" rate has been exceeded does it necessary mean any resulting action has been taken? Am I losing packets anywhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I say it is in default config.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:11:11 GMT</pubDate>
    <dc:creator>mikedelafield</dc:creator>
    <dc:date>2019-03-11T16:11:11Z</dc:date>
    <item>
      <title>[scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297279#M818704</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;I am testing a new ASA firewall and am repeatedly getting the following mesages in Syslog&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ Scanning] drop rate-1 exceeded. Current burst rate is 10 per second, max configured rate is 10; Current average rate is 7 per second, max configured rate is 5; Cumulative total count is 4400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone please explain what these messages actually mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although the "scanning" rate has been exceeded does it necessary mean any resulting action has been taken? Am I losing packets anywhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I say it is in default config.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297279#M818704</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2019-03-11T16:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: [scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297280#M818705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does anyone know the answer to this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297280#M818705</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2010-05-03T20:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: [scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297281#M818708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following is the decription for the log message you get. You are getting this because you have "threat detection enabled"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;733100&lt;/P&gt;&lt;P&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-4-733100: Object drop rate rate_ID exceeded. Current burst rate &lt;BR /&gt;is rate_val per second, max configured rate is rate_val; Current average rate is &lt;BR /&gt;rate_val per second, max configured rate is rate_val; Cumulative total count is &lt;BR /&gt;total_cnt&lt;/P&gt;&lt;P&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp; The specified object in the syslog message has exceeded the specified burst threshold rate or average threshold rate. The object can be drop activity of a host, TCP/UDP port, IP protocol, or various drops due to potential attacks. It indicates the system is under potential attack.&lt;/P&gt;&lt;P&gt;•Object—The general or particular source of a drop rate count, which might include the following:&lt;/P&gt;&lt;P&gt;- Firewall&lt;/P&gt;&lt;P&gt;- Bad pkts&lt;/P&gt;&lt;P&gt;- Rate limit&lt;/P&gt;&lt;P&gt;- DoS attck&lt;/P&gt;&lt;P&gt;- ACL drop&lt;/P&gt;&lt;P&gt;- Conn limit&lt;/P&gt;&lt;P&gt;- ICMP attk&lt;/P&gt;&lt;P&gt;- Scanning&lt;/P&gt;&lt;P&gt;- SYN attck&lt;/P&gt;&lt;P&gt;- Inspect&lt;/P&gt;&lt;P&gt;- Interface&lt;/P&gt;&lt;P&gt;(A citation of a particular interface object might take a number of forms. For example, you might see "80/HTTP" that would signify port 80, with well-known protocol HTTP.)&lt;/P&gt;&lt;P&gt;•rate_ID—The configured rate that is being exceeded. Most objects can be configured with up to three different rates for different intervals.&lt;/P&gt;&lt;P&gt;•rate_val—A particular rate value.&lt;/P&gt;&lt;P&gt;•total_cnt—The total count since the object was created or cleared.&lt;/P&gt;&lt;P&gt;The following three examples show how these variables occur:&lt;/P&gt;&lt;P&gt;For an interface drop due to a CPU or bus limitation:&lt;/P&gt;&lt;P&gt;"%ASA-4-733100: [Interface] drop rate 1 exceeded. Current burst rate is 1 per second, max configured rate is 8000; Current average rate is 2030 per second, max configured rate is 2000; Cumulative total count is 3930654."&lt;/P&gt;&lt;P&gt;For a scanning drop due to potential attacks:&lt;/P&gt;&lt;P&gt;"ASA-4-733100: [Scanning] drop rate-1 exceeded. Current burst rate is 10 per second_max configured rate is 10; Current average rate is 245 per second_max configured rate is 5; Cumulative total count is 147409 (35 instances received)&lt;/P&gt;&lt;P&gt;For bad packets due to potential attacks:&lt;/P&gt;&lt;P&gt;"%ASA-4-733100: [Bad pkts] drop rate 1 exceeded. Current burst rate is 0 per second, max configured rate is 400; Current average rate is 760 per second, max configured rate is 100; Cumulative total count is 1938933"&lt;/P&gt;&lt;P&gt;Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp; Perform the following steps according to the specified object type that appears in the message:&lt;/P&gt;&lt;P&gt;1. If the object in the syslog message is one of the following:&lt;/P&gt;&lt;P&gt;–Firewall&lt;/P&gt;&lt;P&gt;–Bad pkts&lt;/P&gt;&lt;P&gt;–Rate limit&lt;/P&gt;&lt;P&gt;–DoS attck&lt;/P&gt;&lt;P&gt;–ACL drop&lt;/P&gt;&lt;P&gt;–Conn limit&lt;/P&gt;&lt;P&gt;–ICMP attck&lt;/P&gt;&lt;P&gt;–Scanning&lt;/P&gt;&lt;P&gt;–SYN attck&lt;/P&gt;&lt;P&gt;–Inspect&lt;/P&gt;&lt;P&gt;–Interface&lt;/P&gt;&lt;P&gt;Check whether the drop rate is acceptable for the running environment.&lt;/P&gt;&lt;P&gt;2. Adjust the threshold rate of the particular drop to an appropriate value by running the threat-detection rate xxx command, where xxx is one of the following:&lt;/P&gt;&lt;P&gt;–acl-drop&lt;/P&gt;&lt;P&gt;–bad-packet-drop&lt;/P&gt;&lt;P&gt;–conn-limit-drop&lt;/P&gt;&lt;P&gt;–dos-drop&lt;/P&gt;&lt;P&gt;–fw-drop&lt;/P&gt;&lt;P&gt;–icmp-drop&lt;/P&gt;&lt;P&gt;–inspect-drop&lt;/P&gt;&lt;P&gt;–interface-drop&lt;/P&gt;&lt;P&gt;–scanning-threat&lt;/P&gt;&lt;P&gt;–syn-attack&lt;/P&gt;&lt;P&gt;3. If the object in the syslog message is a TCP or UDP port, an IP protocol, or a host drop, check whether the drop rate is acceptable for the running environment.&lt;/P&gt;&lt;P&gt;4. Adjust the threshold rate of the particular drop to an appropriate value by running the threat-detection rate bad-packet-drop command.&lt;/P&gt;&lt;P&gt;Note: If you do not want the drop rate exceed warning to appear, you can disable it by running the no threat-detection basic-threat command.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTH&lt;/P&gt;&lt;P&gt;Ashu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297281#M818708</guid>
      <dc:creator>astripat</dc:creator>
      <dc:date>2010-05-03T20:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: [scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297282#M818710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you are seeing a built in threat protection of the ASA that shows up in logs. Looks like your firewall is hit with a lot of scan traffic (nmap oor other port scanning tool).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Look at the following link for the explanation of the message you are seeing in the logs: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml#sol6"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml#sol6&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Scanning attack detected (This option monitors scanning attacks; for example, the first TCP packet is not a SYN packet, or the TCP connection failed the 3-way handshake."&lt;/EM&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH.&lt;/P&gt;&lt;P&gt;Dmitry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297282#M818710</guid>
      <dc:creator>dtochilovsky</dc:creator>
      <dc:date>2010-05-03T20:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: [scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297283#M818712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The error is indeed due to threat-detection (introduced in ASA 8.0). It alerts you for some weird traffic burst.&lt;/P&gt;&lt;P&gt;But unless you have explicitly configured it, it does not drop anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297283#M818712</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-05-03T20:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: [scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297284#M818715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So am i right in assuming that no action is actually being taken, it is simply reporting that some kind of drop rate statistic limit has been reached?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297284#M818715</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2010-05-03T20:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: [scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297285#M818719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it is a threshold that you exceeded.&lt;/P&gt;&lt;P&gt;But threat detection will not drop unless you tell it to. The default behavior is to just alert (generate syslog).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 21:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297285#M818719</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-05-03T21:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: [scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297286#M818722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats great thanks, although i still don't completely understand&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The messages say Drop Rate Exceeded and I presume this relates to drops on ACLs&lt;/P&gt;&lt;P&gt;and yet i am hardly seeing any actually Denys coming through on the syslog&lt;/P&gt;&lt;P&gt;Should this not correlate in some way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do the drops relate to some other form of "Drop"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actual message;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ Scanning] drop rate-1 exceeded. Current burst rate is 10 per second, max configured rate is 10; Current average rate is 17 per second, max configured rate is 5; Cumulative total count&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2010 09:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297286#M818722</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2010-05-19T09:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: [scanning] drop rate-1 exceeded messages???</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297287#M818723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It does not refer to ACL drops.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The threat detection feature has some internal thresholds for traffic and when you exceed them it will throw a log. The thresholds are here &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/protect.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/protect.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Your syslogs "[ Scanning] drop rate-1 exceeded." mean the you have exceeded &lt;SPAN class="content"&gt;the "Scanning attack detected" threshold.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it is clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2010 12:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297287#M818723</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-05-19T12:53:43Z</dc:date>
    </item>
    <item>
      <title>  Would this issue affect an</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297288#M818725</link>
      <description>&lt;P&gt;&amp;nbsp; Would this issue affect an IPS-20 module that is active in the ASA "5510"?&amp;nbsp; I was trying to figure out why our IPS, or more&amp;nbsp;specifically&amp;nbsp;the&amp;nbsp;Cisco IPS Manager Express "IME" "Memory &amp;amp; Load" gadget&amp;nbsp;was acting funny on the IME dashboard.&lt;/P&gt;&lt;P&gt;&amp;nbsp; The green Memory and Disk Usage percentage bars would go blank for about a minute.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Originally I started looking at the IPS only then I thought I would time my review of the ASA logs to see if anything occurred at the same time.&amp;nbsp; I've now seen this alert three times while writing this post and keeping an eye on the ASA and IPS.&lt;/P&gt;&lt;P&gt;&amp;nbsp; So it looks like&amp;nbsp; the answer to my question is yes it probably is associated to the same events.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; To give everyone an idea on what is causing our issue, it's a flood of "denied tcp" attempts on ports 135, 139 and 445 that are hitting the ASA about 4-7 times a second.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I was going to open a post for the IPS, but finding this discussion answered my questions.&amp;nbsp; I just need to have the System Admin's to shut down those connection requests.&lt;/P&gt;&lt;P&gt;&amp;nbsp; To provide more detail the servers were built in a lab and have a function we didn't order for automatic updates.&amp;nbsp; Once the server was built out I assume they plugged in our specific requirements and left the requests for updates still turned on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Ashu and the others for your comments.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 21:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297288#M818725</guid>
      <dc:creator>thompsondj</dc:creator>
      <dc:date>2015-08-21T21:38:40Z</dc:date>
    </item>
    <item>
      <title>Mike,  If you read my post</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297289#M818726</link>
      <description>&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp; If you read my post above I noticed the same problem, but after researching the affects on the IPS.&amp;nbsp; Since the IPS-20 in connected as a "daughter card" on the main ASA I think it sees the affects of the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I think it is affecting the ASA, resets until the threshold is reached again and continues to reset...&amp;nbsp; My opinion, but if someone else has more experience please let us both know.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 21:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297289#M818726</guid>
      <dc:creator>thompsondj</dc:creator>
      <dc:date>2015-08-21T21:42:07Z</dc:date>
    </item>
    <item>
      <title>My action is to shut off the</title>
      <link>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297290#M818727</link>
      <description>&lt;P&gt;My action is to shut off the connection attempts from the new servers from trying to access some outside source.&lt;/P&gt;&lt;P&gt;&amp;nbsp; The way I figured this out is when I noticed the logs from our firewall ASA dropping connection attempts 4-12 times a second I tried to find out what was causing it.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 21:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/scanning-drop-rate-1-exceeded-messages/m-p/1297290#M818727</guid>
      <dc:creator>thompsondj</dc:creator>
      <dc:date>2015-08-21T21:45:28Z</dc:date>
    </item>
  </channel>
</rss>

