<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA/PIX Dos Mitigation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-pix-dos-mitigation/m-p/1127085#M892465</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You current connection count is only 1 so you will not see any drops.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Dec 2008 18:06:28 GMT</pubDate>
    <dc:creator>vvarakan</dc:creator>
    <dc:date>2008-12-11T18:06:28Z</dc:date>
    <item>
      <title>ASA/PIX Dos Mitigation</title>
      <link>https://community.cisco.com/t5/network-security/asa-pix-dos-mitigation/m-p/1127084#M892464</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the following scenario;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hacker or virus ---&amp;gt; ASA/PIX MPF ---&amp;gt; Router or Device endpoint&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use syslog traffic in this example but I have done it with ICMP, telnet etc .... The idea is to drop the traffic based upon the class-map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map hack&lt;/P&gt;&lt;P&gt;match port udp eq 514&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map inside&lt;/P&gt;&lt;P&gt;class hack&lt;/P&gt;&lt;P&gt;set connection conn-max 1&lt;/P&gt;&lt;P&gt;police input 8000 conform-action drop exceed drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy inside interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting matches against the service-policy but the traffic doesn't drop ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface inside:&lt;/P&gt;&lt;P&gt;  Service-policy: inside&lt;/P&gt;&lt;P&gt;    Class-map: syslog&lt;/P&gt;&lt;P&gt;      Set connection policy: conn-max 1 &lt;/P&gt;&lt;P&gt;        current conns 1, drop 0&lt;/P&gt;&lt;P&gt;      Input police Interface inside:&lt;/P&gt;&lt;P&gt;        cir 8000 bps, bc 1500 bytes&lt;/P&gt;&lt;P&gt;        conformed 3 packets, 375 bytes; actions:  drop&lt;/P&gt;&lt;P&gt;        exceeded 0 packets, 0 bytes; actions:  drop&lt;/P&gt;&lt;P&gt;        conformed 80 bps, exceed 0 bps&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pix-dos-mitigation/m-p/1127084#M892464</guid>
      <dc:creator>jon.humphries</dc:creator>
      <dc:date>2019-03-11T14:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA/PIX Dos Mitigation</title>
      <link>https://community.cisco.com/t5/network-security/asa-pix-dos-mitigation/m-p/1127085#M892465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You current connection count is only 1 so you will not see any drops.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Dec 2008 18:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pix-dos-mitigation/m-p/1127085#M892465</guid>
      <dc:creator>vvarakan</dc:creator>
      <dc:date>2008-12-11T18:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA/PIX Dos Mitigation</title>
      <link>https://community.cisco.com/t5/network-security/asa-pix-dos-mitigation/m-p/1127086#M892466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like my issue, was that the CIR police mechanisim is there for rate limiting as opposed to dropping the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I misunderstood the functionality of this feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your input.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon Humphries&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Dec 2008 16:11:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pix-dos-mitigation/m-p/1127086#M892466</guid>
      <dc:creator>jon.humphries</dc:creator>
      <dc:date>2008-12-14T16:11:43Z</dc:date>
    </item>
  </channel>
</rss>

