09-19-2016 07:53 AM - edited 03-10-2019 06:41 AM
threat-detection rate syn-attack rate-interval 600 average-rate 30 burst-rate 45
Please rate helpful posts and mark correct answers.
Solved! Go to Solution.
10-09-2016 09:48 PM
Hi Luke,
1- yes there is a shun table.
Use the show threat-detection shun command in order to view a full list of attackers that have been shunned by Threat Detection specifically. Use the show shuncommand in order to view the full list of all IPs that are actively being shunned by the ASA (including from sources other than Threat Detection).
Ans 2- Yes packet is firstly checked for Shuns.
ans3,4 and 5-:- Answer is below
The shun command lets you block connections from an attacking host. All future connections from the source IP address are dropped and logged until the blocking function is removed manually or by the Cisco IPS sensor. The blocking function of the shun command is applied whether or not a connection with the specified host address is currently active.
If you specify the destination address, source and destination ports, and the protocol, then you drop the matching connection as well as placing a shun on all future connections from the source IP address; all future connections are shunned, not just those that match these specific connection parameters.
You can only have one shun command per source IP address.
Because the shun command is used to block attacks dynamically, it is not displayed in the ASA configuration.
Whenever an interface configuration is removed, all shuns that are attached to that interface are also removed. If you add a new interface or replace the same interface (using the same name), then you must add that interface to the IPS sensor if you want the IPS sensor to monitor that interface.
Dubey,Shivam
10-09-2016 08:30 PM
Luke,
Please review this document and if still you have doubt, let me know :
http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html
-
Pulkit
10-10-2016 07:35 AM
10-09-2016 09:48 PM
Hi Luke,
1- yes there is a shun table.
Use the show threat-detection shun command in order to view a full list of attackers that have been shunned by Threat Detection specifically. Use the show shuncommand in order to view the full list of all IPs that are actively being shunned by the ASA (including from sources other than Threat Detection).
Ans 2- Yes packet is firstly checked for Shuns.
ans3,4 and 5-:- Answer is below
The shun command lets you block connections from an attacking host. All future connections from the source IP address are dropped and logged until the blocking function is removed manually or by the Cisco IPS sensor. The blocking function of the shun command is applied whether or not a connection with the specified host address is currently active.
If you specify the destination address, source and destination ports, and the protocol, then you drop the matching connection as well as placing a shun on all future connections from the source IP address; all future connections are shunned, not just those that match these specific connection parameters.
You can only have one shun command per source IP address.
Because the shun command is used to block attacks dynamically, it is not displayed in the ASA configuration.
Whenever an interface configuration is removed, all shuns that are attached to that interface are also removed. If you add a new interface or replace the same interface (using the same name), then you must add that interface to the IPS sensor if you want the IPS sensor to monitor that interface.
Dubey,Shivam
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide