11-20-2011 11:11 PM - edited 03-11-2019 02:53 PM
Hi Experts,
Need a solution regarding broadcast.
There were lot of packet loss when i tired to ping inside interface of firewall.And my entire network was down.
When i checked in asdm there was DOS attack from particular ip on of internal server .
Today also i faced a similar problem, And i was not able to even log on to asdm.
Is there any ways to check log on firewall other than syslog server
11-21-2011 12:01 AM
Hi Prashant,
Go thru links-
http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_botnet.html
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_connlimits.html
There is no specific command to check but you will have to see from diffrent ways.
Thanks
Ajay
11-21-2011 12:20 AM
Hi ajay
Thanks for the links.
Problem is it takes to much time to check logs on syslog server .To find from which ip the attack has taken place.
Due to packet loss we are not able to login on firewall asdm also.
Is there any way to check from which ip we are geeting attacks.
11-21-2011 12:24 AM
Basically show connections should tell you whats going on in firewall based on that you can investigate . If you suspect DOS attack you can also check the utalization report of switchs and swicthport. If you have had syslog server it was easy job there is no magical command which tells you the host. You should investigate step by step.
11-21-2011 01:24 AM
Thank you.
11-21-2011 01:29 AM
Hi
Just my 2 cents on the subject.
First of all are you onsite or are you somewhere else ?
It sounds like you are onsite and that the inside server is sending more packets through the link than what the firewall or the link somewhere to the firewall can handle. Ie Link saturation.
If that is the case then set a monitor port on the switch where the firewall connects and setting up a sniffer software such as wireshark will tell you the offending address immediately. It is the one sending most of the packets.
The second thing you can do is to go to the firewall and connect a cable and run CLI commands instead of using the ASDM.
Third
Do you have any unused ports in the firewall setting up a log server on one of those would be a prudent thing.
Forth
It could be a faulty cable, that would give the same problem symptoms, but if the ASDM tells you that there is an attack, then most likely it is not a faulty cable.
Good luck
HTH
11-21-2011 09:38 PM
Hi Hobbe,
Problem is even after changing the Private as well as public ip of the server .we have recieved the attack on the same server with in a month.we have more than 100 servers set up in vmware .
Can u guide me in setting the wireshark.
11-22-2011 03:51 AM
You frist need to setup SPAN port -
Source would be interface where firewall inside is connected and destination port would be where a machine is connected on which wireshark is installed.
Wireshark is freeware you can download it from internet.
once SPAN is configured mirror of all the traffic in/out will be on destination port . In wireshark you can select the interface your NIC and click on start capture .
Thanks
Ajay
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide