Hello, our organization is purchasing an ASA 5510 SP. One of the major goals of this device is to stop abusive crawlers/scrapers/dos attacks. Apart from looking up the user manual (which I'm in the process of doing) I'd like to know how exactly does this device detect the attack, and then how to administer this. Can someone point me in the right direction? Questions exist with this like 'how do we detect an attack', 'how do we become aware of an attack', 'how do we use the asa to either block or unblock ip's or abusive domains?'. I know this is generic but a quick up to speed is needed as we are getting this device really soon and need to hit the ground running.
Tia
Charles