04-22-2013 09:54 AM - edited 03-11-2019 06:32 PM
dear all :
i am facing very urgent and critical DDOS on the port 80 on one of our webservers
The Case:
the Notices:
Previous Configuration for the service policy :
Per Client concurrently : maximum incomplete TCP/UDP (1000) and completeTCP/UDP (500) per client
Total TCP/UDP: Unlimtied(up to 65000 connections)
please anybody can help the ASA CPU is overloaded and i am afraid to be crashed.i am thinking towards limiting the total TCP/UDP connections to this webserver but even that the cpu is still reaching to 90%
04-22-2013 08:38 PM
Hello Basel,
I can understand your concern, Is there a way you can contact your ISP so you can limit that on their side ( this so the WAN link does not get oversubscriped) because even if you stop the attack on your outside interface the WAN link will be saturated already....
I mean with this kind of attacks ( a bunch of botnet devices attacking your servers ) the ASA would not be the proper tool to use, you should restrict that traffic outside the WAN pipe,
You could take captures on port 80 so you can match the patterns on the attacks ( the payload used for all of the botnet devices would be the same so you could configure an HTTP policy map matching those strings )
That and the SYN cookies would be the ways to go,
Regards,
Note: I would recommend to open a TAC case ( do you have a valid contract ? ) to work on this ASAP,
Hope that I could help
Julio Carvajal
04-22-2013 11:02 PM
Dear Jcarvaja;
thank you very much for reply ,
my question is can the feature : "Botnet Traffic Filter " solve this case?
if we buy the license for this feature and enable it , which dynamically updates ASA signatures database with most popular attacks patterns from cisco
,Actually we found before a week some script executing on the same infected server,and the oveloading was from inside interface of that server due to sending the traffic to its Botnet Control.what we did we remove that script then i stop the outgoing traffic from the infected server since it is just web server needs to listen to port 80 not to send any traffic .
but after that the overloading became on the outside due the previous case.
please advise .
04-23-2013 09:00 AM
The ASA uses the dynamic database as follows:
1. When the domain name in a DNS reply matches a name in the dynamic database, the Botnet Traffic Filter adds the name and IP address to the DNS reverse lookup cache.
2. When the infected host starts a connection to the IP address of the malware site, then the ASA sends a syslog message informing you of the suspicious activity and optionally drops the traffic if you configured the ASA to do so.
3. In some cases, the IP address itself is supplied in the dynamic database, and the Botnet Traffic Filter logs or drops any traffic to that IP address without having to inspect DNS requests.
in your case:
Since computers from outside are connecting to a webserver that exists behind your ASA as against computers behind your ASA connecting to bad known websites out on the internet, no dns lookup is going to happen that ASA is going to be able to inspect
Thus unless IPs that are attacking you are in the dynamic database (Point 3 as mentioned above) I don't think botnet filtering is really going to help you
04-23-2013 09:17 AM
Hello Basel,
Based on the problem description, no.. It will not help,
I will recommend to follow my suggestions,
Regards,
Remember to rate all of the helpful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide