Basic Threat Detection Statistics; Advanced Threat Detection Statistics - Cisco ASA Series Configuration Manual

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Detecting Threats

Basic Threat Detection Statistics

Using basic threat detection statistics, the ASA monitors the rate of dropped packets and security events
due to the following reasons:
When the ASA detects a threat, it immediately sends a system log message (733100). The ASA tracks
two types of rates: the average event rate over an interval, and the burst event rate over a shorter burst
interval. The burst rate interval is 1/30th of the average rate interval or 10 seconds, whichever is higher.
For each received event, the ASA checks the average and burst rate limits; if both rates are exceeded,
then the ASA sends two separate system messages, with a maximum of one message for each rate type
per burst period.
Basic threat detection affects performance only when there are drops or potential threats; even in this
scenario, the performance impact is insignificant.

Advanced Threat Detection Statistics

Advanced threat detection statistics show both allowed and dropped traffic rates for individual objects
such as hosts, ports, protocols, or ACLs.
Enabling advanced statistics can affect the ASA performance, depending on the type of statistics
Caution
enabled. The threat-detection statistics host command affects performance in a significant way; if you
have a high traffic load, you might consider enabling this type of statistics temporarily. The
threat-detection statistics port command, however, has modest impact.
Cisco ASA Series Firewall CLI Configuration Guide
18-2
Denial by ACLs.
Bad packet format (such as invalid-ip-header or invalid-tcp-hdr-length).
Connection limits exceeded (both system-wide resource limits, and limits set in the configuration).
DoS attack detected (such as an invalid SPI, Stateful Firewall check failure).
Basic firewall checks failed. This option is a combined rate that includes all firewall-related packet
drops in this list. It does not include non-firewall-related drops such as interface overload, packets
failed at application inspection, and scanning attack detected.
Suspicious ICMP packets detected.
Packets failed application inspection.
Interface overload.
Scanning attack detected. This option monitors scanning attacks; for example, the first TCP packet
is not a SYN packet, or the TCP connection failed the 3-way handshake. Full scanning threat
detection takes this scanning attack rate information and acts on it by classifying hosts as attackers
and automatically shunning them, for example.
Incomplete session detection such as TCP SYN attack detected or UDP session with no return data
attack detected.
Chapter 18
Threat Detection

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents