Cisco ASA 5505 Configuration Manual page 1089

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Chapter 50
Configuring the Botnet Traffic Filter
If you do not enable this option, greylisted traffic will not be dropped if you configure a rule in the
Blacklisted Traffic Actions area. See the
for more information about the greylist.
(Optional) To automatically drop malware traffic, perform the following steps.
Step 4
To manually drop traffic, see the
a.
In the Blacklisted Traffic Actions area, click Add.
The Add Blacklisted Traffic Action dialog box appears.
From the Interface drop-down list, choose the interface on which you want to drop traffic. Only
b.
interfaces on which you enabled Botnet Traffic Filter traffic classification are available.
c.
In the Threat Level area, choose one of the following options to drop traffic specific threat levels.
The default level is a range between Moderate and Very High.
Note
Value—Specify the threat level you want to drop:
Note
Range—Specify a range of threat levels.
In the ACL Used area, from the ACL Used drop-down list choose either --ALL TRAFFIC-- (the
d.
default), or any access list configured on the adaptive security appliance.
Note
To add or edit access lists, click Manage to bring up the ACL Manager. See
ACL Manager,"
Click OK.
e.
You return to the Traffic Settings pane.
If you want to apply additional rules to a given interface, repeat steps
f.
Make sure you do not specify overlapping traffic in multiple rules for a given interface. Because you
cannot control the exact order that rules are matched, overlapping traffic means you do not know
which command will be matched. For example, do not specify both a rule that matches --ALL
TRAFFIC-- as well as a command with and access list for a given interface. In this case, the traffic
might never match the command with the access list. Similarly, if you specify multiple commands
with access lists, make sure each access list is unique, and that the networks do not overlap.
OL-20339-01
"Blocking Botnet Traffic Manually" section on page
We highly recommend using the default setting unless you have strong reasons for changing
the setting.
Very Low
Low
Moderate
High
Very High
Static blacklist entries are always designated with a Very High threat level.
Be sure the access list is a subset of the traffic you specified in the Traffic Classification area.
for more information.
"Botnet Traffic Filter Address Categories" section on page 50-2
Cisco ASA 5500 Series Configuration Guide using ASDM
Configuring the Botnet Traffic Filter
50-12.
Chapter 15, "Using the
a
through e.
50-11

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents