Monitoring Threat Detection; Monitoring Basic Threat Detection Statistics - Cisco ASA Series Configuration Manual

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Monitoring Threat Detection

If you already configured this command as part of the basic threat detection configuration, then those
settings are shared with the scanning threat detection feature; you cannot configure separate rates for
basic and scanning threat detection. If you do not set the rates using this command, the default values
are used for both the scanning threat detection feature and the basic threat detection feature. You can
configure up to three different rate intervals, by entering separate commands.
Monitoring Threat Detection
The following topics explain how to monitor threat detection and view traffic statistics.

Monitoring Basic Threat Detection Statistics

To display basic threat detection statistics, use the following command:
show threat-detection rate [min-display-rate min_display_rate]
[acl-drop | bad-packet-drop | conn-limit-drop | dos-drop | fw-drop |
icmp-drop | inspect-drop | interface-drop | scanning-threat | syn-attack]
The min-display-rate min_display_rate argument limits the display to statistics that exceed the
minimum display rate in events per second. You can set the min_display_rate between 0 and
2147483647.
The other arguments let you limit the display to specific categories. For a description of each event type,
see
The output shows the average rate in events/sec over two fixed time periods: the last 10 minutes and the
last 1 hour. It also shows: the current burst rate in events/sec over the last completed burst interval, which
is 1/30th of the average rate interval or 10 seconds, whichever is larger; the number of times the rates
were exceeded (triggered); and the total number of events over the time periods.
The ASA stores the count at the end of each burst period, for a total of 30 completed burst intervals. The
unfinished burst interval presently occurring is not included in the average rate. For example, if the
average rate interval is 20 minutes, then the burst interval is 20 seconds. If the last burst interval was
from 3:00:00 to 3:00:20, and you use the show command at 3:00:25, then the last 5 seconds are not
included in the output.
The only exception to this rule is if the number of events in the unfinished burst interval already exceeds
the number of events in the oldest burst interval (#1 of 30) when calculating the total events. In that case,
the ASA calculates the total events as the last 29 complete intervals, plus the events so far in the
unfinished burst interval. This exception lets you monitor a large increase in events in real time.
You can clear statistics using the clear threat-detection rate command.
The following is sample output from the show threat-detection rate command:
hostname# show threat-detection rate
10-min ACL
Cisco ASA Series Firewall CLI Configuration Guide
18-8
Monitoring Basic Threat Detection Statistics, page 18-8
Monitoring Advanced Threat Detection Statistics, page 18-9
Evaluating Host Threat Detection Statistics, page 18-10
Monitoring Shunned Hosts, Attackers, and Targets, page 18-12
Basic Threat Detection Statistics, page
drop:
18-2.
Average(eps)
Current(eps) Trigger
0
Chapter 18
Total events
0
0
Threat Detection
16

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents