1-15
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring the Botnet Traffic Filter
Configuring the Botnet Traffic Filter
Examples
The following recommended configuration monitors all traffic on the outside interface and drops all
traffic at a threat level of moderate or higher:
hostname(config)#
dynamic-filter enable interface outside
hostname(config)#
dynamic-filter drop blacklist interface outside
If you decide not to monitor all traffic, you can limit the traffic using an access list. The following
example monitors only port 80 traffic on the outside interface, and drops traffic threat level very-high
only:
hostname(config)#
access-list dynamic-filter_acl extended permit tcp any any eq 80
hostname(config)#
dynamic-filter enable interface outside classify-list dynamic-filter_acl
hostname(config)#
dynamic-filter drop blacklist interface outside threat-level eq
very-high
Blocking Botnet Traffic Manually
If you choose not to block malware traffic automatically (see the
“Enabling Traffic Classification and
Actions for the Botnet Traffic Filter” section on page 1-12
), you can block traffic manually by
configuring an access list to deny traffic, or by using the
shun
command tool to block all traffic to and
from a host.
For example, you receive the following syslog message:
ASA-4-338002: Dynamic Filter permitted black listed TCP traffic from inside:10.1.1.45/6798
(209.165.201.1/7890) to outside:209.165.202.129/80 (209.165.202.129/80), destination
209.165.202.129 resolved from dynamic list: bad.example.com
You can then perform one of the following actions:
•
Create an access list to deny traffic.
For example, using the syslog message above, you might want to deny traffic from the infected host
at 10.1.1.45 to the malware site at 209.165.202.129. Or, if there are many connections to different
blacklisted addresses, you can create an access list to deny all traffic from 10.1.1.45 until you
resolve the infection on the host computer. For example, the following commands deny all traffic
from 10.1.1.5 to 209.165.202.129, but permits all other traffic on the inside interface:
hostname(config)#
access-list BLOCK_OUT extended deny ip host 10.1.1.45 host
209.165.202.129
hostname(config)#
access-list BLOCK_OUT extended permit ip any any
hostname(config)#
access-group BLOCK_OUT in interface inside
Step 4
(Optional)
dynamic-filter ambiguous-is-black
Example:
hostname(config)# dynamic-filter
ambiguous-is-black
If you configured the
dynamic-filter drop blacklist
command,
then this command treats greylisted traffic as blacklisted traffic
for dropping purposes. If you do not enable this command,
greylisted traffic will not be dropped. See the
Filter Address Types” section on page 1-2
for more information
about the greylist.
Command
Purpose
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......