1-7
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Threat Detection
Configuring Advanced Threat Detection Statistics
Security Context Guidelines
Only TCP Intercept statistics are available in multiple mode.
Firewall Mode Guidelines
Supported in routed and transparent firewall mode.
Types of Traffic Monitored
Only through-the-box traffic is monitored; to-the-box traffic is not included in threat detection.
Default Settings
By default, statistics for access lists are enabled.
Configuring Advanced Threat Detection Statistics
By default, statistics for access lists are enabled. To enable other statistics, perform the following steps.
Detailed Steps
Command
Purpose
Step 1
threat-detection statistics
Example:
hostname(config)# threat-detection statistics
(Optional) Enables
all
statistics.
To enable only certain statistics, enter this command
for each statistic type (shown in this table), and do
not also enter the command without any options.
You can enter
threat-detection statistics
(without
any options) and then customize certain statistics by
entering the command with statistics-specific
options (for example,
threat-detection statistics
host number-of-rate 2
). If you enter
threat-detection statistics
(without any options)
and then enter a command for specific statistics, but
without any statistic-specific options, then that
command has no effect because it is already enabled.
If you enter the
no
form of this command, it removes
all
threat-detection statistics
commands, including
the
threat-detection statistics access-list
command, which is enabled by default.
Step 2
threat-detection statistics access-list
Example:
hostname(config)# threat-detection statistics
access-list
(Optional) Enables statistics for access lists (if they
were disabled previously). Statistics for access lists
are enabled by default. Access list statistics are only
displayed using the
show threat-detection top
access-list
command. This command is enabled by
default.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......