23-8
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 23 Preventing Network Attacks
Configuring Threat Detection
The host statistsics accumulate for as long as the host is active and in the scanning threat host
database. The host is deleted from the database (and the statistics cleared) after 10 minutes of
inactivity.
•
To enable statistics for TCP and UDP ports, enter the following command:
hostname(config)#
threat-detection statistics port
•
To enable statistics for non-TCP/UDP IP protocols, enter the following command:
hostname(config)#
threat-detection statistics protocol
Viewing Threat Statistics
The display output shows the following:
•
The average rate in events/sec over fixed time periods.
•
The current burst rate in events/sec over the last completed burst interval, which is 1/60th of the
average rate interval or 10 seconds, whichever is larger
•
The number of times the rates were exceeded (for dropped traffic statistics only)
•
The total number of events over the fixed time periods.
The security appliance stores the count at the end of each burst period, for a total of 60 completed burst
intervals. The unfinished burst interval presently occurring is not included in the average rate. For
example, if the average rate interval is 20 minutes, then the burst interval is 20 seconds. If the last burst
interval was from 3:00:00 to 3:00:20, and you use the
show
command at 3:00:25, then the last 5 seconds
are not included in the output.
The only exception to this rule is if the number of events in the unfinished burst interval already exceeds
the number of events in the oldest burst interval (#1 of 60) when calculating the total events. In that case,
the security appliance calculates the total events as the last 59 complete intervals, plus the events so far
in the unfinished burst interval. This exception lets you monitor a large increase in events in real time.
To view statistics, enter one of the following commands.
•
To view the top 10 statistics, enter the following command:
hostname#
show
threat-detection statistics
[
min-display-rate
min_display_rate
]
top
[{
access-list
|
host
|
port-protocol
}
[
rate-1
|
rate-2
|
rate-3
]]
where the
min-display-rate
min_display_rate
argument limits the display to statistics that exceed
the minimum display rate in events per second. You can set the
min_display_rate
between 0 and
2147483647.
If you do not enter any options, the top 10 statistics are shown for all categories.
To view the top 10 ACEs that match packets, including both permit and deny ACEs., use the
access-list
keyword. Permitted and denied traffic are not differentiated in this display. If you enable
basic threat detection using the
threat-detection basic-threat
command, you can track access list
denies using the
show threat-detection rate access-list
command.
To view only host statistics, use the
host
keyword.
To view statistics for ports and protocols, use the
port-protocol
keyword. The
port-protocol
keyword shows the combined statistics of TCP/UDP port and IP protocol types. TCP (protocol 6)
and UDP (protocol 17) are not included in the display for IP protocols; TCP and UDP ports are,
however, included in the display for ports. If you only enable statistics for one of these types, port
or protocol, then you will only view the enabled statistics.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......