18-6
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 18 Threat Detection
Configure Threat Detection
Procedure
Step 1
(Optional) Enable
all
statistics.
threat-detection statistics
Example:
hostname(config)# threat-detection statistics
To enable only certain statistics, enter this command for each statistic type (shown in this table), and do
not also enter the command without any options. You can enter
threat-detection statistics
(without any
options) and then customize certain statistics by entering the command with statistics-specific options
(for example,
threat-detection statistics host number-of-rate 2
). If you enter
threat-detection
statistics
(without any options) and then enter a command for specific statistics, but without any
statistic-specific options, then that command has no effect because it is already enabled.
If you enter the
no
form of this command, it removes all
threat-detection statistics
commands,
including the
threat-detection statistics access-list
command, which is enabled by default.
Step 2
(Optional) Enable statistics for ACLs (if they were disabled previously).
threat-detection statistics access-list
Example:
hostname(config)# threat-detection statistics access-list
Statistics for ACLs are enabled by default. ACL statistics are only displayed using the
show
threat-detection top access-list
command. This command is enabled by default.
Step 3
(Optional) Configure statistics for hosts (
host
keyword), TCP and UDP ports (
port
keyword), or
non-TCP/UDP IP protocols (
protocol
keyword).
threat-detection statistics
{
host
|
port
|
protocol
}
[
number-of-rate
{
1
|
2
|
3
}]
Example:
hostname(config)# threat-detection statistics host number-of-rate 2
hostname(config)# threat-detection statistics port number-of-rate 2
hostname(config)# threat-detection statistics protocol number-of-rate 3
The
number-of-rate
keyword sets the number of rate intervals maintained for statistics. The default
number of rate intervals is
1
, which keeps the memory usage low. To view more rate intervals, set the
value to
2
or
3
. For example, if you set the value to
3
, then you view data for the last 1 hour, 8 hours, and
24 hours. If you set this keyword to
1
(the default), then only the shortest rate interval statistics are
maintained. If you set the value to
2
, then the two shortest intervals are maintained.
The host statistics accumulate for as long as the host is active and in the scanning threat host database.
The host is deleted from the database (and the statistics cleared) after 10 minutes of inactivity.
Step 4
(Optional) Configure statistics for attacks intercepted by TCP Intercept (to enable TCP Intercept, see
Protect Servers from a SYN Flood DoS Attack (TCP Intercept), page 16-4
threat-detection statistics tcp-intercept
[
rate-interval
minutes
]
[
burst-rate
attacks_per_sec
] [
average-rate
attacks_per_sec
]
Example:
hostname(config)# threat-detection statistics tcp-intercept rate-interval 60 burst-rate
800 average-rate 600
Содержание ASA 5508-X
Страница 11: ...P A R T 1 Access Control ...
Страница 12: ......
Страница 60: ...4 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 4 Access Rules History for Access Rules ...
Страница 157: ...P A R T 2 Network Address Translation ...
Страница 158: ......
Страница 204: ...9 46 Cisco ASA Series Firewall CLI Configuration Guide Chapter 9 Network Address Translation NAT History for NAT ...
Страница 232: ...10 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 10 NAT Examples and Reference DNS and NAT ...
Страница 233: ...P A R T 3 Service Policies and Application Inspection ...
Страница 234: ......
Страница 379: ...P A R T 4 Connection Management and Threat Detection ...
Страница 380: ......
Страница 400: ...16 20 Cisco ASA Series Firewall CLI Configuration Guide Chapter 16 Connection Settings History for Connection Settings ...
Страница 414: ...17 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 Quality of Service History for QoS ...