
C H A P T E R
18-1
Cisco ASA Series Firewall CLI Configuration Guide
18
Threat Detection
This chapter describes how to configure threat detection statistics and scanning threat detection.
•
•
Guidelines for Threat Detection, page 18-3
•
Defaults for Threat Detection, page 18-4
•
Configure Threat Detection, page 18-4
•
Monitoring Threat Detection, page 18-8
•
Examples for Threat Detection, page 18-13
•
History for Threat Detection, page 18-14
Detecting Threats
Threat detection on the ASA provides a front-line defense against attacks. Threat detection works at
Layer 3 and 4 to develop a baseline for traffic on the device, analyzing packet drop statistics and
accumulating “top” reports based on traffic patterns. In comparison, a module that provides IPS or Next
Generation IPS services identifies and mitigates attack vectors up to Layer 7 on traffic the ASA
permitted, and cannot see the traffic dropped already by the ASA. Thus, threat detection and IPS can
work together to provide a more comprehensive threat defense.
Threat detection consists of the following elements:
•
Different levels of statistics gathering for various threats.
Threat detection statistics can help you manage threats to your ASA; for example, if you enable
scanning threat detection, then viewing statistics can help you analyze the threat. You can configure
two types of threat detection statistics:
–
Basic threat detection statistics—Includes information about attack activity for the system as a
whole. Basic threat detection statistics are enabled by default and have no performance impact.
–
Advanced threat detection statistics—Tracks activity at an object level, so the ASA can report
activity for individual hosts, ports, protocols, or ACLs. Advanced threat detection statistics can
have a major performance impact, depending on the statistics gathered, so only the ACL
statistics are enabled by default.
•
Scanning threat detection, which determines when a host is performing a scan. You can optionally
shun any hosts determined to be a scanning threat.
Содержание ASA 5508-X
Страница 11: ...P A R T 1 Access Control ...
Страница 12: ......
Страница 60: ...4 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 4 Access Rules History for Access Rules ...
Страница 157: ...P A R T 2 Network Address Translation ...
Страница 158: ......
Страница 204: ...9 46 Cisco ASA Series Firewall CLI Configuration Guide Chapter 9 Network Address Translation NAT History for NAT ...
Страница 232: ...10 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 10 NAT Examples and Reference DNS and NAT ...
Страница 233: ...P A R T 3 Service Policies and Application Inspection ...
Страница 234: ......
Страница 379: ...P A R T 4 Connection Management and Threat Detection ...
Страница 380: ......
Страница 400: ...16 20 Cisco ASA Series Firewall CLI Configuration Guide Chapter 16 Connection Settings History for Connection Settings ...
Страница 414: ...17 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 Quality of Service History for QoS ...