EasyManuals Logo

Cisco ASA 5512-X Configuration Guide

Cisco ASA 5512-X
428 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #420 background imageLoading...
Page #420 background image
18-6
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 18 Threat Detection
Configure Threat Detection
Procedure
Step 1 (Optional) Enable all statistics.
threat-detection statistics
Example:
hostname(config)# threat-detection statistics
To enable only certain statistics, enter this command for each statistic type (shown in this table), and do
not also enter the command without any options. You can enter threat-detection statistics (without any
options) and then customize certain statistics by entering the command with statistics-specific options
(for example, threat-detection statistics host number-of-rate 2). If you enter threat-detection
statistics (without any options) and then enter a command for specific statistics, but without any
statistic-specific options, then that command has no effect because it is already enabled.
If you enter the no form of this command, it removes all threat-detection statistics commands,
including the threat-detection statistics access-list command, which is enabled by default.
Step 2 (Optional) Enable statistics for ACLs (if they were disabled previously).
threat-detection statistics access-list
Example:
hostname(config)# threat-detection statistics access-list
Statistics for ACLs are enabled by default. ACL statistics are only displayed using the show
threat-detection top access-list command. This command is enabled by default.
Step 3 (Optional) Configure statistics for hosts (host keyword), TCP and UDP ports (port keyword), or
non-TCP/UDP IP protocols (protocol keyword).
threat-detection statistics {host | port | protocol} [number-of-rate {1 | 2 | 3}]
Example:
hostname(config)# threat-detection statistics host number-of-rate 2
hostname(config)# threat-detection statistics port number-of-rate 2
hostname(config)# threat-detection statistics protocol number-of-rate 3
The number-of-rate keyword sets the number of rate intervals maintained for statistics. The default
number of rate intervals is 1, which keeps the memory usage low. To view more rate intervals, set the
value to 2 or 3. For example, if you set the value to 3, then you view data for the last 1 hour, 8 hours, and
24 hours. If you set this keyword to 1 (the default), then only the shortest rate interval statistics are
maintained. If you set the value to 2, then the two shortest intervals are maintained.
The host statistics accumulate for as long as the host is active and in the scanning threat host database.
The host is deleted from the database (and the statistics cleared) after 10 minutes of inactivity.
Step 4 (Optional) Configure statistics for attacks intercepted by TCP Intercept (to enable TCP Intercept, see
Protect Servers from a SYN Flood DoS Attack (TCP Intercept), page 16-4).
threat-detection statistics tcp-intercept [rate-interval minutes]
[burst-rate attacks_per_sec] [average-rate attacks_per_sec]
Example:
hostname(config)# threat-detection statistics tcp-intercept rate-interval 60 burst-rate
800 average-rate 600

Table of Contents

Other manuals for Cisco ASA 5512-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA 5512-X and is the answer not in the manual?

Cisco ASA 5512-X Specifications

General IconGeneral
Firewall Throughput1.2 Gbps
VPN Throughput200 Mbps
Maximum VPN Peers250
Integrated IPSYes
IPS Throughput250 Mbps
RAM4 GB
Power SupplyAC, 100-240V
Security Contexts2 (Standard), 50 (with Security Contexts license)
Interfaces6 x Gigabit Ethernet
Dimensions (H x W x D)1.75 x 17.5 x 14.5 inches
Weight16 lbs

Related product manuals