Cisco Asdm 7 User Guide
Here you can view all the pages of manual Cisco Asdm 7 User Guide. The Cisco manuals for Computer Equipment are available online for free. You can easily download all the documents as PDF.
Page 621
27-9 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 27 Configuring Threat Detection Configuring Scanning Threat Detection Feature History for Scanning Threat Detection, page 27-11 Information About Scanning Threat Detection A typical scanning attack consists of a host that tests the accessibility of every IP address in a subnet (by scanning through many hosts in the subnet or sweeping through many ports in a host or subnet). The scanning threat detection feature determines when a...
Page 622
27-10 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 27 Configuring Threat Detection Configuring Scanning Threat Detection Default Settings Table 27-4 lists the default rate limits for scanning threat detection. The burst rate is calculated as the average rate every N seconds, where N is the burst rate interval. The burst rate interval is 1/30th of the rate interval or 10 seconds, whichever is larger. Configuring Scanning Threat Detection Detailed Steps Step 1Choose the...
Page 623
27-11 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 27 Configuring Threat Detection Configuring Scanning Threat Detection Feature History for Scanning Threat Detection Table 27-5 lists each feature change and the platform release in which it was implemented. ASDM is backwards-compatible with multiple platform releases, so the specific ASDM release in which support was added is not listed. Table 27-5 Feature History for Scanning Threat Detection Feature NamePlatform Releases...
Page 624
27-12 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 27 Configuring Threat Detection Configuring Scanning Threat Detection
Page 625
CH A P T E R 28-1 Cisco ASA Series Firewall ASDM Configuration Guide 28 Using Protection Tools This chapter describes some of the many tools available to protect your network and includes the following sections: Preventing IP Spoofing, page 28-1 Configuring the Fragment Size, page 28-2 Configuring TCP Options, page 28-3 Configuring IP Audit for Basic IPS Support, page 28-5 Preventing IP Spoofing This section lets you enable Unicast Reverse Path Forwarding on an interface. Unicast RPF guards against...
Page 626
28-2 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 28 Using Protection Tools Configuring the Fragment Size Anti-Spoofing Enabled—Shows whether an interface has Unicast RPF enabled, Yes or No. Enable—Enables Unicast RPF for the selected interface. Disable—Disables Unicast RPF for the selected interface. Configuring the Fragment Size By default, the ASA allows up to 24 fragments per IP packet, and up to 200 fragments awaiting reassembly. You might need to let fragments on your...
Page 627
28-3 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 28 Using Protection Tools Configuring TCP Options Timeout—Display only. Displays the number of seconds to wait for an entire fragmented packet to arrive. The timer starts after the first fragment of a packet arrives. If all fragments of the packet do not arrive by the number of seconds displayed, all fragments of the packet that were already received will be discarded. The default is 5 seconds. Threshold—Display only. Displays...
Page 628
28-4 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 28 Using Protection Tools Configuring TCP Options alters the packet to request 1200 bytes. See the “Controlling Fragmentation with the Maximum Transmission Unit and TCP Maximum Segment Size” section on page 11-8 for more information. –Force Minimum Segment Size for TCP—Overrides the maximum segment size to be no less than the number of bytes you set, between 48 and any maximum number. This feature is disabled by default (set...
Page 629
28-5 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 28 Using Protection Tools Configuring IP Audit for Basic IPS Support Configuring IP Audit for Basic IPS Support The IP audit feature provides basic IPS support for the ASA that does not have an AIP SSM. It supports a basic list of signatures, and you can configure the ASA to perform one or more actions on traffic that matches a signature. This section includes the following topics: IP Audit Policy, page 28-5 Add/Edit IP Audit...
Page 630
28-6 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 28 Using Protection Tools Configuring IP Audit for Basic IPS Support Fields Policy Name—Sets the IP audit policy name. You cannot edit the name after you add it. Policy Type—Sets the policy type. You cannot edit the policy type after you add it. –Attack—Sets the policy type as attack. –Information—Sets the policy type as informational. Action—Sets one or more actions to take when a packet matches a signature. If you do not choose...
All Cisco manuals