Cisco Systems and the ASA Services Module Network Router User Manual


 
Contents
xix
Cisco ASA Series Firewall CLI Configuration Guide
Botnet Traffic Filter Address Types 26-2
Botnet Traffic Filter Actions for Known Addresses 26-2
Botnet Traffic Filter Databases 26-2
Information About the Dynamic Database 26-2
Information About the Static Database 26-3
Information About the DNS Reverse Lookup Cache and DNS Host Cache 26-4
How the Botnet Traffic Filter Works 26-5
Licensing Requirements for the Botnet Traffic Filter 26-6
Prerequisites for the Botnet Traffic Filter 26-6
Guidelines and Limitations 26-6
Default Settings 26-6
Configuring the Botnet Traffic Filter 26-7
Task Flow for Configuring the Botnet Traffic Filter 26-7
Configuring the Dynamic Database 26-8
Adding Entries to the Static Database 26-9
Enabling DNS Snooping 26-10
Enabling Traffic Classification and Actions for the Botnet Traffic Filter 26-12
Blocking Botnet Traffic Manually 26-15
Searching the Dynamic Database 26-16
Monitoring the Botnet Traffic Filter 26-17
Botnet Traffic Filter Syslog Messaging 26-17
Botnet Traffic Filter Commands 26-17
Configuration Examples for the Botnet Traffic Filter 26-19
Recommended Configuration Example 26-19
Other Configuration Examples 26-20
Where to Go Next 26-21
Feature History for the Botnet Traffic Filter 26-22
CHAPTER
27 Configuring Threat Detection 27-1
Information About Threat Detection 27-1
Licensing Requirements for Threat Detection 27-1
Configuring Basic Threat Detection Statistics 27-2
Information About Basic Threat Detection Statistics 27-2
Guidelines and Limitations 27-3
Default Settings 27-3
Configuring Basic Threat Detection Statistics 27-4
Monitoring Basic Threat Detection Statistics 27-5
Feature History for Basic Threat Detection Statistics 27-6