Cisco Systems ASA 5500 Network Router User Manual


  Open as PDF
of 1994
 
Contents
xl
Cisco ASA 5500 Series Configuration Guide using the CLI
How the Botnet Traffic Filter Works 55-5
Licensing Requirements for the Botnet Traffic Filter 55-6
Guidelines and Limitations 55-6
Default Settings 55-6
Configuring the Botnet Traffic Filter 55-6
Task Flow for Configuring the Botnet Traffic Filter 55-7
Configuring the Dynamic Database 55-7
Adding Entries to the Static Database 55-9
Enabling DNS Snooping 55-10
Enabling Traffic Classification and Actions for the Botnet Traffic Filter 55-12
Blocking Botnet Traffic Manually 55-15
Searching the Dynamic Database 55-16
Monitoring the Botnet Traffic Filter 55-17
Botnet Traffic Filter Syslog Messaging 55-17
Botnet Traffic Filter Commands 55-17
Configuration Examples for the Botnet Traffic Filter 55-19
Recommended Configuration Example 55-19
Other Configuration Examples 55-20
Where to Go Next 55-21
Feature History for the Botnet Traffic Filter 55-22
CHAPTER
56 Configuring Threat Detection 56-1
Information About Threat Detection 56-1
Licensing Requirements for Threat Detection 56-1
Configuring Basic Threat Detection Statistics 56-2
Information About Basic Threat Detection Statistics 56-2
Guidelines and Limitations 56-3
Default Settings 56-3
Configuring Basic Threat Detection Statistics 56-4
Monitoring Basic Threat Detection Statistics 56-5
Feature History for Basic Threat Detection Statistics 56-6
Configuring Advanced Threat Detection Statistics 56-6
Information About Advanced Threat Detection Statistics 56-6
Guidelines and Limitations 56-6
Default Settings 56-7
Configuring Advanced Threat Detection Statistics 56-7
Monitoring Advanced Threat Detection Statistics 56-9
Feature History for Advanced Threat Detection Statistics 56-14