Cisco Systems ASA 5580 Network Router User Manual


  Open as PDF
of 2086
 
60-5
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter 60 Configuring Threat Detection
Configuring Advanced Threat Detection Statistics
Feature History for Basic Threat Detection Statistics
Table 60-2 lists each feature change and the platform release in which it was implemented. ASDM is
backwards-compatible with multiple platform releases, so the specific ASDM release in which support
was added is not listed.
Configuring Advanced Threat Detection Statistics
You can configure the ASA to collect extensive statistics. This section includes the following topics:
Information About Advanced Threat Detection Statistics, page 60-5
Guidelines and Limitations, page 60-5
Default Settings, page 60-6
Configuring Advanced Threat Detection Statistics, page 60-6
Monitoring Advanced Threat Detection Statistics, page 60-7
Feature History for Advanced Threat Detection Statistics, page 60-8
Information About Advanced Threat Detection Statistics
Advanced threat detection statistics show both allowed and dropped traffic rates for individual objects
such as hosts, ports, protocols, or access lists.
Caution Enabling advanced statistics can affect the ASA performance, depending on the type of statistics
enabled. Enabling host statistics affects performance in a significant way; if you have a high traffic load,
you might consider enabling this type of statistics temporarily. Port statistics, however, has modest
impact.
Guidelines and Limitations
This section includes the guidelines and limitations for this feature:
Table 60-2 Feature History for Basic Threat Detection Statistics
Feature Name
Platform
Releases Feature Information
Basic threat detection statistics 8.0(2) Basic threat detection statistics was introduced.
The following screen was introduced: Configuration >
Firewall > Threat Detection, Home > Firewall Dashboard >
Traffic Overview.
Burst rate interval changed to 1/30th of the
average rate.
8.2(1) In earlier releases, the burst rate interval was 1/60th of the
average rate. To maximize memory usage, the sampling
interval was reduced to 30 times during the average rate.
Improved memory usage 8.3(1) The memory usage for threat detection was improved.