Cisco ASA 5505 User Manual

Page 40

Advertising
background image

Contents

xl

Cisco ASA 5500 Series Configuration Guide using the CLI

How the Botnet Traffic Filter Works

55-5

Licensing Requirements for the Botnet Traffic Filter

55-6

Guidelines and Limitations

55-6

Default Settings

55-6

Configuring the Botnet Traffic Filter

55-6

Task Flow for Configuring the Botnet Traffic Filter

55-7

Configuring the Dynamic Database

55-7

Adding Entries to the Static Database

55-9

Enabling DNS Snooping

55-10

Enabling Traffic Classification and Actions for the Botnet Traffic Filter

55-12

Blocking Botnet Traffic Manually

55-15

Searching the Dynamic Database

55-16

Monitoring the Botnet Traffic Filter

55-17

Botnet Traffic Filter Syslog Messaging

55-17

Botnet Traffic Filter Commands

55-17

Configuration Examples for the Botnet Traffic Filter

55-19

Recommended Configuration Example

55-19

Other Configuration Examples

55-20

Where to Go Next

55-21

Feature History for the Botnet Traffic Filter

55-22

C H A P T E R

56

Configuring Threat Detection

56-1

Information About Threat Detection

56-1

Licensing Requirements for Threat Detection

56-1

Configuring Basic Threat Detection Statistics

56-2

Information About Basic Threat Detection Statistics

56-2

Guidelines and Limitations

56-3

Default Settings

56-3

Configuring Basic Threat Detection Statistics

56-4

Monitoring Basic Threat Detection Statistics

56-5

Feature History for Basic Threat Detection Statistics

56-6

Configuring Advanced Threat Detection Statistics

56-6

Information About Advanced Threat Detection Statistics

56-6

Guidelines and Limitations

56-6

Default Settings

56-7

Configuring Advanced Threat Detection Statistics

56-7

Monitoring Advanced Threat Detection Statistics

56-9

Feature History for Advanced Threat Detection Statistics

56-14

Advertising