Cisco ASA 5505 User Manual

Page 1178

Advertising
background image

55-14

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 55 Configuring the Botnet Traffic Filter

Configuring the Botnet Traffic Filter

Step 3

(Optional)

dynamic-filter drop blacklist

[interface

name] [action-classify-list

subset_access_list] [threat-level {eq

level | range min max}]

Example:

hostname(config)# dynamic-filter drop

blacklist interface outside

action-classify-list

dynamic-filter_acl_subset threat-level

range moderate very-high

Automatically drops malware traffic. To manually drop traffic,
see the

“Blocking Botnet Traffic Manually” section on

page 55-15

.

Be sure to first configure a dynamic-filter enable command to
monitor any traffic you also want to drop.

You can set an interface policy using the interface keyword, or a
global policy (where you do not specify the interface keyword).
Any interface-specific commands take precedence over the global
command. You can enter this command multiple times for each
interface and global policy.

The action-classify-list keyword limits the traffic dropped to a
subset of monitored traffic. The dropped traffic must always be
equal to or a subset of the monitored traffic. For example, if you
specify an access list for the dynamic-filter enable command,
and you specify the action-classify-list for this command, then it
must be a subset of the dynamic-filter enable access list.

Make sure you do not specify overlapping traffic in multiple
commands for a given interface/global policy. Because you
cannot control the exact order that commands are matched,
overlapping traffic means you do not know which command will
be matched. For example, do not specify both a command that
matches all traffic (without the action-classify-list keyword) as
well as a command with the action-classify-list keyword for a
given interface. In this case, the traffic might never match the
command with the action-classify-list keyword. Similarly, if you
specify multiple commands with the action-classify-list
keyword, make sure each access list is unique, and that the
networks do not overlap.

You can additionally limit the traffic dropped by setting the threat
level. If you do not explicitly set a threat level, the level used is
threat-level range moderate very-high.

Note

We highly recommend using the default setting unless you
have strong reasons for changing the setting.

The level and min and max options are:

very-low

low

moderate

high

very-high

Note

Static blacklist entries are always designated with a Very
High threat level.

Command

Purpose

Advertising