Solved

ASA5510 Top Usage Status - top 10 sources/ destinations not working

Posted on 2009-04-02
6
8,866 Views
Last Modified: 2012-10-14
On the "Firewall Dashboard" of the ASDM, under Top Usage Status, Top 10 services is working but Top 10 Sources and Top 10 Destinations just report "No data available to display". Any ideas?
0
Comment
Question by:supportlansmart
6 Comments
 
LVL 33

Expert Comment

by:MikeKane
ID: 24051968
Sure, in the ASA you click on CONFIGURATION - FIREWALL - THREAT DETECTION - and enable the 'Scanning Threat Statistics' for all  of them.
0
 
LVL 33

Accepted Solution

by:
MikeKane earned 250 total points
ID: 24051992
OR from the CLI you could use :

For Access-lists
enable
threat-detection statistics access-list
disable
no threat-detection statistics access-list

For Services
enable
threat-detection statistics port
threat-detection statistics protocol
disable
threat-detection statistics port
threat-detection statistics protocol

For Sources Destinations (same command)
enable
threat-detection statistics host
disable
threat-detection statistics host
0
 

Author Comment

by:supportlansmart
ID: 24055688
The "threat-detection statistics host" was the only thing I was missing. Thanks for the help.
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 
LVL 33

Expert Comment

by:MikeKane
ID: 24060225
No problem, anything else you need then?
0
 

Expert Comment

by:Netsol-NOS
ID: 36277114
Is there any way to see which inside host has accessed the inside or top 10 inside hosts i.e. behind nat/pat
0
 

Expert Comment

by:vantseto
ID: 38495859
How can I exclude some IPs or ranges from the graph? 90% of my traffic is the failover link, thus rendering the graph pretty much useless.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
From Cisco ASA version 8.3, the Network Address Translation (NAT) configuration has been completely redesigned and it may be helpful to have the syntax configuration for both at a glance. You may as well want to read official Cisco published AS…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now