Solved

Cisco ASA 5510 Getting attacked, can't figure out how to stop it

Posted on 2013-02-06
2
2,628 Views
Last Modified: 2013-03-05
Over the past few weeks, we have been getting reports of incoming calls on our Sip trunk not being able to connect.  I think I finally narrowed it down and noticed that we seem to be getting attacked.  My thoughts are that my ASA is being overloaded with bogus requests from port scanning attacks.  When i did into the ASA logs, I show thousands of deny's from random IP's every hour.  I have tried but can't seem to stop this attack.  The port requests come in waves of 10 to 20 at a time.  The scan will come from an ip address about 20 times and then come froma  different ip.  It's always a different address and most of the time a different port.  Because it's so random, the basic threat detection doesn't seem to flag this as an attack.  

Nothing ever seems to show up in the Cisco Shun List.  Even when I force a port scan from a test website.  How can I get my firewall to ignore the crap and let the good stuff in.  The firewall is correctly denying all the bogus entries but I feel like that is causing the problem.  I thought maybe changing the embryonic connection limits or max client connections would help.  I changed the max embryonic connection to 10 but it didn't seem to help.  How can I get this attack to stop or setup the asa to just ignore the crap?

Here is some of my config.

 show running-config threat-detection
no threat-detection rate syn-attack rate-interval 600 average-rate 100 burst-rate 200
no threat-detection rate syn-attack rate-interval 3600 average-rate 80 burst-rate 160
threat-detection rate syn-attack rate-interval 600 average-rate 5 burst-rate 10
threat-detection basic-threat
threat-detection scanning-threat shun
threat-detection statistics
no threat-detection statistics tcp-intercept
0
Comment
Question by:CWadmins
2 Comments
 
LVL 16

Accepted Solution

by:
max_the_king earned 500 total points
ID: 38863439
Hi,
I'm not sure that the SIP trunk issue is related with those kind of attacks to your network: never seen an ASA falling down dos attacks ...
anyway you may want to read the following, where you'll find a lot of parameters that can be changed on your ASA to manage threat detection.
http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bd3913.shtml
you should be patient and tune parameters one at a time and see the results.
please note, however, that ASA, unless you have the IPS module, is not an IPS/IDS system.

max
0
 

Author Closing Comment

by:CWadmins
ID: 38953715
Turns out that the sip problems were not related to the DoS attack.  Had to change our external ip address to get it to stop but then the Sip issues continued.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sonicwall will not export settings 4 102
Palo Alto Networks: Truly No Hit Count? 2 85
How to get windows DNS resolve to internal address? 3 94
ASA DHCP setup 5 38
This article summarizes using a simple matrix to map the different type of phishing attempts and its targeted victims. It also run through many scam scheme scenario with "real" phished emails. There are safeguards highlighted to stay vigilance and h…
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question