Contents
xl
Cisco ASA 5500 Series Configuration Guide using the CLI
How the Botnet Traffic Filter Works 55-5
Licensing Requirements for the Botnet Traffic Filter 55-6
Guidelines and Limitations 55-6
Default Settings 55-6
Configuring the Botnet Traffic Filter 55-6
Task Flow for Configuring the Botnet Traffic Filter 55-7
Configuring the Dynamic Database 55-7
Adding Entries to the Static Database 55-9
Enabling DNS Snooping 55-10
Enabling Traffic Classification and Actions for the Botnet Traffic Filter 55-12
Blocking Botnet Traffic Manually 55-15
Searching the Dynamic Database 55-16
Monitoring the Botnet Traffic Filter 55-17
Botnet Traffic Filter Syslog Messaging 55-17
Botnet Traffic Filter Commands 55-17
Configuration Examples for the Botnet Traffic Filter 55-19
Recommended Configuration Example 55-19
Other Configuration Examples 55-20
Where to Go Next 55-21
Feature History for the Botnet Traffic Filter 55-22
CHAPTER
56 Configuring Threat Detection 56-1
Information About Threat Detection 56-1
Licensing Requirements for Threat Detection 56-1
Configuring Basic Threat Detection Statistics 56-2
Information About Basic Threat Detection Statistics 56-2
Guidelines and Limitations 56-3
Default Settings 56-3
Configuring Basic Threat Detection Statistics 56-4
Monitoring Basic Threat Detection Statistics 56-5
Feature History for Basic Threat Detection Statistics 56-6
Configuring Advanced Threat Detection Statistics 56-6
Information About Advanced Threat Detection Statistics 56-6
Guidelines and Limitations 56-6
Default Settings 56-7
Configuring Advanced Threat Detection Statistics 56-7
Monitoring Advanced Threat Detection Statistics 56-9
Feature History for Advanced Threat Detection Statistics 56-14