18-14
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 18 Threat Detection
History for Threat Detection
History for Threat Detection
Feature Name
Platform
Releases
Description
Basic and advanced threat detection statistics,
scanning threat detection
8.0(2)
Basic and advanced threat detection statistics, scanning
threat detection was introduced.
The following commands were introduced:
threat-detection basic-threat
,
threat-detection rate
,
show threat-detection rate
,
clear threat-detection rate,
threat-detection statistics
,
show threat-detection
statistics
,
threat-detection scanning-threat
,
threat-detection rate scanning-threat
,
show
threat-detection scanning-threat
,
show threat-detection
shun
,
clear threat-detection shun
.
Shun duration
8.0(4)/8.1(2)
You can now set the shun duration,
The following command was introduced:
threat-detection
scanning-threat shun duration
.
TCP Intercept statistics
8.0(4)/8.1(2)
TCP Intercept statistics were introduced.
The following commands were modified or introduced:
threat-detection statistics tcp-intercept
,
show
threat-detection statistics top tcp-intercept
,
clear
threat-detection statistics
.
Customize host statistics rate intervals
8.1(2)
You can now customize the number of rate intervals for
which statistics are collected. The default number of rates
was changed from 3 to 1.
The following command was modified:
threat-detection
statistics host number-of-rates
.
Burst rate interval changed to 1/30th of the
average rate.
8.2(1)
In earlier releases, the burst rate interval was 1/60th of the
average rate. To maximize memory usage, the sampling
interval was reduced to 30 times during the average rate.
Customize port and protocol statistics rate
intervals
8.3(1)
You can now customize the number of rate intervals for
which statistics are collected. The default number of rates
was changed from 3 to 1.
The following commands were modified:
threat-detection
statistics port number-of-rates
,
threat-detection
statistics protocol number-of-rates
.
Improved memory usage
8.3(1)
The memory usage for threat detection was improved.
The following command was introduced:
show
threat-detection memory
.
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......