15-14
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 15 Threat Detection
History for Threat Detection
History for Threat Detection
Feature Name
Platform
Releases
Description
Basic and advanced threat detection statistics,
scanning threat detection
8.0(2)
Basic and advanced threat detection statistics, scanning
threat detection was introduced.
The following commands were introduced:
threat-detection basic-threat
,
threat-detection rate
,
show threat-detection rate
,
clear threat-detection rate,
threat-detection statistics
,
show threat-detection
statistics
,
threat-detection scanning-threat
,
threat-detection rate scanning-threat
,
show
threat-detection scanning-threat
,
show threat-detection
shun
,
clear threat-detection shun
.
Shun duration
8.0(4)/8.1(2)
You can now set the shun duration,
The following command was introduced:
threat-detection
scanning-threat shun duration
.
TCP Intercept statistics
8.0(4)/8.1(2)
TCP Intercept statistics were introduced.
The following commands were modified or introduced:
threat-detection statistics tcp-intercept
,
show
threat-detection statistics top tcp-intercept
,
clear
threat-detection statistics
.
Customize host statistics rate intervals
8.1(2)
You can now customize the number of rate intervals for
which statistics are collected. The default number of rates
was changed from 3 to 1.
The following command was modified:
threat-detection
statistics host number-of-rates
.
Burst rate interval changed to 1/30th of the
average rate.
8.2(1)
In earlier releases, the burst rate interval was 1/60th of the
average rate. To maximize memory usage, the sampling
interval was reduced to 30 times during the average rate.
Customize port and protocol statistics rate
intervals
8.3(1)
You can now customize the number of rate intervals for
which statistics are collected. The default number of rates
was changed from 3 to 1.
The following commands were modified:
threat-detection
statistics port number-of-rates
,
threat-detection
statistics protocol number-of-rates
.
Improved memory usage
8.3(1)
The memory usage for threat detection was improved.
The following command was introduced:
show
threat-detection memory
.
Summary of Contents for ASA 5512-X
Page 5: ...P A R T 1 Service Policies and Access Control ...
Page 6: ......
Page 51: ...P A R T 2 Network Address Translation ...
Page 52: ......
Page 127: ...P A R T 3 Application Inspection ...
Page 128: ......
Page 255: ...P A R T 4 Connection Settings and Quality of Service ...
Page 256: ......
Page 303: ...P A R T 5 Advanced Network Protection ...
Page 304: ......
Page 339: ...P A R T 6 ASA Modules ...
Page 340: ......