Home > Cisco > Computer Equipment > Cisco Asdm 7 User Guide

Cisco Asdm 7 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 754
    							 
    26-5
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Information About the Botnet Traffic Filter
    How the Botnet Traffic Filter Works
    Figure 26-1 shows how the Botnet Traffic Filter works with the dynamic database plus DNS inspection 
    with Botnet Traffic Filter snooping.
    Figure 26-1 How the Botnet Traffic Filter Works with the Dynamic Database
    Figure 26-2 shows how the Botnet Traffic Filter works with the static database.
    Figure 26-2 How the Botnet Traffic Filter Works with the Static Database
    Security Appliance 
    DNS 
    Reverse 
    Lookup Cache 
    Infected 
    Host 
    Malware Home Site 
    209.165.201.3  Syslog Server Dynamic 
    Database 
    DNS Server 
    DNS Snoop
    1 DNS Request:
    bad.example.com
    3Connection to:
    209.165.201.3
    2 DNS Reply: 
    209.165.201.3 
    Internet
    Botnet Traffic
    Filter
    3b. Send
    Syslog Message/Drop Traffic
    1a. Match?
    3a. Match? 
    2a. Add
    248631
    Security Appliance 
    DNS
    Host Cache
    Infected 
    Host 
    Malware Home Site 
    209.165.201.3  Syslog Server Static 
    Database 
    DNS Server 
    Botnet Traffic
    Filter
    3Connection to:
    209.165.201.31a. DNS Request: 
    bad.example.com Internet
    3b. Send
    Syslog Message/Drop Traffic
    2a. Add
    1Add entry:
    bad.example.com
    2 DNS Reply: 
    209.165.201.3 
    3a. Match? 
    248632 
    						
    							 
    26-6
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Licensing Requirements for the Botnet Traffic Filter
    Licensing Requirements for the Botnet Traffic Filter
    The following table shows the licensing requirements for this feature:
    Prerequisites for the Botnet Traffic Filter
    To use the dynamic database, identify a DNS server for the ASA so that it can access the Cisco update 
    server URL. In multiple context mode, the system downloads the database for all contexts using the 
    admin context interface; be sure to identify a DNS server in the admin context.
    Guidelines and Limitations
    This section includes the guidelines and limitations for this feature.
    Context Mode Guidelines
    Supported in single and multiple context mode.
    Firewall Mode Guidelines
    Supported in routed and transparent firewall mode.
    Failover Guidelines
    Does not support replication of the DNS reverse lookup cache, DNS host cache, or the dynamic database 
    in Stateful Failover.
    IPv6 Guidelines
    Does not support IPv6.
    Additional Guidelines and Limitations
    TCP DNS traffic is not supported.
    You can add up to 1000 blacklist entries and 1000 whitelist entries in the static database.
    The packet tracer is not supported.
    Default Settings
    By default, the Botnet Traffic Filter is disabled, as is use of the dynamic database.
    For DNS inspection, which is enabled by default, Botnet Traffic Filter snooping is disabled by default. Model License Requirement
    All models You need the following licenses:
    Botnet Traffic Filter License.
    Strong Encryption (3DES/AES) License to download the dynamic database. 
    						
    							 
    26-7
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Configuring the Botnet Traffic Filter
    Configuring the Botnet Traffic Filter
    This section includes the following topics:
    Task Flow for Configuring the Botnet Traffic Filter, page 26-7
    Configuring the Dynamic Database, page 26-8
    Enabling DNS Snooping, page 26-9
    Adding Entries to the Static Database, page 26-9
    Enabling Traffic Classification and Actions for the Botnet Traffic Filter, page 26-10
    Blocking Botnet Traffic Manually, page 26-12
    Searching the Dynamic Database, page 26-13
    Task Flow for Configuring the Botnet Traffic Filter
    To configure the Botnet Traffic Filter, perform the following steps:
    Step 1Enable use of the dynamic database. See the “Configuring the Dynamic Database” section on page 26-8. 
    This procedure enables database updates from the Cisco update server, and also enables use of the 
    downloaded dynamic database by the ASA. Disallowing use of the downloaded database is useful in 
    multiple context mode so you can configure use of the database on a per-context basis.
    Step 2(Optional) Add static entries to the database. See the “Adding Entries to the Static Database” section on 
    page 26-9. 
    This procedure lets you augment the dynamic database with domain names or IP addresses that you want 
    to blacklist or whitelist. You might want to use the static database instead of the dynamic database if you 
    do not want to download the dynamic database over the Internet.
    Step 3Enable DNS snooping. See the “Enabling DNS Snooping” section on page 26-9. 
    This procedure enables inspection of DNS packets, compares the domain name with those in the 
    dynamic database or the static database (when a DNS server for the ASA is unavailable), and adds the 
    name and IP address to the DNS reverse lookup cache. This cache is then used by the Botnet Traffic 
    Filter when connections are made to the suspicious address.
    Step 4Enable traffic classification and actions for the Botnet Traffic Filter. See the “Enabling Traffic 
    Classification and Actions for the Botnet Traffic Filter” section on page 26-10. 
    This procedure enables the Botnet Traffic Filter, which compares the source and destination IP address 
    in each initial connection packet to the IP addresses in the dynamic database, static database, DNS 
    reverse lookup cache, and DNS host cache, and sends a syslog message or drops any matching traffic.
    Step 5(Optional) Block traffic manually based on syslog message information. See the “Blocking Botnet 
    Traffic Manually” section on page 26-12.
    If you choose not to block malware traffic automatically, you can block traffic manually by configuring 
    an access rule to deny traffic, or by using the shun command in the Command Line Interface tool to 
    block all traffic to and from a host. 
    						
    							 
    26-8
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Configuring the Botnet Traffic Filter
    Configuring the Dynamic Database
    This procedure enables database updates, and also enables use of the downloaded dynamic database by 
    the ASA. In multiple context mode, the system downloads the database for all contexts using the admin 
    context interface. You can configure use of the database on a per-context basis.
    By default, downloading and using the dynamic database is disabled.
    Prerequisites
    Enable ASA use of a DNS server in the Device Management > DNS > DNS Client > DNS Lookup area. 
    In multiple context mode, the system downloads the database for all contexts using the admin context 
    interface; be sure to identify a DNS server in the admin context.
    Detailed Steps
    Step 1Enable downloading of the dynamic database.
    In Single mode, choose the Configuration > Firewall > Botnet Traffic Filter > Botnet Database 
    pane, then check the Enable Botnet Updater Client check box.
    In multiple context mode in the System execution space, choose the Configuration > Device 
    Management > Botnet Database pane, then check the Enable Botnet Updater Client check box.
    This setting enables downloading of the dynamic database from the Cisco update server. In multiple 
    context mode, enter this command in the system execution space. If you do not have a database already 
    installed on the ASA, it downloads the database after approximately 2 minutes. The update server 
    determines how often the ASA polls the server for future updates, typically every hour.
    Step 2(Multiple context mode only) In multiple context mode, click Apply. Then change to the context where 
    you want to configure the Botnet Traffic Filter by double-clicking the context name in the Device List.
    Step 3In the Configuration > Firewall > Botnet Traffic Filter > Botnet Database > Dynamic Database 
    Configuration area, check the Use Botnet data dynamically downloaded from updater server check 
    box.
    Step 4Click Apply.
    Step 5(Optional) If you want to later remove the database from running memory, perform the following steps:
    a.Disable use of the database by unchecking the Use Botnet data dynamically downloaded from 
    updater server check box.
    b.Click Apply.
    c.Click Purge Botnet Database.
    d.To redownload the database, re-check the Use Botnet data dynamically downloaded from 
    updater server check box.
    e.Click Apply.
    NoteThe Fetch Botnet Database button is for testing purposes only; it downloads and verifies the dynamic 
    database, but does not store it in running memory.
    For information about the Search Dynamic Database area, see the “Searching the Dynamic Database”  
    						
    							 
    26-9
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Configuring the Botnet Traffic Filter
    section on page 26-13.
    What to Do Next
    See the “Adding Entries to the Static Database” section on page 26-9.
    Adding Entries to the Static Database
    The static database lets you augment the dynamic database with domain names or IP addresses that you 
    want to blacklist or whitelist. Static blacklist entries are always designated with a Very High threat level. 
    See the “Information About the Static Database” section on page 26-3 for more information. 
    Prerequisites
    In multiple context mode, perform this procedure in the context execution space.
    Enable ASA use of a DNS server in the Device Management > DNS > DNS Client > DNS Lookup 
    area. In multiple context mode, enable DNS per context.
    Detailed Steps
    Step 1Choose the Configuration > Firewall > Botnet Traffic Filter > Black or White List pane, click Add 
    for the Whitelist or Blacklist.
    The Enter hostname or IP Address dialog box appears.
    Step 2In the Addresses field, enter one or more domain names, IP addresses, and IP address/netmasks.
    Enter multiple entries separated by commas, spaces, lines, or semi-colons. You can enter up to 1000 
    entries for each type.
    Step 3Click OK.
    Step 4Click Apply.
    What to Do Next
    See the “Enabling DNS Snooping” section on page 26-9.
    Enabling DNS Snooping
    This procedure enables inspection of DNS packets and enables Botnet Traffic Filter snooping, which 
    compares the domain name with those on the dynamic database or static database, and adds the name 
    and IP address to the Botnet Traffic Filter DNS reverse lookup cache. This cache is then used by the 
    Botnet Traffic Filter when connections are made to the suspicious address.
    Prerequisites
    In multiple context mode, perform this procedure in the context execution space. 
    						
    							 
    26-10
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Configuring the Botnet Traffic Filter
    You must first configure DNS inspection for traffic that you want to snoop using the Botnet Traffic 
    Filter. See the “DNS Inspection” section on page 11-1 and Chapter 1, “Configuring a Service 
    Policy,” for detailed information about configuring advanced DNS inspection options using the 
    Modular Policy Framework.
    NoteYou can also configure DNS snooping directly in the Configuration > Firewall > Service 
    Policy Rules > Rule Actions > Protocol Inspection > Select DNS Inspect Map dialog box by 
    checking the Enable Botnet traffic filter DNS snooping check box.
    Restrictions
    TCP DNS traffic is not supported.
    Default DNS Inspection Configuration and Recommended Configuration
    The default configuration for DNS inspection inspects all UDP DNS traffic on all interfaces, and does 
    not have DNS snooping enabled. 
    We suggest that you enable DNS snooping only on interfaces where external DNS requests are going. 
    Enabling DNS snooping on all UDP DNS traffic, including that going to an internal DNS server, creates 
    unnecessary load on the ASA.
    For example, if the DNS server is on the outside interface, you should enable DNS inspection with 
    snooping for all UDP DNS traffic on the outside interface. 
    Detailed Steps
    Step 1Choose the Configuration > Firewall > Botnet Traffic Filter > DNS Snooping pane.
    All existing service rules that include DNS inspection are listed in the table.
    Step 2For each rule for which you want to enable DNS snooping, in the DNS Snooping Enabled column, check 
    the check box.
    Step 3Click Apply.
    What to Do Next
    See the “Enabling Traffic Classification and Actions for the Botnet Traffic Filter” section on page 26-10.
    Enabling Traffic Classification and Actions for the Botnet Traffic Filter
    This procedure enables the Botnet Traffic Filter. The Botnet Traffic Filter compares the source and 
    destination IP address in each initial connection packet to the following:
    Dynamic database IP addresses
    Static database IP addresses
    DNS reverse lookup cache (for dynamic database domain names)
    DNS host cache (for static database domain names) 
    						
    							 
    26-11
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Configuring the Botnet Traffic Filter
    When an address matches, the ASA sends a syslog message. The only additional action currently 
    available is to drop the connection.
    Prerequisites
    In multiple context mode, perform this procedure in the context execution space.
    Recommended Configuration
    Although DNS snooping is not required, we recommend configuring DNS snooping for maximum use 
    of the Botnet Traffic Filter (see the “Enabling DNS Snooping” section on page 26-9). Without DNS 
    snooping for the dynamic database, the Botnet Traffic Filter uses only the static database entries, plus 
    any IP addresses in the dynamic database; domain names in the dynamic database are not used.
    We recommend enabling the Botnet Traffic Filter on all traffic on the Internet-facing interface, and 
    enabling dropping of traffic with a severity of moderate and higher. 
    Detailed Steps
    Step 1Choose the Configuration > Firewall > Botnet Traffic Filter > Traffic Settings pane.
    Step 2To enable the Botnet Traffic Filter on specified traffic, perform the following steps:
    a.In the Traffic Classification area, check the Traffic Classified check box for each interface on which 
    you want to enable the Botnet Traffic Filter.
    You can configure a global classification that applies to all interfaces by checking the Traffic 
    Classified check box for Global (All Interfaces). If you configure an interface-specific 
    classification, the settings for that interface overrides the global setting.
    b.For each interface, from the AC L  U s e d drop-down list choose either --ALL TRAFFIC-- (the 
    default), or any ACL configured on the ASA.
    For example, you might want to monitor all port 80 traffic on the outside interface.
    To add or edit ACLs, click Manage ACL to bring up the ACL Manager. See the “Adding ACLs and 
    ACEs” section on page 21-2 in the general operations configuration guide for more information.
    Step 3(Optional) To treat greylisted traffic as blacklisted traffic for action purposes, in the Ambiguous Traffic 
    Handling area, check the Treat ambiguous (greylisted) traffic as malicious (blacklisted) traffic check 
    box.
    If you do not enable this option, greylisted traffic will not be dropped if you configure a rule in the 
    Blacklisted Traffic Actions area. See the “Botnet Traffic Filter Address Types” section on page 26-2 for 
    more information about the greylist.
    Step 4(Optional) To automatically drop malware traffic, perform the following steps.
    To manually drop traffic, see the “Blocking Botnet Traffic Manually” section on page 26-12.
    a.In the Blacklisted Traffic Actions area, click Add.
    The Add Blacklisted Traffic Action dialog box appears.
    b.From the Interface drop-down list, choose the interface on which you want to drop traffic. Only 
    interfaces on which you enabled Botnet Traffic Filter traffic classification are available.
    c.In the Threat Level area, choose one of the following options to drop traffic specific threat levels. 
    The default level is a range between Moderate and Very High. 
    						
    							 
    26-12
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Configuring the Botnet Traffic Filter
    NoteWe highly recommend using the default setting unless you have strong reasons for changing 
    the setting. 
    Value—Specify the threat level you want to drop:
    –Very Low
    –Low
    –Moderate
    –High
    –Very High
    NoteStatic blacklist entries are always designated with a Very High threat level. 
    Range—Specify a range of threat levels.
    d.In the ACL Used area, from the ACL  Use d drop-down list choose either --ALL TRAFFIC-- (the 
    default), or any ACL configured on the ASA.
    NoteBe sure the ACL is a subset of the traffic you specified in the Traffic Classification area.
    To add or edit ACLs, click Manage to bring up the ACL Manager. See the “Adding ACLs and ACEs” 
    section on page 21-2 in the general operations configuration guide for more information.
    e.Click OK.
    You return to the Traffic Settings pane.
    f.If you want to apply additional rules to a given interface, repeat steps a through e.
    Make sure you do not specify overlapping traffic in multiple rules for a given interface. Because you 
    cannot control the exact order that rules are matched, overlapping traffic means you do not know 
    which command will be matched. For example, do not specify both a rule that matches --ALL 
    TRAFFIC-- as well as a command with and ACL for a given interface. In this case, the traffic might 
    never match the command with the ACL. Similarly, if you specify multiple commands with ACLs, 
    make sure each ACL is unique, and that the networks do not overlap.
    Step 5Click Apply.
    Blocking Botnet Traffic Manually
    If you choose not to block malware traffic automatically (see the “Enabling Traffic Classification and 
    Actions for the Botnet Traffic Filter” section on page 26-10), you can block traffic manually by 
    configuring an access rule to deny traffic, or by using the shun command in the Command Line Interface 
    tool to block all traffic to and from a host. For some messages, you can automatically configure access 
    rules in ASDM. 
    						
    							 
    26-13
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Configuring the Botnet Traffic Filter
    For example, you receive the following syslog message:
    ASA-4-338002: Dynamic Filter permitted black listed TCP traffic from inside:10.1.1.45/6798 
    (209.165.201.1/7890) to outside:209.165.202.129/80 (209.165.202.129/80), destination 
    209.165.202.129 resolved from dynamic list: bad.example.com
    You can then perform one of the following actions:
    Create an access rule to deny traffic.
    For example, using the syslog message above, you might want to deny traffic from the infected host 
    at 10.1.1.45 to the malware site at 209.165.202.129. Or, if there are many connections to different 
    blacklisted addresses, you can create an ACL to deny all traffic from 10.1.1.45 until you resolve the 
    infection on the host computer. 
    For the following syslog messages, a reverse access rule can be automatically created from the Real 
    Time Log Viewer:
    –338001, 338002, 338003, 338004 (blacklist)
    –338201, 338202 (greylist)
    See Chapter 92, “Configuring Logging,” in the general operations configuration guide and 
    Chapter 7, “Configuring Access Rules,” for more information about creating an access rule.
    NoteIf you create a reverse access rule form a Botnet Traffic Filter syslog message, and you do 
    not have any other access rules applied to the interface, then you might inadvertently block 
    all traffic. Normally, without an access rule, all traffic from a high security to a low security 
    interface is allowed. But when you apply an access rule, all traffic is denied except traffic 
    that you explicitly permit. Because the reverse access rule is a deny rule, be sure to edit the 
    resulting access policy for the interface to permit other traffic.
    ACLs block all future connections. To block the current connection, if it is still active, enter 
    the clear conn command. For example, to clear only the connection listed in the syslog 
    message, enter the clear conn address 10.1.1.45 address 209.165.202.129 command. See 
    the command reference for more information.
    Shun the infected host.
    Shunning blocks all connections from the host, so you should use an ACL if you want to block 
    connections to certain destination addresses and ports. To shun a host, enter the following command 
    in Tools > Command Line Interface. To drop the current connection as well as blocking all future 
    connections, enter the destination address, source port, destination port, and optional protocol.
    shun src_ip [dst_ip src_port dest_port [protocol]]
    For example, to block future connections from 10.1.1.45, and also drop the current connection to the 
    malware site in the syslog message, enter:
    shun 10.1.1.45 209.165.202.129 6798 80
    After you resolve the infection, be sure to remove the ACL or the shun. To remove the shun, enter no 
    shun src_ip.
    Searching the Dynamic Database
    If you want to check if a domain name or IP address is included in the dynamic database, you can search 
    the database for a string. 
    						
    							 
    26-14
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 26      Configuring the Botnet Traffic Filter
      Monitoring the Botnet Traffic Filter
    Detailed Steps
    Step 1Go to the Search Dynamic Database area:
    In Single mode or within a context, choose the Configuration > Firewall > Botnet Traffic Filter 
    > Botnet Database Update pane.
    In multiple context mode in the System execution space, choose the Configuration > Device 
    Management > Botnet Database Update pane.
    Step 2In the Search string field, enter a string at least 3 characters in length, and click Find Now.
    The first two matches are shown. To refine your search for a more specific match, enter a longer string.
    Step 3To clear the displayed matches and the search string, click Clear, or you can just enter a new string and 
    click Find Now to get a new display.
    Monitoring the Botnet Traffic Filter
    Whenever a known address is classified by the Botnet Traffic Filter, then a syslog message is generated. 
    You can also monitor Botnet Traffic Filter statistics and other parameters by entering commands on the 
    ASA. This section includes the following topics:
    Botnet Traffic Filter Syslog Messaging, page 26-14
    Botnet Traffic Filter Monitor Panes, page 26-15
    Botnet Traffic Filter Syslog Messaging
    The Botnet Traffic Filter generates detailed syslog messages numbered 338nnn. Messages differentiate 
    between incoming and outgoing connections, blacklist, whitelist, or greylist addresses, and many other 
    variables. (The greylist includes addresses that are associated with multiple domain names, but not all 
    of these domain names are on the blacklist.)
    See the syslog messages guide for detailed information about syslog messages.
    For the following syslog messages, a reverse access rule can be automatically created from the Real Time 
    Log Viewer:
    338001, 338002, 338003, 338004 (blacklist)
    338201, 338202 (greylist)
    See Chapter 92, “Configuring Logging,” in the general operations configuration guide. 
    						
    All Cisco manuals Comments (0)