Limit connection per IP
Often a load can be generated from unique single (or a group of IPs). To limit the number of connection.
access-list http_conn_limit extended permit tcp any any eq www ! access-list http_conn_limit extended permit tcp any any eq https ! you can add any other ACL to catch the intresting traffic class-map http_conn_limit_class match access-list http_conn_limit policy-map http_conn_limit_map class http_conn_limit_class set connection per-client-max 100 service-policy global_policy global service-policy http_conn_limit_map interface outside
Reference:
http://rtomaszewski.blogspot.co.uk/2013/12/cisco-asa-connection-table-state.html
http://www.itlibrary.net/index.php/cisco-asa/8-limiting-connections-rate-for-traffic-destined-on-port-80
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mpc.html
http://blog.ine.com/2009/04/19/understanding-modular-policy-framework/
Kick off a client sessions
If you identify a client that you want to deny traffic and close all its connections.
access-list 101 extended deny ip host [ip] any shun [ip] no shun [ip]
No comments:
Post a Comment