Check: CASA-FW-000220
Cisco ASA Firewall STIG:
CASA-FW-000220
(in versions v2 r1 through v1 r4)
Title
The Cisco ASA must be configured to implement scanning threat detection. (Cat I impact)
Discussion
In a port scanning attack, an unauthorized application is used to scan the host devices for available services and open ports for subsequent use in an attack. This type of scanning can be used as a DoS attack when the probing packets are sent excessively.
Check Content
NOTE: When operating the ASA in multi-context mode with a separate IDPS, threat detection cannot be enabled and this check is Not Applicable. Review the ASA configuration to determine if scanning threat detection has been enabled. threat-detection scanning-threat shun NOTE: The parameter "shun" is an optional parameter in the Cisco documentation, but is required here to offer additional protection by dropping further connections from the threat. If the ASA has not been configured to enable scanning threat detection, this is a finding.
Fix Text
Configure scanning threat detection as shown in the example below. ASA(config)# threat-detection scanning-threat shun
Additional Identifiers
Rule ID: SV-239864r891328_rule
Vulnerability ID: V-239864
Group Title: SRG-NET-000362-FW-000028
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002385 |
Protect against or limit the effects of organization-defined types of denial-of-service events. |
Controls
Number | Title |
---|---|
SC-5 |
Denial of Service Protection |