This document describes the process of configuring threat detection capabilities for Remote Access VPN on Cisco Secure Firewall ASA.
Cisco recommends you have knowledge of these topics:
These threat detection features are supported in the next Cisco Secure Firewall ASA versions:
The information described in this document is based on these hardware and software versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Threat detection features for remote access VPN services help prevent Denial of Service (DoS) attacks from IPv4 addresses by automatically blocking the host (IP address) that exceeds the configured thresholds, to prevent further attempts until you manually remove the shun of the IP address. There are separate services available for the next types of attack:
These attacks, even when unsuccessful in their attempt to gain access, can consume computational resources and prevent valid users from connecting to the remote access VPN services.
When you enable these services, the Secure Firewall automatically shuns the host (IP address) that exceeds the configured thresholds, to prevent further attempts until you manually remove the shun of the IP address.
Log in to the Secure Firewall Command Line Interface (CLI) in global configuration mode and enable one or more of the available threat detection services for remote access VPN:
To enable this service, run the threat-detection service invalid-vpn-access command.
To enable this service, run the threat-detection service remote-access-client-initiations hold-down <minutes> threshold <count> command, where:
For example, if the hold-down period is 10 minutes and the threshold is 20, the IPv4 address is automatically shunned if there are 20 consecutive connection attempts within any 10-minute span.
To enable this service, run the threat-detection service remote-access-authentication hold-down<minutes> threshold <count> command, where:
For example, if the hold-down period is 10 minutes and the threshold is 20, the IPv4 address is automatically shunned if there are 20 consecutive authentication failures within any 10-minute span.
The next example configuration enables the three available threat detection services for remote access VPN with a hold-down period of 10 minutes and a threshold of 20 for client initiation and failed authentication attempts.
threat-detection service invalid-vpn-access
threat-detection service remote-access-client-initiations hold-down 10 threshold 20
threat-detection service remote-access-authentication hold-down 10 threshold 20
To display statistics for threat detection RAVPN services, run the show threat-detection service [service] [entries|details] command. Where the service can be: remote-access-authentication, remote-access-client-initiations, or invalid-vpn-access.
You can limit the view further by adding these parameters:
Run the show threat-detection service command to display statistics of all the threat detection services that are enabled.
ciscoasa# show threat-detection service
Service: invalid-vpn-access
State : Enabled
Hold-down : 1 minutes
Threshold : 1
Stats:
failed : 0
blocking : 0
recording : 0
unsupported : 0
disabled : 0
Total entries: 0
Service: remote-access-authentication
State : Enabled
Hold-down : 10 minutes
Threshold : 20
Stats:
failed : 0
blocking : 1
recording : 4
unsupported : 0
disabled : 0
Total entries: 2
Name: remote-access-client-initiations
State : Enabled
Hold-down : 10 minutes
Threshold : 20
Stats:
failed : 0
blocking : 0
recording : 0
unsupported : 0
disabled : 0
Total entries: 0
To view more details of potential attackers that are being tracked for the remote-access-authentication service, run the show threat-detection service <service> entries command.
ciscoasa# show threat-detection service remote-access-authentication entries
Service: remote-access-authentication
Total entries: 2
Idx Source Interface Count Age Hold-down
--- ------------------- -------------------- -------------- ---------- ---------
1 192.168.100.101/ 32 outside 1 721 0
2 192.168.100.102/ 32 outside 2 486 114
Total number of IPv4 entries: 2
NOTE: Age is in seconds since last reported. Hold-down is in seconds remaining.
To view the general statistics and details of a specific threat detection remote access VPN service run the show threat-detection service <service> details command.
ciscoasa# show threat-detection service remote-access-authentication details
Service: remote-access-authentication
State : Enabled
Hold-down : 10 minutes
Threshold : 20
Stats:
failed : 0
blocking : 1
recording : 4
unsupported : 0
disabled : 0
Total entries: 2
Idx Source Interface Count Age Hold-down
--- ------------------- -------------------- -------------- ---------- ---------
1 192.168.100.101/ 32 outside 1 721 0
2 192.168.100.102/ 32 outside 2 486 114
Total number of IPv4 entries: 2
NOTE: Age is in seconds since last reported. Hold-down is in seconds remaining.
Additionally, you can monitor shuns applied by the VPN services, and remove shuns for a single IP address or all the IP addresses with the next commands:
Shows shunned hosts, including those shunned automatically by threat detection for VPN services, or manually using the shun command. You can optionally limit the view to a specified IP address.
Removes a shun applied to the specified IP address.
If an IP address is shunned on multiple interfaces and no specific interface is mentioned, the command removes the shun from only one interface. The selection of this interface is based on a route lookup for the shunned IP address. To remove the shun from additional interfaces, you must explicitly specify the interface.
Removes the shun from all IP addresses and all interfaces.
To read all the details for each command output and available syslog messages related to the threat detection services for remote access VPN, please refer to the Cisco Secure Firewall ASA Firewall CLI Configuration Guide, 9.20. Chapter: Threat Detection document.
| Revision | Publish Date | Comments |
|---|---|---|
3.0 |
22-Apr-2026
|
Updated Machine Translation and Formatting. |
2.0 |
25-Oct-2024
|
Updated Background Information for further clarity. |
1.0 |
27-Aug-2024
|
Initial Release |