I have basic threat detection turned on on a 5520 running 8.0(4) software. This is showing a number of "scanning" attacks. From the "sh threat-detection scanning-threat" command I can see the Targets and Attackers, but I would like more details. In particular I would like to know,
A - The targets attacked by a specific device.
B - The activity an attacker performed to put it on the list, i.e. port scan or IP scan.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...