Blog | G5 Cyber Security

Cisco ASA 5505: Blocking a DDoS Attack

TL;DR

Yes, a Cisco ASA 5505 can mitigate some types of Distributed Denial-of-Service (DDoS) attacks, but its capabilities are limited compared to dedicated DDoS protection appliances. This guide focuses on using the ASA’s built-in features – Access Control Lists (ACLs), Connection Limiting, and Intrusion Prevention System (IPS) signatures – to reduce the impact of common DDoS attacks.

Blocking a DDoS Attack with Cisco ASA 5505

  1. Understand the Attack
  • Access Control Lists (ACLs) – Blocking Known Bad IPs
  • If you can identify specific malicious IP addresses, block them using ACLs.

    access-list outside_in extended deny ip host  any
    interface GigabitEthernet0/0
     access-group outside_in in 
  • Connection Limiting – Rate Limiting Connections
  • Limit the number of connections allowed from a single IP address to protect against SYN floods and other connection-based attacks.

    class-map type inspect match-any SYN_FLOOD
     match protocol tcp eq syn
    policy-map type inspect outside_in class SYN_FLOOD
     drop 
    service-policy type inspect outside_in class SYN_FLOOD
  • Intrusion Prevention System (IPS) – Using Signatures
  • Enable IPS signatures to detect and block known DDoS attack patterns.

  • Monitor ASA Resources
  • Continuously monitor CPU usage, memory utilization, and interface bandwidth to assess the attack’s impact.

  • Consider Cloud-Based DDoS Protection
  • The ASA 5505 has limited capacity. For large or sophisticated attacks, consider using a cloud-based DDoS protection service that can absorb and mitigate the attack before it reaches your network.

    Exit mobile version