Ahriakin wrote: » Have you though about using something like Bothunter instead?
Ahriakin wrote: » You could NAT on your perimeter device for the ASA outside address (presuming since you have an assigned set of Pub IPs you have another internet connected device).
Ahriakin wrote: » But so are Darknets, unless you are looking for more of a Honeypot service. Darknets are usually deployed within your network with a Sniffer of some sort on a routed but completely unused subnet, essentially you want to build a Zone that legitimate traffic should never go to so you get the cleanest possible indicator of potentially malicious traffic (like WORMs, Scans etc.) from inside hosts. If you are capturing malicious internet sourced traffic on an internal Darknet then you've got some pretty serious perimeter defense issues (which I guess could also be your aim to detect that )