Cisco Systems Home Security System IPS4510K9 User Manual

Cisco Intrusion Prevention System Sensor  
CLI Configuration Guide for IPS 7.2  
Americas Headquarters  
Cisco Systems, Inc.  
170 West Tasman Drive  
San Jose, CA 95134-1706  
USA  
800 553-NETS (6387)  
Fax: 408 527-0883  
Text Part Number: OL-29168-01  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
iv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
v
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
vi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
vii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
viii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
x
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Routers 14-25  
Routers 14-26  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xiii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xiv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
ROMMON 21-15  
MainApp A-6  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xviii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Blocking C-35  
Logging C-44  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xx  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xxi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
xxii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Preface  
Published: April 29, 2013, OL-29168-01  
Contents  
Audience  
This document describes how to configure the sensor using the Cisco IPS 7.2 CLI. It contains the  
following sections:  
This guide is intended for administrators who need to do the following:  
Configure the sensor for intrusion prevention using the CLI.  
Secure their network with IPS sensors.  
Prevent intrusion on their networks and monitor subsequent alerts.  
Organization  
This guide includes the following sections:  
Section  
Title  
Description  
1
Describes the purpose of the CLI Configuration  
Guide.  
2
3
Describes how to log in to the various sensors.  
Describes how to use the setup command to  
initialize sensors.  
4
Describes how to use the CLI to configure initial  
settings on the sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
-xxiii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter  
Organization  
Section  
Title  
Description  
5
Describes how to configure promiscuous, inline,  
inline VLAN pair, and VLAN group interfaces.  
6
7
Describes how to configure virtual sensors.  
Describes how to configure event action rules  
policies on the sensor.  
8
9
Describes how to add, clone, and edit signatures.  
Describes how to configure anomaly detection  
policies on the sensor.  
10  
11  
12  
13  
14  
Describes how to configure global correlation  
features on the sensor.  
Describes how to configure external product  
interfaces for CSA MC.  
Describes how to configure IP logging on the  
sensor.  
Describes how to display and capture live traffic  
on sensor interfaces.  
Describes how to configure blocking and rate  
limiting on Cisco routers, and switches, and how  
to configure a master blocking sensor.  
15  
16  
Describes how to configure SNMP on the sensor.  
“Working With Configuration Files” Describes how to use configuration files on the  
sensor.  
17  
18  
19  
20  
21  
“Administrative Tasks for the Sensor” Describes various administrative procedures to  
help you keep your sensor working and up to date.  
Describes how to configure the  
ASA 5500-X IPS SSP.  
Describes how to configure the  
ASA 5585-X IPS SSP.  
Describes where to go to get the latest IPS  
software and describes the naming conventions.  
Describes how to upgrade sensors and reimage the  
various sensors.  
A
B
Describes the IPS system architecture.  
Describes the IPS signature engines and their  
parameters.  
C
Contains troubleshooting tips for IPS hardware  
and software.  
D
E
Lists the CLI error messages.  
“Open Source License Files Used In Lists the open source license files used by the IPS.  
Cisco IPS 7.2”  
Contains IPS acronyms and terms.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
-xxiv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter  
Conventions  
Conventions  
This document uses the following conventions:  
Convention Indication  
bold font  
italic font  
Commands and keywords and user-entered text appear in bold font.  
Document titles, new or emphasized terms, and arguments for which you supply  
values are in italic font.  
[ ]  
Elements in square brackets are optional.  
{x | y | z }  
Required alternative keywords are grouped in braces and separated by  
vertical bars.  
[ x | y | z ]  
string  
Optional alternative keywords are grouped in brackets and separated by  
vertical bars.  
A nonquoted set of characters. Do not use quotation marks around the string or  
the string will include the quotation marks.  
courierfont  
< >  
Terminal sessions and information the system displays appear in courier font.  
Nonprinting characters such as passwords are in angle brackets.  
Default responses to system prompts are in square brackets.  
[ ]  
!, #  
An exclamation point (!) or a pound sign (#) at the beginning of a line of code  
indicates a comment line.  
Note  
Tip  
Means reader take note.  
Means the following information will help you solve a problem.  
Caution  
Means reader be careful. In this situation, you might perform an action that could result in equipment  
damage or loss of data.  
Timesaver  
Warning  
Means the described action saves time. You can save time by performing the action described in  
the paragraph.  
Means reader be warned. In this situation, you might perform an action that could result in  
bodily injury.  
Related Documentation  
For a complete list of the Cisco IPS 7.2 documentation and where to find it, refer to the following URL:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
-xxv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter  
Obtaining Documentation and Submitting a Service Request  
For a complete list of the Cisco ASA 5500 series documentation and where to find it, refer to the  
following URL:  
Obtaining Documentation and Submitting a Service Request  
For information on obtaining documentation, submitting a service request, and gathering additional  
information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and  
revised Cisco technical documentation, at:  
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed  
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free  
service and Cisco currently supports RSS Version 2.0.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
-xxvi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
C H A P T E R  
ii  
Logging In to the Sensor  
This chapter explains how to log in to the sensor. It contains the following sections:  
Logging In Notes and Caveats  
The following notes and caveats apply to logging in to the sensor:  
All IPS platforms allow ten concurrent log in sessions.  
The service role is a special role that allows you to bypass the CLI if needed. Only a user with  
administrator privileges can edit the service account.  
You must initialize the appliance (run the setup command) from the console. After networking is  
configured, SSH and Telnet are available. You can log in to the appliance from a console port.  
You log in to the ASA 5500-X IPS SSP and ASA 5585-X IPS SSP from the adaptive security  
appliance.  
Supported User Roles  
You can log in with the following user privileges:  
Administrator  
Operator  
Viewer  
Service  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ii-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter ii Logging In to the Sensor  
Logging In to the Appliance  
The service role does not have direct access to the CLI. Service account users are logged directly into a  
bash shell. Use this account for support and troubleshooting purposes only. Unauthorized modifications  
are not supported and will require the sensor to be reimaged to guarantee proper operation. You can  
create only one user with the service role.  
When you log in to the service account, you receive the following warning:  
******************************** WARNING *****************************************  
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED.  
This account is intended to be used for support and troubleshooting purposes only.  
Unauthorized modifications are not supported and will require this device to be re-imaged  
to guarantee proper operation.  
**********************************************************************************  
Note  
The service role is a special role that allows you to bypass the CLI if needed. Only a user with  
administrator privileges can edit the service account.  
For More Information  
For the procedure for creating the service account, see Creating the Service Account, page 3-28.  
For the procedures for adding and deleting users, see Configuring Authentication and User  
Logging In to the Appliance  
Note  
You can log in to the appliance from a console port. The currently supported Cisco IPS appliances are  
the IPS 4345, IPS 4360, IPS 4510, and IPS 4520.  
To log in to the appliance, follow these steps:  
Step 1  
Step 2  
Connect a console port to the sensor to log in to the appliance.  
Enter your username and password at the login prompt.  
Note  
The default username and password are both cisco. You are prompted to change them the first  
time you log in to the appliance.You must first enter the UNIX password, which is cisco. Then  
you must enter the new password twice.  
login: cisco  
Password:  
***NOTICE***  
This product contains cryptographic features and is subject to United States and local  
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic  
products does not imply third-party authority to import, export, distribute or use  
encryption. Importers, exporters, distributors and users are responsible for compliance  
with U.S. and local country laws. By using this product you agree to comply with  
applicable laws and regulations. If you are unable to comply with U.S. and local laws,  
return this product immediately.  
A summary of U.S. laws governing Cisco cryptographic products may be found at:  
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html  
If you require further assistance please contact us by sending email to [email protected].  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ii-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter ii Logging In to the Sensor  
Connecting an Appliance to a Terminal Server  
***LICENSE NOTICE***  
There is no license key installed on the system.  
Please go to http://www.cisco.com/go/license to obtain a new license or install a license.  
sensor#  
For More Information  
For the procedure for connecting an appliance to a terminal server, see Connecting an Appliance to  
For the procedure for using the setup command to initialize the appliance, see Basic Sensor Setup,  
Connecting an Appliance to a Terminal Server  
A terminal server is a router with multiple, low speed, asynchronous ports that are connected to other  
serial devices. You can use terminal servers to remotely manage network equipment, including  
appliances. To set up a Cisco terminal server with RJ-45 or hydra cable assembly connections, follow  
these steps:  
Step 1  
Step 2  
Connect to a terminal server using one of the following methods:  
For terminal servers with RJ-45 connections, connect a rollover cable from the console port on the  
appliance to a port on the terminal server.  
For hydra cable assemblies, connect a straight-through patch cable from the console port on the  
appliance to a port on the terminal server.  
Configure the line and port on the terminal server. In enable mode, enter the following configuration,  
where # is the line number of the port to be configured.  
config t  
line #  
login  
transport input all  
stopbits 1  
flowcontrol hardware  
speed 9600  
exit  
exit  
wr mem  
Step 3  
Be sure to properly close a terminal session to avoid unauthorized access to the appliance. If a terminal  
session is not stopped properly, that is, if it does not receive an exit(0) signal from the application that  
initiated the session, the terminal session can remain open. When terminal sessions are not stopped  
properly, authentication is not performed on the next session that is opened on the serial port.  
Caution  
Always exit your session and return to a login prompt before terminating the application used to establish  
the connection.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ii-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter ii Logging In to the Sensor  
Logging In to the ASA 5500-X IPS SSP  
Caution  
If a connection is dropped or terminated by accident, you should reestablish the connection and exit  
normally to prevent unauthorized access to the appliance.  
Logging In to the ASA 5500-X IPS SSP  
You log in to the ASA 5500-X IPS SSP from the adaptive security appliance.  
To session in to the ASA 5500-X IPS SSP from the adaptive security appliance, follow these steps:  
Step 1  
Log in to the adaptive security appliance.  
Note  
If the adaptive security appliance is operating in multi-mode, use the change system command  
to get to the system level prompt before continuing.  
Step 2  
Step 3  
Session to the IPS. You have 60 seconds to log in before the session times out.  
asa# session ips  
Opening command session with slot 1.  
Connected to slot 1. Escape character sequence is 'CTRL-^X'.  
Enter your username and password at the login prompt.  
Note  
The default username and password are both cisco. You are prompted to change them the first  
time you log in to the module. You must first enter the UNIX password, which is cisco. Then  
you must enter the new password twice.  
login: cisco  
Password:  
***NOTICE***  
This product contains cryptographic features and is subject to United States and local  
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic  
products does not imply third-party authority to import, export, distribute or use  
encryption. Importers, exporters, distributors and users are responsible for compliance  
with U.S. and local country laws. By using this product you agree to comply with  
applicable laws and regulations. If you are unable to comply with U.S. and local laws,  
return this product immediately.  
A summary of U.S. laws governing Cisco cryptographic products may be found at:  
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html  
If you require further assistance please contact us by sending email to [email protected].  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ii-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter ii Logging In to the Sensor  
Logging In to the ASA 5585-X IPS SSP  
***LICENSE NOTICE***  
There is no license key installed on this IPS platform.  
The system will continue to operate with the currently installed  
signature set. A valid license must be obtained in order to apply  
signature updates. Please go to http://www.cisco.com/go/license  
to obtain a new license or install a license.  
asa-ips#  
Step 4  
To escape from a session and return to the adaptive security appliance prompt, do one of the following:  
Enter exit.  
Press CTRL-Shift-6-x (represented as CTRL^X).  
For More Information  
For the procedure for using the setup command to initialize the ASA 5500-X IPS SSP, see Advanced  
Logging In to the ASA 5585-X IPS SSP  
You log in to the ASA 5585-X IPS SSP from the adaptive security appliance.  
To session in to the ASA 5585-X IPS SSP from the adaptive security appliance, follow these steps:  
Step 1  
Log in to the adaptive security appliance.  
Note  
If the adaptive security appliance is operating in multi-mode, use the change system command  
to get to the system level prompt before continuing.  
Step 2  
Step 3  
Session to the ASA 5585-X IPS SSP. You have 60 seconds to log in before the session times out.  
asa# session 1  
Opening command session with slot 1.  
Connected to slot 1. Escape character sequence is 'CTRL-^X'.  
Enter your username and password at the login prompt.  
Note  
The default username and password are both cisco. You are prompted to change them the first  
time you log in to the module. You must first enter the UNIX password, which is cisco. Then  
you must enter the new password twice.  
login: cisco  
Password:  
***NOTICE***  
This product contains cryptographic features and is subject to United States and local  
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic  
products does not imply third-party authority to import, export, distribute or use  
encryption. Importers, exporters, distributors and users are responsible for compliance  
with U.S. and local country laws. By using this product you agree to comply with  
applicable laws and regulations. If you are unable to comply with U.S. and local laws,  
return this product immediately.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ii-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter ii Logging In to the Sensor  
Logging In to the Sensor  
A summary of U.S. laws governing Cisco cryptographic products may be found at:  
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html  
If you require further assistance please contact us by sending email to [email protected].  
***LICENSE NOTICE***  
There is no license key installed on the system.  
Please go to http://www.cisco.com/go/license to obtain a new license or install a license.  
ips-ssp#  
Step 4  
To escape from a session and return to the adaptive security appliance prompt, do one of the following:  
Enter exit.  
Press CTRL-Shift-6-x (represented as CTRL^X).  
For More Information  
For the procedure for using the setup command to initialize the ASA 5585-X IPS SSP, see Advanced  
Logging In to the Sensor  
Note  
After you have initialized the sensor using the setup command and enabled Telnet, you can use SSH or  
Telnet to log in to the sensor.  
To log in to the sensor using Telnet or SSH, follow these steps:  
Step 1  
Step 2  
To log in to the sensor over the network using SSH or Telnet.  
ssh sensor_ip_address  
telnet sensor_ip_address  
Enter your username and password at the login prompt.  
login: ******  
Password: ******  
***NOTICE***  
This product contains cryptographic features and is subject to United States and local  
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic  
products does not imply third-party authority to import, export, distribute or use  
encryption. Importers, exporters, distributors and users are responsible for compliance  
with U.S. and local country laws. By using this product you agree to comply with  
applicable law s and regulations. If you are unable to comply with U.S. and local laws,  
return this product immediately.  
A summary of U.S. laws governing Cisco cryptographic products may be found at:  
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html  
If you require further assistance please contact us by sending email to [email protected].  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ii-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter ii Logging In to the Sensor  
Logging In to the Sensor  
***LICENSE NOTICE***  
There is no license key installed on the system.  
Please go to http://www.cisco.com/go/license to obtain a new license or install a license.  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ii-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter ii Logging In to the Sensor  
Logging In to the Sensor  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
ii-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
1
Introducing the CLI Configuration Guide  
This chapter introduces the IPS CLI configuration guide, and contains the following sections:  
Supported IPS Platforms  
IPS 7.2(1)E4 supports the following IPS platforms:  
IPS 4345  
IPS 4360  
IPS 4510  
IPS 4520  
ASA 5500-X IPS SSP  
ASA 5585-X IPS SSP  
IPS CLI Configuration Guide  
This guide is a task-based configuration guide for the Cisco IPS 7.2 CLI. The term “sensor” is used  
throughout this guide to refer to all sensor models, unless a procedure refers to a specific appliance or  
to one of the modules, then the specific model name is used.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 1 Introducing the CLI Configuration Guide  
Sensor Configuration Sequence  
For an alphabetical list of all IPS commands, refer to the Command Reference for Cisco Intrusion  
Prevention System 7.2. For information on locating all IPS 7.2 documents on Cisco.com, refer to the  
You can also use an IPS manager to configure your sensor. For information on how to access  
documentation that describes how to use IPS managers, refer to the Documentation Roadmap for Cisco  
Sensor Configuration Sequence  
Perform the following tasks to configure the sensor:  
1. Log in to the sensor.  
2. Initialize the sensor by running the setup command.  
3. Verify the sensor initialization.  
4. Create the service account. A service account is needed for special debug situations directed by  
TAC.  
Note  
Only one user with the role of service is allowed.  
5. License the sensor.  
6. Perform the other initial tasks, such as adding users and trusted hosts, and so forth.  
7. Make changes to the interface configuration if necessary. You configure the interfaces during  
initialization.  
8. Add or delete virtual sensors as necessary. You configure the virtual sensors during initialization.  
9. Configure event action rules.  
10. Configure the signatures for intrusion prevention.  
11. Configure the sensor for global correlation.  
12. Configure anomaly detection if needed. You can run anomaly detection using the default values or  
you can tailor it to suit your network needs.  
Note  
Anomaly detection is disabled by default. You must enable it to configure or apply an  
anomaly detection policy. Enabling anomaly detection results in a decrease in performance.  
13. Set up any external product interfaces if needed. The CSA MC is the only external product  
supported by the Cisco IPS.  
14. Configure IP logging if needed.  
15. Configure blocking if needed.  
16. Configure SNMP if needed.  
17. Perform miscellaneous tasks to keep your sensor running smoothly.  
18. Upgrade the IPS software with new signature updates and service packs.  
19. Reimage the application partition when needed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 1 Introducing the CLI Configuration Guide  
User Roles  
For More Information  
For the procedure for logging in to your sensor, see Chapter ii, “Logging In to the Sensor.”  
For the procedure for using the setup command to initialize your sensor, see Chapter 2, “Initializing  
For the procedure for verifying sensor initialization, see Verifying Initialization, page 2-20.  
For the procedure for obtaining and installing the license key, see Installing the License Key,  
For the procedures for setting up your sensor, see Chapter 3, “Setting Up the Sensor.”  
For the procedure for creating the service account, see Creating the Service Account, page 3-28.  
For the procedures for configuring interfaces on your sensor, see Chapter 4, “Configuring  
For the procedures for configuring virtual sensors on your sensor, see Chapter 5, “Configuring  
For the procedures for configuring event action rules policies, see Chapter 8, “Configuring Event  
For the procedures for configuring signatures for intrusion prevention, see Chapter 7, “Defining  
For the procedures for configuring global correlation, see Chapter 10, “Configuring Global  
For the procedure for configuring anomaly detection policies, see Chapter 9, “Configuring Anomaly  
For the procedure for setting up external product interfaces, see Chapter 11, “Configuring External  
For the procedures for configuring IP logging, see Chapter 12, “Configuring IP Logging.”  
For the procedures for configuring blocking on your sensor, see Chapter 14, “Configuring Attack  
For the procedures for configuring SNMP on your sensor, see Chapter 15, “Configuring SNMP.”  
For the administrative procedures, see Chapter 17, “Administrative Tasks for the Sensor.”  
For more information on how to obtain Cisco IPS software, see Chapter 20, “Obtaining Software.”  
For the procedures for installing system images, see Chapter 21, “Upgrading, Downgrading, and  
For the procedures specific to the ASA 5500-X IPS SSP, see Chapter 18, “Configuring the ASA  
For the procedures specific to the ASA 5585-X IPS SSP, see Chapter 19, “Configuring the ASA  
User Roles  
The Cisco CLI permits multiple users to log in at the same time. You can create and remove users from  
the local sensor. You can modify only one user account at a time. Each user is associated with a role that  
controls what that user can and cannot modify. The CLI supports four user roles: administrator, operator,  
viewer, and service. The privilege levels for each role are different; therefore, the menus and available  
commands vary for each role.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 1 Introducing the CLI Configuration Guide  
User Roles  
Administrator  
This user role has the highest level of privileges. Administrators have unrestricted view access and can  
perform the following functions:  
Add users and assign passwords  
Enable and disable control of physical interfaces and virtual sensors  
Assign physical sensing interfaces to a virtual sensor  
Modify the list of hosts allowed to connect to the sensor as a configuring or viewing agent  
Modify sensor address configuration  
Tune signatures  
Assign configuration to a virtual sensor  
Manage routers  
Operators  
This user role has the second highest level of privileges. Operators have unrestricted view access and can  
perform the following functions:  
Modify their passwords  
Tune signatures  
Manage routers  
Assign configuration to a virtual sensor  
Viewers  
This user role has the lowest level of privileges. Viewers can view configuration and event data and can  
modify their passwords.  
Tip  
Monitoring applications only require viewer access to the sensor. You can use the CLI to set up a user  
account with viewer privileges and then configure the event viewer to use this account to connect to the  
sensor.  
Service  
This user role does not have direct access to the CLI. Service account users are logged directly into a  
bash shell. Use this account for support and troubleshooting purposes only. Unauthorized modifications  
are not supported and require the device to be reimaged to guarantee proper operation. You can create  
only one user with the service role. In the service account you can also switch to user root by executing  
su-. The root password is synchronized to the service account password. Some troubleshooting  
procedures may require you to execute commands as the root user.  
When you log in to the service account, you receive the following warning:  
******************************* WARNING *****************************************  
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED.  
This account is intended to be used for support and troubleshooting purposes only.  
Unauthorized modifications are not supported and will require this device to be re-imaged  
to guarantee proper operation.  
*********************************************************************************  
Note  
The service role is a special role that allows you to bypass the CLI if needed. Only a user with  
administrator privileges can edit the service account.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 1 Introducing the CLI Configuration Guide  
CLI Behavior  
Note  
For IPS 5.0 and later, you can no longer remove the cisco account. You can disable it using the no  
password cisco command, but you cannot remove it. To use the no password cisco command, there  
must be another administrator account on the sensor. Removing the cisco account through the service  
account is not supported. If you remove the cisco account through the service account, the sensor most  
likely will not boot up, so to recover the sensor you must reinstall the sensor system image.  
CLI Behavior  
The following tips help you use the Cisco IPS CLI.  
Prompts  
You cannot change the prompt displayed for the CLI commands.  
User interactive prompts occur when the system displays a question and waits for user input. The  
default input is displayed inside brackets [ ]. To accept the default input, press Enter.  
Help  
To display the help for a command, type ? after the command.  
The following example demonstrates the ? function:  
sensor# configure ?  
terminal  
Configure from the terminal  
sensor# configure  
Note  
When the prompt returns from displaying help, the command previously entered is displayed  
without the ?.  
You can type ? after an incomplete token to view the valid tokens that complete the command. If  
there is a trailing space between the token and the ?, you receive an ambiguous command error:  
sensor# show c ?  
% Ambiguous command: “show c”  
If you enter the token without the space, a selection of available tokens for the completion (with no  
help description) appears:  
sensor# show c?  
clock configuration  
sensor# show c  
Only commands available in the current mode are displayed by help.  
Tab Completion  
Only commands available in the current mode are displayed by tab complete and help.  
If you are unsure of the complete syntax for a command, you can type a portion of the command and  
press Tab to complete the command.  
If multiple commands match for tab completion, nothing is displayed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 1 Introducing the CLI Configuration Guide  
Command Line Editing  
Recall  
To recall the commands entered in a mode, use the Up Arrow or Down Arrow keys or press Ctrl-P  
or Ctrl-N.  
Note  
Help and tab complete requests are not reported in the recall list.  
A blank prompt indicates the end of the recall list.  
Case Sensitivity  
The CLI is not case sensitive, but it does echo back the text in the same case you typed it. For  
example, if you type:  
sensor# CONF  
and press Tab, the sensor displays:  
sensor# CONFigure  
Note  
CLI commands are not case sensitive, but values are case sensitive. Remember this when you  
are creating regular expressions in signatures. A regular expression of “STRING” will not  
match “string” seen in a packet.  
Display Options  
—More— is an interactive prompt that indicates that the terminal output exceeds the allotted display  
space. To display the remaining output, press the spacebar to display the next page of output or  
press Enter to display the output one line at a time.  
To clear the current line contents and return to a blank command line, press Ctrl-C.  
For More Information  
For more information on CLI command regular expression syntax, see Regular Expression Syntax,  
Command Line Editing  
Table 1-1 describes the command line editing capabilities provided by the Cisco IPS CLI.  
Table 1-1  
Command Line Editing  
Keys  
Description  
Tab  
Completes a partial command name entry. When you type a unique set of characters and  
press Tab, the system completes the command name. If you type a set of characters that  
could indicate more than one command, the system beeps to indicate an error. Type a  
question mark (?) immediately following the partial command (no space). The system  
provides a list of commands that begin with that string.  
Backspace Erases the character to the left of the cursor.  
Enter  
At the command line, pressing Enter processes a command. At the ---More--- prompt  
on a terminal screen, pressing Enter scrolls down a line.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                       
Chapter 1 Introducing the CLI Configuration Guide  
Command Line Editing  
Table 1-1  
Command Line Editing (continued)  
Description  
Keys  
Spacebar  
Enables you to see more output on the terminal screen. Press the Spacebar when you see  
the line ---More---on the screen to display the next screen.  
Left arrow Moves the cursor one character to the left. When you type a command that extends  
beyond a single line, you can press the Left Arrow key repeatedly to scroll back toward  
the system prompt and verify the beginning of the command entry.  
Right arrow Moves the cursor one character to the right.  
Up Arrow  
or Ctrl-P  
Recalls commands in the history buffer, beginning with the most recent command.  
Repeat the key sequence to recall successively older commands.  
Down  
Arrow or  
Ctrl-N  
Returns to more recent commands in the history buffer after recalling commands with  
the Up Arrow or Ctrl-P. Repeat the key sequence to recall successively more recent  
commands.  
Ctrl-A  
Ctrl-B  
Ctrl-D  
Ctrl-E  
Ctrl-F  
Ctrl-K  
Ctrl-L  
Ctrl-T  
Ctrl-U  
Ctrl-V  
Moves the cursor to the beginning of the line.  
Moves the cursor back one character.  
Deletes the character at the cursor.  
Moves the cursor to the end of the command line.  
Moves the cursor forward one character.  
Deletes all characters from the cursor to the end of the command line.  
Clears the screen and redisplays the system prompt and command line  
Transposes the character to the left of the cursor with the character located at the cursor.  
Deletes all characters from the cursor to the beginning of the command line.  
Inserts a code to indicate to the system that the keystroke immediately following should  
be treated as a command entry, not as an editing key.  
Ctrl-W  
Ctrl-Y  
Deletes the word to the left of the cursor.  
Recalls the most recent entry in the delete buffer. The delete buffer contains the last ten  
items you deleted or cut.  
Ctrl-Z  
Esc-B  
Esc-C  
Esc-D  
Esc-F  
Esc-L  
Esc-U  
Ends configuration mode and returns you to the EXEC prompt.  
Moves the cursor back one word.  
Capitalizes the word at the cursor.  
Deletes from the cursor to the end of the word.  
Moves the cursor forward one word.  
Changes the word at the cursor to lowercase.  
Capitalizes from the cursor to the end of the word.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1 Introducing the CLI Configuration Guide  
IPS Command Modes  
IPS Command Modes  
The Cisco IPS CLI has the following command modes:  
privileged EXEC—Entered when you log in to the CLI interface.  
global configuration—Entered from privileged EXEC mode by entering configure terminal. The  
command prompt is sensor(config)#.  
service mode configuration—Entered from global configuration mode by entering service  
service-name. The command prompt is sensor(config-ser)#, where ser is the first three  
characters of the service name.  
multi-instance service mode—Entered from global configuration mode by entering service  
service-name log-instance-name. The command prompt is sensor(config-log)#where log is the  
first three characters of the log instance name. The only multi-instance services in the system are  
anomaly detection, signature definition, and event action rules.  
Regular Expression Syntax  
Note  
The syntax in this section applies only to regular expressions used as part of a CLI command. It does not  
apply to regular expressions used by signatures.  
Regular expressions are text patterns that are used for string matching. Regular expressions contain a  
mix of plain text and special characters to indicate what kind of matching to do. For example, if you are  
looking for a numeric digit, the regular expression to search for is “[0-9]”. The brackets indicate that the  
character being compared should match any one of the characters enclosed within the bracket. The dash  
(-) between 0 and 9 indicates that it is a range from 0 to 9. Therefore, this regular expression will match  
any character from 0 to 9, that is, any digit.  
To search for a specific special character, you must use a backslash before the special character. For  
example, the single character regular expression “\*” matches a single asterisk.  
The regular expressions defined in this section are similar to a subset of the POSIX Extended Regular  
Expression definitions. In particular, “[..]”, “[==]”, and “[::]” expressions are not supported. Also,  
escaped expressions representing single characters are supported. A character can be represented as its  
hexadecimal value, for example, \x61 equals ‘a,’ so \x61 is an escaped expression representing the  
character ‘a.’  
The regular expressions are case sensitive. To match “STRING” or “string” use the following regular  
expression: “[Ss][Tt][Rr][Ii][Nn][Gg].”  
Table 1-2 lists the special characters.  
Table 1-2  
Regular Expression Syntax  
Character  
Description  
^
Beginning of the string. The expression “^A” will match an “A” only at the beginning  
of the string.  
^
Immediately following the left-bracket ([). Excludes the remaining characters within  
brackets from matching the target string. The expression “[^0-9]” indicates that the  
target character should not be a digit.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                       
Chapter 1 Introducing the CLI Configuration Guide  
Regular Expression Syntax  
Table 1-2  
Regular Expression Syntax (continued)  
Description  
Character  
$
Matches the end of the string. The expression “abc$” matches the sub-string “abc”  
only if it is at the end of the string.  
|
Allows the expression on either side to match the target string. The expression “a|b”  
matches “a” as well as “b.”  
.
Matches any character.  
*
Indicates that the character to the left of the asterisk in the expression should match 0  
or more times.  
+
Similar to * but there should be at least one match of the character to the left of the +  
sign in the expression.  
?
Matches the character to its left 0 or 1 times.  
()  
Affects the order of pattern evaluation and also serves as a tagged expression that can  
be used when replacing the matched sub-string with another expression.  
[]  
\
Enclosing a set of characters indicates that any of the enclosed characters may match  
the target character.  
Allows specifying a character that would otherwise be interpreted as special.  
\xHH represents the character whose value is the same as the value represented by  
(HH) hexadecimal digits [0-9A-Fa-f]. The value must be non-zero.  
BEL is the same as \x07, BS is \x08, FF is \x0C, LF is \x0A, CR is \x0D, TAB is \x09,  
and VT is \x0B.  
For any other character ‘c’, ‘\c’ is the same as ‘c’ except that it is never interpreted as  
special  
The following examples demonstrate the special characters:  
a* matches any number of occurrences of the letter a, including none.  
a+ requires that at least one letter a be in the string to be matched.  
ba?b matches the string bb or bab.  
\** matches any number of asterisks (*).  
To use multipliers with multiple-character patterns, you enclose the pattern in parentheses.  
(ab)* matches any number of the multiple-character string ab.  
([A-Za-z][0-9])+ matches one or more instances of alphanumeric pairs, but not none (that is, an  
empty string is not a match).  
The order for matches using multipliers (*, +, or ?) is to put the longest construct first. Nested constructs  
are matched from outside to inside. Concatenated constructs are matched beginning at the left side of the  
construct. Thus, the regular expression matches A9b3, but not 9Ab3 because the letters are specified  
before the numbers.  
You can also use parentheses around a single- or multiple-character pattern to instruct the software to  
remember a pattern for use elsewhere in the regular expression.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1 Introducing the CLI Configuration Guide  
Generic CLI Commands  
To create a regular expression that recalls a previous pattern, you use parentheses to indicate memory of  
a specific pattern and a backslash (\) followed by a digit to reuse the remembered pattern. The digit  
specifies the occurrence of a parentheses in the regular expression pattern. If you have more than one  
remembered pattern in your regular expression, \1 indicates the first remembered pattern, and \2  
indicates the second remembered pattern, and so on.  
The following regular expression uses parentheses for recall:  
a(.)bc(.)\1\2 matches an a followed by any character, followed by bc followed by any character,  
followed by the first any character again, followed by the second any character again.  
For example, the regular expression can match aZbcTZT. The software remembers that the first  
character is Z and the second character is T and then uses Z and T again later in the regular  
expression.  
Generic CLI Commands  
The following CLI commands are generic to the Cisco IPS.  
configure terminal—Enters global configuration mode.  
Global configuration commands apply to features that affect the system as a whole rather than just  
one protocol or interface.  
sensor# configure terminal  
sensor(config)#  
service—Takes you to the following configuration submodes: analysis-engine, anomaly-detection,  
authentication, event-action-rules, external-product-interfaces, global-correlation, health-monitor,  
host, interface, logger, network-access, notification, signature-definition, ssh-known-hosts,  
trusted-certificates, and web-server.  
Note  
The anomaly-detection, event-action-rules, and signature-definition submodes are multiple  
instance services. One predefined instance is allowed for each. For anomaly-detection, the  
predefined instance name is ad0. For event-action-rules, the predefined instance name is  
rules0. For signature-definition, the predefined instance name is sig0. You can create  
additional instances.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules0  
sensor(config-rul)#  
end—Exits configuration mode or any configuration submodes. It takes you back to the top-level  
EXEC menu.  
sensor# configure terminal  
sensor(config)# end  
sensor#  
exit—Exits any configuration mode or closes an active terminal session and terminates the EXEC  
mode. It takes you to the previous menu session.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules0  
sensor(config-rul)# exit  
sensor(config)# exit  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 1 Introducing the CLI Configuration Guide  
CLI Keywords  
CLI Keywords  
In general, use the no form of a command to disable a feature or function. Use the command without the  
keyword no to enable a disabled feature or function. For example, the command ssh host-key ip_address  
adds an entry to the known hosts table, the command no ssh host-key ip_address removes the entry from  
the known hosts table. Refer to the individual commands for a complete description of what the no form  
of that command does.  
Service configuration commands can also have a default form. Use the default form of the command to  
return the command setting to its default. This keyword applies to the service submenu commands used  
for application configuration. Entering defaultwith the command resets the parameter to the default  
value. You can only use the default keyword with commands that specify a default value in the  
configuration files.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 1 Introducing the CLI Configuration Guide  
CLI Keywords  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
1-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
2
Initializing the Sensor  
This chapter describes how to use the setup command to initialize the sensor, and contains the following  
sections:  
Initializing Notes and Caveats  
The following notes and caveats apply to initializing the sensor:  
You must be administrator to use the setup command.  
You must have a valid sensor license for automatic signature updates and global correlation features  
to function. You can still configure and display statistics for the global correlation features, but the  
global correlation databases are cleared and no updates are attempted. Once you install a valid  
license, the global correlation features are reactivated.  
The currently supported Cisco IPS appliances are the IPS 4345, IPS 4360, IPS 4510, and IPS 4520.  
You do not need to configure interfaces on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP). You should ignore the modify interface default VLAN setting in setup. The  
separation of traffic across virtual sensors is configured differently for the ASA IPS modules than  
for other sensors.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 2 Initializing the Sensor  
Understanding Initialization  
Understanding Initialization  
After you install the sensor on your network, you must use the setup command to initialize it so that you  
can communicate with it over the network.  
With the setup command, you configure basic sensor settings, including the hostname, IP interfaces,  
access control lists, global correlation servers, and time settings. You can continue using advanced setup  
in the CLI to enable Telnet, configure the web server, enable SSHv1 fallback, and assign and enable  
virtual sensors and interfaces, or you can use the Startup Wizard in the IDM or IME. After you configure  
the sensor with the setup command, you can change the network settings in the IDM or IME.  
Note  
You must be administrator to use the setup command.  
Simplified Setup Mode  
The sensor automatically calls the setup command when you connect to the sensor using a console cable  
and the sensor basic network settings have not yet been configured. The sensor does not call automatic  
setup under the following conditions:  
When initialization has already been successfully completed.  
If you have recovered or downgraded the sensor.  
If you have set the host configuration to default after successfully configuring the sensor using  
automatic setup.  
When you enter the setup command, an interactive dialog called the System Configuration Dialog  
appears on the system console screen. The System Configuration Dialog guides you through the  
configuration process. The values shown in brackets next to each prompt are the default values last set.  
System Configuration Dialog  
When you enter the setup command, an interactive dialog called the System Configuration Dialog  
appears on the system console screen. The System Configuration Dialog guides you through the  
configuration process. The values shown in brackets next to each prompt are the current values.  
You must go through the entire System Configuration Dialog until you come to the option that you want  
to change. To accept default settings for items that you do not want to change, press Enter.  
To return to the EXEC prompt without making changes and without going through the entire System  
Configuration Dialog, press Ctrl-C. The System Configuration Dialog also provides help text for each  
prompt. To access the help text, enter ? at a prompt.  
When you complete your changes, the System Configuration Dialog shows you the configuration that  
you created during the setup session. It also asks you if you want to use this configuration. If you enter  
yes, the configuration is saved. If you enter no, the configuration is not saved and the process begins  
again. There is no default for this prompt; you must enter either yes or no.  
You can configure daylight savings time either in recurring mode or date mode. If you choose recurring  
mode, the start and end days are based on week, day, month, and time. If you choose date mode, the start  
and end days are based on month, day, year, and time. Choosing disable turns off daylight savings time.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 2 Initializing the Sensor  
System Configuration Dialog  
Note  
Note  
You only need to set the date and time in the System Configuration Dialog if the system is an appliance  
and is NOT using NTP.  
The System Configuration Dialog is an interactive dialog. The default settings are displayed.  
Example 2-1 shows a sample System Configuration Dialog.  
Example 2-1 Example System Configuration Dialog  
--- Basic Setup ---  
--- System Configuration Dialog ---  
At any point you may enter a question mark '?' for help.  
User ctrl-c to abort configuration dialog at any prompt.  
Default settings are in square brackets '[]'.  
Current time: Wed Mar 6 00:07:23 2013  
Setup Configuration last modified:  
Enter host name[sensor]:  
Enter IP interface[192.168.1.2/24,192.168.1.1]:  
Modify current access list?[no]:  
Current access list entries:  
[1] 0.0.0.0/0  
Delete:  
Permit:  
Use DNS server for Auto-Updates from www.cisco.com and Global Correlation?[no]:  
DNS server IP address[171.68.226.120]:  
Use HTTP proxy server for Auto-Updates from www.cisco.com and Global Correlation?[no]:  
HTTP proxy server IP address:  
HTTP proxy server Port number:  
Modify system clock settings?[no]:  
Modify summer time settings?[no]:  
Use USA SummerTime Defaults?[yes]:  
Recurring, Date or Disable?[Recurring]:  
Start Month[march]:  
Start Week[second]:  
Start Day[sunday]:  
Start Time[02:00:00]:  
End Month[november]:  
End Week[first]:  
End Day[sunday]:  
End Time[02:00:00]:  
DST Zone[]:  
Offset[60]:  
Modify system timezone?[no]:  
Timezone[UTC]:  
UTC Offset[0]:  
Use NTP?[no]:  
NTP Server IP Address[]:  
Use NTP Authentication?[no]:  
NTP Key ID[]:  
NTP Key Value[]:  
Modify system date and time?[no]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 2 Initializing the Sensor  
Basic Sensor Setup  
Local Date as YYYY-MM-DD[2013-03-06]:  
Local Time as HH:MM:SS[]:  
Participation in the SensorBase Network allows Cisco to collect aggregated statistics  
about traffic sent to your IPS.  
SensorBase Network Participation level?[off]:  
If you agree to participate in the SensorBase Network, Cisco will collect aggregated  
statistics about traffic sent to your IPS.  
This includes summary data on the Cisco IPS network traffic properties and how this  
traffic was handled by the Cisco appliances. We do not collect the data content of  
traffic or other sensitive business or personal information. All data is aggregated and  
sent via secure HTTP to the Cisco SensorBase Network servers in periodic intervals. All  
data shared with Cisco will be anonymous and treated as strictly confidential.  
The table below describes how the data will be used by Cisco.  
Participation Level = "Partial":  
* Type of Data: Protocol Attributes (e.g. TCP max segment size and  
options string)  
Purpose: Track potential threats and understand threat exposure  
* Type of Data: Attack Type (e.g. Signature Fired and Risk Rating)  
Purpose: Used to understand current attacks and attack severity  
* Type of Data: Connecting IP Address and port  
Purpose: Identifies attack source  
* Type of Data: Summary IPS performance (CPU utilization memory usage,  
inline vs. promiscuous, etc)  
Purpose: Tracks product efficacy  
Participation Level = "Full" additionally includes:  
* Type of Data: Victim IP Address and port  
Purpose: Detect threat behavioral patterns  
Do you agree to participate in the SensorBase Network?[no]:  
Basic Sensor Setup  
You can perform basic sensor setup using the setup command, and then finish setting up the sensor using  
the CLI, IDM, or IME.  
To perform basic sensor setup using the setup command, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Note  
Both the default username and password are cisco.  
The first time you log in to the sensor you are prompted to change the default password. Passwords must  
be at least eight characters long and be strong, that is, not be a dictionary word. After you change the  
password, basic setup begins.  
Step 3  
Step 4  
Enter the setupcommand. The System Configuration Dialog is displayed.  
Specify the hostname. The hostname is a case-sensitive character string up to 64 characters. Numbers,  
“_” and “-” are valid, but spaces are not acceptable. The default is sensor.  
Step 5  
Specify the IP interface. The IP interface is in the form of IP Address/Netmask,Gateway:  
X.X.X.X/nn,Y.Y.Y.Y, where X.X.X.X specifies the sensor IP address as a 32-bit address written as 4 octets  
separated by periods, nn specifies the number of bits in the netmask, and Y.Y.Y.Y specifies the default  
gateway as a 32-bit address written as 4 octets separated by periods.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 2 Initializing the Sensor  
Basic Sensor Setup  
Step 6  
Enter yesto modify the network access list:  
a. If you want to delete an entry, enter the number of the entry and press Enter, or press Enter to get  
to the Permit line.  
b. Enter the IP address and netmask of the network you want to add to the access list.  
Note  
For example, 10.0.0.0/8 permits all IP addresses on the 10.0.0.0 network  
(10.0.0.0-10.255.255.255) and 10.1.1.0/24 permits only the IP addresses on the 10.1.1.0  
subnet (10.1.1.0-10.1.1.255). If you want to permit access to a single IP address than the  
entire network, use a 32-bit netmask. For example, 10.1.1.1/32 permits just the 10.1.1.1  
address.  
c. Repeat Step b until you have added all networks that you want to add to the access list, and then  
press Enter at a blank permit line to go to the next step.  
Step 7  
You must configure a DNS server or an HTTP proxy server for automatic updates from www.cisco.com  
and global correlation to operate:  
a. Enter yesto add a DNS server, and then enter the DNS server IP address.  
b. Enter yes to add an HTTP proxy server, and then enter the HTTP proxy server IP address and port  
number.  
Caution  
Step 8  
You must have a valid sensor license for automatic signature updates and global correlation features to  
function. You can still configure and display statistics for the global correlation features, but the global  
correlation databases are cleared and no updates are attempted. Once you install a valid license, the  
global correlation features are reactivated.  
Enter yesto modify the system clock settings:  
a. Enter yesto modify summertime settings.  
Note  
Summertime is also known as DST. If your location does not use Summertime, go to Step m.  
b. Enter yesto choose the USA summertime defaults, or enter noand choose recurring, date, or disable  
to specify how you want to configure summertime settings. The default is recurring.  
c. If you chose recurring, specify the month you want to start summertime settings. Valid entries are  
january, february, march, april, may, june, july, august, september, october, november, and  
december. The default is march.  
d. Specify the week you want to start summertime settings. Valid entries are first, second, third, fourth,  
fifth, and last. The default is second.  
e. Specify the day you want to start summertime settings. Valid entries are sunday, monday, tuesday,  
wednesday, thursday, friday, and saturday. The default is sunday.  
f. Specify the time you want to start summertime settings. The default is 02:00:00.  
Note  
The default recurring summertime parameters are correct for time zones in the United States.  
The default values specify a start time of 2:00 a.m. on the second Sunday in March, and a  
stop time of 2:00 a.m. on the first Sunday in November. The default summertime offset is 60  
minutes.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 2 Initializing the Sensor  
Basic Sensor Setup  
g. Specify the month you want summertime settings to end. Valid entries are january, february, march,  
april, may, june, july, august, september, october, november, and december. The default is november.  
h. Specify the week you want the summertime settings to end. Valid entries are first, second, third,  
fourth, fifth, and last. The default is first.  
i. Specify the day you want the summertime settings to end. Valid entries are sunday, monday, tuesday,  
wednesday, thursday, friday, and saturday. The default is sunday.  
j. Specify the time you want summertime settings to end. The default is 02:00:00.  
k. Specify the DST zone. The zone name is a character string up to 24 characters long in the pattern  
[A-Za-z0-9()+:,_/-]+$.  
l. Specify the summertime offset. Specify the summertime offset from UTC in minutes (negative  
numbers represent time zones west of the Prime Meridian). The default is 60.  
m. Enter yesto modify the system time zone.  
n. Specify the standard time zone name. The zone name is a character string up to 24 characters long.  
o. Specify the standard time zone offset. Specify the standard time zone offset from UTC in minutes  
(negative numbers represent time zones west of the Prime Meridian). The default is 0.  
p. Enter yesif you want to use NTP. To use authenticated NTP, you need the NTP server IP address,  
the NTP key ID, and the NTP key value. If you do not have those at this time, you can configure  
NTP later. Otherwise, you can choose unauthenticated NTP.  
Step 9  
Enter off, partial, or full to participate in the SensorBase Network Participation:  
Off—No data is contributed to the SensorBase Network.  
Partial—Data is contributed to the SensorBase Network, but data considered potentially sensitive is  
filtered out and never sent.  
Full—All data is contributed to the SensorBase Network except the attacker/victim IP addresses that  
you exclude.  
The SensorBase Network Participation disclaimer appears. It explains what is involved in participating  
in the SensorBase Network.  
Step 10 Enter yesto participate in the SensorBase Network.  
The following configuration was entered.  
service host  
network-settings  
host-ip 192.168.1.2/24, 192.168.1.1  
host-name sensor  
telnet-option disabled  
sshv1-fallback disabled  
access-list 10.0.0.0/8  
ftp-timeout 300  
no login-banner-text  
dns-primary-server enabled  
address 171.68.226.120  
exit  
dns-secondary-server disabled  
dns-tertiary-server disabled  
http-proxy proxy-server  
address 128.107.241.170  
port 8080  
exit  
exit  
time-zone-settings  
offset -360  
standard-time-zone-name CST  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
exit  
summertime-option recurring  
offset 60  
summertime-zone-name CDT  
start-summertime  
month march  
week-of-month second  
day-of-week sunday  
time-of-day 02:00:00  
exit  
end-summertime  
month november  
week-of-month first  
day-of-week sunday  
time-of-day 02:00:00  
exit  
exit  
ntp-option enabled  
ntp-keys 1 md5-key 8675309  
ntp-servers 10.10.1.2 key-id 1  
exit  
service global-correlation  
network-participation full  
exit  
[0] Go to the command prompt without saving this config.  
[1] Return to setup without saving this config.  
[2] Save this configuration and exit setup.  
[3] Continue to Advanced setup.  
Step 11 Enter  
2
to save the configuration (or  
3
to continue with advanced setup using the CLI).  
Enter your selection[2]: 2  
Configuration Saved.  
Step 12 If you changed the time setting, enter yes to reboot the sensor.  
For More Information  
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,  
Advanced Setup  
This section describes how to continue with advanced setup in the CLI for the sensor. It contains the  
following sections:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 2 Initializing the Sensor  
Advanced Setup  
Advanced Setup for the Appliance  
Note  
The currently supported Cisco IPS appliances are the IPS 4345, IPS 4360, IPS 4510, and IPS 4520.  
Note  
Adding new subinterfaces is a two-step process. You first organize the interfaces when you edit the  
virtual sensor configuration. You then choose which interfaces and subinterfaces are assigned to which  
virtual sensors.  
The interfaces change according to the appliance model, but the prompts are the same for all models.  
To continue with advanced setup for the appliance, follow these steps:  
Step 1  
Step 2  
Log in to the appliance using an account with administrator privileges.  
Enter the setupcommand. The System Configuration Dialog is displayed. Press Enter or the spacebar  
to skip to the menu to access advanced setup.  
Step 3  
Step 4  
Step 5  
Step 6  
Enter  
3
to access advanced setup.  
Specify the Telnet server status. The default is disabled.  
Specify the SSHv1 fallback setting. The default is disabled.  
Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).  
The default is 443.  
Note  
The web server is configured to use TLS/SSL encryption by default. Setting the port to 80 does  
not disable the encryption.  
Step 7  
Enter yesto modify the interface and virtual sensor configuration and to see the current interface  
configuration.  
Current interface configuration  
Command control: Management0/0  
Unassigned:  
Promiscuous:  
GigabitEthernet0/0  
GigabitEthernet0/1  
GigabitEthernet0/2  
GigabitEthernet0/3  
Virtual Sensor: vs0  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
Virtual Sensor: vs1  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
Virtual Sensor: vs2  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 2 Initializing the Sensor  
Advanced Setup  
[1] Edit Interface Configuration  
[2] Edit Virtual Sensor Configuration  
[3] Display configuration  
Option:  
Step 8  
Enter  
1
to edit the interface configuration.  
Note  
The following options let you create and delete interfaces. You assign the interfaces to virtual  
sensors in the virtual sensor configuration. If you are using promiscuous mode for your  
interfaces and are not subdividing them by VLAN, no additional configuration is necessary.  
[1] Remove interface configurations.  
[2] Add/Modify Inline Vlan Pairs.  
[3] Add/Modify Promiscuous Vlan Groups.  
[4] Add/Modify Inline Interface Pairs.  
[5] Add/Modify Inline Interface Pair Vlan Groups.  
[6] Modify interface default-vlan.  
Option:  
Step 9  
Enter  
2
to add inline VLAN pairs and display the list of available interfaces.  
Caution  
The new VLAN pair is not automatically added to a virtual sensor.  
Available Interfaces  
[1] GigabitEthernet0/0  
[2] GigabitEthernet0/1  
[3] GigabitEthernet0/2  
[4] GigabitEthernet0/3  
Option:  
Step 10 Enter  
1
to add an inline VLAN pair to GigabitEthernet 0/0, for example.  
Inline Vlan Pairs for GigabitEthernet0/0  
None  
Step 11 Enter a subinterface number and description.  
Subinterface Number:  
Description[Created via setup by user asmith]:  
Step 12 Enter numbers for VLAN 1 and 2.  
Vlan1[]: 200  
Vlan2[]: 300  
Step 13 Press Enter to return to the available interfaces menu.  
Note  
Entering a carriage return at a prompt without a value returns you to the previous menu.  
[1] GigabitEthernet0/0  
[2] GigabitEthernet0/1  
[3] GigabitEthernet0/2  
[4] GigabitEthernet0/3  
Option:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
Note  
At this point, you can configure another interface, for example, GigabitEthernet 0/1, for inline  
VLAN pair.  
Step 14 Press Enter to return to the top-level interface editing menu.  
[1] Remove interface configurations.  
[2] Add/Modify Inline Vlan Pairs.  
[3] Add/Modify Promiscuous Vlan Groups.  
[4] Add/Modify Inline Interface Pairs.  
[5] Add/Modify Inline Interface Pair Vlan Groups.  
[6] Modify interface default-vlan.  
Option:  
Step 15 Enter  
4
to add an inline interface pair and see these options.  
Available Interfaces  
GigabitEthernet0/1  
GigabitEthernet0/2  
GigabitEthernet0/3  
Step 16 Enter the pair name, description, and which interfaces you want to pair.  
Pair name: newPair  
Description[Created via setup by user asmith:  
Interface1[]: GigabitEthernet0/1  
Interface2[]: GigabitEthernet0/2  
Pair name:  
Step 17 Press Enter to return to the top-level interface editing menu.  
[1] Remove interface configurations.  
[2] Add/Modify Inline Vlan Pairs.  
[3] Add/Modify Promiscuous Vlan Groups.  
[4] Add/Modify Inline Interface Pairs.  
[5] Add/Modify Inline Interface Pair Vlan Groups.  
[6] Modify interface default-vlan.  
Option:  
Step 18 Press Enter to return to the top-level editing menu.  
[1] Edit Interface Configuration  
[2] Edit Virtual Sensor Configuration  
[3] Display configuration  
Option:  
Step 19 Enter  
2
to edit the virtual sensor configuration.  
[1] Remove virtual sensor.  
[2] Modify "vs0" virtual sensor configuration.  
[3] Create new virtual sensor.  
Option:  
Step 20 Enter  
2
to modify the virtual sensor configuration, vs0.  
Virtual Sensor: vs0  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
No Interfaces to remove.  
Unassigned:  
Promiscuous:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
[1] GigabitEthernet0/3  
[2] GigabitEthernet0/0  
Inline Vlan Pair:  
[3] GigabitEthernet0/0:1 (Vlans: 200, 300)  
Inline Interface Pair:  
[4] newPair (GigabitEthernet0/1, GigabitEthernet0/2)  
Add Interface:  
Step 21 Enter  
Step 22 Enter  
3
4
to add inline VLAN pair GigabitEthernet0/0:1.  
to add inline interface pair NewPair.  
Step 23 Press Enter to return to the top-level virtual sensor menu.  
Virtual Sensor: vs0  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
Inline Vlan Pair:  
GigabitEthernet0/0:1 (Vlans: 200, 300)  
Inline Interface Pair:  
newPair (GigabitEthernet0/1, GigabitEthernet0/2)  
[1] Remove virtual sensor.  
[2] Modify "vs0" virtual sensor configuration.  
[3] Create new virtual sensor.  
Option: GigabitEthernet0/1, GigabitEthernet0/2)  
Add Interface:  
Step 24 Press Enter to return to the top-level interface and virtual sensor configuration menu.  
[1] Edit Interface Configuration  
[2] Edit Virtual Sensor Configuration  
[3] Display configuration  
Option:  
Step 25 Enter yesif you want to modify the default threat prevention settings.  
Note  
The sensor comes with a built-in override to add the deny packet event action to high risk rating  
alerts. If you do not want this protection, disable automatic threat prevention.  
Virtual sensor newVs is configured to prevent high risk threats in inline mode. (Risk  
Rating 90-100)  
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating  
90-100)  
Do you want to disable automatic threat prevention on all virtual sensors?[no]:  
Step 26 Enter yesto disable automatic threat prevention on all virtual sensors.  
Step 27 Press Enter to exit the interface and virtual sensor configuration.  
The following configuration was entered.  
service host  
network-settings  
host-ip 192.168.1.2/24,192.168.1.1  
host-name sensor  
telnet-option disabled  
sshv1-fallback disabled  
ftp-timeout 300  
no login-banner-text  
exit  
time-zone-settings  
offset 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
standard-time-zone-name UTC  
exit  
summertime-option disabled  
ntp-option disabled  
exit  
service web-server  
port 342  
exit  
service interface  
physical-interfaces GigabitEthernet0/0  
admin-state enabled  
subinterface-type inline-vlan-pair  
subinterface 1  
description Created via setup by user asmith  
vlan1 200  
vlan2 300  
exit  
exit  
exit  
physical-interfaces GigabitEthernet0/1  
admin-state enabled  
exit  
physical-interfaces GigabitEthernet0/2  
admin-state enabled  
exit  
physical-interfaces GigabitEthernet0/0  
admin-state enabled  
exit  
inline-interfaces newPair  
description Created via setup by user asmith  
interface1 GigabitEthernet0/1  
interface2 GigabitEthernet0/2  
exit  
exit  
service analysis-engine  
virtual-sensor newVs  
description Created via setup by user cisco  
signature-definition newSig  
event-action-rules rules0  
anomaly-detection  
anomaly-detection-name ad0  
operational-mode inactive  
exit  
physical-interface GigabitEthernet0/0  
exit  
virtual-sensor vs0  
physical-interface GigabitEthernet0/0 subinterface-number 1  
logical-interface newPair  
service event-action-rules rules0  
overrides deny-packet-inline  
override-item-status Disabled  
risk-rating-range 90-100  
exit  
exit  
[0] Go to the command prompt without saving this config.  
[1] Return back to the setup without saving this config.  
[2] Save this configuration and exit setup.  
Step 28 Enter  
2
to save the configuration.  
Enter your selection[2]: 2  
Configuration Saved.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
Step 29 Reboot the appliance.  
sensor# reset  
Warning: Executing this command will stop all applications and reboot the node.  
Continue with reset? []:  
Step 30 Enter yesto continue the reboot.  
Step 31 Apply the most recent service pack and signature update. You are now ready to configure your appliance  
for intrusion prevention.  
For More Information  
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,  
Advanced Setup for the ASA 5500-X IPS SSP  
To continue with advanced setup for the ASA 5500-X IPS SSP, follow these steps:  
Step 1  
Step 2  
Session in to the IPS using an account with administrator privileges.  
asa# session ips  
Enter the setupcommand. The System Configuration Dialog is displayed. Press Enter or the spacebar  
to skip to the menu to access advanced setup.  
Step 3  
Step 4  
Step 5  
Step 6  
Enter  
3
to access advanced setup.  
Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.  
Specify the SSHv1 fallback setting. The default is disabled.  
Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).  
The default is 443.  
Note  
The web server is configured to use TLS/SSL encryption by default. Setting the port to 80 does  
not disable the encryption.  
Step 7  
Enter yesto modify the interface and virtual sensor configuration.  
Current interface configuration  
Command control: Management0/0  
Unassigned:  
Monitored:  
PortChannel 0/0  
Virtual Sensor: vs0  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
[1] Edit Interface Configuration  
[2] Edit Virtual Sensor Configuration  
[3] Display configuration  
Option:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 2 Initializing the Sensor  
Advanced Setup  
Step 8  
Enter  
1
to edit the interface configuration.  
Note  
You do not need to configure interfaces on the ASA 5500-X IPS SSP. You should ignore the  
modify interface default VLAN setting. The separation of traffic across virtual sensors is  
configured differently for the ASA 5500-X IPS SSP than for other sensors.  
[1] Modify interface default-vlan.  
Option:  
Step 9  
Press Enter to return to the top-level interface and virtual sensor configuration menu.  
[1] Edit Interface Configuration  
[2] Edit Virtual Sensor Configuration  
[3] Display configuration  
Option:  
Step 10 Enter  
2
to edit the virtual sensor configuration.  
[1] Remove virtual sensor.  
[2] Modify "vs0" virtual sensor configuration.  
[3] Create new virtual sensor.  
Option:  
Step 11 Enter  
2
to modify the virtual sensor vs0 configuration.  
Virtual Sensor: vs0  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
No Interfaces to remove.  
Unassigned:  
Monitored:  
[1] PortChannel 0/0  
Add Interface:  
Step 12 Enter  
1
to add PortChannel 0/0 to virtual sensor vs0.  
Note  
Multiple virtual sensors are supported. The adaptive security appliance can direct packets to  
specific virtual sensors or can send packets to be monitored by a default virtual sensor. The  
default virtual sensor is the virtual sensor to which you assign PortChannel 0/0. We recommend  
that you assign PortChannel 0/0 to vs0, but you can assign it to another virtual sensor if you want  
to.  
Step 13 Press Enter to return to the main virtual sensor menu.  
Step 14 Enter to create a virtual sensor.  
3
Name[]:  
Step 15 Enter a name and description for your virtual sensor.  
Name[]: newVs  
Description[Created via setup by user cisco]: New Sensor  
Anomaly Detection Configuration  
[1] ad0  
[2] Create a new anomaly detection configuration  
Option[2]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
Step 16 Enter  
1
to use the existing anomaly-detection configuration, ad0.  
Signature Definition Configuration  
[1] sig0  
[2] Create a new signature definition configuration  
Option[2]:  
Step 17 Enter  
2
to create a signature-definition configuration file.  
Step 18 Enter the signature-definition configuration name, newSig.  
Event Action Rules Configuration  
[1] rules0  
[2] Create a new event action rules configuration  
Option[2]:  
Step 19 Enter  
1
to use the existing event-action-rules configuration, rules0.  
Note  
If PortChannel 0/0 has not been assigned to vs0, you are prompted to assign it to the new virtual  
sensor.  
Virtual Sensor: newVs  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: newSig  
Monitored:  
PortChannel0/0  
[1] Remove virtual sensor.  
[2] Modify "newVs" virtual sensor configuration.  
[3] Modify "vs0" virtual sensor configuration.  
[4] Create new virtual sensor.  
Option:  
Step 20 Press Enter to exit the interface and virtual sensor configuration menu.  
Modify default threat prevention settings?[no]:  
Step 21 Enter yesif you want to modify the default threat prevention settings.  
Note  
The sensor comes with a built-in override to add the deny packet event action to high risk rating  
alerts. If you do not want this protection, disable automatic threat prevention.  
Virtual sensor newVs is configured to prevent high risk threats in inline mode. (Risk  
Rating 90-100)  
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating  
90-100)  
Do you want to disable automatic threat prevention on all virtual sensors?[no]:  
Step 22 Enter yesto disable automatic threat prevention on all virtual sensors.  
The following configuration was entered.  
service host  
network-settings  
host-ip 192.168.1.2/24,192.168.1.1  
host-name asa-ips  
telnet-option disabled  
sshv1-fallback disabled  
access-list 10.0.0.0/8  
access-list 64.0.0.0/8  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
ftp-timeout 300  
no login-banner-text  
exit  
time-zone-settings  
offset 0  
standard-time-zone-name UTC  
exit  
summertime-option disabled  
ntp-option disabled  
exit  
service web-server  
port 342  
exit  
service analysis-engine  
virtual-sensor newVs  
description New Sensor  
signature-definition newSig  
event-action-rules rules0  
anomaly-detection  
anomaly-detection-name ad0  
exit  
physical-interfaces PortChannel0/0  
exit  
exit  
service event-action-rules rules0  
overrides deny-packet-inline  
override-item-status Disabled  
risk-rating-range 90-100  
exit  
exit  
[0] Go to the command prompt without saving this config.  
[1] Return back to the setup without saving this config.  
[2] Save this configuration and exit setup.  
Step 23 Enter  
2
to save the configuration.  
Enter your selection[2]: 2  
Configuration Saved.  
Step 24 Reboot the ASA 5500-X IPS SSP.  
asa-ips# reset  
Warning: Executing this command will stop all applications and reboot the node.  
Continue with reset? []:  
Step 25 Enter yesto continue the reboot.  
Step 26 After reboot, log in to the sensor, and display the self-signed X.509 certificate (needed by TLS).  
asa-ips# show tls fingerprint  
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27  
Step 27 Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the  
certificate when using HTTPS to connect to this ASA 5500-X IPS SSP with a web browser.  
Step 28 Apply the most recent service pack and signature update. You are now ready to configure the  
ASA 5500-X IPS SSP for intrusion prevention.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
For More Information  
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,  
Advanced Setup for the ASA 5585-X IPS SSP  
To continue with advanced setup for the ASA 5585-X IPS SSP, follow these steps:  
Step 1  
Step 2  
Session in to the ASA 5585-X IPS SSP using an account with administrator privileges.  
asa# session 1  
Enter the setupcommand. The System Configuration Dialog is displayed. Press Enter or the spacebar  
to skip to the menu to access advanced setup.  
Step 3  
Step 4  
Step 5  
Step 6  
Enter  
3
to access advanced setup.  
Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.  
Specify the SSHv1 fallback setting. The default is disabled.  
Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).  
The default is 443.  
Note  
The web server is configured to use TLS/SSL encryption by default. Setting the port to 80 does  
not disable the encryption.  
Step 7  
Enter yesto modify the interface and virtual sensor configuration.  
Current interface configuration  
Command control: Management0/0  
Unassigned:  
Monitored:  
PortChannel0/0  
Virtual Sensor: vs0  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
[1] Edit Interface Configuration  
[2] Edit Virtual Sensor Configuration  
[3] Display configuration  
Option:  
Step 8  
Enter  
1
to edit the interface configuration.  
Note  
You do not need to configure interfaces on the ASA 5585-X IPS SSP. You should ignore the  
modify interface default VLAN setting. The separation of traffic across virtual sensors is  
configured differently for the ASA 5585-X IPS SSP than for other sensors.  
[1] Modify interface default-vlan.  
Option:  
Step 9  
Press Enter to return to the top-level interface and virtual sensor configuration menu.  
[1] Edit Interface Configuration  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 2 Initializing the Sensor  
Advanced Setup  
[2] Edit Virtual Sensor Configuration  
[3] Display configuration  
Option:  
Step 10 Enter  
2
to edit the virtual sensor configuration.  
[1] Remove virtual sensor.  
[2] Modify "vs0" virtual sensor configuration.  
[3] Create new virtual sensor.  
Option:  
Step 11 Enter  
2
to modify the virtual sensor vs0 configuration.  
Virtual Sensor: vs0  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: sig0  
No Interfaces to remove.  
Unassigned:  
Monitored:  
[1] PortChannel0/0  
Add Interface:  
Step 12 Enter  
1
to add PortChannel 0/0 to virtual sensor vs0.  
Note  
Multiple virtual sensors are supported. The adaptive security appliance can direct packets to  
specific virtual sensors or can send packets to be monitored by a default virtual sensor. The  
default virtual sensor is the virtual sensor to which you assign PortChannel 0/0. We recommend  
that you assign PortChannel 0/0 to vs0, but you can assign it to another virtual sensor if you want  
to.  
Step 13 Press Enter to return to the main virtual sensor menu.  
Step 14 Enter to create a virtual sensor.  
3
Name[]:  
Step 15 Enter a name and description for your virtual sensor.  
Name[]: newVs  
Description[Created via setup by user cisco]: New Sensor  
Anomaly Detection Configuration  
[1] ad0  
[2] Create a new anomaly detection configuration  
Option[2]:  
Step 16 Enter  
1
to use the existing anomaly-detection configuration, ad0.  
Signature Definition Configuration  
[1] sig0  
[2] Create a new signature definition configuration  
Option[2]:  
Step 17 Enter  
2
to create a signature-definition configuration file.  
Step 18 Enter the signature-definition configuration name, newSig.  
Event Action Rules Configuration  
[1] rules0  
[2] Create a new event action rules configuration  
Option[2]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Advanced Setup  
Step 19 Enter  
1
to use the existing event action rules configuration, rules0.  
Note  
If PortChannel 0/0 has not been assigned to vs0, you are prompted to assign it to the new virtual  
sensor.  
Virtual Sensor: newVs  
Anomaly Detection: ad0  
Event Action Rules: rules0  
Signature Definitions: newSig  
Monitored:  
PortChannel0/0  
[1] Remove virtual sensor.  
[2] Modify "newVs" virtual sensor configuration.  
[3] Modify "vs0" virtual sensor configuration.  
[4] Create new virtual sensor.  
Option:  
Step 20 Press Enter to exit the interface and virtual sensor configuration menu.  
Modify default threat prevention settings?[no]:  
Step 21 Enter yesif you want to modify the default threat prevention settings.  
Note  
The sensor comes with a built-in override to add the deny packet event action to high risk rating  
alerts. If you do not want this protection, disable automatic threat prevention.  
Virtual sensor newVs is configured to prevent high risk threats in inline mode. (Risk  
Rating 90-100)  
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating  
90-100)  
Do you want to disable automatic threat prevention on all virtual sensors?[no]:  
Step 22 Enter yesto disable automatic threat prevention on all virtual sensors.  
The following configuration was entered.  
service host  
network-settings  
host-ip 10.1.9.201/24,10.1.9.1  
host-name ips-ssm  
telnet-option disabled  
sshv1-fallback disabled  
access-list 10.0.0.0/8  
access-list 64.0.0.0/8  
ftp-timeout 300  
no login-banner-text  
exit  
time-zone-settings  
offset 0  
standard-time-zone-name UTC  
exit  
summertime-option disabled  
ntp-option disabled  
exit  
service web-server  
port 342  
exit  
service analysis-engine  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Initializing the Sensor  
Verifying Initialization  
virtual-sensor newVs  
description New Sensor  
signature-definition newSig  
event-action-rules rules0  
anomaly-detection  
anomaly-detection-name ad0  
exit  
physical-interfaces PortChannel0/0  
exit  
exit  
service event-action-rules rules0  
overrides deny-packet-inline  
override-item-status Disabled  
risk-rating-range 90-100  
exit  
exit  
[0] Go to the command prompt without saving this config.  
[1] Return back to the setup without saving this config.  
[2] Save this configuration and exit setup.  
Step 23 Enter  
2
to save the configuration.  
Enter your selection[2]: 2  
Configuration Saved.  
Step 24 Reboot the ASA 5585-X IPS SSP.  
ips-ssp# reset  
Warning: Executing this command will stop all applications and reboot the node.  
Continue with reset? []:  
Step 25 Enter yesto continue the reboot.  
Step 26 After reboot, log in to the sensor, and display the self-signed X.509 certificate (needed by TLS).  
ips-ssp# show tls fingerprint  
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27  
Step 27 Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the  
certificate when using HTTPS to connect to this ASA 5585-X IPS SSP with a web browser.  
Step 28 Apply the most recent service pack and signature update. You are now ready to configure your  
ASA 5585-X IPS SSP for intrusion prevention.  
For More Information  
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,  
Verifying Initialization  
Note  
The CLI output is an example of what your configuration may look like. It will not match exactly due to  
the optional setup choices, sensor model, and IPS version you have installed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 2 Initializing the Sensor  
Verifying Initialization  
To verify that you initialized your sensor, follow these steps:  
Step 1  
Step 2  
Log in to the sensor.  
View your configuration.  
sensor# show configuration  
! ------------------------------  
! Current configuration last modified Fri Apr 19 19:01:05 2013  
! ------------------------------  
! Version 7.2(1)  
! Host:  
!
Realm Keys  
! Signature Definition:  
Signature Update  
key1.0  
S697.0  
!
2013-02-15  
! ------------------------------  
service interface  
physical-interfaces GigabitEthernet0/0  
admin-state enabled  
exit  
physical-interfaces GigabitEthernet0/1  
admin-state enabled  
exit  
inline-interfaces pair0  
interface1 GigabitEthernet0/0  
interface2 GigabitEthernet0/1  
exit  
bypass-mode auto  
exit  
! ------------------------------  
service authentication  
exit  
! ------------------------------  
service event-action-rules rules0  
exit  
! ------------------------------  
service host  
network-settings  
host-ip 10.106.133.159/23,10.106.132.1  
host-name q4360-159  
telnet-option enabled  
access-list 0.0.0.0/0  
dns-primary-server disabled  
dns-secondary-server disabled  
dns-tertiary-server disabled  
exit  
exit  
! ------------------------------  
service logger  
exit  
! ------------------------------  
service network-access  
exit  
! ------------------------------  
service notification  
exit  
! ------------------------------  
service signature-definition sig0  
exit  
! ------------------------------  
service ssh-known-hosts  
exit  
! ------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 2 Initializing the Sensor  
Verifying Initialization  
service trusted-certificates  
exit  
! ------------------------------  
service web-server  
websession-inactivity-timeout 3600  
exit  
! ------------------------------  
service anomaly-detection ad0  
exit  
! ------------------------------  
service external-product-interface  
exit  
! ------------------------------  
service health-monitor  
exit  
! ------------------------------  
service global-correlation  
exit  
! ------------------------------  
service aaa  
exit  
! ------------------------------  
service analysis-engine  
virtual-sensor vs0  
logical-interface pair0  
exit  
exit  
sensor#  
Note  
You can also use the more current-config command to view your configuration.  
Step 3  
Step 4  
Display the self-signed X.509 certificate (needed by TLS).  
sensor# show tls fingerprint  
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27  
Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the  
certificate when connecting to this sensor with a web browser.  
For More Information  
For the procedure for logging in to the sensor, see Chapter ii, “Logging In to the Sensor.”  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
2-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
3
Setting Up the Sensor  
This chapter contains procedures for the setting up the sensor, and contains the following sections:  
Setup Notes and Caveats  
The following notes and caveats apply to setting up the sensor:  
By default SSHv2 is enabled and SSHv1 is disabled.  
When updating the hostname, the CLI prompt of the current session and other existing sessions is  
not updated with the new hostname immediately. Subsequent CLI login sessions reflect the new  
hostname in the prompt.  
Telnet is not a secure access service and therefore is disabled by default on the sensor. However,  
SSH is always running on the sensor and it is a secure service.  
For automatic and global correlation updates to function, you must have either a DNS server or an  
HTTP proxy server configured at all times.  
DNS resolution is supported for accessing the global correlation update server as well as  
www.cisco.com for automatic updates.  
The default web server port is 443 if TLS is enabled and 80 if TLS is disabled.  
The username command provides username and password authentication for login purposes only.  
You cannot use this command to remove a user who is logged in to the system. You cannot use this  
command to remove yourself from the system.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 3 Setting Up the Sensor  
Understanding Sensor Setup  
You cannot use the privilege command to give a user service privileges. If you want to give an  
existing user service privileges, you must remove that user and then use the username command to  
create the service account.  
Do not make modifications to the sensor through the service account except under the direction of  
TAC. If you use the service account to configure the sensor, your configuration is not supported by  
TAC. Adding services to the operating system through the service account affects proper  
performance and functioning of the other IPS services. TAC does not support a sensor on which  
additional services have been added.  
You should carefully consider whether you want to create a service account. The service account  
provides shell access to the system, which makes the system vulnerable. However, you can use the  
service account to create a password if the administrator password is lost. Analyze your situation to  
decide if you want a service account existing on the system.  
Administrators may need to disable the password recovery feature for security reasons.  
We recommend that you use an NTP server to regulate time on your sensor. You can use  
authenticated or unauthenticated NTP. For authenticated NTP, you must obtain the NTP server IP  
address, NTP server key ID, and the key value from the NTP server. You can set up NTP during  
initialization or you can configure NTP through the CLI, IDM, IME, or ASDM.  
In addition to a valid Cisco.com username and password, you must also have a Cisco Services for  
IPS service contract before you can apply for a license key.  
Understanding Sensor Setup  
Setting up the sensor involves such tasks as changing sensor initialization information, adding and  
deleting users, configuring time and setting up NTP, creating a service account, configuring SSH and  
TLS, and installing the license key. You configured most of these settings when you initialized the sensor  
using the setup command.  
For More Information  
For more information on using the setup command to initialize the sensor, see Chapter 2, “Initializing  
Changing Network Settings  
After you initialize your sensor, you may need to change some of the network settings that you  
configured when you ran the setup command. This section describes how to change network settings,  
and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
Changing the Hostname  
Note  
The CLI prompt of the current session and other existing sessions will not be updated with the new  
hostname. Subsequent CLI login sessions will reflect the new hostname in the prompt.  
Use the host-name host_name command in the service host submode to change the hostname of the  
sensor after you have run the setup command. The default is sensor.  
To change the sensor hostname, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter network settings submode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
Step 3  
Step 4  
Change the sensor hostname.  
sensor(config-hos-net)# host-name firesafe  
Verify the new hostname.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.0.2.1/24,192.0.2.2 default:  
192.168.1.2/24,192.168.1.1  
host-name: firesafe default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 5  
Step 6  
To change the hostname back to the default setting, use the default form of the command.  
sensor(config-hos-net)# default host-name  
Verify the change to the default hostname sensor.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.0.2.1/24,192.0.2.2 default:  
192.168.1.2/24,192.168.1.1  
host-name: sensor <defaulted>  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 7  
Step 8  
Exit network settings mode.  
sensor(config-hos-net)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Changing the IP Address, Netmask, and Gateway  
Use the host-ip ip_address/netmask,default_gateway command in the service host submode to change  
the IP address, netmask, and default gateway after you have run the setup command. The default is  
192.168.1.2/24,192.168.1.1.  
The host-ip is in the form of IP Address/Netmask/Gateway: X.X.X.X/nn,Y.Y.Y.Y, where X.X.X.X  
specifies the sensor IP address as a 32-bit address written as 4 octets separated by periods where X =  
0-255, nn specifies the number of bits in the netmask, and Y.Y.Y.Y specifies the default gateway as a  
32-bit address written as 4 octets separated by periods where Y = 0-255.  
To change the sensor IP address, netmask, and default gateway, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter network settings mode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
Step 3  
Change the sensor IP address, netmask, and default gateway.  
sensor(config-hos-net)# host-ip 192.0.2.1/24,192.0.2.2  
Note  
The default gateway must be in the same subnet as the IP address of the sensor or the sensor  
generates an error and does not accept the configuration change.  
Step 4  
Verify the new information.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.0.2.1/24,192.0.2.2  
default: 192.168.1.2/24,192.168.1.1  
host-name: sensor default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
Step 5  
Step 6  
To change the information back to the default setting, use the default form of the command.  
sensor(config-hos-net)# default host-ip  
Verify that the host IP is now the default of 192.168.1.2/24,192.168.1.1.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.168.1.2/24,192.168.1.1 <defaulted>  
host-name: sensor default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 7  
Step 8  
Exit network settings mode.  
sensor(config-hos-net)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Enabling and Disabling Telnet  
Caution  
Telnet is not a secure access service and therefore is disabled by default. However, SSH is always  
running on the sensor and it is a secure service.  
Use the telnet-option {enabled | disabled} command in the service host submode to enable Telnet for  
remote access to the sensor. The default is disabled.  
To enable or disable Telnet services, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter network settings mode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
Step 3  
Enable Telnet services.  
sensor(config-hos-net)# telnet-option enabled  
sensor(config-hos-net)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
Step 4  
Verify that Telnet is enabled.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.0.2.1/24,192.0.2.2  
default: 192.168.1.2/24,192.168.1.1  
host-name: sensor default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 5  
Exit network settings mode.  
sensor(config-hos-net)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Step 6  
Note  
Press Enter to apply the changes or enter no to discard them.  
To Telnet to the sensor, you must enable Telnet and configure the access list to allow the Telnet clients  
to connect.  
For More Information  
For the procedure for configuring the access list, see Changing the Access List, page 3-6.  
Changing the Access List  
Use the access-list ip_address/netmask command in the service host submode to configure the access  
list, the list of hosts or networks that you want to have access to your sensor. Use the no form of the  
command to remove an entry from the list. The default access list is empty.  
The following hosts must have an entry in the access list:  
Hosts that need to Telnet to your sensor.  
Hosts that need to use SSH with your sensor.  
Hosts, such as the IDM and the IME, that need to access your sensor from a web browser.  
Management stations, such as the CSM, that need access to your sensor.  
If your sensor is a master blocking sensor, the IP addresses of the blocking forwarding sensors must  
have an entry in the list.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
To modify the access list, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter network settings mode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
Step 3  
Step 4  
Add an entry to the access list. The netmask for a single host is 32.  
sensor(config-hos-net)# access-list 192.0.2.110/32  
Verify the change you made to the access-list.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.168.1.2/24,192.168.1.1 <defaulted>  
host-name: sensor <defaulted>  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 2)  
-----------------------------------------------  
network-address: 10.1.9.0/24  
-----------------------------------------------  
network-address: 192.0.2.110/32  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
Step 5  
Step 6  
Remove the entry from the access list.  
sensor(config-hos-net)# no access-list 192.0.2.110/32  
Verify that the host is no longer in the list.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.168.1.2/24,192.168.1.1 <defaulted>  
host-name: sensor <defaulted>  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 10.1.9.0/24  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 7  
Step 8  
Change the value back to the default.  
sensor(config-hos-net)# default access-list  
Verify the value has been set back to the default.  
sensor(config-hos-net)# show settings  
network-settings  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
-----------------------------------------------  
host-ip: 192.168.1.2/24,192.168.1.1 <defaulted>  
host-name: sensor <defaulted>  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 9  
Exit network settings mode.  
sensor(config-hos-net)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Step 10 Press Enter to apply the changes or enter no to discard them.  
Changing the FTP Timeout  
Note  
You can use the FTP client for downloading updates and configuration files from your FTP server.  
Use the ftp-timeout command in the service host submode to change the number of seconds that the FTP  
client waits before timing out when the sensor is communicating with an FTP server. The default is 300  
seconds.  
To change the FTP timeout, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter network settings mode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
Step 3  
Step 4  
Change the number of seconds of the FTP timeout.  
sensor(config-hos-net)# ftp-timeout 500  
Verify the FTP timeout change.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.0.2.1/24,192.0.2.2  
default: 192.168.1.2/24,192.168.1.1  
host-name: sensor default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
-----------------------------------------------  
ftp-timeout: 500 seconds default: 300  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 5  
Step 6  
Change the value back to the default.  
sensor(config-hos-net)# default ftp-timeout  
Verify the value has been set back to the default.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.0.2.1/24,192.0.2.2  
default: 192.168.1.2/24,192.168.1.1  
host-name: sensor default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 7  
Step 8  
Exit network settings mode.  
sensor(config-hos-net)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Adding a Login Banner  
Use the login-banner-text text_message command to add a login banner that the user sees during login.  
There is no default. When you want to start a new line in your message, press Ctrl-V Enter.  
To add a login banner, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter network settings mode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
Step 3  
Step 4  
Add the banner login text.  
sensor(config-hos-net)# login-banner-text This is the banner login text message.  
Verify the banner login text message.  
sensor(config-hos-net)# show settings  
network-settings  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
-----------------------------------------------  
host-ip: 192.0.2.1/24,192.0.2.2  
default: 192.168.1.2/24,192.168.1.1  
host-name: sensor default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: This is the banner login text message. default:  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 5  
Step 6  
To remove the login banner text, use the no form of the command.  
sensor(config-hos-net)# no login-banner-text  
Verify the login text has been removed.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.0.2.1/24,192.0.2.2  
default: 192.168.1.2/24,192.168.1.1  
host-name: sensor default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: default:  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 7  
Step 8  
Exit network settings mode.  
sensor(config-hos-net)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Configuring the DNS and Proxy Servers for Global Correlation and Automatic  
Update  
Use the http-proxy, dns-primary-server, dns-secondary-server, and dns-tertiary-server commands  
in network-settings submode to configure servers to support the automatic update and global correlation  
features.  
You must configure either an HTTP proxy server or DNS server to support automatic update and global  
correlation. You may need a proxy server to download automatic update and global correlation updates  
if you use proxy in your network. If you are using a DNS server, you must configure at least one DNS  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
server and it must be reachable for automatic update and global correlation updates to be successful. You  
can configure other DNS servers as backup servers. DNS queries are sent to the first server in the list. If  
it is unreachable, DNS queries are sent to the next configured DNS server.  
Caution  
Caution  
For automatic and global correlation updates to function, you must have either a DNS server or an HTTP  
proxy server configured at all times.  
DNS resolution is supported for accessing the global correlation update server as well as www.cisco.com  
for automatic updates.  
The following options apply:  
http-proxy {no-proxy | proxy-sensor}—Configures the HTTP proxy server:  
address ip_address —Specifies the IP address of the HTTP proxy server.  
port port_number —Specifies the port number of the HTTP proxy server.  
dns-primary-server {enabled | disabled}—Enables a DNS primary server:  
address ip_address —Specifies the IP address of the DNS primary server.  
dns-secondary-server {enabled | disabled}—Enables a DNS secondary server:  
address ip_address —Specifies the IP address of the DNS secondary server.  
dns-tertiary-server {enabled | disabled}—Enables the DNS tertiary server:  
address ip_address —Specifies the IP address of the DNS tertiary server.  
Configuring DNS and Proxy Servers for Automatic Update and Global Correlation  
To configure DNS and proxy servers to support automatic update and global correlation, follow these  
steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter network settings submode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
Step 3  
Enable a proxy or DNS server to support global correlation:  
a. Enable a proxy server.  
sensor(config-hos-net)# http-proxy proxy-server  
sensor(config-hos-net-pro)# address 10.10.10.1  
sensor(config-hos-net-pro)# port 65  
sensor(config-hos-net-pro)#  
b. Enable a DNS server.  
sensor(config-hos-net)# dns-primary-server enabled  
sensor(config-hos-net-ena)# address 10.10.10.1  
sensor(config-hos-net-ena)#  
Step 4  
Verify the settings.  
sensor(config-hos-net)# show settings  
network-settings  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
-----------------------------------------------  
host-ip: 10.89.147.24/25,10.89.147.126 default: 192.168.1.2/24,192.168.1.1  
host-name: sensor <defaulted>  
telnet-option: enabled default: disabled  
sshv1-fallback: disabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
dns-primary-server  
-----------------------------------------------  
enabled  
-----------------------------------------------  
address: 10.10.10.1  
-----------------------------------------------  
-----------------------------------------------  
dns-secondary-server  
-----------------------------------------------  
disabled  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
dns-tertiary-server  
-----------------------------------------------  
disabled  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
http-proxy  
-----------------------------------------------  
proxy-server  
-----------------------------------------------  
address: 10.10.10.1  
port: 65  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-hos-net)#  
Step 5  
Step 6  
Exit network settings mode.  
sensor(config-hos-net)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for configuring automatic update, see Configuring Automatic Upgrades,  
For more information on global correlation features, see Chapter 10, “Configuring Global  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Setting Up the Sensor  
Changing Network Settings  
Enabling SSHv1 Fallback  
Note  
The IPS supports managing both SSHv1 and SSHv2. The default is SSHv2, but you can configure the  
sensor to fallback to SSHv1 if the peer client/server does not support SSHv2  
Use the sshv1-fallback {enabled | disabled} command in the service host submode to enable the sensor  
to fall back to SSH protocol version 1. Fallback to SSHv1 is provided in case the peer client/server does  
not support SSHv2. SSHv2 is the default SSH version.  
To enable or disable SSHv1 fallback, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter network settings mode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
Step 3  
Step 4  
Enable Telnet services.  
sensor(config-hos-net)# sshv1-fallback enabled  
sensor(config-hos-net)#  
Verify that SSHv1 fallback is enabled.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 10.106.164.52/24,10.106.164.1 default: 192.168.1.2/24,192.168.1.1  
host-name: p32-ips4240-52 default: sensor  
telnet-option: enabled default: disabled  
sshv1-fallback: enabled default: disabled  
access-list (min: 0, max: 512, current: 1)  
-----------------------------------------------  
network-address: 0.0.0.0/0  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: mmmm default:  
sensor(config-hos-net)#  
Step 5  
Step 6  
Exit network settings mode.  
sensor(config-hos-net)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For more information about configuring SSH, see Configuring SSH, page 3-45.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Changing the CLI Session Timeout  
Changing the CLI Session Timeout  
Use the cli-inactivity-timeout command in the service authentication submode to change the number of  
seconds that the CLI waits before timing out. Setting the CLI session timeout increases the security of a  
CLI session. The default is 0 seconds, which means that it is an unlimited value and thus will never time  
out. The valid range is 0 to 100,000 minutes.  
To change the CLI session timeout, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter authentication mode.  
sensor# configure terminal  
sensor(config)# service authentication  
Step 3  
Step 4  
Change the number of seconds of the CLI session timeout.  
sensor(config-aut)# cli-inactivity-timeout 5000  
Verify the CLI session timeout change.  
sensor(config-aut)# show settings  
attemptLimit: 0 <defaulted>  
password-strength  
-----------------------------------------------  
size: 8-64 <defaulted>  
digits-min: 0 <defaulted>  
uppercase-min: 0 <defaulted>  
lowercase-min: 0 <defaulted>  
other-min: 0 <defaulted>  
number-old-passwords: 0 <defaulted>  
-----------------------------------------------  
permit-packet-logging: true <defaulted>  
cli-inactivity-timeout: 5000 default: 0  
sensor(config-aut)#  
Step 5  
Step 6  
Change the value back to the default.  
sensor(config-aut)# default cli-inactivity-timeout  
Verify the value has been set back to the default.  
sensor(config-aut)# show settings  
attemptLimit: 0 <defaulted>  
password-strength  
-----------------------------------------------  
size: 8-64 <defaulted>  
digits-min: 0 <defaulted>  
uppercase-min: 0 <defaulted>  
lowercase-min: 0 <defaulted>  
other-min: 0 <defaulted>  
number-old-passwords: 0 <defaulted>  
-----------------------------------------------  
permit-packet-logging: true <defaulted>  
cli-inactivity-timeout: 0 <defaulted>  
sensor(config-aut)#  
Step 7  
Exit authentication mode.  
sensor(config-aut)# exit  
Apply Changes:?[yes]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Changing Web Server Settings  
Step 8  
Press Enter to apply the changes or enter no to discard them.  
Changing Web Server Settings  
Note  
The default web server port is 443 if TLS is enabled and 80 if TLS is disabled.  
After you run the setup command, you can change the following web server settings: the web server port,  
whether TLS encryption is being used, the HTTP server header message, restriction of TLS client  
ciphers, web session inactivity timeout, and logging of web session inactivity timeouts.  
HTTP is the protocol that web clients use to make requests from web servers. The HTTP specification  
requires a server to identify itself in each response. Attackers sometimes exploit this protocol feature to  
perform reconnaissance. If the IPS web server identified itself by providing a predictable response, an  
attacker might learn that an IPS sensor is present.  
We recommend that you not reveal to attackers that you have an IPS sensor. Change the server-id to  
anything that does not reveal any information, especially if your web server is available to the Internet.  
For example, if you forward a port through a firewall so you can monitor a sensor remotely, you need to  
set the server-id.  
The following options apply:  
enable-tls {false | true}—Enables encryption (TLSv1) on the system. The default is enabled.  
enable-websession-inactivity-timeout-logging {false | true}—Enables logging for web session  
inactivity timeouts. The default is disabled.  
port port_number—Specifies the port on which the web server listens for connections. The valid  
range is 1 to 65535. The default is 443.  
server-id server_id—Specifies the textual message the web server returns in the HTTP Server  
header. The default is HTTP/1.1 compliant configurable-service.  
tls-client-ciphers-restriction {false | true}—Enables the client to use only restricted mode ciphers;  
disabling allows all ciphers. The default is enabled. When IPS acts as a TLS client, you can  
configure restriciton on the TLS ciphers.  
Note  
Changes take place for the next sessions only. The current web session is not affected.  
When enabled, the client can use the following restricted ciphers:  
TLS_RSA_WITH_AES_128_CBC_SHA  
TLS_RSA_WITH_AES_256_CBC_SHA  
TLS_DHE_RSA_WITH_AES_128_CBC_SHA  
TLS_DHE_RSA_WITH_AES_256_CBC_SHA  
When disabled, the client can use the following ciphers:  
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256  
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256  
TLS_DHE_RSA_WITH_AES_256_CBC_SHA  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 3 Setting Up the Sensor  
Changing Web Server Settings  
TLS_DHE_DSS_WITH_AES_256_CBC_SHA  
TLS_RSA_WITH_AES_256_CBC_SHA  
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA  
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA  
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA  
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA  
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA  
TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA  
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA  
TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA  
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA  
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA  
TLS_RSA_WITH_3DES_EDE_CBC_SHA  
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256  
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256  
TLS_DHE_RSA_WITH_AES_128_CBC_SHA  
TLS_DHE_DSS_WITH_AES_128_CBC_SHA  
TLS_RSA_WITH_AES_128_CBC_SHA  
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA  
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA  
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA  
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA  
websession-inactivity-timeout seconds—Specifies the duration in seconds at which inactive web  
sessions time out. The valid range is 600 to 3600 seconds. The default is 3600 seconds.  
To change the web server settings, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter web server mode.  
sensor# configure terminal  
sensor(config)# service web-server  
Step 3  
Change the port number.  
sensor(config-web)# port 8080  
If you change the port number from the default of 443 to 8080, you receive this message:  
Warning: The web server’s listening port number has changed from 443 to 8080. This change  
will not take effect until the web server is re-started  
Step 4  
Enable TLS.  
sensor(config-web)# enable-tls true  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Setting Up the Sensor  
Changing Web Server Settings  
If you disable TLS, you receive this message:  
Warning: TLS protocol support has been disabled. This change will not take effect until  
the web server is re-started.  
Step 5  
Step 6  
Step 7  
Step 8  
Step 9  
Change the HTTP server header.  
sensor(config-web)# server-id Nothing to see here. Move along.  
Specify the web session inactivity timeout.  
sensor(config-web)# websession-inactivity-timeout 800  
Turn on logging for web session inactivity timeouts.  
sensor(config-web)# enable-websession-inactivity-timeout-logging true  
Turn on TLS client ciphers restriction.  
sensor(config-web)# tls-client-ciphers-restriction enable  
Verify the web server changes.  
sensor(config-web)# show settings  
enable-tls: true default: true  
port: 8080 default: 443  
server-id: Nothing to see here. Move along. default: HTTP/1.1 compliant  
configurable-service (min: 0, max: 99, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
websession-inactivity-timeout: 800 default: 3600  
enable-websession-inactivity-timeout-logging: true default: false  
tls-client-ciphers-restriction: enable default: enable  
sensor(config-web)#  
Step 10 To revert to the defaults, use the default form of the commands.  
sensor(config-web)# default port  
sensor(config-web)# default enable-tls  
sensor(config-web)# default server-id  
Step 11 Verify the defaults have been replaced.  
sensor(config-web)# show settings  
enable-tls: true <defaulted>  
port: 443 <defaulted>  
server-id: HTTP/1.1 compliant <defaulted>  
configurable-service (min: 0, max: 99, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
websession-inactivity-timeout: 3600 <defaulted>  
enable-websession-inactivity-timeout-logging: false <defaulted>  
tls-client-ciphers-restriction: enable <defaulted>  
sensor(config-web)#  
Step 12 Exit web server submode.  
sensor(config-web)# exit  
Apply Changes:?[yes]:  
Step 13 Press Enter to apply the changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Note  
If you change the port or enable TLS settings, you must reset the sensor to make the web server uses the  
new settings.  
For More Information  
For the procedure for enabling SSHv1 fallback, see Enabling SSHv1 Fallback, page 3-13.  
For the procedure for resetting the appliance, see Resetting the Appliance, page 17-44.  
For the procedure for resetting the ASA 5500-X IPS SSP, see Reloading, Shutting Down, Resetting,  
For the procedure for resetting the ASA 5585-X IPS SSP, see Reloading, Shutting Down, Resetting,  
Configuring Authentication and User Parameters  
The following section explains how to create users, configure RADIUS authentication, create the service  
account, configure passwords, specify privilege level, view a list of users, configure password policy,  
and lock and unlock user accounts. It contains the following topics:  
Adding and Removing Users  
Use the username command to create users on the local system. You can add a new user, set the privilege  
level—administrator, operator, viewer—and set the password for the new user. Use the no form of this  
command to remove a user from the system. This removes the user from CLI and web access.  
Caution  
The username command provides username and password authentication for login purposes only. You  
cannot use this command to remove a user who is logged in to the system. You cannot use this command  
to remove yourself from the system.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
If you do not specify a password, the system prompts you for one. Use the password command to change  
the password for existing users. Use the privilege command to change the privilege for existing users.  
The username follows the pattern ^[A-Za-z0-9()+:,_/-]+$, which means the username must start with a  
letter or number, and can include any letter A to Z (capital or small), any number 0 to 9, - and _, and can  
contain 1 to 64 characters. A valid password is 8 to 32 characters long. All characters except space are  
allowed.  
You receive the following error messages if you do not create a valid password:  
Error: setEnableAuthenticationTokenStatus : The password is too short.  
Error: setEnableAuthenticationTokenStatus : Failure setting the account’s password:  
it does not contain enough DIFFERENT characters  
Note  
You cannot use the privilege command to give a user service privileges. If you want to give an existing  
user service privileges, you must remove that user and then use the username command to create the  
service account.  
To add and remove users, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 3  
Specify the parameters for the user.  
sensor(config)# username username password password privilege  
administrator/operator/viewer  
For example, to add the user “tester” with a privilege level of administrator and the password  
“testpassword,” enter the following command:  
Note  
If you do not want to see the password in clear text, wait for the password prompt. Do not enter  
the password along with the username and privilege.  
sensor(config)# username tester privilege administrator  
Enter Login Password: ************  
Re-enter Login Password: ************  
sensor(config)#  
Note  
If you do not specify a privilege level for the user, the user is assigned the default viewer  
privilege.  
Step 4  
Verify that the user has been added. A list of users is displayed.  
sensor(config)# exit  
sensor# show users all  
CLI ID  
13491  
User  
cisco  
jsmith  
jtaylor  
jroberts  
Privilege  
administrator  
operator  
service  
*
viewer  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Step 5  
To remove a user, use the no form of the command.  
sensor# configure terminal  
sensor(config)# no username jsmith  
Note  
You cannot use this command to remove yourself from the system.  
Step 6  
Verify that the user has been removed. The user jsmithhas been removed.  
sensor(config)# exit  
sensor# show users all  
CLI ID  
13491  
User  
cisco  
jtaylor  
jroberts  
Privilege  
administrator  
service  
*
viewer  
sensor#  
For More Information  
For the procedure for creating the service account, see Creating the Service Account, page 3-28.  
For the procedure for configuring local or RADIUS authentication, see Configuring Authentication,  
Configuring Authentication  
Caution  
Make sure you have a RADIUS server already configured before you configure RADIUS authentication  
on the sensor. IPS has been tested with CiscoSecure ACS 4.2 and 5.1 servers. Refer to your RADIUS  
server documentation for information on how to set up a RADIUS server.  
You can create and remove users from the local sensor. You can only modify one user account at a time.  
Each user is associated with a role that controls what that user can and cannot modify. The requirements  
that must be used for user passwords are set with the password command.  
Users are authenticated through AAA either locally or through RADIUS servers. Local authentication  
is enabled by default. You must configure RADIUS authentication before it is active.  
You must specify the user role that is authenticated through RADIUS either by configuring the user role  
on the RADIUS server or specifying a default user role. The username and password are sent in an  
authentication request to the configured RADIUS server. The response of the server determines whether  
the login is authenticated.  
Note  
If the sensor is not configured to use a default user role and the sensor user role information in not in the  
Accept Message of the CiscoSecure ACS server, the sensor rejects RADIUS authentication even if the  
CiscoSecure ACS server accepts the username and password.  
You can configure a primary RADIUS server and a secondary RADIUS server. The secondary RADIUS  
server authenticates and authorizes users if the primary RADIUS server is unresponsive.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
You can also configure the sensor to use local authentication (local fallback) if no RADIUS servers are  
responding. In this case, the sensor authenticates against the locally configured user accounts. The  
sensor will only use local authentication if the RADIUS servers are not available, not if the RADIUS  
server rejects the authentication requests of the user. You can also configure how users connected  
through the console port are authenticated—through local user accounts, through RADIUS first and if  
that fails through local user accounts, or through RADIUS alone.  
To configure a RADIUS server, you must have the IP address, port, and shared secret of the RADIUS  
server. You must also either have the NAS-ID of the RADIUS server, or have the RADIUS server  
configured to authenticate clients without a NAS-ID or with the default IPS NAS-ID of cisco-ips.  
Note  
Enabling RADIUS authentication on the sensor does not disconnect already established connections.  
RADIUS authentication is only enforced for new connections to the sensor. Existing CLI, IDM, and IME  
connections remain established with the login credentials used prior to configuring RADIUS  
authentication. To force disconnection of these established connections, you must reset the sensor after  
RADIUS is configured.  
RADIUS Authentication Options  
Use the aaa command in service aaa submode to configure either local authentication or authentication  
using a RADIUS server.  
The following options apply:  
local—Lets you specify local authentication. To continue to create users, use the password  
command.  
radius—Lets you specify RADIUS as the method of authentication:  
nas-id—Identifies the service requesting authentication. The value can be no nas-id, cisco-ips,  
or a NAS-ID already configured on the RADIUS server. The default is cisco-ips.  
default-user-role—Lets you assign a default user role on the sensor that is only applied when  
there is NOT a Cisco av pair specifying the user role. The value can be unspecified, viewer,  
operator, or administrator. Service cannot be the default user role. The default is unspecified.  
If you do not want to configure a default user role on the sensor that is applied in the absence  
of a Cisco av pair, you need to configure the Cisco IOS/PIX 6.x RADIUS Attributes [009\001]  
cisco-av-pair under the group or user profile with one of the following options:  
ips-role=viewer, ips-role=operator, ips-role=administrator, ips-role=service, or  
ips-role=unspecified. The default is ips-role=unspecified.  
Note  
If the sensor is not configured to use a default user role and the sensor user role  
information in not in the Accept Message of the CiscoSecure ACS server, the sensor  
rejects RADIUS authentication even if the CiscoSecure ACS server accepts the  
username and password.  
Note  
The default user role is used only when the user has not been configured with a specific  
role on the ACS server. Local users are always configured with a specific role so the  
default user role will never apply to locally authenticated users.  
local-fallback {enabled | disabled}—Lets you default to local authentication if the RADIUS  
servers are not responding. The default is enabled.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
primary-server—Lets you configure the main RADIUS server:  
server-address—IP address of the RADIUS server.  
server-port—Port of the RADIUS server. If not specified, the default RADIUS port is used.  
timeout (seconds)—Specifies the number of seconds the sensor waits for a response from a  
RADIUS server before it considers the server to be unresponsive.  
shared-secret—The secret value configured on the RADIUS server. You must obtain the secret  
value of the RADIUS server to enter with the shared-secret command.  
Note  
You must have the same secret value configured on both the RADIUS server and the IPS  
sensor so that the server can authenticate the requests of the client and the client can  
authenticate the responses of the server.  
secondary-server {enabled | disabled}— (Optional) Lets you configure a secondary RADIUS  
server:  
server-address—IP address of the RADIUS server.  
server-port—Port of the RADIUS server. If not specified, the default RADIUS port is used.  
timeout (seconds)—Specifies the number of seconds the sensor waits for a response from a  
RADIUS server before it considers the server to be unresponsive.  
shared-secret—The secret value configured on the RADIUS server. You must obtain the secret  
value of the RADIUS server to enter with the shared-secret command.  
Note  
You must have the same secret value configured on both the RADIUS server and the IPS  
sensor so that the server can authenticate the requests of the client and the client can  
authenticate the responses of the server.  
console-authentication—Lets you choose how users connected through the console port are  
authenticated:  
local—Users connected through the console port are authenticated through local user accounts.  
radius-and-local—Users connected through the console port are authenticated through  
RADIUS first. If RADIUS fails, local authentication is attempted. This is the default.  
radius—Users connected through the console port are authenticated by RADIUS. If you also  
have local-fallback enabled, users can also be authenticated through the local user accounts.  
Configuring Local or RADIUS Authentication  
Caution  
Make sure you have a RADIUS server already configured before you configure RADIUS authentication  
on the sensor. IPS has been tested with CiscoSecure ACS 4.2 and 5.1 servers. Refer to your RADIUS  
server documentation for information on how to set up a RADIUS server.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Note  
Enabling RADIUS authentication on the sensor does not disconnect already established connections.  
RADIUS authentication is only enforced for new connections to the sensor. Existing CLI, IDM, and IME  
connections remain established with the login credentials used prior to configuring RADIUS  
authentication. To force disconnection of these established connections, you must reset the sensor after  
RADIUS is configured.  
To configure local or RADIUS AAA authentication on the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 3  
Step 4  
Enter AAA submode.  
sensor(config)# service aaa  
sensor(config-aaa)#  
Configure local authentication. To continue to create users on the local system, enter yesto save your  
configuration, and use the username command in configure terminal mode. To configure AAA RADIUS  
authentication, go to Step 5.  
sensor(config-aaa)# aaa local  
sensor(config-aaa)# exit  
Apply Changes?[yes]:yes  
Step 5  
Configure AAA RADIUS authentication:  
a. Enter RADIUS authentication submode.  
sensor(config-aaa)# aaa radius  
sensor(config-aaa-rad)#  
b. Enter the Network Access ID. The NAS-ID is an identifier that clients send to servers to  
communicate the type of service they are attempting to authenticate. The value can be no nas-id,  
cisco-ips, or a NAS-ID already configured on the RADIUS server. The default is cisco-ips.  
sensor(config-aaa-rad)# nas-id cisco-ips  
sensor(config-aaa-rad)#  
c. (Optional) Configure a default user role if you are not configuring a Cisco av pair. You can configure  
a default user role on the sensor that is only applied when there is NOT a Cisco av pair specifying  
the user role. The values are unspecified, viewer, operator, or administrator. The default is  
unspecified.  
sensor(config-aaa-rad)# default-user-role operator  
sensor(config-aaa-rad)#  
Note  
Service cannot be the default role.  
d. Configure a Cisco av pair. If you do not want to configure a default user role on the sensor that is  
applied in the absence of a Cisco av pair, you need to configure the Cisco IOS/PIX 6.x RADIUS  
Attributes [009\001] cisco-av-pair under the group or user profile with one of the following options:  
ips-role=viewer  
ips-role=operator  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
ips-role=administrator  
ips-role=service  
Note  
If the sensor is not configured to use a default user role and the sensor user role  
information in not in the Accept Message of the CiscoSecure ACS server, the sensor  
rejects RADIUS authentication even if the CiscoSecure ACS server accepts the  
username and password.  
Note  
The default user role is used only when the user has not been configured with a specific  
role on the ACS server. Local users are always configured with a specific role so the  
default user role will never apply to locally authenticated users.  
e. Configure the sensor to switch over to local authentication if the RADIUS server becomes  
unresponsive.  
sensor(config-aaa-rad)# local-fallback enabled  
sensor(config-aaa-rad)#  
Step 6  
Configure the primary RADIUS server:  
a. Enter primary server submode.  
sensor(config-aaa-rad)# primary-server  
sensor(config-aaa-rad-pri)#  
b. Enter the RADIUS server IP address.  
sensor(config-aaa-rad-pri)# server-address 10.1.2.3  
sensor(config-aaa-rad-pri)#  
c. Enter the RADIUS server port. If not specified, the default RADIUS port is used.  
sensor(config-aaa-rad-pri)# server-port 1812  
sensor(config-aaa-rad-pri)#  
d. Enter the amount of time in seconds you want to wait for the RADIUS server to respond.  
sensor(config-aaa-rad-pri)# time-out 5  
sensor(config-aaa-rad-pri)#  
e. Enter the secret value that you obtained from the RADIUS server. The shared secret is a piece of  
data known only to the parties involved in a secure communication.  
sensor(config-aaa-rad-pri)# shared-secret kkkk  
sensor(config-aaa-rad-pri)#  
Note  
You must have the same secret value configured on both the RADIUS server and the IPS  
sensor so that the server can authenticate the requests of the client and the client can  
authenticate the responses of the server.  
Step 7  
(Optional) Enable a secondary RADIUS server to perform authentication in case the primary RADIUS  
server is not responsive:  
a. Enter secondary server submode.  
sensor(config-aaa-rad)# secondary-server enabled  
sensor(config-aaa-rad-sec)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
b. Enter the IP address of the second RADIUS server.  
sensor(config-aaa-rad-sec)# server-address 10.4.5.6  
sensor(config-aaa-rad-sec)#  
c. Enter the RADIUS server port. If not specified, the default RADIUS port is used.  
sensor(config-aaa-rad-sec)# server-port 1812  
sensor(config-aaa-rad-sec)#  
d. Enter the amount of time in seconds you want to wait for the RADIUS server to respond.  
sensor(config-aaa-rad-sec)# time-out 8  
sensor(config-aaa-rad-sec)#  
e. Enter the secret value you obtained for this RADIUS server. The shared secret is a piece of data  
known only to the parties involved in a secure communication.  
sensor(config-aaa-rad-sec)# shared-secret yyyyy  
sensor(config-aaa-rad-sec)#  
Note  
You must have the same secret value configured on both the RADIUS server and the IPS  
sensor so that the server can authenticate the requests of the client and the client can  
authenticate the responses of the server.  
Step 8  
Step 9  
Specify the type of console authentication.  
sensor(config-aaa-rad)# console-authentication radius-and-local  
sensor(config-aaa-rad)#  
You can choose local, local and RADIUS, or RADIUS.  
Verify the settings:  
sensor(config-aaa-rad)# show settings  
radius  
-----------------------------------------------  
primary-server  
-----------------------------------------------  
server-address: 10.1.2.3  
server-port: 1812 <defaulted>  
shared-secret: kkkk  
timeout: 3 <defaulted>  
-----------------------------------------------  
secondary-server  
-----------------------------------------------  
enabled  
-----------------------------------------------  
server-address: 10.4.5.6  
server-port: 1816 default: 1812  
shared-secret: yyyyy  
timeout: 8 default: 3  
-----------------------------------------------  
-----------------------------------------------  
nas-id: cisco-ips default: cisco-ips  
local-fallback: enabled default: enabled  
console-authentication: radius-and-local <defaulted>  
default-user-role: operator default: unspecified  
-----------------------------------------------  
sensor(config-aaa-rad)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Step 10 Exit AAA mode.  
sensor(config-aaa-rad)# exit  
sensor(config-aaa)# exit  
Apply Changes:?[yes]:  
Step 11 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for adding and removing users, see Adding and Removing Users, page 3-18.  
For the procedure for configuring passwords, see Configuring Passwords, page 3-29.  
For the procedure for specifying password requirements, see Configuring the Password Policy,  
For detailed information on RADIUS and the service account, see The Service Account and  
Configuring Packet Command Restriction  
Use the permit-packet-logging command to restrict the use of packet capture-related  
commands—packet capture/display and IP logging—for local and AAA RADIUS users. The default is  
to permit packet capture/display and IP log commands. Local users with the correct permissions can use  
the packet capture/display and IP log commands. AAA RADIUS users with the correct av-pair can use  
the packet capture/display and IP log commands.  
Note  
IP log actions configured for signatures are not impacted by the packet command restriction feature.  
When you modify the packet command restriction option, you receive the following warning:  
Modified packet settings would take effect only for new sessions, existing sessions will  
continue with previous settings.  
The following options apply:  
permit-packet-logging true—Allows users to execute packet-related commands based on privilege  
level.  
permit-packet-logging false—Restricts all users from executing any packet-related commands.  
AAA RADIUS Users  
AAA RADIUS users with the correct av-pair are authorized to execute packet capture/display and IP  
logging commands. RADIUS users with no av-pair value are restricted. The correct av-pair,  
permit-packet-logging=true, allows users to execute packet-related commands based on privilege  
level. This av-pair is in addition to the authentication role related av-pair:  
ips-role=viewer  
ips-role=operator  
ips-role=administrator  
ips-role=service  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Status Events  
As part of the packet command restriction option, status events are triggered for the following actions:  
When an administrator enables or disables the packet command restriction.  
When an authorized user executes any of the restricted commands.  
When an unauthorized user executes any of the restricted commands.  
To permit or restrict packet command restrictions, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter authentication submode.  
sensor# configure terminal  
sensor(config)# service authentication  
sensor(config-aut)#  
Step 3  
Allow AAA RADIUS users with the correct av-pair (permit-packet-logging=true) and local users with  
the correct privilege levels to execute all packet capture/display and IP log commands.  
sensor(config-aut)# permit-packet-logging true  
Note  
Existing CLI sessions are not affected by the changes made in restriction settings.  
Step 4  
Check your new setting.  
sensor(config-aut)# show settings  
attemptLimit: 0 <defaulted>  
password-strength  
-----------------------------------------------  
size: 8-64 <defaulted>  
digits-min: 0 <defaulted>  
uppercase-min: 0 <defaulted>  
lowercase-min: 0 <defaulted>  
other-min: 0 <defaulted>  
number-old-passwords: 0 <defaulted>  
-----------------------------------------------  
permit-packet-logging: true default: true  
cli-inactivity-timeout: 0 <defaulted>  
sensor(config-aut)#  
Step 5  
Step 6  
Restrict all users from executing packet capture/display and IP log commands.  
sensor(config-aut)# permit-packet-logging false  
Check your new setting.  
sensor(config-aut)# show settings  
attemptLimit: 0 <defaulted>  
password-strength  
-----------------------------------------------  
size: 8-64 <defaulted>  
digits-min: 0 <defaulted>  
uppercase-min: 0 <defaulted>  
lowercase-min: 0 <defaulted>  
other-min: 0 <defaulted>  
number-old-passwords: 0 <defaulted>  
-----------------------------------------------  
permit-packet-logging: false default: true  
cli-inactivity-timeout: 0 <defaulted>  
sensor(config-aut)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Step 7  
Step 8  
Exit authentication mode.  
sensor(config-aut)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Creating the Service Account  
You can create a service account for TAC to use during troubleshooting. Although more than one user  
can have access to the sensor, only one user can have service privileges on a sensor. The service account  
is for support purposes only.  
The root user password is synchronized to the service account password when the service account is  
created. To gain root access you must log in with the service account and switch to user root with the  
su - root command.  
Caution  
Do not make modifications to the sensor through the service account except under the direction of TAC.  
If you use the service account to configure the sensor, your configuration is not supported by TAC.  
Adding services to the operating system through the service account affects proper performance and  
functioning of the other IPS services. TAC does not support a sensor on which additional services have  
been added.  
Caution  
You should carefully consider whether you want to create a service account. The service account  
provides shell access to the system, which makes the system vulnerable. However, you can use the  
service account to create a password if the administrator password is lost. Analyze your situation to  
decide if you want a service account existing on the system.  
Note  
For IPS 5.0 and later, you can no longer remove the cisco account. You can disable it using the no  
password cisco command, but you cannot remove it. To use the no password cisco command, there  
must be another administrator account on the sensor. Removing the cisco account through the service  
account is not supported. If you remove the cisco account through the service account, the sensor most  
likely will not boot up, so to recover the sensor you must reinstall the sensor system image.  
To create the service account, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 3  
Specify the parameters for the service account. The username follows the pattern  
^[A-Za-z0-9()+:,_/-]+$, which means the username must start with a letter or number, and can include  
any letter A to Z (capital or small), any number 0 to 9, - and _, and can contain 1 to 64 characters.  
sensor(config)# user username privilege service  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Step 4  
Step 5  
Specify a password when prompted. A valid password is 8 to 32 characters long. All characters except  
space are allowed. If a service account already exists for this sensor, the following error is displayed and  
no service account is created.  
Error: Only one service account may exist  
Exit configuration mode.  
sensor(config)# exit  
sensor#  
When you use the service account to log in to the CLI, you receive this warning.  
************************ WARNING *******************************************************  
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. This account is intended to be  
used for support and troubleshooting purposes only. Unauthorized modifications are not  
supported and will require this device to be reimaged to guarantee proper operation.  
****************************************************************************************  
The Service Account and RADIUS Authentication  
If you are using RADIUS authentication and want to create and use a service account, you must create  
the service account both on your sensor and on the RADIUS server. You must use local authentication  
to access the service account on the sensor. The service account must be created manually as a local  
account on the sensor. Then when you configure RADIUS authentication, the service account must also  
be configured manually on the RADIUS server with the accept message set to ip-role=service.  
When you log in to the service account, you are authenticated against both the sensor account and the  
RADIUS server account. By whatever method you use to access the service account—serial console  
port, direct monitor/keyboard (for sensors that support it), or a network connection, such as SSH or  
Telnet—you have to log in using local authentication.  
RADIUS Authentication Functionality and Limitations  
The current AAA RADIUS implementation has the following functionality and limitations:  
Authentication with a RADIUS server—However, you cannot change the password of the RADIUS  
server from the IPS.  
Authorization—You can perform role-based authorization by specifying the IPS role of the user on  
the RADIUS server.  
Accounting—The login attempts of the user and the configuration changes are logged as events  
locally on the IPS. However, these account messages are not communicated to the RADIUS server.  
Configuring Passwords  
Use the password command to update the password on the local sensor. You can also use this command  
to change the password for an existing user or to reset the password for a locked account. A valid  
password is 8 to 32 characters long. All characters except space are allowed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
To change the password, follow these steps:  
Step 1  
To change the password for another user or reset the password for a locked account, follow these steps:  
a. Log in to the CLI using an account with administrator privileges.  
b. Enter configuration mode.  
sensor# configure terminal  
c. Change the password for a specific user. This example modifies the password for the user “tester.”  
sensor(config)# password tester  
Enter New Login Password: ******  
Re-enter New Login Password: ******  
Step 2  
To change your password, follow these steps:  
a. Log in to the CLI.  
b. Enter configuration mode.  
sensor# configure terminal  
c. Change your password.  
sensor(config)# password  
Enter Old Login Password:************  
Enter New Login Password: ************  
Re-enter New Login Password: ************  
For More Information  
For the procedures for recovering sensor passwords, see Recovering the Password, page 17-2.  
Changing User Privilege Levels  
Note  
You cannot use the privilege command to give a user service privileges. If you want to give an existing  
user service privileges, you must remove that user and then use the username command to create the  
service account. There can only be one person with service privileges.  
Use the privilege command to change the privilege level—administrator, operator, viewer—for a user.  
To change the privilege level for a user, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Verify the current privilege of the user jsmith.  
sensor# show users all  
CLI ID  
13491  
User  
cisco  
jsmith  
operator  
service  
viewer  
Privilege  
administrator  
viewer  
operator  
service  
*
viewer  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Step 3  
Step 4  
Change the privilege level from viewer to operator.  
sensor# configure terminal  
sensor(config)# privilege user jsmith operator  
Warning: The privilege change does not apply to current CLI sessions. It will be applied  
to subsequent logins.  
sensor(config)#  
Verify that the privilege of the user has been changed. The privilege of the user jsmithhas been changed  
from viewer to operator.  
sensor(config)# exit  
sensor# show users all  
CLI ID  
13491  
User  
cisco  
jsmith  
operator  
service  
viewer  
Privilege  
administrator  
operator  
operator  
service  
*
viewer  
sensor#  
Step 5  
Display your current level of privilege.  
sensor# show privilege  
Current privilege level is administrator  
For More Information  
For the procedure for creating the service account, see Creating the Service Account, page 3-28.  
Showing User Status  
Note  
All IPS platforms allow ten concurrent log in sessions.  
Use the show users command to view information about the username and privilege of all users logged  
in to the sensor, and all user accounts on the sensor regardless of login status. An asterisk (*) indicates  
the current user. If an account is locked, the username is surrounded by parentheses. A locked account  
means that the user failed to enter the correct password after the configured attempts.  
To show user information, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Verify the users logged in to the sensor.  
sensor# show users  
CLI ID  
13491  
User  
cisco  
Privilege  
administrator  
*
sensor#  
Step 3  
Verify all users. The account of the user jsmith is locked.  
sensor# show users all  
CLI ID  
13491  
5824  
User  
cisco  
(jsmith)  
Privilege  
administrator  
viewer  
*
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
9802  
sensor#  
tester  
operator  
Step 4  
To unlock the account of jsmith, reset the password.  
sensor# configure terminal  
sensor(config)# password jsmith  
Enter New Login Password: ******  
Re-enter New Login Password: ******  
Configuring the Password Policy  
As sensor administrator, you can configure how passwords are created. All user-created passwords must  
conform to the policy that you set up. You can set login attempts and the size and minimum characters  
requirements for a password. The minimum password length is eight characters. If you forget your  
password, there are various ways to recover the password depending on your sensor platform.  
Caution  
If the password policy includes minimum numbers of character sets, such as upper case or number  
characters, the sum of the minimum number of required character sets cannot exceed the minimum  
password size. For example, you cannot set a minimum password size of eight and also require that  
passwords must contain at least five lowercase and five uppercase characters.  
Example  
For example, you can set a policy where passwords must have at least 10 characters and no more than  
40, and must have a minimum of 2 upper case and 2 numeric characters. Once that policy is set, every  
password configured for each user account must conform to this password policy.  
To set up a password policy, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter password strength authentication submode.  
sensor# configure terminal  
sensor(config)# service authentication  
sensor(config-aut)# password-strength  
Step 3  
Step 4  
Set the minimum number of numeric digits that must be in a password. The range is 0 to 64.  
sensor(config-aut-pas)# digits-min 6  
Set the minimum number of nonalphanumeric printable characters that must be in a password. The range  
is 0 to 64.  
sensor(config-aut-pas)# other-min 3  
Step 5  
Step 6  
Set the minimum number of uppercase alphabet characters that must be in a password. The range is 0 to  
64.  
sensor(config-aut-pas)# uppercase-min 3  
Set the minimum number of lower-case alphabet characters that must be in a password.  
sensor(config-aut-pas)# lowercase-min 3  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Step 7  
Step 8  
Set the number of old passwords to remember for each account. A new password cannot match any of  
the old passwords of an account.  
sensor(config-aut-pas)# number-old-passwords 3  
Check your new setting.  
sensor(config-aut-pas)# show settings  
password-strength  
-----------------------------------------------  
size: 8-64 <defaulted>  
digits-min: 6 default: 0  
uppercase-min: 3 default: 0  
lowercase-min: 3 default: 0  
other-min: 3 default: 0  
number-old-passwords: 3 default: 0  
-----------------------------------------------  
sensor(config-aut-pas)#  
For More Information  
For the procedures for recovering sensor passwords, see Recovering the Password, page 17-2.  
Locking User Accounts  
Use the attemptLimit number command in authentication submode to lock accounts so that users cannot  
keep trying to log in after a certain number of failed attempts. The default is 0, which indicates unlimited  
authentication attempts. For security purposes, you should change this number.  
To configure account locking, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter service authentication submode.  
sensor# configure terminal  
sensor(config)# service authentication  
Step 3  
Step 4  
Set the number of attempts users will have to log in to accounts.  
sensor(config-aut)# attemptLimit 3  
Check your new setting.  
sensor(config-aut)# show settings  
attemptLimit: 3 defaulted: 0  
sensor(config-aut)#  
Step 5  
Step 6  
Set the value back to the system default setting.  
sensor(config-aut)# default attemptLimit  
Check that the setting has returned to the default.  
sensor(config-aut)# show settings  
attemptLimit: 0 <defaulted>  
sensor(config-aut)#  
Step 7  
Check to see if any users have locked accounts. The account of the user jsmithis locked as indicated by  
the parentheses.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3 Setting Up the Sensor  
Configuring Authentication and User Parameters  
Note  
When you apply a configuration that contains a non-zero value for attemptLimit, a change is  
made in the SSH server that may subsequently impact your ability to connect with the sensor.  
When attemptLimit is non-zero, the SSH server requires the client to support challenge-response  
authentication. If you experience problems after your SSH client connects but before it prompts  
for a password, you need to enable challenge-response authentication. Refer to the  
documentation for your SSH client for instructions.  
sensor(config-aut)# exit  
sensor(config)# exit  
sensor# show users all  
CLI ID  
1349  
5824  
User  
cisco  
(jsmith)  
tester  
Privilege  
administrator  
viewer  
*
9802  
operator  
Step 8  
To unlock the account of jsmith, reset the password.  
sensor# configure terminal  
sensor(config)# password jsmith  
Enter New Login Password: ******  
Re-enter New Login Password: ******  
For More Information  
For the procedure for unlocking the user accounts, see Unlocking User Accounts, page 3-34.  
Unlocking User Accounts  
Use the unlock user username command in global configuration mode to unlock accounts for users who  
have been locked out after a specified number of failed attempts.  
To configure account unlocking, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Check to see if any users have locked accounts. The account of the user jsmith is locked as indicated by  
the parentheses.  
sensor# show users all  
CLI ID  
1349  
5824  
User  
cisco  
(jsmith)  
tester  
Privilege  
administrator  
viewer  
*
9802  
operator  
Step 3  
Step 4  
Enter global configuration mode.  
sensor# configure terminal  
sensor(config)#  
Unlock the account.  
sensor(config)# unlock user jsmith  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3 Setting Up the Sensor  
Configuring Time  
Step 5  
Check your new setting. The account of the user jsmith is now unlocked as indicated by the lack of  
parenthesis.  
sensor# show users all  
CLI ID  
1349  
5824  
User  
Privilege  
administrator  
viewer  
*
cisco  
jsmith  
tester  
9802  
operator  
For More Information  
For the procedure for locking the user accounts, see Locking User Accounts, page 3-33.  
Configuring Time  
This section describes the importance of having a reliable time source for the sensor. It contains the  
following topics:  
Time Sources and the Sensor  
Note  
We recommend that you use an NTP server to regulate time on your sensor. You can use authenticated  
or unauthenticated NTP. For authenticated NTP, you must obtain the NTP server IP address, NTP server  
key ID, and the key value from the NTP server. You can set up NTP during initialization or you can  
configure NTP through the CLI, IDM, IME, or ASDM.  
The sensor requires a reliable time source. All events (alerts) must have the correct UTC and local time  
stamp, otherwise, you cannot correctly analyze the logs after an attack. When you initialize the sensor,  
you set up the time zones and summertime settings. This section provides a summary of the various ways  
to set the time on sensors.  
The IPS Standalone Appliances  
Use the clock set command to set the time. This is the default.  
Configure the appliance to get its time from an NTP time synchronization source.  
Note  
The currently supported Cisco IPS appliances are the IPS 4345, IPS 4360, IPS 4510, and  
IPS 4520.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 3 Setting Up the Sensor  
Configuring Time  
The ASA IPS Modules  
The ASA 5500-X IPS SSP and ASA 5585-X IPS SSP automatically synchronize their clocks with  
the clock in the adaptive security appliance in which they are installed. This is the default.  
Configure them to get their time from an NTP time synchronization source, such as a Cisco router  
other than the parent router.  
Synchronizing IPS Module System Clocks with the Parent Device System Clock  
The ASAIPS modules (ASA 5500 AIP SSM, ASA 5500-X IPS SSP, ASA 5585-X IPS SSP) synchronize  
their clocks to the parent chassis clock (switch, router, or adaptive security appliance) each time the IPS  
boots up and any time the parent chassis clock is set. The IPS clock and parent chassis clock tend to drift  
apart over time. The difference can be as much as several seconds per day. To avoid this problem, make  
sure that both the IPS clock and the parent clock are synchronized to an external NTP server. If only the  
IPS clock or only the parent chassis clock is synchronized to an NTP server, the time drift occurs.  
Correcting Time on the Sensor  
If you set the time incorrectly, your stored events will have the incorrect time because they are stamped  
with the time the event was created. The Event Store time stamp is always based on UTC time. If during  
the original sensor setup, you set the time incorrectly by specifying 8:00 p.m. rather than 8:00 a.m.,  
when you do correct the error, the corrected time will be set backwards. New events might have times  
older than old events.  
For example, if during the initial setup, you configure the sensor as central time with daylight saving  
time enabled and the local time is 8:04 p.m., the time is displayed as 20:04:37 CDT and has an offset  
from UTC of -5 hours (01:04:37 UTC, the next day). A week later at 9:00 a.m., you discover the error:  
the clock shows 21:00:23 CDT. You then change the time to 9:00 a.m. and now the clock shows  
09:01:33 CDT. Because the offset from UTC has not changed, it requires that the UTC time now be  
14:01:33 UTC, which creates the time stamp problem.  
To ensure the integrity of the time stamp on the event records, you must clear the event archive of the  
older events by using the clear events command.  
Note  
You cannot remove individual events.  
Configuring Time on the Sensor  
This section describes how to configure time on the sensor so that your events are time-stamped  
correctly. It contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Chapter 3 Setting Up the Sensor  
Configuring Time  
Displaying the System Clock  
Use the show clock [detail] command to display the system clock. You can use the detail option to  
indicate the clock source (NTP or system) and the current summertime setting (if any). The system clock  
keeps an authoritative flag that indicates whether the time is authoritative (believed to be accurate). If  
the system clock has been set by a timing source, such as NTP, the flag is set.  
Table 3-1 lists the system clock flags.  
Table 3-1  
System Clock Flags  
Symbol  
Description  
*
Time is not authoritative.  
Time is authoritative.  
(blank)  
.
Time is authoritative, but NTP is not synchronized.  
To display the system clock, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the system clock.  
sensor# show clock  
*19:04:52 UTC Thu Apr 03 2008  
Step 3  
Display the system clock with details. The following example indicates that the sensor is getting its time  
from NTP and that is configured and synchronized.  
sensor# show clock detail  
20:09:43 UTC Thu Apr 03 2011  
Time source is NTP  
Summer time starts 03:00:00 UTC Sun Mar 09 2011  
Summer time stops 01:00:00 UTC Sun Nov 02 2011  
Step 4  
Display the system clock with details. The following example indicates that no time source is configured.  
sensor# show clock detail  
*20:09:43 UTC Thu Apr 03 2011  
No time source  
Summer time starts 03:00:00 UTC Sun Mar 09 2011  
Summer time stops 01:00:00 UTC Sun Nov 02 2011  
Manually Setting the System Clock  
Note  
You do not need to set the system clock if your sensor is synchronized by a valid outside timing  
mechanism such as an NTP clock source.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 3 Setting Up the Sensor  
Configuring Time  
Use the clock set hh:mm [:ss] month day year command to manually set the clock on the appliance. Use  
this command if no other time sources are available. The clock set command does not apply to the  
following platforms, because they get their time from the adaptive security appliance in which they are  
installed:  
ASA 5500-X IPS SSP  
ASA 5585-X IPS SSP  
To manually set the clock on the appliance, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Set the clock manually.  
sensor# clock set 13:21 Mar 29 2011  
Note  
The time format is 24-hour time.  
Configuring Recurring Summertime Settings  
Note  
Summertime is a term for daylight saving time.  
Use the summertime-option recurring command to configure the sensor to switch to summertime  
settings on a recurring basis. The default is recurring.  
To configure the sensor to switch to summertime settings on a recurring basis, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter summertime recurring submode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# summertime-option recurring  
Step 3  
Step 4  
Enter start summertime submode.  
sensor(config-hos-rec)# start-summertime  
Configure the start summertime parameters:  
a. Enter the day of the week you want to start summertime settings.  
sensor(config-hos-rec-sta)# day-of-week monday  
b. Enter the month you want to start summertime settings.  
sensor(config-hos-rec-sta)# month april  
c. Enter the time of day you want to start summertime settings. The format is hh:mm:ss.  
sensor(config-hos-rec-sta)# time-of-day 12:00:00  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 3 Setting Up the Sensor  
Configuring Time  
d. Enter the week of the month you want to start summertime settings. The values are first through  
fifth, or last.  
sensor(config-hos-rec-sta)# week-of-month first  
e. Verify your settings.  
sensor(config-hos-rec-sta)# show settings  
start-summertime  
-----------------------------------------------  
month: april default: april  
week-of-month: first default: first  
day-of-week: monday default: sunday  
time-of-day: 12:00:00 default: 02:00:00  
-----------------------------------------------  
sensor(config-hos-rec-sta)#  
Step 5  
Step 6  
Enter end summertime submode.  
sensor(config-hos-rec-sta)# exit  
sensor(config-hos-rec)# end-summertime  
Configure the end summertime parameters:  
a. Enter the day of the week you want to end summertime settings.  
sensor(config-hos-rec-end)# day-of-week friday  
b. Enter the month you want to end summertime settings.  
sensor(config-hos-rec-end)# month october  
c. Enter the time of day you want to end summertime settings. The format is hh:mm:ss.  
sensor(config-hos-rec-end)# time-of-day 05:15:00  
d. Enter the week of the month you want to end summertime settings. The values are first through fifth,  
or last.  
sensor(config-hos-rec-end)# week-of-month last  
e. Verify your settings.  
sensor(config-hos-rec-end)# show settings  
end-summertime  
-----------------------------------------------  
month: october default: october  
week-of-month: last default: last  
day-of-week: friday default: sunday  
time-of-day: 05:15:00 default: 02:00:00  
-----------------------------------------------  
sensor(config-hos-rec-end)#  
Step 7  
Specify the local time zone used during summertime.  
sensor(config-hos-rec-end)# exit  
sensor(config-hos-rec)# summertime-zone-name CDT  
Step 8  
Step 9  
Specify the offset.  
sensor(config-hos-rec)# offset 60  
Verify your settings.  
sensor(config-hos-rec)# show settings  
recurring  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Setting Up the Sensor  
Configuring Time  
offset: 60 minutes default: 60  
summertime-zone-name: CDT  
start-summertime  
-----------------------------------------------  
month: april default: april  
week-of-month: first default: first  
day-of-week: monday default: sunday  
time-of-day: 12:00:00 default: 02:00:00  
-----------------------------------------------  
end-summertime  
-----------------------------------------------  
month: october default: october  
week-of-month: last default: last  
day-of-week: friday default: sunday  
time-of-day: 05:15:00 default: 02:00:00  
-----------------------------------------------  
-----------------------------------------------  
Step 10 Exit recurring summertime submode.  
sensor(config-hos-rec)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Step 11 Press Enter to apply the changes or enter no to discard them.  
Configuring Nonrecurring Summertime Settings  
Note  
Summertime is a term for daylight saving time.  
Use the summertime-option non-recurring command to configure the sensor to switch to summer time  
settings on a one-time basis. The default is recurring.  
To configure the sensor to switch to summertime settings on a one-time basis, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter summertime non-recurring submode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# summertime-option non-recurring  
Step 3  
Step 4  
Enter start summertime submode.  
sensor(config-hos-non)# start-summertime  
Configure the start summertime parameters:  
a. Enter the date you want to start summertime settings. The format is yyyy-mm-dd.  
sensor(config-hos-non-sta)# date 2004-05-15  
b. Enter the time you want to start summertime settings. The format is hh:mm:ss.  
sensor(config-hos-non-sta)# time 12:00:00  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Configuring Time  
c. Verify your settings.  
sensor(config-hos-non-sta)# show settings  
start-summertime  
-----------------------------------------------  
date: 2004-05-15  
time: 12:00:00  
-----------------------------------------------  
sensor(config-hos-non-sta)#  
Step 5  
Step 6  
Enter end summertime submode.  
sensor(config-hos-non-sta)# exit  
sensor(config-hos-non)# end-summertime  
Configure the end summertime parameters:  
a. Enter the date you want to end summertime settings. The format is yyyy-mm-dd.  
sensor(config-hos-non-end)# date 2004-10-31  
b. Enter the time you want to end summertime settings. The format is hh:mm:ss.  
sensor(config-hos-non-end)# time 12:00:00  
c. Verify your settings.  
sensor(config-hos-non-end)# show settings  
end-summertime  
-----------------------------------------------  
date: 2004-10-31  
time: 12:00:00  
-----------------------------------------------  
sensor(config-hos-non-end)#  
Step 7  
Specify the local time zone used during summertime.  
sensor(config-hos-non-end)# exit  
sensor(config-hos-non)# summertime-zone-name CDT  
Step 8  
Step 9  
Specify the offset.  
sensor(config-hos-non)# offset 60  
Verify your settings.  
sensor(config-hos-non)# show settings  
non-recurring  
-----------------------------------------------  
offset: 60 minutes default: 60  
summertime-zone-name: CDT  
start-summertime  
-----------------------------------------------  
date: 2004-05-15  
time: 12:00:00  
-----------------------------------------------  
end-summertime  
-----------------------------------------------  
date: 2004-10-31  
time: 12:00:00  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-hos-non)#  
Step 10 Exit non-recurring summertime submode.  
sensor(config-hos-non)# exit  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Setting Up the Sensor  
Configuring Time  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Step 11 Press Enter to apply the changes or enter no to discard them.  
Configuring Time Zones Settings  
Use the time-zone-settings command to configure the time zone settings on the sensor, such as the time  
zone name the sensor displays whenever summertime settings are not in effect and the offset.  
To configure the time zone settings on the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter time zone settings submode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# time-zone-settings  
Step 3  
Step 4  
Step 5  
Configure the time zone name that is displayed whenever summertime settings are not in effect. The  
default is UTC.  
sensor(config-hos-tim)# standard-time-zone-name CST  
Configure the offset in minutes. The offset is the number of minutes you add to UTC to get the local  
time. The default is 0.  
sensor(config-hos-tim)# offset -360  
Verify your settings.  
sensor(config-hos-tim)# show settings  
time-zone-settings  
-----------------------------------------------  
offset: -360 minutes default: 0  
standard-time-zone-name: CST default: UTC  
-----------------------------------------------  
sensor(config-hos-tim)#  
Step 6  
Step 7  
Exit time zone settings submode.  
sensor(config-hos-tim)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Configuring NTP  
This section describes how to configure a Cisco router to be an NTP server and how to configure the  
sensor to use an NTP server as its time source. It contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 3 Setting Up the Sensor  
Configuring Time  
Configuring a Cisco Router to be an NTP Server  
The sensor requires an authenticated connection with an NTP server if it is going to use the NTP server  
as its time source. The sensor supports only the MD5 hash algorithm for key encryption. Use the  
following procedure to activate a Cisco router to act as an NTP server and use its internal clock as the  
time source.  
Caution  
Note  
The sensor NTP capability is designed to be compatible with Cisco routers acting as NTP servers. The  
sensor may work with other NTP servers, but is not tested or supported.  
Remember the NTP server key ID and key values. You need them along with the NTP server IP address  
when you configure the sensor to use the NTP server as its time source.  
To set up a Cisco router to act as an NTP server, follow these steps:  
Step 1  
Step 2  
Log in to the router.  
Enter configuration mode.  
router# configure terminal  
Step 3  
Create the key ID and key value. The key ID can be a number between 1 and 65535. The key value is  
text (numeric or character). It is encrypted later.  
router(config)# ntp authentication-key key_ID md5 key_value  
Example  
router(config)# ntp authentication-key 100 md5 attack  
Note  
Note  
The sensor only supports MD5 keys.  
Keys may already exist on the router. Use the show running configuration command to check  
for other keys. You can use those values for the trusted key in Step 4.  
Step 4  
Step 5  
Designate the key you just created in Step 3 as the trusted key (or use an existing key). The trusted key  
ID is the same number as the key ID in Step 3.  
router(config)# ntp trusted-key key_ID  
Example  
router(config)# ntp trusted-key 100  
Specify the interface on the router with which the sensor will communicate.  
router(config)# ntp source interface_name  
Example  
router(config)# ntp source FastEthernet 1/0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Configuring Time  
Step 6  
Specify the NTP master stratum number to be assigned to the sensor. The NTP master stratum number  
identifies the relative position of the server in the NTP hierarchy. You can choose a number between 1  
and 15. It is not important to the sensor which number you choose.  
router(config)# ntp master stratum_number  
Example  
router(config)# ntp master 6  
Configuring the Sensor to Use an NTP Time Source  
The sensor requires a consistent time source. We recommend that you use an NTP server. Use the  
following procedure to configure the sensor to use the NTP server as its time source. You can use  
authenticated or unauthenticated NTP.  
Note  
For authenticated NTP, you must obtain the NTP server IP address, NTP server key ID, and the key value  
from the NTP server.  
Caution  
The sensor NTP capability is designed to be compatible with Cisco routers acting as NTP servers. The  
sensor may work with other NTP servers, but is not tested or supported.  
To configure the sensor to use an NTP server as its time source, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 3  
Step 4  
Enter service host mode.  
sensor(config)# service host  
Configure unauthenticated NTP:  
a. Enter NTP configuration mode.  
sensor(config-hos)# ntp-option enabled-ntp-unauthenticated  
b. Specify the NTP server IP address.  
sensor(config-hos-ena)# ntp-server ip_address  
c. Verify the unauthenticated NTP settings.  
sensor(config-hos-ena)# show settings  
enabled-ntp-unauthenticated  
-----------------------------------------------  
ntp-server: 10.89.147.45  
-----------------------------------------------  
sensor(config-hos-ena)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 3 Setting Up the Sensor  
Configuring SSH  
Step 5  
Configure authenticated NTP:  
a. Enter NTP configuration mode.  
sensor(config-hos)# ntp-option enable  
b. Specify the NTP server IP address and key ID. The key ID is a number between 1 and 65535. This  
is the key ID that you already set up on the NTP server.  
sensor(config-hos-ena)# ntp-servers ip_address key-id key_ID  
Example  
sensor(config-hos-ena)# ntp-servers 10.16.0.0 key-id 100  
c. Specify the key value NTP server. The key value is text (numeric or character). This is the key value  
that you already set up on the NTP server.  
sensor(config-hos-ena)# ntp-keys key_ID md5-key key_value  
Example  
sensor(config-hos-ena)# ntp-keys 100 md5-key attack  
d. Verify the NTP settings.  
sensor(config-hos-ena)# show settings  
enabled  
-----------------------------------------------  
ntp-keys (min: 1, max: 1, current: 1)  
-----------------------------------------------  
key-id: 100  
-----------------------------------------------  
md5-key: attack  
-----------------------------------------------  
-----------------------------------------------  
ntp-servers (min: 1, max: 1, current: 1)  
-----------------------------------------------  
ip-address: 10.16.0.0  
key-id: 100  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-hos-ena)#  
Step 6  
Step 7  
Exit NTP configuration mode.  
sensor(config-hos-ena)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]  
Press Enter to apply the changes or enter no to discard them.  
Configuring SSH  
This section describes SSH on the sensor, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Setting Up the Sensor  
Configuring SSH  
Understanding SSH  
SSH provides strong authentication and secure communications over channels that are not secure. SSH  
encrypts your connection to the sensor and provides a key so you can validate that you are connecting  
to the correct sensor. SSH also provides authenticated and encrypted access to other devices that the  
sensor connects to for blocking. The IPS supports managing both SSHv1 and SSHv2. The default is  
SSHv2, but you can configure the sensor to fallback to SSHv1 if the peer client/server does not support  
SSHv2.  
SSH authenticates the hosts or networks using one or both of the following:  
Password  
User RSA public key  
Note  
SSH never sends passwords in clear text.  
SSH protects against the following:  
IP spoofing—A remote host sends out packets pretending to come from another trusted host.  
Note  
SSH even protects against a spoofer on the local network who can pretend he is your router  
to the outside.  
IP source routing—A host pretends an IP packet comes from another trusted host.  
DNS spoofing—An attacker forges name server records.  
Interception of clear text passwords and other data by intermediate hosts.  
Manipulation of data by those in control of intermediate hosts.  
Attacks based on listening to X authentication data and spoofed connection to the X11 server.  
Adding Hosts to the SSH Known Hosts List  
You must add hosts to the SSH known hosts list so that the sensor can recognize the hosts that it can  
communicate with through SSH. These hosts are SSH servers that the sensor needs to connect to for  
upgrades and file copying, and other hosts, such as Cisco routers, firewalls, and switches that the sensor  
will connect to for blocking.  
For SSHv1, use the ssh host-key ip-address rsa1-key [key-modulus-length public-exponent  
public-modulus] command to add an entry to the known hosts list. If you do not know the values for the  
modulus, exponent, and length, the system displays the bubble babble for the requested IP address. You  
can then choose to add the key to the list. To modify a key for an IP address, the entry must be removed  
and recreated. Use the no form of the command to remove the entry.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 3 Setting Up the Sensor  
Configuring SSH  
Caution  
When you use the ssh host-key command, the SSH server at the specified IP address is contacted to  
obtain the required key over the network. The specified host must be accessible at the moment the  
command is issued. If the host is unreachable, you must use the full form of the command, ssh host-key  
ip-address rsa1-key [key-modulus-length public-exponent public-modulus], to confirm the fingerprint  
of the key displayed to protect yourself from accepting the key of an attacker.  
For SSHv2, use the ssh host-key ip-address rsa-key key command to add an entry to the known hosts  
list.  
The following options apply:  
ip address—Specifies the IP address to add to the system.  
rsa-key—Specifies the RSA (SSHv2) key details.  
key—Specifies the Base64 encoded public key.  
rsa1-key—Specifies the RSA1 (SSHv1) key details:  
key-modulus-length—Specifies an ASCCI decimal integer in the range[511, 2048].  
public-exponent—Specifies an ASCII decimal integer in the range [3, 2^32].  
public-modulus—Specifies an ASCII decimal integer, x, such that (2^(key-modulus-length-1))  
< x < (2^(key-modulus-length)).  
To add a host to the SSH known hosts list, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 3  
Add an entry to the known hosts list.  
sensor(config)# ssh host-key 10.16.0.0  
Bubble Babble is xucis-hehon-kizog-nedeg-zunom-kolyn-syzec-zasyk-symuf-rykum-sexyx  
Would you like to add this to the known hosts table for this host?[yes]  
The Bubble Babble appears. You are prompted to add it to the known hosts list.  
If the host is not accessible when the command is issued, this message appears.  
Error: getHostSshKey : Failed to fetch RSA key  
Step 4  
Step 5  
Enter yes to have the fingerprint added to the known hosts list.  
Verify that the host was added.  
sensor(config)# exit  
sensor# show ssh host-keys  
10.89.146.110  
Step 6  
View the key for a specific IP address.  
sensor# show ssh host-keys 10.16.0.0  
1024 35  
139306213541835240385332922253968814685684523520064131997839905113640120217816869696708721  
704631322844292073851730565044879082670677554157937058485203995572114631296604552161309712  
601068614812749969593513740598331393154884988302302182922353335152653860589163651944997842  
874583627883277460138506084043415861927  
Bubble Babble: xebiz-vykyk-fekuh-rukuh-cabaz-paret-gosym-serum-korus-fypop-huxyx  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3 Setting Up the Sensor  
Configuring SSH  
Step 7  
Step 8  
Remove an entry. The host is removed from the SSH known hosts list.  
sensor(config)# no ssh host-key 10.16.0.0  
Verify the host was removed. The IP address no longer appears in the list.  
sensor(config)# exit  
sensor# show ssh host-keys  
Adding Authorized RSA1 and RSA2 Keys  
Use the ssh authorized-key command to define public keys for a client allowed to use RSA1 or RSA2  
authentication to log in to the local SSH server. The default is RSA2. You can configure the sensor to  
fall back to RSA1. To modify an authorized key, you must remove and recreate the entry. Use the no  
form of the command to remove the entry. Users can only create and remove their own keys.  
The following options apply:  
id—Specifies a 1 to 256-character string that uniquely identifies the authorized key. You can use  
numbers, “_,” and “-,” but spaces and “?” are not accepted.  
rsa-pubkey—Specifies the RSA (SSHv2) key details.  
pubkey—Specifies the Base64 encoded public key.  
rsa1-pubkey—Specifies the RSA1 (SSHv1) key details:  
key-modulus-length—Specifies an ASCCI decimal integer in the range[511, 2048].  
public-exponent—Specifies an ASCII decimal integer in the range [3, 2^32].  
public-modulus—Specifies an ASCII decimal integer, x, such that (2^(key-modulus-length-1))  
< x < (2^(key-modulus-length)).  
Each user who can log in to the sensor has a list of authorized public keys. An SSH client with access to  
any of the corresponding RSA private keys can log in to the sensor as the user without entering a  
password.  
For SSHv1, use an RSA key generation tool on the client where the private key is going to reside. Then,  
display the generated public key as a set of three numbers (modulus length, public exponent, public  
modulus) and enter those numbers as parameters for the ssh authorized-key command. For SSHv2, you  
just need the ID and the public key.  
Note  
Note  
You configure your own list of SSH authorized keys. An administrator cannot manage the list of SSH  
authorized keys for other users on the sensor.  
An SSH authorized key provides better security than passwords if the private key is adequately  
safeguarded. The best practice is to create the private key on the same host where it will be used and  
store it with a pass phrase on a local file system. To minimize password or pass phrase prompts, use a  
key agent.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Configuring SSH  
To add a key entry to the SSHv1 or SSHv2 authorized keys list for the current user, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Add a key to the authorized keys list for the current user.  
Note  
You recieve an error message if you try to add a key less than the 2048-bit key size and if the  
measured key length and input key length do not match.  
For SSHv1:  
sensor# configure terminal  
sensor(config)# ssh authorized-key mhs rsa1-pubkey 512 34 8777777777777  
sensor(config)#  
For SSHv2:  
sensor# configure terminal  
sensor(config)# ssh authorized-key phs rsa-pubkey AAAAAAAAAAslkfjslkfjsjfs  
Step 3  
Step 4  
Enter yesto add the key to the authorized key list.  
Verify that the key was added.  
sensor(config)# exit  
sensor# show ssh authorized-keys  
mhs  
phs  
sensor#  
Step 5  
View the key for a specific ID.  
sensor# show ssh authorized-keys mhs  
512 34 8777777777777  
sensor#  
Step 6  
Step 7  
Step 8  
Remove an entry from the list of SSH authorized keys.  
sensor# configure terminal  
sensor(config)# no ssh authorized-key mhs rsa1-key  
Verify the entry was removed.  
sensor(config)# exit  
sensor# show ssh authorized-keys  
If you enter the former ID, you receive an error message.  
sensor# show ssh authorized-keys mhs  
Error: Requested id does not exist for the current user.  
sensor#  
Generating the RSA Server Host Key  
The server uses the SSHv1 or SSHv2 host key to prove its identity. Clients know they have contacted the  
correct server when they see a known key. The sensor generates an SSHv1 or SSHv2 host key the first  
time it starts up.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Configuring SSH  
Use the ssh generate-key command to change the SSH server host key. The displayed fingerprint  
matches the one displayed in the remote SSH client in future connections with this sensor if the remote  
client is using SSH.  
Note  
The sensor only supports RSA keys. Peers that communicate with IPS need to support RSA keys;  
otherwise, the connection is not established.  
To generate a new SSH server host key, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Generate the new server host key.  
sensor# ssh generate-key  
RSA1 Bubble Babble: xucor-gidyg-comym-zipib-pilyk-vucal-pekyd-hipuc-tuven-gigyr-fixyx  
RSA Bubble Babble: xucot-sapaf-sufiz-duriv-rigud-kezol-tupif-buvih-zokap-sohoz-kixox  
sensor#  
Caution  
Step 3  
The new key replaces the existing key, which requires you to update the known hosts tables on remote  
systems with the new host key so that future connections succeed. You can update the known hosts tables  
on remote systems using the ssh host-key command.  
Display the current SSH server host key. The sensor displays the RSA1 (SSHv1) and the RSA (SSHv2)  
keys.  
sensor# show ssh server-key  
RSA1 Key: 2048 65537 21281522654207836691935756443555553045267729811163188158123  
19221105282706971156372834395971442406711584211050336190060471149429624658777668  
77772213935517164097668879617982452141055538222385354775671320871325156194364534  
01964293900473562985740703815287014221909604447874565966052932190994239169399973  
09451774745322103150629685832787333113245586019053499876586171642882215702812368  
29552879443164044336379548314607826859130457872422419997317349512539506437629934  
62410481738789963850532157078406908293224279442047344280835594921181229802312694  
953678513524852911662327237984274983550808940893737598517019547234622411280871  
RSA1 Bubble Babble: xucor-gidyg-comym-zipib-pilyk-vucal-pekyd-hipuc-tuven-gigyr-fixyx  
RSA Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQC/zpG5nXqlAfc/aNzgQweipp9tjAqd1Xr5tuCJa+m  
ccscEPHc25zUKLQG+8HkvieG2Pf11Y7mZk2POJICjXSV5izFczaFnZhBBUS+QOMH0nsk+S6F9Cujmz99  
/OseRwQK16o2o2ds9otNfctAhVgex86SX5cWI0dyAYU1ZpwZCpK5sKxTtgzUkOEOSFPcHthf1DJvJfuj  
1rWSJ/VAUHH4T5aomZ4m/is8jTp+nog5O5tDt6huqWYZt6MNTRoXTq0UgDgGOlueoGM6Sqk0nCwUlsBG  
TNaEoJbN0elRk+qNnSGo4FQYLVCryMZYi6GOxZVxwPST3IGuEHTunAw6aUnRl  
RSA Bubble Babble: xucot-sapaf-sufiz-duriv-rigud-kezol-tupif-buvih-zokap-sohoz-kixox  
sensor#  
For More Information  
For the procedure for updating the known hosts table, see Adding Hosts to the SSH Known Hosts List,  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3 Setting Up the Sensor  
Configuring TLS  
Configuring TLS  
This section describes TLS on the sensor, and contains the following topics:  
Understanding TLS  
The Cisco IPS contains a web server that is running the IDM. Management stations connect to this web  
server. Blocking forwarding sensors also connect to the web server of the master blocking sensor. To  
provide security, this web server uses an encryption protocol known as TLS, which is closely related to  
SSL protocol. When you enter a URL into the web browser that starts with https://ip_address, the  
web browser responds by using either TLS or SSL protocol to negotiate an encrypted session with the  
host.  
Caution  
Note  
The web browser initially rejects the certificate presented by the IDM because it does not trust the  
certificate authority (CA).  
The IDM is enabled by default to use TLS and SSL.We highly recommend that you use TLS and SSL.  
The process of negotiating an encrypted session in TLS is called “handshaking,” because it involves a  
number of coordinated exchanges between client and server. The server sends its certificate to the client.  
The client performs the following three-part test on this certificate:  
1. Is the issuer identified in the certificate trusted?  
Every web browser ships with a list of trusted third-party CAs. If the issuer identified in the  
certificate is among the list of CAs trusted by your browser, the first test is passed.  
2. Is the date within the range of dates during which the certificate is considered valid?  
Each certificate contains a Validity field, which is a pair of dates. If the date falls within this range  
of dates, the second test is passed.  
3. Does the common name of the subject identified in the certificate match the URL hostname?  
The URL hostname is compared with the subject common name. If they match, the third test is  
passed.  
When you direct your web browser to connect with the IDM, the certificate that is returned fails because  
the sensor issues its own certificate (the sensor is its own CA) and the sensor is not already in the list of  
CAs trusted by your browser.  
When you receive an error message from your browser, you have three options:  
Disconnect from the site immediately.  
Accept the certificate for the remainder of the web browsing session.  
Add the issuer identified in the certificate to the list of trusted CAs of the web browser and trust the  
certificate until it expires.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 3 Setting Up the Sensor  
Configuring TLS  
The most convenient option is to permanently trust the issuer. However, before you add the issuer, use  
out-of-band methods to examine the fingerprint of the certificate. This prevents you from being  
victimized by an attacker posing as a sensor. Confirm that the fingerprint of the certificate appearing in  
your web browser is the same as the one on your sensor.  
Caution  
If you change the organization name or hostname of the sensor, a new certificate is generated the next  
time the sensor is rebooted. The next time your web browser connects to the IDM, you will receive the  
manual override dialog boxes. You must perform the certificate fingerprint validation again for Internet  
Explorer and Firefox.  
Adding TLS Trusted Hosts  
In certain situations, the sensor uses TLS/SSL to protect a session it establishes with a remote web  
server. For these sessions to be secure from man-in-the-middle attacks you must establish trust of the  
TLS certificates of the remote web servers. A copy of the TLS certificate of each trusted remote host is  
stored in the trusted hosts list.  
Use the tls trusted-host ip-address ip-address [port port] command to add a trusted host to the trusted  
hosts list. This command retrieves the TLS certificate from the specified host/port and displays its  
fingerprint. You can accept or reject the fingerprint based on information retrieved directly from the host  
you are requesting to add. The default port is 443.  
Each certificate is stored with an identifier field (id). For the IP address and default port, the identifier  
field is ipaddress. For the IP address and specified port, the identifier field is ipaddress:port.  
Caution  
TLS at the specified IP address is contacted to obtain the required fingerprint over the network. The  
specified host must by accessible at the moment the command is issued. Use an alternate method to  
confirm the fingerprint to protect yourself from accepting a certificate of an attacker.  
To add a trusted host to the trusted hosts list, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Add the trusted host.  
sensor# configure terminal  
sensor(config)# tls trusted-host ip-address 10.16.0.0  
Certificate SHA1 fingerprint is B1:6F:F5:DA:F3:7A:FB:FB:93:E9:2D:39:B9:99:08:D4:  
47:02:F6:12  
Would you like to add this to the trusted certificate table for this host?[yes]:  
The SHA1 fingerprints appear. You are prompted to add the trusted host.  
If the connection cannot be established, the transaction fails.  
sensor(config)# tls trusted-host ip-address 10.89.146.110 port 8000  
Error: getHostCertificate : socket connect failed [4,111]  
Step 3  
Enter yes to accept the fingerprint. The host is added to the TLS trusted host list. The Certificate ID  
stored for the requested certificate is displayed when the command is successful.  
Certificate ID: 10.89.146.110 successfully added to the TLS trusted host table.  
sensor(config)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3 Setting Up the Sensor  
Configuring TLS  
Step 4  
Step 5  
Verify that the host was added.  
sensor(config)# exit  
sensor# show tls trusted-hosts  
10.89.146.110  
sensor#  
View the fingerprint for a specific host.  
sensor# show tls trusted-hosts 10.89.146.110  
SHA1: B1:6F:F5:DA:F3:7A:FB:FB:93:E9:2D:39:B9:99:08:D4:47:02:F6:12  
sensor#  
Step 6  
Step 7  
Remove an entry from the trusted hosts list.  
sensor# configure terminal  
sensor(config)# no tls trusted-host 10.89.146.110  
Verify the entry was removed from the trusted host list. The IP address no longer appears in the list.  
sensor(config)# exit  
sensor# show tls trusted-hosts  
No entries  
Displaying and Generating the Server Certificate  
A TLS certificate is generated when the sensor is first started. Use the tls generate-key command to  
generate a new server self-signed X.509 certificate. The IP address of the sensor is included in the  
certificate. If you change the sensor IP address, the sensor automatically generates a new certificate.  
Caution  
The new certificate replaces the existing certificate, which requires you to update the trusted hosts lists  
on remote systems with the new certificate so that future connections succeed. You can update the trusted  
hosts lists on remote IPS sensors using the tls trusted-host command. If the sensor is a master blocking  
sensor, you must update the trusted hosts lists on the remote sensors that are sending block requests to  
the master blocking sensor.  
To generate a new TLS certificate, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Generate the new certificate.  
sensor# tls generate-key  
SHA1 fingerprint is 4A:2B:79:A0:82:8B:65:3A:83:B5:D9:50:C0:8E:F6:C6:B0:30:47:BB  
sensor#  
Step 3  
Verify that the key was generated.  
sensor# show tls fingerprint  
SHA1: 4A:2B:79:A0:82:8B:65:3A:83:B5:D9:50:C0:8E:F6:C6:B0:30:47:BB  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Installing the License Key  
For More Information  
For the procedure for updating the trusted hosts lists on remote sensors, see Adding TLS Trusted Hosts,  
Installing the License Key  
This section describes the IPS license key and how to install it. It contains the following topics:  
Understanding the License Key  
Although the sensor functions without the license key, you must have a license key to obtain signature  
updates and use the global correlation features. To obtain a license key, you must have the following:  
Cisco Service for IPS service contract—Contact your reseller, Cisco service or product sales to  
purchase a contract.  
Your IPS device serial number—To find the IPS device serial number in the IDM or the IME, for  
the IDM choose Configuration > Sensor Management > Licensing, and for the IME choose  
Configuration > sensor_name > Sensor Management > Licensing, or in the CLI use the show  
version command.  
Valid Cisco.com username and password.  
Trial license keys are also available. If you cannot get your sensor licensed because of problems with  
your contract, you can obtain a 60-day trial license that supports signature updates that require licensing.  
You can obtain a license key from the Cisco.com licensing server, which is then delivered to the sensor.  
Or, you can update the license key from a license key provided in a local file. Go to  
http://www.cisco.com/go/license and click IPS Signature Subscription Service to apply for a license  
key.  
You can view the status of the license key in these places:  
The IDM Home window Licensing section on the Health tab  
The IDM Licensing pane (Configuration > Licensing)  
The IME Home page in the Device Details section on the Licensing tab  
License Notice at CLI login  
Whenever you start the IDM, the IME, or the CLI, you are informed of your license status—whether you  
have a trial, invalid, or expired license key. With no license key, an invalid license key, or an expired  
license key, you can continue to use the IDM, the IME, and the CLI, but you cannot download signature  
updates.  
If you already have a valid license on the sensor, you can click Download on the License pane to  
download a copy of your license key to the computer that the IDM or the IME is running on and save it  
to a local file. You can then replace a lost or corrupted license, or reinstall your license after you have  
reimaged the sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 3 Setting Up the Sensor  
Installing the License Key  
Service Programs for IPS Products  
You must have a Cisco Services for IPS service contract for any IPS product so that you can download  
a license key and obtain the latest IPS signature updates. If you have a direct relationship with Cisco  
Systems, contact your account manager or service account manager to purchase the Cisco Services for  
IPS service contract. If you do not have a direct relationship with Cisco Systems, you can purchase the  
service account from a one-tier or two-tier partner.  
When you purchase the following IPS products you must also purchase a Cisco Services for IPS service  
contract:  
IPS 4345  
IPS 4345-DC  
IPS 4360  
IPS 4510  
IPS 4520  
When you purchase an ASA 5500 series adaptive security appliance product that does not contain IPS,  
you must purchase a SMARTnet contract.  
Note  
Note  
SMARTnet provides operating system updates, access to Cisco.com, access to TAC, and hardware  
replacement NBD on site.  
When you purchase an ASA 5500 series adaptive security appliance product that ships with an IPS  
module installed, or if you purchase one to add to your ASA 5500 series adaptive security appliance  
product, you must purchase the Cisco Services for IPS service contract.  
Cisco Services for IPS provides IPS signature updates, operating system updates, access to Cisco.com,  
access to TAC, and hardware replacement NBD on site.  
For example, if you purchase an ASA 5585-X and then later want to add IPS and purchase an  
ASA-IPS10-K9, you must now purchase the Cisco Services for IPS service contract. After you have the  
Cisco Services for IPS service contract, you must also have your product serial number to apply for the  
license key.  
Caution  
If you ever send your product for RMA, the serial number changes. You must then get a new license key  
for the new serial number.  
Obtaining and Installing the License Key  
Note  
You cannot install an older license key over a newer license key.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Installing the License Key  
Use the copy source-url license_file_name license-key command to copy the license key to your sensor.  
The following options apply:  
source-url—The location of the source file to be copied. It can be a URL or keyword.  
destination-url—The location of the destination file to be copied. It can be a URL or a keyword.  
license-key—The subscription license file.  
license_file_name—The name of the license file you receive.  
The exact format of the source and destination URLs varies according to the file. Here are the valid  
types:  
ftp:—Source or destination URL for an FTP network server. The syntax for this prefix is:  
ftp://[[username@]location][/relativeDirectory]/filename  
ftp://[[username@]location][//absoluteDirectory]/filename  
scp:—Source or destination URL for the SCP network server. The syntax for this prefix is:  
scp://[[username@]location][/relativeDirectory]/filename  
scp://[[username@]location][//absoluteDirectory]/filename  
Note  
If you use FTP or SCP protocol, you are prompted for a password. If you use SCP protocol,  
you must add the remote host to the SSH known hosts list.  
http:—Source URL for the Web server. The syntax for this prefix is:  
http://[[username@]location][/directory]/filename  
https:—Source URL for the Web server. The syntax for this prefix is:  
https://[[username@]location][/directory]/filename  
Note  
If you use HTTPS protocol, the remote host must be a TLS trusted host.  
Installing the License Key  
To install the license key, follow these steps:  
Step 1  
Step 2  
Log in to Cisco.com.  
Apply for the license key at this URL: www.cisco.com/go/license.  
Note  
In addition to a valid Cisco.com username and password, you must also have a Cisco Services  
for IPS service contract before you can apply for a license key.  
Step 3  
Fill in the required fields. Your Cisco IPS Signature Subscription Service license key will be sent by  
email to the e-mail address you specified.  
Note  
You must have the correct IPS device serial number and product identifier (PID) because the  
license key only functions on the device with that number.  
Step 4  
Save the license key to a system that has a Web server, FTP server, or SCP server.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3 Setting Up the Sensor  
Installing the License Key  
Step 5  
Step 6  
Log in to the CLI using an account with administrator privileges.  
Copy the license key to the sensor.  
sensor# copy scp://[email protected]/24://tftpboot/dev.lic license-key  
Password: *******  
Step 7  
Verify the sensor is licensed.  
sensor# show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Realm Keys  
Signature Definition:  
Signature Update  
OS Version:  
key1.0  
S697.0  
2.6.29.1  
IPS4360  
2013-02-15  
Platform:  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24% usage)  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96% usage)  
MainApp  
Running  
AnalysisEngine  
Running  
CollaborationApp  
Running  
V-2013_04_10_11_00_7_2_1  
V-2013_04_10_11_00_7_2_1  
V-2013_04_10_11_00_7_2_1  
V-2013_04_10_11_00_7_2_1  
(Release)  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
CLI  
Upgrade History:  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Recovery Partition Version 1.1 - 7.2(1)E4  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
sensor#  
Licensing the ASA 5500-X IPS SSP  
For the ASA 5500-X series adaptive security appliances with the IPS SSP, the ASA requires the IPS  
Module license. To view your current ASA licenses, in ASDM choose Home > Device Dashboard >  
Device Information > Device License. For more information about ASA licenses, refer to the licensing  
chapter in the configuration guide. After you obtain the ASA IPS Module license, you can obtain and  
install the IPS license key.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Setting Up the Sensor  
Installing the License Key  
For More Information  
For more information about getting started using the ASA 5500-X IPS SSP, refer to the Cisco IPS  
For the procedures for obtaining and installing the IPS License key, see Obtaining and Installing the  
Uninstalling the License Key  
Use the erase license-key command to uninstall the license key on your sensor. This allows you to delete  
an installed license key from a sensor without restarting the sensor or logging into the sensor using the  
service account.  
To uninstall the license key, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Uninstall the license key on the sensor.  
sensor# erase license-key  
Warning: Executing this command will remove the license key installed on the sensor.  
You must have a valid license key installed on the sensor to apply the Signature Updates  
and use the Global Correlation features.  
Continue? []: yes  
sensor#  
Step 3  
Verify the sensor key has been uninstalled.  
sensor# show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Realm Keys  
Signature Definition:  
Signature Update  
OS Version:  
key1.0  
S697.0  
2.6.29.1  
IPS4360  
2013-02-15  
Platform:  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24% usage)  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96% usage)  
MainApp  
Running  
AnalysisEngine  
Running  
CollaborationApp  
Running  
V-2013_04_10_11_00_7_2_1  
V-2013_04_10_11_00_7_2_1  
V-2013_04_10_11_00_7_2_1  
V-2013_04_10_11_00_7_2_1  
(Release)  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
CLI  
Upgrade History:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3 Setting Up the Sensor  
Installing the License Key  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Recovery Partition Version 1.1 - 7.2(1)E4  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Setting Up the Sensor  
Installing the License Key  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
3-60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
4
Configuring Interfaces  
This chapter describes how to configure interfaces on the sensor. You configured the interfaces when you  
initialized the sensor with the setup command, but if you need to change or add anything to your  
interface configuration, use the following procedures. For more information on configuring interfaces  
This chapter contains the following sections:  
Interface Notes and Caveats  
The following notes and caveats apply to configuring interfaces on the sensor:  
On appliances, all sensing interfaces are disabled by default. You must enable them to use them. On  
modules, the sensing interfaces are permanently enabled.  
There is only one sensing interface on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP), so you cannot designate an alternate TCP reset interface.  
You can only assign a sensing interface as an alternate TCP reset interface. You cannot configure  
the management interface as an alternate TCP reset interface.  
You configure the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) for  
promiscuous mode from the adaptive security appliance CLI and not from the Cisco IPS CLI.  
You can configure the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) to  
operate inline even though they have only one sensing interface.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not support inline  
VLAN pairs.  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not support VLAN  
groups mode.  
There are security consequences when you put the sensor in bypass mode. When bypass mode is on,  
the traffic bypasses the sensor and is not inspected; therefore, the sensor cannot prevent malicious  
attacks.  
As with signature updates, when the sensor applies a global correlation update, it may trigger  
bypass. Whether or not bypass is triggered depends on the traffic load of the sensor and the size of  
the signature/global correlation update. If bypass mode is turned off, an inline sensor stops passing  
traffic while the update is being applied.  
The ASA 5500-X IPS SSP and the ASA 5585-X IPS SSP do not support bypass mode. The adaptive  
security appliance will either fail open, fail close, or fail over depending on the configuration of the  
adaptive security appliance and the type of activity being done on the IPS.  
The show interface command output for the IPS 4510 and IPS 4520 does not include the total  
undersize packets or total transmit FIFO overruns.  
When the IPS 4510 and IPS 4520 are configured in VLAN pairs, the packet display command does  
not work without the VLAN option if the expression keyword is also used.  
On the IPS 4510 and IPS 4520, no interface-related configurations are allowed when the SensorApp  
is down.  
Understanding Interfaces  
This section describes the IPS interfaces and modes, and contains the following topics:  
IPS Interfaces  
The sensor interfaces are named according to the maximum speed and physical location of the interface.  
The physical location consists of a port number and a slot number. All interfaces that are built-in on the  
sensor motherboard are in slot 0, and the interface card expansion slots are numbered beginning with  
slot 1 for the bottom slot with the slot numbers increasing from bottom to top. Each physical interface  
can be divided in to VLAN group subinterfaces, each of which consists of a group of VLANs on that  
interface.  
There are three interface roles:  
Command and control  
Sensing  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
Alternate TCP reset  
There are restrictions on which roles you can assign to specific interfaces and some interfaces have  
multiple roles. You can configure any sensing interface to any other sensing interface as its TCP reset  
interface. The TCP reset interface can also serve as an IDS (promiscuous) sensing interface at the same  
time. The following restrictions apply:  
The TCP reset interface that is assigned to a sensing interface has no effect in inline interface or  
inline VLAN pair mode, because TCP resets are always sent on the sensing interfaces in those  
modes.  
Note  
There is only one sensing interface on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP), so you cannot designate an alternate TCP reset interface.  
Caution  
On the IPS 4510 and IPS 4520, no interface-related configurations are allowed when the SensorApp is  
down.  
Command and Control Interface  
The command and control interface has an IP address and is used for configuring the sensor. It receives  
security and status events from the sensor and queries the sensor for statistics. The command and control  
interface is permanently enabled. It is permanently mapped to a specific physical interface, which  
depends on the specific model of sensor. You cannot use the command and control interface as either a  
sensing or alternate TCP reset interface.  
Table 4-1 lists the command and control interfaces for each sensor.  
Table 4-1  
Command and Control Interfaces  
Sensor  
Command and Control Interface  
Management 0/0  
ASA 5512-X IPS SSP  
ASA 5515-X IPS SSP  
ASA 5525-X IPS SSP  
ASA 5545-X IPS SSP  
ASA 5555-X IPS SSP  
ASA 5585-X IPS SSP-10  
ASA 5585-X IPS SSP-20  
ASA 5585-X IPS SSP-40  
ASA 5585-X IPS SSP-60  
IPS 4345  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/0  
Management 0/01  
Management 0/01  
IPS 4345-DC  
IPS 4360  
IPS 4510  
IPS 4520  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
1. The 4500 series sensors have two management ports, Management 0/0 and  
Management 0/1, but Management 0/1 is reserved for future use.  
Sensing Interfaces  
Sensing interfaces are used by the sensor to analyze traffic for security violations. A sensor has one or  
more sensing interfaces depending on the sensor. Sensing interfaces can operate individually in  
promiscuous mode or you can pair them to create inline interfaces.  
Note  
On appliances, all sensing interfaces are disabled by default. You must enable them to use them. On  
modules, the sensing interfaces are permanently enabled.  
Some appliances support optional interface cards that add sensing interfaces to the sensor. You must  
insert or remove these optional cards while the sensor is powered off. The sensor detects the addition or  
removal of a supported interface card. If you remove an optional interface card, some of the interface  
configuration is deleted, such as the speed, duplex, description string, enabled/disabled state of the  
interface, and any inline interface pairings. These settings are restored to their default settings when the  
card is reinstalled. However, the assignment of promiscuous and inline interfaces to the Analysis Engine  
is not deleted from the Analysis Engine configuration, but is ignored until those cards are reinserted and  
you create the inline interface pairs again.  
For More Information  
For more information on supported interfaces, see Interface Support, page 4-6.  
For more information on interface modes, see Configuring Promiscuous Mode, page 4-14,  
TCP Reset Interfaces  
This section explains the TCP reset interfaces and when to use them. It contains the following topics:  
Understanding Alternate TCP Reset Interfaces  
You can configure sensors to send TCP reset packets to try to reset a network connection between an  
attacker host and its intended target host. In some installations when the interface is operating in  
promiscuous mode, the sensor may not be able to send the TCP reset packets over the same sensing  
interface on which the attack was detected. In such cases, you can associate the sensing interface with  
an alternate TCP reset interface and any TCP resets that would otherwise be sent on the sensing interface  
when it is operating in promiscuous mode are instead sent out on the associated alternate TCP reset  
interface.  
If a sensing interface is associated with an alternate TCP reset interface, that association applies when  
the sensor is configured for promiscuous mode but is ignored when the sensing interface is configured  
for inline mode. any sensing interface can serve as the alternate TCP reset interface for another sensing  
interface.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                     
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
Note  
There is only one sensing interface on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP), so you cannot designate an alternate TCP reset interface.  
Table 4-2 lists the alternate TCP reset interfaces.  
Table 4-2  
Alternate TCP Reset Interfaces  
Sensor  
Alternate TCP Reset Interface  
None  
ASA 5512-X IPS SSP  
ASA 5515-X IPS SSP  
ASA 5525-X IPS SSP  
ASA 5545-X IPS SSP  
ASA 5555-X IPS SSP  
ASA 5585-X IPS SSP-10  
ASA 5585-X IPS SSP-20  
ASA 5585-X IPS SSP-40  
ASA 5585-X IPS SSP-60  
IPS 4345  
None  
None  
None  
None  
None  
None  
None  
None  
Any sensing interface  
Any sensing interface  
Any sensing interface  
Any sensing interface  
Any sensing interface  
IPS 4345-DC  
IPS 4360  
IPS 4510  
IPS 4520  
For More Information  
For more information on choosing the alternate TCP interface, see Designating the Alternate TCP Reset  
Designating the Alternate TCP Reset Interface  
Note  
There is only one sensing interface on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP), so you cannot designate an alternate TCP reset interface.  
You need to designate an alternate TCP reset interface in the following situations:  
When a switch is being monitored with either SPAN or VACL capture and the switch does not accept  
incoming packets on the SPAN or VACL capture port.  
When a switch is being monitored with either SPAN or VACL capture for multiple VLANs, and the  
switch does not accept incoming packets with 802.1q headers. The TCP resets need 802.1q headers  
to tell which VLAN the resets should be sent on.  
When a network tap is used for monitoring a connection. Taps do not permit incoming traffic from  
the sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
Caution  
You can only assign a sensing interface as an alternate TCP reset interface. You cannot configure the  
management interface as an alternate TCP reset interface.  
Interface Support  
Table 4-3 describes the interface support for appliances and modules running Cisco IPS.  
Table 4-3  
Interface Support  
Interfaces Not  
Supporting Inline  
(Command and Control  
Port)  
Added  
Interfaces Supporting  
Interface Inline VLAN Pairs  
Cards  
Combinations Supporting  
Inline Interface Pairs  
Base Chassis  
(Sensing Ports)  
ASA 5512-X IPS SSP  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
ASA 5515-X IPS SSP  
ASA 5525-X IPS SSP  
ASA 5545-X IPS SSP  
ASA 5555-X IPS SSP  
ASA 5585-X IPS SSP-10  
ASA 5585-X IPS SSP-20  
ASA 5585-X IPS SSP-40  
ASA 5585-X IPS SSP-60  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN  
context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN  
context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN  
context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN  
context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN  
context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN  
context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN  
context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
PortChannel 0/0 by security PortChannel 0/0 by security Management 0/0  
context instead of VLAN  
context instead of VLAN  
pair or inline interface pair pair or inline interface pair  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
Table 4-3  
Interface Support (continued)  
Interfaces Not  
Supporting Inline  
(Command and Control  
Port)  
Added  
Interfaces Supporting  
Interface Inline VLAN Pairs  
Cards  
Combinations Supporting  
Inline Interface Pairs  
Base Chassis  
(Sensing Ports)  
IPS 4345  
GigabitEthernet 0/0  
GigabitEthernet 0/1  
GigabitEthernet 0/2  
GigabitEthernet 0/3  
GigabitEthernet 0/4  
GigabitEthernet 0/5  
Gigabitethernet 0/6  
GigabitEthernet 0/7  
GigabitEthernet 0/0  
GigabitEthernet 0/1  
GigabitEthernet 0/2  
GigabitEthernet 0/3  
GigabitEthernet 0/4  
GigabitEthernet 0/5  
Gigabitethernet 0/6  
GigabitEthernet 0/7  
GigabitEthernet 0/0  
GigabitEthernet 0/1  
GigabitEthernet 0/2  
GigabitEthernet 0/3  
GigabitEthernet 0/4  
GigabitEthernet 0/5  
GigabitEthernet 0/6  
GigabitEthernet 0/7  
All sensing ports can be  
paired together  
Management 0/0  
Management 0/11  
IPS 4345-DC  
All sensing ports can be  
paired together  
Management 0/0  
Management 0/11  
IPS 4360  
All sensing ports can be  
paired together  
Management 0/0  
Management 0/11  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
Table 4-3  
Interface Support (continued)  
Interfaces Not  
Supporting Inline  
(Command and Control  
Port)  
Added  
Interfaces Supporting  
Interface Inline VLAN Pairs  
Cards  
Combinations Supporting  
Inline Interface Pairs  
Base Chassis  
(Sensing Ports)  
IPS 4510  
GigabitEthernet 0/0  
GigabitEthernet 0/1  
GigabitEthernet 0/2  
GigabitEthernet 0/3  
GigabitEthernet 0/4  
GigabitEthernet 0/5  
TenGigabitEthernet 0/6  
TenGigabitEthernet 0/7  
TenGigabitEthernet 0/8  
TenGigabitEthernet 0/9  
GigabitEthernet 0/0  
GigabitEthernet 0/1  
GigabitEthernet 0/2  
GigabitEthernet 0/3  
GigabitEthernet 0/4  
GigabitEthernet 0/5  
TenGigabitEthernet 0/6  
TenGigabitEthernet 0/7  
TenGigabitEthernet 0/8  
TenGigabitEthernet 0/9  
All sensing ports can be  
paired together  
Management 0/0  
Management 0/12  
IPS 4520  
—TX  
All sensing ports can be  
paired together  
Management 0/0  
Management 0/12  
1. Does not currently support hardware bypass.  
2. Reserved for future use.  
Interface Configuration Restrictions  
The following restrictions apply to configuring interfaces on the sensor:  
Physical Interfaces  
On the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) all backplane  
interfaces have fixed speed, duplex, and state settings. These settings are protected in the default  
configuration on all backplane interfaces.  
For nonbackplane FastEthernet interfaces the valid speed settings are 10 Mbps, 100 Mbps, and  
auto. Valid duplex settings are full, half, and auto.  
For Gigabit copper interfaces (1000-TX on the IPS 4345, IPS 4360, IPS 4510, and IPS 4520),  
valid speed settings are 10 Mbps, 100 Mbps, 1000 Mbps, and auto. Valid duplex settings are  
full, half, and auto.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
For Gigabit (copper or fiber) interfaces, if the speed is configured for 1000 Mbps, the only valid  
duplex setting is auto.  
The command and control interface cannot also serve as a sensing interface.  
Inline Interface Pairs  
Inline interface pairs can contain any combination of sensing interfaces regardless of the  
physical interface type (copper versus fiber), speed, or duplex settings of the interface.  
However, pairing interfaces of different media type, speeds, and duplex settings may not be  
fully tested or supported.  
The command and control interface cannot be a member of an inline interface pair.  
You cannot pair a physical interface with itself in an inline interface pair.  
A physical interface can be a member of only one inline interface pair.  
You can only configure bypass mode and create inline interface pairs on sensor platforms that  
support inline mode.  
A physical interface cannot be a member of an inline interface pair unless the subinterface mode  
of the physical interface is none.  
Note  
You can configure the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP) to operate inline even though they have only one sensing  
interface.  
Inline VLAN Pairs  
You cannot pair a VLAN with itself.  
You cannot use the default VLAN as one of the paired VLANs in an inline VLAN pair.  
For a given sensing interface, a VLAN can be a member of only one inline VLAN pair.  
However, a given VLAN can be a member of an inline VLAN pair on more than one sensing  
interface.  
The order in which you specify the VLANs in an inline VLAN pair is not significant.  
A sensing interface in Inline VLAN Pair mode can have from 1 to 255 inline VLAN pairs.  
Note  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not  
support inline VLAN pairs.  
Alternate TCP Reset Interface  
You can only assign the alternate TCP reset interface to a sensing interface. You cannot  
configure the command and control interface as an alternate TCP reset interface. The alternate  
TCP reset interface option is set to none as the default and is protected for all interfaces except  
the sensing interfaces.  
You can assign the same physical interface as an alternate TCP reset interface for multiple  
sensing interfaces.  
A physical interface can serve as both a sensing interface and an alternate TCP reset interface.  
The command and control interface cannot serve as the alternate TCP reset interface for a  
sensing interface.  
A sensing interface cannot serve as its own alternate TCP reset interface.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 4 Configuring Interfaces  
Understanding Interfaces  
You can only configure interfaces that are capable of TCP resets as alternate TCP reset  
interfaces.  
Note  
There is only one sensing interface on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP), so you cannot designate an alternate TCP reset interface.  
VLAN Groups  
You can configure any single interface for promiscuous, inline interface pair, or inline VLAN  
pair mode, but no combination of these modes is allowed.  
You cannot add a VLAN to more than one group on each interface.  
You cannot add a VLAN group to multiple virtual sensors.  
An interface can have no more than 255 user-defined VLAN groups.  
When you pair a physical interface, you cannot subdivide it; you can subdivide the pair.  
You can use a VLAN on multiple interfaces; however, you receive a warning for this  
configuration.  
You can assign a virtual sensor to any combination of one or more physical interfaces and inline  
VLAN pairs, subdivided or not.  
You can subdivide both physical and logical interfaces into VLAN groups.  
The CLI, IDM, and IME prompt you to remove any dangling references. You can leave the  
dangling references and continue editing the configuration.  
The CLI, IDM, and IME do not allow configuration changes in Analysis Engine that conflict  
with the interface configuration.  
The CLI allows configuration changes in the interface configuration that cause conflicts in the  
Analysis Engine configuration. The IDM and IME do not allow changes in the interface  
configuration that cause conflicts in the Analysis Engine configuration.  
Note  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not  
support VLAN groups mode.  
For More Information  
For a list of supported sensor interfaces, see Interface Support, page 4-6.  
For more information on alternate TCP reset, see TCP Reset Interfaces, page 4-4.  
For more information on physical interfaces, see Configuring Physical Interfaces, page 4-11.  
Interface Configuration Sequence  
Follow these steps to configure interfaces on the sensor:  
1. Configure the physical interface settings (speed, duplex, and so forth) and enable the interfaces.  
2. Create or delete inline interfaces, inline VLAN subinterfaces, and VLAN groups, and set the inline  
bypass mode.  
3. Assign the physical, subinterfaces, and inline interfaces to the virtual sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 4 Configuring Interfaces  
Configuring Physical Interfaces  
For More Information  
For the procedure for configuring the physical interface settings, see Configuring Physical  
For the procedures for creating and deleting different kinds of interfaces, see Configuring Inline  
For the procedure for configuring virtual sensors, see Adding, Editing, and Deleting Virtual Sensors,  
Configuring Physical Interfaces  
Use the physical-interfaces interface_name command in the service interface submode to configure  
promiscuous interfaces. The interface name is FastEthernet, GigabitEthernet, or PortChannel.  
Note  
You configure the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) for  
promiscuous mode from the adaptive security appliance CLI and not from the Cisco IPS CLI.  
The following options apply:  
admin-state {enabled | disabled}—Specifies the administrative link state of the interface, whether  
the interface is enabled or disabled.  
Note  
On all backplane sensing interfaces on all modules, admin-state is set to enabled and is  
protected (you cannot change the setting). The admin-state has no effect (and is protected)  
on the command and control interface. It only affects sensing interfaces. The command and  
control interface does not need to be enabled because it cannot be monitored.  
alt-tcp-reset-interface—Sends TCP resets out an alternate interface when this interface is used for  
promiscuous monitoring and the reset action is triggered by a signature firing.  
Note  
You can only assign a sensing interface as an alternate TCP reset interface. You cannot  
configure the management interface as an alternate TCP reset interface.  
Note  
There is only one sensing interface on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP), so you cannot designate an alternate TCP reset interface.  
interface_name—Specifies the name of the interface on which TCP resets should be sent when  
this interface is used for promiscuous monitoring and the reset action is triggered by a signature  
firing. This setting is ignored when this interface is a member of an inline interface.  
none —Disables the use of an alternate TCP reset interface. TCP resets triggered by the reset  
action when in promiscuous mode will be sent out of this interface instead.  
default—Sets the value back to the system default setting.  
description—Specifies your description of the promiscuous interface.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 4 Configuring Interfaces  
Configuring Physical Interfaces  
duplex—Specifies the duplex setting of the interface:  
auto—Sets the interface to auto negotiate duplex.  
full—Sets the interface to full duplex.  
half—Sets the interface to half duplex.  
Note  
Note  
The duplex option is protected on all modules.  
For TenGigabit SFP+ ports, the permitted values are auto and full.  
no—Removes an entry or selection setting.  
speed—Specifies the speed setting of the interface:  
auto—Sets the interface to auto negotiate speed.  
10—Sets the interface to 10 MB (for TX interfaces only).  
100—Sets the interface to 100 MB (for TX interfaces only).  
1000—Sets the interface to 1 GB (for Gigabit interfaces only).  
Note  
Note  
The speed option is protected on all modules.  
For TenGigabit SFP+ ports with a 10 Gb connector, the permitted values are auto and  
10000, and for TenGigabit SFP+ ports with a 1 Gb connector, the permitted value is  
auto.  
Configuring the Physical Interface Settings  
To configure the physical interface settings for promiscuous mode on the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter interface submode.  
sensor# configure terminal  
sensor(config)# service interface  
Step 3  
Display the list of available interfaces.  
sensor(config-int)# physical-interfaces ?  
GigabitEthernet0/0  
GigabitEthernet0/1  
GigabitEthernet0/2  
GigabitEthernet0/3  
Management0/0  
GigabitEthernet0/0 physical interface.  
GigabitEthernet0/1 physical interface.  
GigabitEthernet0/2 physical interface.  
GigabitEthernet0/3 physical interface.  
Management0/0 physical interface.  
sensor(config-int)# physical-interfaces  
Step 4  
Specify the interface for promiscuous mode.  
sensor(config-int)# physical-interfaces GigabitEthernet0/2  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 4 Configuring Interfaces  
Configuring Physical Interfaces  
Step 5  
Enable the interface. You must assigned the interface to a virtual sensor and enable it before it can  
monitor traffic.  
sensor(config-int-phy)# admin-state enabled  
Step 6  
Step 7  
Add a description of this interface.  
sensor(config-int-phy)# description INT1  
Specify the duplex settings. This option is not available on the ASA IPS modules (ASA 5500-X IPS SSP  
and ASA 5585-X IPS SSP).  
sensor(config-int-phy)# duplex full  
Step 8  
Step 9  
Specify the speed. This option is not available on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP).  
sensor(config-int-phy)# speed 1000  
Enable TCP resets for this interface if desired. This option is not available on the ASA IPS modules  
(ASA 5500-X IPS SSP and ASA 5585-X IPS SSP).  
sensor(config-int-phy)# alt-tcp-reset-interface interface-name GigabitEthernet2/0  
Step 10 Repeat Steps 4 through 9 for any other interfaces you want to designate as promiscuous interfaces.  
Step 11 Verify the settings.  
Note  
Make sure the subinterface-typeis none, the default. You use the subinterface-type command  
to configure inline VLAN pairs.  
sensor(config-int-phy)# show settings  
<protected entry>  
name: GigabitEthernet0/2  
-----------------------------------------------  
media-type: tx <protected>  
description: INT1 default:  
admin-state: enabled default: disabled  
duplex: full default: auto  
speed: 1000 default: auto  
alt-tcp-reset-interface  
-----------------------------------------------  
interface-name: GigabitEthernet2/0  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-int-phy)#  
Step 12 Remove TCP resets from an interface.  
sensor(config-int-phy)# alt-tcp-reset-interface none  
Step 13 Verify the settings.  
sensor(config-int-phy)# show settings  
<protected entry>  
name: GigabitEthernet0/0  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Configuring Promiscuous Mode  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <protected>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-int-phy)#  
Step 14 Exit interface submode.  
sensor(config-int-phy)# exit  
sensor(config-int)# exit  
Apply Changes:?[yes]:  
Step 15 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For a list of possible interfaces for your sensor, see Interface Support, page 4-6.  
For the procedure for sending traffic to the ASA 5500-X IPS SSP, see Creating Virtual Sensors for  
For the procedure for sending traffic to the ASA 5585-X IPS SSP, see Creating Virtual Sensors for  
For more information on the alternate TCP reset interface, see Understanding Alternate TCP Reset  
For the procedure for configuring inline VLAN pairs, see Configuring Inline VLAN Pairs,  
For the procedure for adding interfaces to virtual sensors, see Adding, Editing, and Deleting Virtual  
Configuring Promiscuous Mode  
This section describes promiscuous mode on the sensor, and contains the following topics:  
Understanding Promiscuous Mode  
In promiscuous mode, packets do not flow through the sensor. The sensor analyzes a copy of the  
monitored traffic rather than the actual forwarded packet. The advantage of operating in promiscuous  
mode is that the sensor does not affect the packet flow with the forwarded traffic. The disadvantage of  
operating in promiscuous mode, however, is the sensor cannot stop malicious traffic from reaching its  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 4 Configuring Interfaces  
Configuring Promiscuous Mode  
intended target for certain types of attacks, such as atomic attacks (single-packet attacks). The response  
actions implemented by promiscuous sensor devices are post-event responses and often require  
assistance from other networking devices, for example, routers and firewalls, to respond to an attack.  
While such response actions can prevent some classes of attacks, in atomic attacks the single packet has  
the chance of reaching the target system before the promiscuous-based sensor can apply an ACL  
modification on a managed device (such as a firewall, switch, or router).  
By default, all sensing interfaces are in promiscuous mode. To change an interface from inline interface  
mode to promiscuous mode, delete any inline interface that contains that interface and delete any inline  
VLAN pair subinterfaces of that interface from the interface configuration.  
Figure 4-1 illustrates promiscuous mode:  
Figure 4-1  
Promiscuous Mode  
Switch  
VLAN A  
Router  
Host  
Span port sending  
copies of VLAN A traffic  
Sensor  
Configuring Promiscuous Mode  
By default, all sensing interfaces are in promiscuous mode. To change an interface from inline mode to  
promiscuous mode, delete the inline interface that contains that interface from the interface  
configuration.  
IPv6, Switches, and Lack of VACL Capture  
VACLs on Catalyst switches do not have IPv6 support. The most common method for copying traffic to  
a sensor configured in promiscuous mode is to use VACL capture. If you want to have IPv6 support, you  
can use SPAN ports.  
However, you can only configure up to two monitor sessions on a switch unless you use the following  
configuration:  
Monitor session  
Multiple trunks to one or more sensors  
Restrict per trunk port which VLANs are allowed to perform monitoring of many VLANs to more  
than two different sensors or virtual sensors within one IPS  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 4 Configuring Interfaces  
Configuring Inline Interface Mode  
The following configuration uses one SPAN session to send all of the traffic on any of the specified  
VLANs to all of the specified ports. Each port configuration only allows a particular VLAN or VLANs  
to pass. Thus you can send data from different VLANs to different sensors or virtual sensors all with one  
SPAN configuration line:  
clear trunk 4/1-4 1-4094  
set trunk 4/1 on dot1q 930  
set trunk 4/2 on dot1q 932  
set trunk 4/3 on dot1q 960  
set trunk 4/4 on dot1q 962  
set span 930, 932, 960, 962 4/1-4 both  
Note  
The SPAN/Monitor configuration is valuable when you want to assign different IPS policies per VLAN  
or when you have more bandwidth to monitor than one interface can handle.  
Configuring Inline Interface Mode  
This section describes inline mode on the sensor, and contains the following topics:  
Understanding Inline Interface Mode  
Operating in inline interface pair mode puts the IPS directly into the traffic flow and affects  
packet-forwarding rates making them slower by adding latency. This allows the sensor to stop attacks by  
dropping malicious traffic before it reaches the intended target, thus providing a protective service. Not  
only is the inline device processing information on Layers 3 and 4, but it is also analyzing the contents  
and payload of the packets for more sophisticated embedded attacks (Layers 3 to 7). This deeper analysis  
lets the system identify and stop and/or block attacks that would normally pass through a traditional  
firewall device.  
In inline interface pair mode, a packet comes in through the first interface of the pair on the sensor and  
out the second interface of the pair. The packet is sent to the second interface of the pair unless that  
packet is being denied or modified by a signature.  
Note  
Note  
You can configure the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) to operate  
inline even though they have only one sensing interface.  
If the paired interfaces are connected to the same switch, you should configure them on the switch as  
access ports with different access VLANs for the two ports. Otherwise, traffic does not flow through the  
inline interface.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 4 Configuring Interfaces  
Configuring Inline Interface Mode  
Figure 4-2 illustrates inline interface pair mode:  
Figure 4-2 Inline Interface Pair Mode  
Traffic passes  
through interface pair  
VLAN A  
Switch  
Router  
Sensor  
Host  
Configuring Inline Interface Pairs  
Use the inline-interfaces name command in the service interface submode to create inline interface  
pairs.  
Note  
You can configure the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) to operate  
inline even though they have only one sensing interface.  
The following options apply:  
inline-interfaces name—Specifies the name of the logical inline interface pair.  
default—Sets the value back to the system default setting.  
description—Specifies your description of the inline interface pair.  
interface1 interface_name—Specifies the first interface in the inline interface pair.  
interface2 interface_name—Specifies the second interface in the inline interface pair.  
no—Removes an entry or selection setting.  
admin-state {enabled | disabled}—Specifies the administrative link state of the interface, whether  
the interface is enabled or disabled.  
Note  
On all backplane sensing interfaces on all modules, admin-state is set to enabled and is  
protected (you cannot change the setting). The admin-state has no effect (and is protected)  
on the command and control interface. It only affects sensing interfaces. The command and  
control interface does not need to be enabled because it cannot be monitored.  
Creating Inline Interface Pairs  
To create inline interface pairs, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter interface submode.  
sensor# configure terminal  
sensor(config)# service interface  
sensor(config-int)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 4 Configuring Interfaces  
Configuring Inline Interface Mode  
Step 3  
Verify that the subinterface mode is “none” for both of the physical interfaces you are pairing in the  
inline interface.  
sensor(config-int)# show settings  
physical-interfaces (min: 0, max: 999999999, current: 2)  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/0 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <protected>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
Step 4  
Step 5  
Name the inline pair.  
sensor(config-int)# inline-interfaces PAIR1  
Display the available interfaces.  
sensor(config-int)# interface1 ?  
GigabitEthernet0/0  
GigabitEthernet0/1  
GigabitEthernet0/2  
GigabitEthernet0/3  
Management0/0  
GigabitEthernet0/0 physical interface.  
GigabitEthernet0/1 physical interface.  
GigabitEthernet0/2 physical interface.  
GigabitEthernet0/3 physical interface.  
Management0/0 physical interface.  
Step 6  
Step 7  
Configure two interfaces into a pair. You must assign the interface to a virtual sensor and enable it before  
it can monitor traffic (see Step 10).  
sensor(config-int-inl)# interface1 GigabitEthernet0/0  
sensor(config-int-inl)# interface2 GigabitEthernet0/1  
Add a description of the interface pair.  
sensor(config-int-inl)# description PAIR1 Gig0/0 and Gig0/1  
Step 8  
Step 9  
Repeat Steps 4 through 7 for any other interfaces that you want to configure into inline interface pairs.  
Verify the settings.  
sensor(config-int-inl)# show settings  
name: PAIR1  
-----------------------------------------------  
description: PAIR1 Gig0/0 & Gig0/1 default:  
interface1: GigabitEthernet0/0  
interface2: GigabitEthernet0/1  
-----------------------------------------------  
Step 10 Enable the interfaces assigned to the interface pair.  
sensor(config-int)# exit  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Configuring Inline Interface Mode  
sensor(config-int)# physical-interfaces GigabitEthernet0/0  
sensor(config-int-phy)# admin-state enabled  
sensor(config-int-phy)# exit  
sensor(config-int)# physical-interfaces GigabitEthernet0/1  
sensor(config-int-phy)# admin-state enabled  
sensor(config-int-phy)# exit  
sensor(config-int)#  
Step 11 Verify that the interfaces are enabled.  
sensor(config-int)# show settings  
physical-interfaces (min: 0, max: 999999999, current: 5)  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/0  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: enabled default: disabled  
duplex: auto <defaulted>  
speed: auto <defaulted>  
default-vlan: 0 <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/1  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: enabled default: disabled  
duplex: auto <defaulted>  
speed: auto <defaulted>  
default-vlan: 0 <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/2 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Configuring Inline Interface Mode  
speed: auto <defaulted>  
default-vlan: 0 <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/3 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
--MORE--  
Step 12 Delete an inline interface pair and return the interfaces to promiscuous mode. You must also delete the  
inline interface pair from the virtual sensor to which it is assigned.  
sensor(config-int)# no inline-interfaces PAIR1  
Step 13 Verify the inline interface pair has been deleted.  
sensor(config-int)# show settings  
-----------------------------------------------  
command-control: Management0/0 <protected>  
inline-interfaces (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
bypass-mode: auto <defaulted>  
interface-notifications  
-----------------------------------------------  
Step 14 Exit interface configuration submode.  
sensor(config-int)# exit  
Apply Changes:?[yes]:  
Step 15 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for configuring inline interface mode for the ASA 5500-X IPS SSP, see Assigning  
For the procedure for configuring inline interface mode for the ASA 5585-X IPS SSP, see Assigning  
For the procedure for assigning inline interface pairs to a virtual sensor, or deleting the inline  
interface pair from the virtual sensor to which it is assigned, see Adding, Editing, and Deleting  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 4 Configuring Interfaces  
Configuring Inline VLAN Pair Mode  
Configuring Inline VLAN Pair Mode  
This section describes inline VLAN pair mode and how to configure inline VLAN pairs. It contains the  
following topics:  
Understanding Inline VLAN Pair Mode  
Note  
The ASAIPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not support inline VLAN  
pairs.  
You can associate VLANs in pairs on a physical interface. This is known as inline VLAN pair mode.  
Packets received on one of the paired VLANs are analyzed and then forwarded to the other VLAN in the  
pair.  
Inline VLAN pair mode is an active sensing mode where a sensing interface acts as an 802.1q trunk port,  
and the sensor performs VLAN bridging between pairs of VLANs on the trunk. The sensor inspects the  
traffic it receives on each VLAN in each pair, and can either forward the packets on the other VLAN in  
the pair, or drop the packet if an intrusion attempt is detected. You can configure an IPS sensor to  
simultaneously bridge up to 255 VLAN pairs on each sensing interface. The sensor replaces the  
VLAN ID field in the 802.1q header of each received packet with the ID of the egress VLAN on which  
the sensor forwards the packet. The sensor drops all packets received on any VLANs that are not  
assigned to inline VLAN pairs.  
Note  
You cannot use the default VLAN as one of the paired VLANs in an inline VLAN pair.  
Figure 4-3 illustrates inline VLAN pair mode:  
Figure 4-3  
Inline VLAN Pair Mode  
Switch  
VLAN B VLAN A  
Router  
Host  
Trunk port carrying  
VLAN A and B  
Pairing VLAN A and B  
Sensor  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 4 Configuring Interfaces  
Configuring Inline VLAN Pair Mode  
Configuring Inline VLAN Pairs  
Use the physical-interfaces interface_name command in the service interface submode to configure  
inline VLAN pairs. The interface name is FastEthernet or GigabitEthernet.  
The following options apply:  
admin-state {enabled | disabled}—Specifies the administrative link state of the interface, whether  
the interface is enabled or disabled.  
Note  
On all backplane sensing interfaces on all modules, admin-state is set to enabled and is  
protected (you cannot change the setting). The admin-state has no effect (and is protected)  
on the command and control interface. It only affects sensing interfaces. The command and  
control interface does not need to be enabled because it cannot be monitored.  
default—Sets the value back to the system default setting.  
description—Specifies the description of the interface.  
duplex—Specifies the duplex setting of the interface:  
auto—Sets the interface to auto negotiate duplex.  
full—Sets the interface to full duplex.  
half—Sets the interface to half duplex.  
Note  
The duplex option is protected on all modules.  
no—Removes an entry or selection setting.  
speed—Specifies the speed setting of the interface:  
auto—Sets the interface to auto negotiate speed.  
10—Sets the interface to 10 MB (for TX interfaces only).  
100—Sets the interface to 100 MB (for TX interfaces only).  
1000—Sets the interface to 1 GB (for Gigabit interfaces only).  
Note  
The speed option is protected on all modules.  
subinterface-type—Specifies that the interface is a subinterface and what type of subinterface is  
defined.  
inline-vlan-pair—Lets you define the subinterface as an inline VLAN pair.  
none—No subinterfaces defined.  
subinterface name—Defines the subinterface as an inline VLAN pair:  
vlan1—Specifies the first VLAN in the inline VLAN pair.  
vlan2—Specifies the second VLAN in the inline VLAN pair.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 4 Configuring Interfaces  
Configuring Inline VLAN Pair Mode  
Configuring Inline VLAN Pairs  
To configure the inline VLAN pair settings on the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter interface submode.  
sensor# configure terminal  
sensor(config)# service interface  
sensor(config-int)#  
Step 3  
Verify if any inline interfaces exist (the subinterface type should read “none” if no inline interfaces have  
been configured).  
sensor(config-int)# show settings  
physical-interfaces (min: 0, max: 999999999, current: 5)  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/0 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/1 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/2 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 4 Configuring Interfaces  
Configuring Inline VLAN Pair Mode  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/3 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: Management0/0 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <protected>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
command-control: Management0/0 <protected>  
inline-interfaces (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Configuring Inline VLAN Pair Mode  
bypass-mode: auto <defaulted>  
interface-notifications  
-----------------------------------------------  
missed-percentage-threshold: 0 percent <defaulted>  
notification-interval: 30 seconds <defaulted>  
idle-interface-delay: 30 seconds <defaulted>  
-----------------------------------------------  
sensor(config-int)#  
Step 4  
Step 5  
If there are inline interfaces that are using this physical interface, remove them. You must also delete the  
inline interface from the virtual sensor to which it is assigned.  
sensor(config-int)# no inline-interfaces interface_name  
Display the list of available interfaces.  
sensor(config-int)# physical-interfaces ?  
GigabitEthernet0/0  
GigabitEthernet0/1  
GigabitEthernet0/2  
GigabitEthernet0/3  
Management0/0  
GigabitEthernet0/0 physical interface.  
GigabitEthernet0/1 physical interface.  
GigabitEthernet0/2 physical interface.  
GigabitEthernet0/3 physical interface.  
Management0/0 physical interface.  
sensor(config-int)# physical-interfaces  
Step 6  
Step 7  
Designate an interface.  
sensor(config-int)# physical-interfaces GigabitEthernet0/2  
Enable the interface. You must assign the interface to a virtual sensor and enable it before it can monitor  
traffic.  
sensor(config-int-phy)# admin-state enabled  
Step 8  
Step 9  
Add a description of this interface.  
sensor(config-int-phy)# description INT1  
Configure the duplex settings. This option is not available on the ASA IPS modules  
(ASA 5500-X IPS SSP and ASA 5585-X IPS SSP).  
sensor(config-int-phy)# duplex full  
Step 10 Configure the speed. This option is not available on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP).  
sensor(config-int-phy)# speed 1000  
Step 11 Set up the inline VLAN pair.  
sensor(config-int-phy)# subinterface-type inline-vlan-pair  
sensor(config-int-phy-inl)# subinterface 1  
sensor(config-int-phy-inl-sub)# vlan1 52  
sensor(config-int-phy-inl-sub)# vlan2 53  
Step 12 Add a description for the inline VLAN pair.  
sensor(config-int-phy-inl-sub)# description INT1 vlans 52 and 53  
Step 13 Verify the inline VLAN pair settings.  
sensor(config-int-phy-inl-sub)# show settings  
subinterface-number: 1  
-----------------------------------------------  
description: INT1 vlans 52 and 53 default:  
vlan1: 52  
vlan2: 53  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Configuring VLAN Group Mode  
-----------------------------------------------  
sensor(config-int-phy-inl-sub)#  
Step 14 To delete VLAN pairs:  
a. Delete one VLAN pair.  
sensor(config-int-phy-inl-sub)# exit  
sensor(config-int-phy-inl)# no subinterface 1  
If this VLAN pair is the last one on the sensor, you receive the following error message:  
Error: This "subinterface-type" contains less than the required number of  
"subinterface" entries. Please add entry(s) to reach the minimum required entries or  
select a different "subinterface-type".  
Go to Step b to remove the last VLAN pair.  
b. Delete all VLAN pairs.  
sensor(config-int-phy-inl-sub)# exit  
sensor(config-int-phy-inl)# exit  
sensor(config-int-phy)# subinterface-type none  
Step 15 Exit interface submode. You must also delete the interface from the virtual sensor to which it is assigned.  
sensor(config-int-phy-inl-sub)# exit  
sensor(config-int-phy-inl)# exit  
sensor(config-int-phy)# exit  
sensor(config-int)# exit  
Apply Changes:?[yes]:  
Step 16 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for assigning inline interface pairs to a virtual sensor, or deleting the inline interface  
pair from the virtual sensor to which it is assigned, see Adding, Editing, and Deleting Virtual Sensors,  
Configuring VLAN Group Mode  
This section describes VLAN Group mode and how to configure VLAN groups. It contains the following  
topics:  
Understanding VLAN Group Mode  
Note  
The ASAIPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not support VLAN groups  
mode.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 4 Configuring Interfaces  
Configuring VLAN Group Mode  
You can divide each physical interface or inline interface into VLAN group subinterfaces, each of which  
consists of a group of VLANs on that interface. Analysis Engine supports multiple virtual sensors, each  
of which can monitor one or more of these interfaces. This lets you apply multiple policies to the same  
sensor. The advantage is that now you can use a sensor with only a few interfaces as if it had many  
interfaces.  
Note  
You cannot divide physical interfaces that are in inline VLAN pairs into VLAN groups.  
VLAN group subinterfaces associate a set of VLANs with a physical or inline interface. No VLAN can  
be a member of more than one VLAN group subinterface. Each VLAN group subinterface is identified  
by a number between 1 and 255. Subinterface 0 is a reserved subinterface number used to represent the  
entire unvirtualized physical or logical interface. You cannot create, delete, or modify subinterface 0 and  
no statistics are reported for it.  
An unassigned VLAN group is maintained that contains all VLANs that are not specifically assigned to  
another VLAN group. You cannot directly specify the VLANs that are in the unassigned group. When a  
VLAN is added to or deleted from another VLAN group subinterface, the unassigned group is updated.  
Packets in the native VLAN of an 802.1q trunk do not normally have 802.1q encapsulation headers to  
identify the VLAN number to which the packets belong. A default VLAN variable is associated with  
each physical interface and you should set this variable to the VLAN number of the native VLAN or to 0.  
The value 0 indicates that the native VLAN is either unknown or you do not care if it is specified. If the  
default VLAN setting is 0, the following occurs:  
Any alerts triggered by packets without 802.1q encapsulation have a VLAN value of 0 reported in  
the alert.  
Non-802.1q encapsulated traffic is associated with the unassigned VLAN group and it is not  
possible to assign the native VLAN to any other VLAN group.  
Note  
You can configure a port on a switch as either an access port or a trunk port. On an access port, all traffic  
is in a single VLAN is called the access VLAN. On a trunk port, multiple VLANs can be carried over  
the port, and each packet has a special header attached called the 802.1q header that contains the VLAN  
ID. This header is commonly referred as the VLAN tag. However, a trunk port has a special VLAN called  
the native VLAN. Packets in the native VLAN do not have the 802.1q headers attached.  
Deploying VLAN Groups  
Because a VLAN group of an inline pair does not translate the VLAN ID, an inline paired interface must  
exist between two switches to use VLAN groups on a logical interface. For an appliance, you can connect  
the two pairs to the same switch, make them access ports, and then set the access VLANs for the two  
ports differently. In this configuration, the sensor connects between two VLANs, because each of the  
two ports is in access mode and carries only one VLAN. In this case the two ports must be in different  
VLANs, and the sensor bridges the two VLANs, monitoring any traffic that flows between the two  
VLANs.  
You can also connect appliances between two switches. There are two variations. In the first variation,  
the two ports are configured as access ports, so they carry a single VLAN. In this way, the sensor bridges  
a single VLAN between the two switches.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 4 Configuring Interfaces  
Configuring VLAN Group Mode  
In the second variation, the two ports are configured as trunk ports, so they can carry multiple VLANs.  
In this configuration, the sensor bridges multiple VLANs between the two switches. Because multiple  
VLANs are carried over the inline interface pair, the VLANs can be divided into groups and each group  
can be assigned to a virtual sensor.  
Configuring VLAN Groups  
Use the physical-interfaces interface_name command in the service interface submode to configure  
inline VLAN groups. The interface name is FastEthernet or GigabitEthernet.  
The following options apply:  
admin-state {enabled | disabled}—Specifies the administrative link state of the interface, whether  
the interface is enabled or disabled.  
Note  
On all backplane sensing interfaces on all modules, admin-state is set to enabled and is  
protected (you cannot change the setting). The admin-state has no effect (and is protected)  
on the command and control interface. It only affects sensing interfaces. The command and  
control interface does not need to be enabled because it cannot be monitored.  
default—Sets the value back to the system default setting.  
description—Specifies the description of the interface.  
duplex—Specifies the duplex setting of the interface:  
auto—Sets the interface to auto negotiate duplex.  
full—Sets the interface to full duplex.  
half—Sets the interface to half duplex.  
Note  
The duplex option is protected on all modules.  
no—Removes an entry or selection setting.  
speed—Specifies the speed setting of the interface:  
auto—Sets the interface to auto negotiate speed.  
10—Sets the interface to 10 MB (for TX interfaces only).  
100—Sets the interface to 100 MB (for TX interfaces only).  
1000—Sets the interface to 1 GB (for Gigabit interfaces only).  
Note  
The speed option is protected on all modules.  
subinterface-type—Specifies that the interface is a subinterface and what type of subinterface is  
defined.  
vlan-group—Lets you define the subinterface as a VLAN group.  
none—Speechifies that no subinterfaces are defined.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 4 Configuring Interfaces  
Configuring VLAN Group Mode  
subinterface name—Defines the subinterface as a VLAN group:  
vlans {range | unassigned}—Specifies the set of VLANs in the VLAN group. The value for  
range is 1 to 4095 in a comma-separated pattern of individual VLAN IDs or ranges:  
1,5-8,10-15. There are no spaces between the entries.  
Configuring Inline VLAN Groups  
To configure the inline VLAN group settings on the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter interface submode.  
sensor# configure terminal  
sensor(config)# service interface  
sensor(config-int)#  
Step 3  
Verify if any inline interfaces exist (the subinterface type should read “none” if no inline interfaces have  
been configured).  
sensor(config-int)# show settings  
physical-interfaces (min: 0, max: 999999999, current: 5)  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/0 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/1 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 4 Configuring Interfaces  
Configuring VLAN Group Mode  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/2 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/3 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: Management0/0 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <protected>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Configuring VLAN Group Mode  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
command-control: Management0/0 <protected>  
inline-interfaces (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
bypass-mode: auto <defaulted>  
interface-notifications  
-----------------------------------------------  
missed-percentage-threshold: 0 percent <defaulted>  
notification-interval: 30 seconds <defaulted>  
idle-interface-delay: 30 seconds <defaulted>  
-----------------------------------------------  
sensor(config-int)#  
Step 4  
Step 5  
If there are inline interfaces that are using this physical interface, remove them.  
sensor(config-int)# no inline-interfaces interface_name  
Display the list of available interfaces.  
sensor(config-int)# physical-interfaces ?  
GigabitEthernet0/0  
GigabitEthernet0/1  
GigabitEthernet0/2  
GigabitEthernet0/3  
Management0/0  
GigabitEthernet0/0 physical interface.  
GigabitEthernet0/1 physical interface.  
GigabitEthernet0/2 physical interface.  
GigabitEthernet0/3 physical interface.  
Management0/0 physical interface.  
sensor(config-int)# physical-interfaces  
Step 6  
Step 7  
Specify an interface.  
sensor(config-int)# physical-interfaces GigabitEthernet0/2  
Enable the interface. You must also assign the interface to a virtual sensor and enable it before it can  
monitor traffic.  
sensor(config-int-phy)# admin-state enabled  
Step 8  
Step 9  
Add a description of this interface.  
sensor(config-int-phy)# description INT1  
Specify the duplex settings. This option is not available on the ASA IPS modules (ASA 5500-X IPS SSP  
and ASA 5585-X IPS SSP).  
sensor(config-int-phy)# duplex full  
Step 10 Specify the speed. This option is not available on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP).  
sensor(config-int-phy)# speed 1000  
Step 11 Set up the VLAN group.  
sensor(config-int-phy)# subinterface-type vlan-group  
sensor(config-int-phy-vla)# subinterface 1  
Step 12 Assign the VLANs to this group:  
a. Assign specific VLANs.  
sensor(config-int-phy-vla-sub)# vlans range 1,5-8,10-15  
sensor(config-int-phy-vla-sub)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Configuring VLAN Group Mode  
b. Verify the settings.  
sensor(config-int-phy-vla-sub)# show settings  
subinterface-number: 1  
-----------------------------------------------  
description: <defaulted>  
vlans  
-----------------------------------------------  
range: 1,5-8,10-15  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-int-phy-vla-sub)#  
c. Configure unassigned VLANs.  
sensor(config-int-phy-vla-sub)# vlans unassigned  
sensor(config-int-phy-vla-sub)#  
d. Verify the settings.  
sensor(config-int-phy-vla-sub)# show settings  
subinterface-number: 1  
-----------------------------------------------  
description: <defaulted>  
vlans  
-----------------------------------------------  
unassigned  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-int-phy-vla-sub)#  
Note  
Assigning the unassigned VLANs to a separate virtual sensor allows you to specify a policy  
for all VLANs that you have not specifically assigned to other groups. For example, you can  
group your important internal VLANs in one group and apply a stringent security policy to  
that group. You can group the other less important unassigned VLANs into another group,  
and apply the default security policy to that group, so that only very serious alerts are  
reported.  
Step 13 Add a description for the VLAN group.  
sensor(config-int-phy-inl-sub)# description INT1 vlans 52 and 53  
Step 14 Verify the VLAN group settings.  
sensor(config-int-phy-vla-sub)# show settings  
subinterface-number: 1  
-----------------------------------------------  
description: GROUP1 default:  
vlans  
-----------------------------------------------  
unassigned  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-int-phy-vla-sub)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Configuring Inline Bypass Mode  
Step 15 Delete VLAN groups:  
a. Delete one VLAN group.  
sensor(config-int-phy-vla-sub)# exit  
sensor(config-int-phy-vla)# no subinterface 1  
If this VLAN group is the last one on the sensor, you receive an error message.  
Error: This "subinterface-type" contains less than the required number of  
"subinterface" entries. Please add entry(s) to reach the minimum required entries or  
select a different "subinterface-type".  
Go to Step b to remove the last VLAN group.  
b. Delete all VLAN groups. You must also delete the VLAN group from the virtual sensor to which it  
is assigned.  
sensor(config-int-phy-vla-sub)# exit  
sensor(config-int-phy-vla)# exit  
sensor(config-int-phy)# subinterface-type none  
Step 16 Exit interface submode.  
sensor(config-int-phy-vla-sub)# exit  
sensor(config-int-phy-vla)# exit  
sensor(config-int-phy)# exit  
sensor(config-int)# exit  
Apply Changes:?[yes]:  
Step 17 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for assigning inline interface pairs to a virtual sensor, or deleting the inline interface  
pair from the virtual sensor to which it is assigned, see Adding, Editing, and Deleting Virtual Sensors,  
Configuring Inline Bypass Mode  
This section describes inline bypass mode for sensors configured as inline interface and inline VLAN  
pairs, and contains the following topics:  
Understanding Inline Bypass Mode  
Note  
The ASA 5500-X IPS SSP and the ASA 5585-X IPS SSP do not support bypass mode. The adaptive  
security appliance will either fail open, fail close, or fail over depending on the configuration of the  
adaptive security appliance and the type of activity being done on the IPS.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 4 Configuring Interfaces  
Configuring Inline Bypass Mode  
Caution  
Caution  
There are security consequences when you put the sensor in bypass mode. When bypass mode is on, the  
traffic bypasses the sensor and is not inspected; therefore, the sensor cannot prevent malicious attacks.  
As with signature updates, when the sensor applies a global correlation update, it may trigger bypass.  
Whether or not bypass is triggered depends on the traffic load of the sensor and the size of the  
signature/global correlation update. If bypass mode is turned off, an inline sensor stops passing traffic  
while the update is being applied.  
You can use inline bypass as a diagnostic tool and a failover protection mechanism. Normally, the sensor  
Analysis Engine performs packet analysis. When inline bypass is activated, the Analysis Engine is  
bypassed, allowing traffic to flow through the inline interfaces and inline VLAN pairs without  
inspection. Inline bypass ensures that packets continue to flow through the sensor when the sensor  
processes are temporarily stopped for upgrades or when the sensor monitoring processes fail. There are  
three modes: on, off, and automatic. By default, bypass mode is set to automatic.  
The inline bypass functionality is implemented in software, so it only functions when the operating  
system is running. If the sensor is powered off or shut down, inline bypass does not work—traffic does  
not flow through the sensor.  
For IPS 4510 and IPS 4520, when the SensorApp is not running or if bypass mode is on, the following  
occurs:  
The output from the packet capture/display command does not show any packets.  
The show interface and show interface interface_name commands do not show VLAN statistics.  
Configuring Inline Bypass Mode  
Use the bypass-mode command in the service interface submode to configure bypass mode. The  
following options apply:  
off—Turns off inline bypassing. Packet inspection is performed on inline data traffic. However,  
inline traffic is interrupted if the Analysis Engine is stopped.  
on—Turns on inline bypassing. No packet inspection is performed on the traffic. Inline traffic  
continues to flow even if the Analysis Engine is stopped.  
auto—Turns on automatic bypassing. The sensor automatically begins bypassing inline packet  
inspection if the Analysis Engine stops processing packets. This prevents data interruption on inline  
interfaces. This is the default.  
Configuring Bypass Mode  
To configure bypass mode, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter interface submode.  
sensor# configure terminal  
sensor(config)# service interface  
Step 3  
Configure bypass mode.  
sensor(config-int)# bypass-mode off  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 4 Configuring Interfaces  
Configuring Interface Notifications  
Step 4  
Verify the settings.  
sensor(config-int)# show settings  
-----------------------------------------------  
bypass-mode: off default: auto  
interface-notifications  
-----------------------------------------------  
missed-percentage-threshold: 0 percent <defaulted>  
notification-interval: 30 seconds <defaulted>  
idle-interface-delay: 30 seconds <defaulted>  
-----------------------------------------------  
sensor(config-int)#  
Step 5  
Step 6  
Exit interface submode.  
sensor(config-int)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For more information on inline bypass mode, see Configuring Inline Bypass Mode, page 4-33.  
Configuring Interface Notifications  
You can configure the sensor to monitor the flow of packets across an interface and send notification if  
that flow changes (starts/stops) during a specified interval. You can configure the missed packet  
threshold within a specific notification interval and also configure the interface idle delay before a status  
event is reported.  
Use the interface-notifications command in the service interface submode to configure traffic  
notifications.  
The following options apply:  
default—Sets the value back to the system default setting.  
idle-interface-delay—Specifies the number of seconds an interface must be idle before sending a  
notification. The valid range is 5 to 3600. The default is 30 seconds.  
missed-percentage-threshold—Specifies the percentage of packets that must be missed during a  
specified interval before notification will be sent. The valid range is 0 to 100. The default is 0.  
notification-interval—Specifies the interval to check for missed packet percentage. The valid range  
is 5 to 3600. The default is 30 seconds  
Configuring Interface Notifications  
To configure the interface notification settings, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter global configuration mode.  
sensor# configure terminal  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 4 Configuring Interfaces  
Configuring CDP Mode  
Step 3  
Step 4  
Step 5  
Step 6  
Step 7  
Step 8  
Enter interface submode.  
sensor(config)# service interface  
Enter interface notifications submode.  
sensor(config-int)# interface-notifications  
Specify the idle interface delay.  
sensor(config-int-int)# idle-interface-delay 60  
Specify the missed percentage threshold.  
sensor(config-int-int)# missed-percentage-threshold 1  
Specify the notification interval.  
sensor(config-int-int)# notification-interval 60  
Verify the settings.  
sensor(config-int-int)# show settings  
interface-notifications  
-----------------------------------------------  
missed-percentage-threshold: 1 percent default: 0  
notification-interval: 60 seconds default: 30  
idle-interface-delay: 60 seconds default: 30  
-----------------------------------------------  
sensor(config-int-int)#  
Step 9  
Exit interface notifications submode.  
sensor(config-int-int)# exit  
sensor(config-int)# exit  
Apply Changes:?[yes]:  
Step 10 Press Enter to apply the changes or enter no to discard them.  
Configuring CDP Mode  
Note  
The ASA 5500-X IPS SSP and the ASA 5585-X IPS SSP do not support CDP mode.  
You can configure the sensor to enable or disable the forwarding of CDP packets. This action applies  
globally to all interfaces.  
Cisco Discovery Protocol is a media- and protocol-independent device-discovery protocol that runs on  
all Cisco-manufactured equipment, including routers, access servers, bridges, and switches. Using CDP,  
a device can advertise its existence to other devices and receive information about other devices on the  
same LAN or on the remote side of a WAN. CDP runs on all media that support SNAP, including LANs,  
Frame Relay, and ATM media.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 4 Configuring Interfaces  
Configuring CDP Mode  
User the cdp-mode command in service interface mode to have the sensor either forward or drop CDP  
packets.  
The following option applies:  
cdp-mode {forward-cdp-packets | drop-cdp-packets}—Configures the sensor to either forward  
CDP packets or drop CDP packets. The default is drop-cdp-packets.  
Enabling CDP Mode  
To configure CDP mode, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter interface submode.  
sensor# configure terminal  
sensor(config)# service interface  
Step 3  
Step 4  
Enable CDP mode.  
sensor(config-int)# cdp-mode forward-cdp-packets  
Verify the settings.  
sensor(config-int)# show settings  
-----------------------------------------------  
bypass-mode: auto <defaulted>  
interface-notifications  
-----------------------------------------------  
missed-percentage-threshold: 0 percent <defaulted>  
notification-interval: 30 seconds <defaulted>  
idle-interface-delay: 30 seconds <defaulted>  
-----------------------------------------------  
cdp-mode: forward-cdp-packets default: drop-cdp-packets  
sensor(config-int)#  
Displaying Interface Statistics  
Note  
The show interface command output for the IPS 4510 and IPS 4520 does not include the total undersize  
packets or total transmit FIFO overruns.  
Note  
When the IPS 4510 and IPS 4520 are in bypass mode, VLAN statistics in the show interface and packet  
display/capture command output do not show any packets.  
The jumbo packet count in the show interface command output from the lines Total Jumbo Packets  
Received and Total Jumbo Packets Transmitted for ASA IPS modules may be larger than expected  
due to some packets that were almost jumbo size on the wire being counted as jumbo size by the IPS.  
This miscount is a result of header bytes added to the packet by the ASA before the packet is transmitted  
to the IPS. For IPv4, 58 bytes of header data are added. For IPv6, 78 bytes of header data are added. The  
ASA removes the added IPS header before the packet leaves the ASA.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 4 Configuring Interfaces  
Configuring CDP Mode  
Use the show interfaces [clear | brief] command in EXEC mode to display statistics for all system  
interfaces. Use the show interfaces {FastEthernet | GigabitEthernet | Management | PortChannel}  
[slot/port] command to display statistics for specific interfaces.  
The following options apply:  
clear—(Optional) Clears the diagnostics.  
brief—(Optional) Displays a summary of the usability status information for each interface.  
FastEthernet—Displays statistics for FastEthernet interfaces.  
GigabitEthernet—Displays statistics for GigabitEthernet interfaces.  
Management—Displays statistics for Management interfaces.  
Note  
Only platforms with external ports marked Management support this keyword.  
PortChannel—Displays statistics for PortChannel interfaces  
slot/port—Displays statistics for the specific slot/port of the interface.  
To display interface statistics, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display statistics for all interfaces.  
sensor# show interfaces  
Interface Statistics  
Total Packets Received = 0  
Total Bytes Received = 0  
Missed Packet Percentage = 0  
Current Bypass Mode = Auto_off  
MAC statistics from interface GigabitEthernet0/0  
Statistics From Subinterface 12  
Vlans in this group = 12  
Total Packets Received On This Vlan Group = 0  
Total Bytes Received On This Vlan Group = 0  
Total Packets Transmitted On This Vlan Group = 0  
Total Bytes Transmitted On This Vlan Group = 0  
Statistics From Subinterface 16  
Vlans in this group = 10  
Total Packets Received On This Vlan Group = 0  
Total Bytes Received On This Vlan Group = 0  
Total Packets Transmitted On This Vlan Group = 0  
Total Bytes Transmitted On This Vlan Group = 0  
Statistics From Subinterface 25  
Vlans in this group = 11  
Total Packets Received On This Vlan Group = 0  
Total Bytes Received On This Vlan Group = 0  
Total Packets Transmitted On This Vlan Group = 0  
Total Bytes Transmitted On This Vlan Group = 0  
--MORE--  
Step 3  
Show a brief summary of the interfaces. The * indicates that the interface is the command and control  
interface.  
sensor# show interfaces brief  
CC  
Interface  
GigabitEthernet0/0  
Management0/0  
Sensing State  
Disabled  
Disabled  
Link  
Down  
Up  
Inline Mode  
Unpaired  
Pair Status  
N/A  
*
GigabitEthernet0/1  
Disabled  
Down  
Unpaired  
N/A  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 4 Configuring Interfaces  
Configuring CDP Mode  
GigabitEthernet0/2  
GigabitEthernet0/3  
sensor#  
Disabled  
Disabled  
Down  
Down  
Unpaired  
Unpaired  
N/A  
N/A  
Step 4  
Display the statistics for a specific interface.  
sensor# show interfaces Management0/0  
MAC statistics from interface Management0/0  
Interface function = Command-control interface  
Description =  
Media Type = TX  
Default Vlan = 0  
Link Status = Up  
Link Speed = Auto_100  
Link Duplex = Auto_Full  
Total Packets Received = 4305909  
Total Bytes Received = 280475712  
Total Multicast Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 973627  
Total Bytes Transmitted = 437632618  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
sensor#  
Step 5  
Clear the statistics.  
sensor# show interfaces clear  
Interface Statistics  
Total Packets Received = 0  
Total Bytes Received = 0  
Missed Packet Percentage = 0  
Current Bypass Mode = Auto_off  
MAC statistics from interface GigabitEthernet0/0  
Statistics From Subinterface 12  
Vlans in this group = 12  
Total Packets Received On This Vlan Group = 0  
Total Bytes Received On This Vlan Group = 0  
Total Packets Transmitted On This Vlan Group = 0  
Total Bytes Transmitted On This Vlan Group = 0  
Statistics From Subinterface 16  
Vlans in this group = 10  
Total Packets Received On This Vlan Group = 0  
Total Bytes Received On This Vlan Group = 0  
Total Packets Transmitted On This Vlan Group = 0  
Total Bytes Transmitted On This Vlan Group = 0  
Statistics From Subinterface 25  
Vlans in this group = 11  
Total Packets Received On This Vlan Group = 0  
Total Bytes Received On This Vlan Group = 0  
Total Packets Transmitted On This Vlan Group = 0  
Total Bytes Transmitted On This Vlan Group = 0  
--MORE--  
ì
For More Information  
For information on slot and port numbers and which platforms have a Management port, refer to Cisco  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Configuring Interfaces  
Displaying Interface Traffic History  
Displaying Interface Traffic History  
Use the show interfaces-history [traffic-by-hour | traffic-by-minute] command in EXEC mode to  
display historical interfaces statistics for all system interfaces. The historical information for each  
interface is maintained for three days with 60 seconds granularity. Use the show interfaces-history  
{FastEthernet | GigabitEthernet | Management | PortChannel} [traffic-by-hour |  
traffic-by-minute] command to display statistics for specific interfaces.  
Note  
You must have health monitoring enabled to support the historic interface function.  
Each record has the following details:  
Total packets received  
Total bytes received  
FIFO overruns  
Receive errors  
Received Mbps  
Missed packet percentage  
Average load  
Peak load  
Note  
Historical data for each interface for the past 72 hours is also included in the show tech-support  
command.  
The following options apply:  
traffic-by-hour—Displays interface traffic history by the hour.  
traffic-by-minute—Displays interface traffic history by the minute.  
past—Displays historical interface traffic information.  
HH:MM—Specifies the amount of time to go back in the past to begin the traffic display. The range  
for HH is 0 to 72. The range for MM is 0 to 59. The minimum value is 00:01 and the maximum value  
is 72:00.  
FastEthernet—Displays statistics for FastEthernet interfaces.  
GigabitEthernet—Displays statistics for GigabitEthernet interfaces.  
Management—Displays statistics for Management interfaces.  
Note  
Only platforms with external ports marked Management support this keyword.  
PortChannel—Displays statistics for PortChannel interfaces.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 4 Configuring Interfaces  
Displaying Interface Traffic History  
Displaying Historical Interface Statistics  
To display interface traffic history, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the interface traffic history by the hour.  
sensor# show interfaces-history traffic-by-hour past 02:15  
GigabitEthernet0/0  
Time  
FIFO Overruns  
11:30:31 UTC Tue Mar 05 2013  
0
10:27:32 UTC Tue Mar 05 2013  
0
Packets Received  
Bytes Received  
Mbps  
MPP  
0
Receive Errors  
Avg Load  
Peak Load  
0
0
0
0
0
0
0
0
0
0
0
0
0
GigabitEthernet0/1  
Time  
Packets Received  
Bytes Received  
Mbps  
MPP  
0
FIFO Overruns  
Receive Errors  
Avg Load  
Peak Load  
11:30:31 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
10:27:32 UTC Tue Mar 05 2013  
0
0
0
0
GigabitEthernet0/2  
Time  
Packets Received  
Bytes Received  
Mbps  
MPP  
0
FIFO Overruns  
Receive Errors  
Avg Load  
Peak Load  
11:30:31 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
0
10:27:32 UTC Tue Mar 05 2013  
0
0
0
GigabitEthernet0/3  
Time  
Packets Received  
Bytes Received  
Mbps  
MPP  
0
FIFO Overruns  
Receive Errors  
Avg Load  
Peak Load  
11:30:31 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
10:27:32 UTC Tue Mar 05 2013  
0
0
0
0
Management0/0  
Time  
FIFO Overruns  
11:30:31 UTC Tue Mar 05 2013  
0
Packets Received  
Avg Load  
31071600  
Bytes Received  
3240924703  
Mbps  
MPP  
0
Receive Errors  
Peak Load  
0
0
0
0
0
10:27:32 UTC Tue Mar 05 2013  
0
30859941  
0
3216904786  
0
0
0
--MORE--  
Step 3  
Display the interface traffic history by the minute.  
sensor# show interfaces-history traffic-by-minute past 00:45  
GigabitEthernet0/0  
Time  
FIFO Overruns  
12:27:49 UTC Tue Mar 05 2013  
0
12:26:45 UTC Tue Mar 05 2013  
0
12:25:48 UTC Tue Mar 05 2013  
0
Packets Received  
Bytes Received  
Mbps  
MPP  
0
Receive Errors  
Avg Load  
Peak Load  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
12:24:42 UTC Tue Mar 05 2013  
0
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 4 Configuring Interfaces  
Displaying Interface Traffic History  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
12:23:37 UTC Tue Mar 05 2013  
0
12:22:30 UTC Tue Mar 05 2013  
0
12:21:31 UTC Tue Mar 05 2013  
0
12:20:29 UTC Tue Mar 05 2013  
0
12:19:25 UTC Tue Mar 05 2013  
0
12:18:18 UTC Tue Mar 05 2013  
0
12:17:12 UTC Tue Mar 05 2013  
0
12:16:07 UTC Tue Mar 05 2013  
0
12:15:00 UTC Tue Mar 05 2013  
0
12:13:54 UTC Tue Mar 05 2013  
0
12:12:49 UTC Tue Mar 05 2013  
0
12:11:43 UTC Tue Mar 05 2013  
0
12:10:36 UTC Tue Mar 05 2013  
0
12:09:30 UTC Tue Mar 05 2013  
0
12:08:24 UTC Tue Mar 05 2013  
0
12:07:25 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
12:06:23 UTC Tue Mar 05 2013  
0
12:05:25 UTC Tue Mar 05 2013  
0
0
0
sensor#  
Step 4  
Display the interface traffic history for a specific interface.  
sensor# show interfaces-history GigabitEthernet0/0 traffic-by-minute past 00:05  
GigabitEthernet0/0  
Time  
FIFO Overruns  
13:34:38 UTC Thu Mar 07 2013  
0
13:33:35 UTC Thu Mar 07 2013  
0
13:32:32 UTC Thu Mar 07 2013  
0
13:31:27 UTC Thu Mar 07 2013  
0
13:30:25 UTC Thu Mar 07 2013  
0
Packets Received  
Receive Errors Avg Load Peak Load  
Bytes Received  
Mbps  
MPP  
00  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
00  
00  
00  
00  
0
0
0
0
sensor#  
For More Information  
For information on enabling health monitoring, see Configuring Health Status Information, page 17-13.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
4-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
5
Configuring Virtual Sensors  
This chapter explains the function of the Analysis Engine and how to create, edit, and delete virtual  
sensors. It also explains how to assign interfaces to a virtual sensor. It contains the following sections:  
Virtual Sensor Notes and Caveats  
The following notes and caveats apply to configuring the virtual sensor:  
The Cisco IPS does not support more than four virtual sensors. You cannot delete the default virtual  
sensor vs0.  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not support the inline  
TCP session tracking mode.  
For the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP), normalization is  
performed by the adaptive security appliance and not the IPS.  
Anomaly detection is disabled by default. You must enable it to configure or apply an anomaly  
detection policy. Enabling anomaly detection results in a decrease in performance.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 5 Configuring Virtual Sensors  
Understanding the Analysis Engine  
Understanding the Analysis Engine  
The Analysis Engine performs packet analysis and alert detection. It monitors traffic that flows through  
specified interfaces.  
You create virtual sensors in the Analysis Engine. Each virtual sensor has a unique name with a list of  
interfaces, inline interface pairs, inline VLAN pairs, and VLAN groups associated with it. To avoid  
definition ordering issues, no conflicts or overlaps are allowed in assignments. You assign interfaces,  
inline interface pairs, inline VLAN pairs, and VLAN groups to a specific virtual sensor so that no packet  
is processed by more than one virtual sensor. Each virtual sensor is also associated with a specifically  
named signature definition, event action rules, and anomaly detection configuration. Packets from  
interfaces, inline interface pairs, inline VLAN pairs, and VLAN groups that are not assigned to any  
virtual sensor are disposed of according to the inline bypass configuration.  
Note  
The Cisco IPS does not support more than four virtual sensors. You cannot delete the default virtual  
sensor vs0.  
Understanding Virtual Sensors  
The sensor can receive data inputs from one or many monitored data streams. These monitored data  
streams can either be physical interface ports or virtual interface ports. For example, a single sensor can  
monitor traffic from in front of the firewall, from behind the firewall, or from in front of and behind the  
firewall concurrently. And a single sensor can monitor one or more data streams. In this situation a single  
sensor policy or configuration is applied to all monitored data streams.  
A virtual sensor is a collection of data that is defined by a set of configuration policies. The virtual sensor  
is applied to a set of packets as defined by interface component.  
A virtual sensor can monitor multiple segments, and you can apply a different policy or configuration  
for each virtual sensor within a single physical sensor. You can set up a different policy per monitored  
segment under analysis. You can also apply the same policy instance, for example, sig0, rules0, or ad0,  
to different virtual sensors. You can assign interfaces, inline interface pairs, inline VLAN pairs, and  
VLAN groups to a virtual sensor.  
Note  
The default virtual sensor is vs0. You cannot delete the default virtual sensor. The interface list, the  
anomaly detection operational mode, the inline TCP session tracking mode, and the virtual sensor  
description are the only configuration features you can change for the default virtual sensor. You cannot  
change the signature definition, event action rules, or anomaly detection policies.  
Advantages and Restrictions of Virtualization  
Virtualization has the following advantages:  
You can apply different configurations to different sets of traffic.  
You can monitor two networks with overlapping IP spaces with one sensor.  
You can monitor both inside and outside of a firewall or NAT device.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Chapter 5 Configuring Virtual Sensors  
Inline TCP Session Tracking Mode  
Virtualization has the following restrictions:  
You must assign both sides of asymmetric traffic to the same virtual sensor.  
Using VACL capture or SPAN (promiscuous monitoring) is inconsistent with regard to VLAN  
tagging, which causes problems with VLAN groups.  
When using Cisco IOS software, a VACL capture port or a SPAN target does not always receive  
tagged packets even if it is configured for trunking.  
When using the MSFC, fast path switching of learned routes changes the behavior of VACL  
captures and SPAN.  
Persistent store is limited.  
Virtualization has the following traffic capture requirements:  
The virtual sensor must receive traffic that has 802.1q headers (other than traffic on the native VLAN  
of the capture port).  
The sensor must see both directions of traffic in the same VLAN group in the same virtual sensor  
for any given sensor.  
The following sensors support virtualization:  
ASA 5500-X IPS SSP  
ASA 5585-X IPS SSP  
IPS 4345  
IPS 4345-DC  
IPS 4360  
IPS 4510  
IPS 4520  
Inline TCP Session Tracking Mode  
Note  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not support the inline TCP  
session tracking mode.  
When you choose to modify packets inline, if the packets from a stream are seen twice by the Normalizer  
engine, it cannot properly track the stream state and often the stream is dropped. This situation occurs  
most often when a stream is routed through multiple VLANs or interfaces that are being monitored by  
the IPS. A further complication in this situation is the necessity of allowing asymmetric traffic to merge  
for proper tracking of streams when the traffic for either direction is received from different VLANs or  
interfaces. To deal with this situation, you can set the mode so that streams are perceived as unique if  
they are received on separate interfaces and/or VLANs (or the subinterface for VLAN pairs).  
The following inline TCP session tracking modes apply:  
Interface and VLAN—All packets with the same session key (AaBb) in the same VLAN (or inline  
VLAN pair) and on the same interface belong to the same session. Packets with the same key but on  
different VLANs are tracked separately.  
VLAN Only—All packets with the same session key (AaBb) in the same VLAN (or inline VLAN  
pair) regardless of the interface belong to the same session. Packets with the same key but on  
different VLANs are tracked separately.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 5 Configuring Virtual Sensors  
Normalization and Inline TCP Evasion Protection Mode  
Virtual Sensor—All packets with the same session key (AaBb) within a virtual sensor belong to the  
same session. This is the default and almost always the best option to choose.  
Normalization and Inline TCP Evasion Protection Mode  
Note  
For the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP), normalization is  
performed by the adaptive security appliance and not the IPS.  
Normalization only applies when the sensor is operating in inline mode. The default is strict evasion  
protection, which is full enforcement of TCP state and sequence tracking. The Normalizer enforces  
duplicate packets, changed packets, out-of-order packets, and so forth, which helps prevent attackers  
from evading the IPS.  
Asymmetric mode disables most of the Normalizer checks. Use asymmetric mode only when the entire  
stream cannot be inspected, because in this situation, attackers can now evade the IPS.  
HTTP Advanced Decoding  
HTTP advanced decoding facilitates analysis of encoded HTTP return web traffic by using on-the-fly  
decoding. Changes to HTTP advanced decoding take effect immediately and only affect the new traffic  
flows.  
Restrictions  
The following restrictions apply when you enable HTTP advanced decoding:  
Although HTTP advanced decoding does not fire any new signatures, drop packets, or modify  
traffic, it allows existing signatures to match on content that was previously not detectable because  
of encodings.  
HTTP advanced decoding only acts on return web response traffic.  
Caution  
Note  
Enabling HTTP advanced decoding severely impacts system performance.  
Because HTTP advanced decoding requires the Regex card and the String XL engine, it is available only  
to those platforms that have them. HTTP advanced decoding is supported on the IPS 4345, IPS 4360,  
IPS 4510, IPS 4520, ASA 5585-X IPS SSP, ASA 5525-X IPS SSP, ASA 5545-X IPS SSP, and  
ASA 5555-X IPS SSP.  
Adding, Editing, and Deleting Virtual Sensors  
This section describes how to add, edit, and delete virtual sensors, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                   
Chapter 5 Configuring Virtual Sensors  
Adding, Editing, and Deleting Virtual Sensors  
Adding Virtual Sensors  
Use the virtual-sensor name command in service analysis engine submode to create a virtual sensor.  
You can create up to four virtual sensors. You assign policies (anomaly detection, event action rules, and  
signature definition) to the virtual sensor. Then you assign interfaces (promiscuous, inline interface  
pairs, inline VLAN pairs, and VLAN groups) to the virtual sensor. You must configure the inline  
interface pairs and VLAN pairs before you can assign them to a virtual sensor.  
Note  
Anomaly detection is disabled by default. You must enable it to configure or apply an anomaly detection  
policy. Enabling anomaly detection results in a decrease in performance.  
The following options apply:  
http-advanced-decoding {true | false}—Enables deeper inspection of HTTP traffic. The default is  
disabled.  
Note  
Note  
Enabling HTTP advanced decoding severely impacts system performance.  
HTTP advanced decoding is supported on the IPS 4345, IPS 4360, IPS 4510, IPS 4520,  
ASA 5585-X IPS SSP, ASA 5525-X IPS SSP, ASA 5545-X IPS SSP, and  
ASA 5555-X IPS SSP.  
anomaly-detection—Specifies the anomaly detection parameters:  
anomaly-detection-name name—Specifies the name of the anomaly detection policy.  
operational-mode—Specifies the anomaly detection mode (inactive, learn, detect).  
description—Description of the virtual sensor.  
event-action-rules—Specifies the name of the event action rules policy.  
inline-TCP-evasion-protection-mode—Lets you choose which type of normalization you need for  
traffic inspection:  
asymmetric —Specifies that the sensor can only see one direction of bidirectional traffic flow.  
Asymmetric mode protection relaxes the evasion protection at the TCP layer.  
Note  
Asymmetric mode lets the sensor synchronize state with the flow and maintain  
inspection for those engines that do not require both directions. Asymmetric mode  
lowers security because full protection requires both sides of traffic to be seen.  
strict—Specifies that if a packet is missed for any reason, all packets after the missed packet  
are not processed. Strict evasion protection provides full enforcement of TCP state and  
sequence tracking.  
Note  
Any out-of-order packets or missed packets can produce Normalizer engine signatures  
1300 or 1330 firings, which try to correct the situation, but can result in denied  
connections.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 5 Configuring Virtual Sensors  
Adding, Editing, and Deleting Virtual Sensors  
Note  
For the ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP),  
normalization is performed by the adaptive security appliance and not the IPS.  
inline-TCP-session-tracking-mode—Enables an advanced method used to identify duplicate TCP  
sessions in inline traffic. The default is virtual sensor, which is almost always the best choice.  
virtual-sensor —Specifies that all packets with the same session key (AaBb) within a virtual  
sensor belong to the same session.  
interface-and-vlan—Specifies that all packets with the same session key (AaBb) in the same  
VLAN (or inline VLAN pair) and on the same interface belong to the same session. Packets with  
the same key but on different VLANs or interfaces are tracked independently.  
vlan-only—Specifies that all packets with the same session key (AaBb) in the same VLAN (or  
inline VLAN pair) regardless of the interface belong to the same session. Packets with the same  
key but on different VLANs are tracked independently.  
Note  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not  
support the inline TCP session tracking mode.  
signature-definition—Specifies the name of the signature definition policy.  
logical-interfaces—Specifies the name of the logical interfaces (inline interface pairs).  
physical-interfaces—Specifies the name of the physical interfaces (promiscuous, inline VLAN  
pairs, and VLAN groups):  
subinterface-number—Specifies the physical subinterface number. If the subinterface-type is  
none, the value of 0 indicates the entire interface is assigned in promiscuous mode.  
no—Removes an entry or selection.  
Adding a Virtual Sensor  
To add a virtual sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter service analysis mode.  
sensor# configure terminal  
sensor(config)# service analysis-engine  
sensor(config-ana)#  
Step 3  
Add a virtual sensor.  
sensor(config-ana)# virtual-sensor vs1  
sensor(config-ana-vir)#  
Step 4  
Step 5  
Add a description for this virtual sensor.  
sensor(config-ana-vir)# description virtual sensor 1  
Assign an anomaly detection policy and operational mode to this virtual sensor.  
sensor(config-ana-vir)# anomaly-detection  
sensor(config-ana-vir-ano)# anomaly-detection-name ad1  
sensor(config-ana-vir-ano)# operational-mode learn  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 5 Configuring Virtual Sensors  
Adding, Editing, and Deleting Virtual Sensors  
Step 6  
Assign an event action rules policy to this virtual sensor.  
sensor(config-ana-vir-ano)# exit  
sensor(config-ana-vir)# event-action-rules rules1  
Step 7  
Step 8  
Assign a signature definition policy to this virtual sensor.  
sensor(config-ana-vir)# signature-definition sig1  
Enable HTTP advanced decoding.  
sensor(config-ana-vir)# http-advanced-decoding true  
Caution  
Step 9  
Enabling HTTP advanced decoding severely impacts system performance.  
Assign the inline TCP session tracking mode. The default is virtual sensor mode, which is almost always  
the best option to choose.  
sensor(config-ana-vir)# inline-TCP-session-tracking-mode virtual-sensor  
Step 10 Assign the inline TCP evasion protection mode. The default is strict mode, which is almost always the  
best option to choose.  
sensor(config-ana-vir)# inline-TCP-evasion-protection-mode strict  
Step 11 Enable HTTP advanced decoding.  
sensor(config-ana-vir)# http-advanced-decoding true  
Step 12 Display the list of available interfaces.  
sensor(config-ana-vir)# physical-interface ?  
GigabitEthernet0/0  
GigabitEthernet0/1  
GigabitEthernet2/0  
GigabitEthernet2/1  
GigabitEthernet0/0 physical interface.  
GigabitEthernet0/1 physical interface.  
GigabitEthernet0/2 physical interface.  
GigabitEthernet0/3 physical interface.  
sensor(config-ana-vir)# physical-interface  
sensor(config-ana-vir)# logical-interface ?  
<none available>  
Step 13 Assign the promiscuous mode interfaces you want to add to this virtual sensor. Repeat this step for all  
the promiscuous interfaces that you want to assign to this virtual sensor.  
sensor(config-ana-vir)# physical-interface GigabitEthernet0/3  
Step 14 Assign the inline interface pairs you want to add to this virtual sensor. You must have already paired the  
interfaces.  
sensor(config-ana-vir)# logical-interface inline_interface_pair_name  
Step 15 Assign the subinterfaces of the inline VLAN pairs or groups you want to add to this virtual sensor. You  
must have already subdivided any interfaces into VLAN pairs or groups.  
sensor(config-ana-vir)# physical-interface GigabitEthernet2/0 subinterface-number  
subinterface_number  
Step 16 Verify the virtual sensor settings.  
sensor(config-ana-vir)# show settings  
name: vs1  
-----------------------------------------------  
description: virtual sensor 1 default:  
signature-definition: sig1 default: sig0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5 Configuring Virtual Sensors  
Adding, Editing, and Deleting Virtual Sensors  
event-action-rules: rules1 default: rules0  
anomaly-detection  
-----------------------------------------------  
anomaly-detection-name: ad1 default: ad0  
operational-mode: learn default: detect  
-----------------------------------------------  
physical-interface (min: 0, max: 999999999, current: 2)  
-----------------------------------------------  
name: GigabitEthernet0/3  
subinterface-number: 0 <defaulted>  
-----------------------------------------------  
inline-TCP-session-tracking-mode: virtual-sensor default: virtual-sensor  
-----------------------------------------------  
logical-interface (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ana-vir)#  
Step 17 Exit analysis engine mode.  
sensor(config-ana-vir)# exit  
sensor(config-ana)# exit  
sensor(config)#  
Apply Changes:?[yes]:  
Step 18 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for creating virtual sensors on the ASA 5500-X IPS SSP, see Creating Virtual  
For the procedure for creating virtual sensors on the ASA 5585-X IPS SSP, see Creating Virtual  
For more information on creating and configuring anomaly detection policies, see Working With  
For more information on creating and configuring event action rules policies, see Working With  
For more information on creating and configuring signature definition policies, see Working With  
For more information about normalization, see Normalization and Inline TCP Evasion Protection  
For more information about inline TCP session tracking mode, see Inline TCP Session Tracking  
For the procedure for pairing inline interfaces, see Configuring Inline Interface Pairs, page 4-17.  
Repeat Step 11 for all the inline interface pairs that you want to assign to this virtual sensor.  
For the procedure for pairing and grouping inline VLANs, see Configuring Inline VLAN Pairs,  
page 4-22 and Configuring VLAN Groups, page 4-28. Repeat Step 12 for all inline VLAN pairs or  
VLAN groups that you want to assign to this virtual sensor.  
For the procedure for enabling anomaly detection, see Enabling Anomaly Detection, page 9-8.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5 Configuring Virtual Sensors  
Adding, Editing, and Deleting Virtual Sensors  
Editing and Deleting Virtual Sensors  
You can edit the following parameters of a virtual sensor:  
Signature definition policy  
Event action rules policy  
Anomaly detection policy  
Note  
Anomaly detection is disabled by default. You must enable it to configure or apply an  
anomaly detection policy. Enabling anomaly detection results in a decrease in performance.  
Anomaly detection operational mode  
Inline TCP session tracking mode  
Note  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) do not support  
the inline TCP session tracking mode.  
Description  
Interfaces assigned  
Editing or Deleting a Virtual Sensor  
To edit or delete a virtual sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter analysis engine mode.  
sensor# configure terminal  
sensor(config)# service analysis-engine  
sensor(config-ana)#  
Step 3  
Edit the virtual sensor, vs1.  
sensor(config-ana)# virtual-sensor vs1  
sensor(config-ana-vir)#  
Step 4  
Step 5  
Edit the description of this virtual sensor.  
sensor(config-ana-vir)# description virtual sensor A  
Change the anomaly detection policy and operational mode assigned to this virtual sensor.  
sensor(config-ana-vir)# anomaly-detection  
sensor(config-ana-vir-ano)# anomaly-detection-name ad0  
sensor(config-ana-vir-ano)# operational-mode learn  
Step 6  
Step 7  
Change the event action rules policy assigned to this virtual sensor.  
sensor(config-ana-vir-ano)# exit  
sensor(config-ana-vir)# event-action-rules rules0  
Change the signature definition policy assigned to this virtual sensor.  
sensor(config-ana-vir)# signature-definition sig0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 5 Configuring Virtual Sensors  
Adding, Editing, and Deleting Virtual Sensors  
Step 8  
Step 9  
Change the inline TCP session tracking mode. The default is virtual sensor mode, which is almost always  
the best option to choose.  
sensor(config-ana-vir)# inline-TCP-session-tracking-mode interface-and-vlan  
Display the list of available interfaces.  
sensor(config-ana-vir)# physical-interface ?  
GigabitEthernet0/0  
GigabitEthernet0/1  
GigabitEthernet2/0  
GigabitEthernet2/1  
GigabitEthernet0/0 physical interface.  
GigabitEthernet0/1 physical interface.  
GigabitEthernet0/2 physical interface.  
GigabitEthernet0/3 physical interface.  
sensor(config-ana-vir)# physical-interface  
sensor(config-ana-vir)# logical-interface ?  
<none available>  
Step 10 Change the promiscuous mode interfaces assigned to this virtual sensor.  
sensor(config-ana-vir)# physical-interface GigabitEthernet0/2  
Step 11 Change the inline interface pairs assigned to this virtual sensor. You must have already paired the  
interfaces.  
sensor(config-ana-vir)# logical-interface inline_interface_pair_name  
Step 12 Change the subinterface with the inline VLAN pairs or groups assigned to this virtual sensor. You must  
have already subdivided any interfaces into VLAN pairs or groups.  
sensor(config-ana-vir)# physical-interface GigabitEthernet2/0 subinterface-number  
subinterface_number  
Step 13 Verify the edited virtual sensor settings.  
ssensor(config-ana-vir)# show settings  
name: vs1  
-----------------------------------------------  
description: virtual sensor 1 default:  
signature-definition: sig1 default: sig0  
event-action-rules: rules1 default: rules0  
anomaly-detection  
-----------------------------------------------  
anomaly-detection-name: ad1 default: ad0  
operational-mode: learn default: detect  
-----------------------------------------------  
physical-interface (min: 0, max: 999999999, current: 2)  
-----------------------------------------------  
name: GigabitEthernet0/3  
subinterface-number: 0 <defaulted>  
-----------------------------------------------  
inline-TCP-session-tracking-mode: interface-and-vlan default: virtual-sensor  
-----------------------------------------------  
logical-interface (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ana-vir)#  
Step 14 Delete a virtual sensor.  
sensor(config-ana-vir)# exit  
sensor(config-ana)# no virtual-sensor vs1  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5 Configuring Virtual Sensors  
Adding, Editing, and Deleting Virtual Sensors  
Step 15 Verify the deleted virtual sensor. Only the default virtual sensor, vs0, is present.  
sensor(config-ana)# show settings  
global-parameters  
-----------------------------------------------  
ip-logging  
-----------------------------------------------  
max-open-iplog-files: 20 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
virtual-sensor (min: 1, max: 255, current: 2)  
-----------------------------------------------  
<protected entry>  
name: vs0 <defaulted>  
-----------------------------------------------  
description: default virtual sensor <defaulted>  
signature-definition: sig0 <protected>  
event-action-rules: rules0 <protected>  
anomaly-detection  
-----------------------------------------------  
anomaly-detection-name: ad0 <protected>  
operational-mode: detect <defaulted>  
-----------------------------------------------  
physical-interface (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
logical-interface (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ana)#  
Step 16 Exit analysis engine mode.  
sensor(config-ana)# exit  
sensor(config)#  
Apply Changes:?[yes]:  
Step 17 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For more information on creating and configuring anomaly detection policies, see Working With  
For more information on creating and configuring event action rules policies, see Working With  
For more information on creating and configuring signature definition policies, see Working With  
For the procedure for pairing inline interfaces, see Configuring Inline Interface Pairs, page 4-17.  
Repeat Step 11 for all the inline interface pairs that you want to assign to this virtual sensor.  
For the procedure for pairing and grouping inline VLANs, see Configuring Inline VLAN Pairs,  
page 4-22 and Configuring VLAN Groups, page 4-28. Repeat Step 12 for all inline VLAN pairs or  
VLAN groups that you want to assign to this virtual sensor.  
For the procedure for enabling anomaly detection, see Enabling Anomaly Detection, page 9-8.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5 Configuring Virtual Sensors  
Configuring Global Variables  
Configuring Global Variables  
Use the global-parameters command in service analysis engine submode to create global variables,  
such as IP logging, service activity, and specifying the flow depth. Flow depth is used for String,  
Multi-String, Service HTTP, and State engines. It does not apply to the XL String engine and the  
platforms that support it.  
Note  
The IPS 4345, IPS 4360, IPS 4510, IPS 4520, ASA 5525-X IPS SSP, ASA 5545-X IPS SSP,  
ASA 5555-X IPS SSP, and ASA 5585-X IPS SSP support the String XL engines and the Regex  
accelerator card.  
The following options apply:  
ip-logging—Enables global IP logging parameters.  
max-open-iplog-files—Specifies the maximum number of concurrently open log files. The  
range is 20 to 100. The default is 20.  
serviceActivity—Lets you gather information about service activities for diagnostic purposes. The  
details are more granular and have port level details.  
Note  
Enabling service activity impacts system performance. Enable service activity collection  
temporarily for diagnostic purposes only. You must reboot the sensor after you enable  
service activity for the change to take affect.  
enable-serviceactivity [1 | 0]—Set to 1 to enable, set to 0 to disable. The default is disabled.  
serviceActivityLimit limit—Sets the limit for how many services you want to enable. The valid  
range is from 10 to 65536. The default is 15.  
specify-flow-depth—Lets you specify the inspection depth of the flow. Flow depth is the number  
of bytes inspected in a flow. The new value applies for new flows only. The valid range is from 0 to  
429496296. The default is 0, which is infinitive.  
Creating a Global Variable  
To create a global variable, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter service analysis mode.  
sensor# configure terminal  
sensor(config)# service analysis-engine  
sensor(config-ana)#  
Step 3  
Step 4  
Create the variable for the maximum number of open IP logs.  
sensor(config-ana)# global-parameters  
sensor(config-ana-glo)# ip-logging  
sensor(config-ana-glo-ip)# max-open-iplog-files 50  
sensor(config-ana-glo-ip)# exit  
sensor(config-ana-glo)#  
Create the flow depth variable.  
sensor(config-ana-glo)# specify-flow-depth 500  
sensor(config-ana-glo)# exit  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 5 Configuring Virtual Sensors  
Configuring Global Variables  
sensor(config-ana)#  
Step 5  
Step 6  
Create the variable for service activity.  
sensor(config-ana-glo)# serviceActivity  
sensor(config-ana-glo-ser)# enable-serviceactivity 1  
sensor(config-ana-glo-ser)# serviceActivityLimit 15  
sensor(config-ana-glo-ser)# exit  
sensor(config-ana-glo)#  
Verify the global variable settings.  
sensor(config-ana-glo)# show settings  
global-parameters  
-----------------------------------------------  
specify-flow-depth: 500 default: 0  
serviceActivity  
-----------------------------------------------  
enable-serviceactivity: 1 default: 0  
serviceActivityLimit: 25 default: 15  
-----------------------------------------------  
ip-logging  
-----------------------------------------------  
max-open-iplog-files: 50 default: 20  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ana-glo)#  
Step 7  
Exit analysis engine mode.  
sensor(config-ana)# exit  
sensor(config)#  
Apply Changes:?[yes]:  
Step 8  
Step 9  
Press Enter to apply the changes or enter no to discard them.  
After you reboot the sensor so that service activity is effective, you can view the details.  
sensor# show statistic analysis-engine  
Analysis Engine Statistics  
Number of seconds since service started = 354  
Processing Load Percentage  
Thread  
5 sec  
1 min  
5 min  
0
1
2
3
4
5
6
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
3
2
Average  
For More Information  
For detailed information about String, Multi-String, Service HTTP, and State engines, see Appendix B,  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5 Configuring Virtual Sensors  
Configuring Global Variables  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
5-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
7
Defining Signatures  
This chapter describes how to define and create signatures. It contains the following sections:  
Signature Definition Notes and Caveats  
The following notes and caveats apply to defining signatures:  
You must preface signature variables with a dollar ($) sign to indicate that you are using a variable  
rather than a string.  
We recommend that you do NOT change the promiscuous delta setting for a signature.  
The parameters tcp-3-way-handshake-required and tcp-reassembly-mode only impact sensors  
inspecting traffic in promiscuous mode, not inline mode. To configure asymmetric options for  
sensors inspecting inline traffic, use the inline-TCP-evasion-protection-mode parameter.  
A custom signature can affect the performance of your sensor. Test the custom signature against a  
baseline sensor performance for your network to determine the overall impact of the signature.  
Understanding Policies  
You can create multiple security policies and apply them to individual virtual sensors. A security policy  
is made up of a signature definition policy, an event action rules policy, and an anomaly detection policy.  
Cisco IPS contains a default signature definition policy called sig0, a default event action rules policy  
called rules0, and a default anomaly detection policy called ad0. You can assign the default policies to  
a virtual sensor or you can create new policies. The use of multiple security policies lets you create  
security policies based on different requirements and then apply these customized policies per VLAN or  
physical interface.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 7 Defining Signatures  
Working With Signature Definition Policies  
Working With Signature Definition Policies  
Use the service signature-definition name command in service signature definition mode to create a  
signature definition policy. The values of this signature definition policy are the same as the default  
signature definition policy, sig0, until you edit them.  
Or you can use the copy signature-definition source_destination command in privileged EXEC mode  
to make a copy of an existing policy and then edit the values of the new policy as needed.  
Use the list signature-definition-configurations command in privileged EXEC mode to list the  
signature definition policies.  
Use the no service signature-definition name command in global configuration mode to delete a  
signature definition policy. Use the default service signature-definition name command in global  
configuration mode to reset the signature definition policy to factory settings.  
Creating, Copying, Editing, and Deleting Signature Definition Policies  
To create, copy, edit, and delete signature definition policies, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Create a signature definition policy.  
sensor# configure terminal  
sensor(config)# service signature-definition MySig  
Editing new instance MySig.  
sensor(config-sig)# exit  
Apply Changes?[yes]: yes  
sensor(config)# exit  
Step 3  
Or copy an existing signature definition policy to a new signature definition policy.  
sensor# copy signature-definition sig0 sig1  
sensor#  
Note  
You receive an error if the policy already exists or if there is not enough space available for the  
new policy.  
Step 4  
Step 5  
Accept the default signature definition policy values or edit the following parameters:  
a. Add signature definition variables.  
b. Configure the general signature options.  
Display a list of signature definition policies on the sensor.  
sensor# list signature-definition-configurations  
Signature Definition  
Instance  
sig0  
temp  
MySig  
sig1  
Size  
255  
707  
255  
141  
Virtual Sensor  
vs0  
N/A  
N/A  
vs1  
sensor#  
Step 6  
Delete a signature definition policy.  
sensor# configure terminal  
sensor(config)# no service signature-definition MySig  
sensor(config)# exit  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                     
Chapter 7 Defining Signatures  
Understanding Signatures  
sensor#  
Note  
You cannot delete the default signature definition policy, sig0.  
Step 7  
Confirm the signature definition policy has been deleted.  
sensor# list signature-definition-configurations  
Signature Definition  
Instance  
sig0  
temp  
Size  
255  
707  
141  
Virtual Sensor  
vs0  
N/A  
vs1  
sig1  
sensor#  
Step 8  
Reset a signature definition policy to factory settings.  
sensor# configure terminal  
sensor(config)# default service signature-definition sig1  
sensor(config)#  
For More Information  
For the procedure for adding signature variables, see Configuring Signature Variables, page 7-4.  
For the procedure for configuring the general settings, see Configuring Signatures, page 7-6.  
Understanding Signatures  
Attacks or other misuses of network resources can be defined as network intrusions. Sensors that use a  
signature-based technology can detect network intrusions. A signature is a set of rules that your sensor  
uses to detect typical intrusive activity, such as DoS attacks. As sensors scan network packets, they use  
signatures to detect known attacks and respond with actions that you define.  
The sensor compares the list of signatures with network activity. When a match is found, the sensor takes  
an action, such as logging the event or sending an alert. Sensors let you modify existing signatures and  
define new ones.  
Signature-based intrusion detection can produce false positives because certain normal network activity  
can be misinterpreted as malicious activity. For example, some network applications or operating  
systems may send out numerous ICMP messages, which a signature-based detection system might  
interpret as an attempt by an attacker to map out a network segment. You can minimize false positives  
by tuning your signatures.  
To configure a sensor to monitor network traffic for a particular signature, you must enable the signature.  
By default, the most critical signatures are enabled when you install the signature update. When an attack  
is detected that matches an enabled signature, the sensor generates an alert, which is stored in the Event  
Store of the sensor. The alerts, as well as other events, may be retrieved from the Event Store by  
web-based clients. By default the sensor logs all Informational alerts or higher.  
Some signatures have subsignatures, that is, the signature is divided into subcategories. When you  
configure a subsignature, changes made to the parameters of one subsignature apply only to that  
subsignature. For example, if you edit signature 3050 subsignature 1 and change the severity, the severity  
change applies to only subsignature 1 and not to 3050 2, 3050 3, and 3050 4.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 7 Defining Signatures  
Configuring Signature Variables  
The Cisco IPS contains over 10,000 built-in default signatures. You cannot rename or delete signatures  
from the list of built-in signatures, but you can retire signatures to remove them from the sensing engine.  
You can later activate retired signatures; however, this process requires the sensing engines to rebuild  
their configuration, which takes time and could delay the processing of traffic. You can tune built-in  
signatures by adjusting several signature parameters. Built-in signatures that have been modified are  
called tuned signatures.  
Note  
We recommend that you retire any signatures that you are not using. This improves sensor performance.  
You can create signatures, which are called custom signatures. Custom signature IDs begin at 60000.  
You can configure them for several things, such as matching of strings on UDP connections, tracking of  
network floods, and scans. Each signature is created using a signature engine specifically designed for  
the type of traffic being monitored.  
Configuring Signature Variables  
This section describes signature variables, and contains the following topics:  
Understanding Signature Variables  
When you want to use the same value within multiple signatures, use a variable. When you change the  
value of a variable, that variable is updated in all signatures in which it appears. This saves you from  
having to change the variable repeatedly as you configure signatures.  
Note  
You must preface signature variables with a dollar ($) sign to indicate that you are using a variable rather  
than a string.  
Some variables cannot be deleted because they are necessary to the signature system. If a variable is  
protected, you cannot select it to edit it. You receive an error message if you try to delete protected  
variables. You can edit only one variable at a time.  
Creating Signature Variables  
Use the variables command in the signature definition submode to create signature variables.  
The following options apply:  
variable_name—Identifies the name assigned to this variable. A valid name can only contain  
numbers or letters. You can also use a hyphen (-) or underscore (_).  
ip-addr-range—Specifies the system-defined variable for grouping IP addresses. The valid values  
are: A.B.C.D-A.B.C.D[,A.B.C.D-A.B.C.D]  
web-ports—Specifies the system-defined variable for ports to look for HTTP traffic. To designate  
multiple port numbers for a single variable, place a comma between the entries. For example, 80,  
3128, 8000, 8010, 8080, 8888, 24326.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 7 Defining Signatures  
Configuring Signature Variables  
Adding, Editing, and Deleting Signature Variables  
To add, edit, and delete signature variables, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Step 4  
Create a signature variable for a group of IP addresses.  
sensor(config-sig)# variables IPADD ip-addr-range 10.1.1.1-10.1.1.24  
Edit the signature variable for web ports. WEBPORTS has a predefined set of ports where web servers  
are running, but you can edit the value. This variable affects all signatures that have web ports. The  
default is 80, 3128, 8000, 8010, 8080, 8888, 24326.  
sensor(config-sig)# variables WEBPORTS web-ports 80,3128,8000  
Step 5  
Verify the changes.  
sensor(config-sig)# show settings  
variables (min: 0, max: 256, current: 2)  
-----------------------------------------------  
variable-name: IPADD  
-----------------------------------------------  
ip-addr-range: 10.1.1.1-10.1.1.24  
-----------------------------------------------  
<protected entry>  
variable-name: WEBPORTS  
-----------------------------------------------  
web-ports: 80,3128,8000 default: 80-80,3128-3128,8000-8000,8010-8010,80  
80-8080,8888-8888,24326-24326  
-----------------------------------------------  
Step 6  
Step 7  
Delete a variable.  
sensor(config-sig)# no variables IPADD  
Verify the variable has been deleted.  
sensor(config-sig)# show settings  
variables (min: 0, max: 256, current: 1)  
-----------------------------------------------  
<protected entry>  
variable-name: WEBPORTS  
-----------------------------------------------  
web-ports: 80,3128,8000 default: 80-80,3128-3128,8000-8000,8010-8010,80  
80-8080,8888-8888,24326-24326  
-----------------------------------------------  
Step 8  
Step 9  
Exit signature definition submode.  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 7 Defining Signatures  
Configuring Signatures  
Configuring Signatures  
This section describes how to configure signature parameters, and contains the following topics:  
Signature Definition Options  
The following options apply to configuring the general parameters of a specific signature:  
alert-frequency—Sets the summary options for grouping alerts.  
alert-severity—Sets the severity of the alert.  
engine—Specifies the signature engine. You can assign actions when you are in the engine  
submode.  
event-counter—Sets the event count.  
promisc-delta—Specifies the delta value used to determine the seriousness of the alert.  
Caution  
We recommend that you do NOT change the promiscuous delta setting for a signature.  
Promiscuous delta lowers the risk rating of certain alerts in promiscuous mode. Because the sensor  
does not know the attributes of the target system and in promiscuous mode cannot deny packets, it  
is useful to lower the prioritization of promiscuous alerts (based on the lower risk rating) so the  
administrator can focus on investigating higher risk rating alerts.  
In inline mode, the sensor can deny the offending packets and they never reach the target host, so it  
does not matter if the target was vulnerable. The attack was not allowed on the network and so we  
do not subtract from the risk rating value.  
Signatures that are not service, OS, or application specific have 0 for the promiscuous delta. If the  
signature is specific to an OS, service, or application, it has a promiscuous delta of 5, 10, or 15  
calculated from 5 points for each category.  
sig-descriptionYour description of the signature.  
sig-fidelity-rating—Specifies the rating of the fidelity of signature.  
status—Sets the status of the signature to enabled or retired.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 7 Defining Signatures  
Configuring Signatures  
vulnerable-os—Specifies the list of OS types that are vulnerable to this attack signature.  
For More Information  
For the procedure for configuring alert frequency, see Configuring Alert Frequency, page 7-7.  
For more information about signature engines, see Appendix B, “Signature Engines.”  
For the procedure for assigning actions, see Assigning Actions to Signatures, page 7-15.  
For the procedure for configuring event counts, see Configuring the Event Counter, page 7-10.  
For the procedure for configuring the signature fidelity rating, see Configuring Signature Fidelity  
For the procedure for enabling and disabling signatures, see Configuring the Status of Signatures,  
For the procedure for configuring vulnerable OSes, see Configuring the Vulnerable OSes for a  
Configuring Alert Frequency  
Use the alert-frequency command in signature definition submode to configure the alert frequency for  
a signature. The alert-frequency command specifies how often the sensor alerts you when this signature  
is firing.  
The following options apply:  
sig_id—Identifies the unique numerical value assigned to this signature. This value lets the sensor  
identify a particular signature. The value is 1000 to 65000.  
subsig_id—Identifies the unique numerical value assigned to this subsignature. A subsignature ID  
is used to identify a more granular version of a broad signature. The value is 0 to 255.  
summary-mode—Specifies the way you want the sensor to group the alerts:  
fire-all—Fires an alert on all events.  
fire-once—Fires an alert only once.  
global-summarize—Summarizes an alert so that it only fires once regardless of how many  
attackers or victims.  
summarize—Summarize all the alerts.  
specify-summary-threshold {yes | no}—Enables summary threshold mode:  
summary-threshold—Specifies the minimum number of hits the sensor must receive before  
sending a summary alert for this signature. The value is 0 to 65535.  
summary-interval—Specifies the time in seconds used in each summary alert. The value is 1  
to 1000.  
summary-key—Specifies the storage type on which to summarize this signature:  
Axxx—Attacker address.  
Axxb—Attacker address and victim port.  
AxBx—Attacker and victim addresses.  
AaBb—Attacker and victim addresses and ports.  
xxBx—Victim address.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Configuring Signatures  
specify-global-summary-threshold {yes | no}—(Optional) Enables global summary threshold  
mode:  
global-summary-threshold—Specifies the threshold number of events to take alert in to global  
summary. The value is 1 to 65535.  
Configuring Alert Frequency  
To configure the alert frequency parameters of a signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Step 4  
Step 5  
Specify the signature you want to configure.  
sensor(config-sig)# signatures 9000 0  
Enter alert frequency submode.  
sensor(config-sig-sig)# alert-frequency  
Specify the alert frequency of this signature:  
a. Configure the summary mode to, for example, fire once.  
sensor(config-sig-sig-ale)# summary-mode fire-once  
sensor(config-sig-sig-ale-fir)# specify-global-summary-threshold yes  
sensor(config-sig-sig-ale-fir-yes)# global-summary-threshold 3000  
sensor(config-sig-sig-ale-fir-yes)# summary-interval 5000  
b. Specify the summary key.  
sensor(config-sig-sig-ale-fir-yes)# exit  
sensor(config-sig-sig-ale-fir)# summary-key AxBx  
c. Verify the settings.  
sensor(config-sig-sig-ale-fir)# show settings  
fire-once  
-----------------------------------------------  
summary-key: AxBx default: Axxx  
specify-global-summary-threshold  
-----------------------------------------------  
yes  
-----------------------------------------------  
global-summary-threshold: 3000 default: 120  
summary-interval: 5000 default: 15  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-sig-sig-ale-fir)#  
Step 6  
Exit alert-frequency submode.  
sensor(config-sig-sig-ale-fir)# exit  
sensor(config-sig-sig-ale)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 7 Defining Signatures  
Configuring Signatures  
Step 7  
Press Enter to apply the changes or enter no to discard them.  
Configuring Alert Severity  
Use the alert-severity command in signature definition submode to configure the severity of a signature.  
The following options apply:  
sig_id—Identifies the unique numerical value assigned to this signature. This value lets the sensor  
identify a particular signature. The value is 1000 to 65000.  
subsig_id—Identifies the unique numerical value assigned to this subsignature. A subsignature ID  
is used to identify a more granular version of a broad signature. The value is 0 to 255.  
alert-severity—Specifies the severity of the alert:  
high —Dangerous alert.  
medium—Medium level alert (default).  
low—Low level alert.  
informational—Informational alert.  
Configuring Alert Severity  
To configure the alert severity, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Step 4  
Step 5  
Specify the signature you want to configure.  
sensor(config-sig)# signatures 9000 0  
Assign the alert severity.  
sensor(config-sig-sig)# alert-severity medium  
Verify the settings.  
sensor(config-sig-sig)# show settings  
<protected entry>  
sig-id: 9000  
subsig-id: 0  
-----------------------------------------------  
alert-severity: medium default: medium  
sig-fidelity-rating: 75 <defaulted>  
promisc-delta: 0 <defaulted>  
sig-description  
-----------------------------------------------  
sig-name: Back Door Probe (TCP 12345) <defaulted>  
sig-string-info: SYN to TCP 12345 <defaulted>  
sig-comment: <defaulted>  
alert-traits: 0 <defaulted>  
release: 40 <defaulted>  
-----------------------------------------------  
vulnerable-os: general-os <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Configuring Signatures  
engine  
-----------------------------------------------  
atomic-ip  
-----------------------------------------------  
event-action: produce-alert <defaulted>  
fragment-status: any <defaulted>  
specify-l4-protocol  
-----------------------------------------------  
--MORE--  
Step 6  
Step 7  
Exit signatures submode.  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Configuring the Event Counter  
Use the event-counter command in signature definition submode to configure how the sensor counts  
events. For example, you can specify that you want the sensor to send an alert only if the same signature  
fires 5 times for the same address set.  
The following options apply:  
event-count—Specifies the number of times an event must occur before an alert is generated. The  
valid range is 1 to 65535. The default is 1.  
event-count-key—Specifies the storage type on which to count events for this signature:  
Axxx—Attacker address  
AxBx—Attacker and victim addresses  
Axxb—Attacker address and victim port  
xxBx—Victim address  
AaBb—Attacker and victim addresses and ports  
specify-alert-interval [yes | no]—Enables alert interval:  
alert-interval—Specifies the time in seconds before the event count is reset. The default is 60.  
Configuring the Event Counter  
To configure event counter, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Specify the signature for which you want to configure event counter.  
sensor(config-sig)# signatures 9000 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Configuring Signatures  
Step 4  
Step 5  
Step 6  
Step 7  
Step 8  
Step 9  
Enter event counter submode.  
sensor(config-sig-sig)# event-counter  
Specify how many times an event must occur before an alert is generated.  
sensor(config-sig-sig-eve)# event-count 2  
Specify the storage type on which you want to count events for this signature.  
sensor(config-sig-sig-eve)# event-count-key AxBx  
(Optional) Enable alert interval.  
sensor(config-sig-sig-eve)# specify-alert-interval yes  
(Optional) Specify the amount of time in seconds before the event count should be reset.  
sensor(config-sig-sig-eve-yes)# alert-interval 30  
Verify the settings.  
sensor(config-sig-sig-eve-yes)# exit  
sensor(config-sig-sig-eve)# show settings  
event-counter  
-----------------------------------------------  
event-count: 2 default: 1  
event-count-key: AxBx default: Axxx  
specify-alert-interval  
-----------------------------------------------  
yes  
-----------------------------------------------  
alert-interval: 30 default: 60  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-sig-sig-eve)#  
Step 10 Exit signatures submode.  
sensor(config-sig-sig-eve)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Step 11 Press Enter to apply the changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Configuring Signatures  
Configuring Signature Fidelity Rating  
Use the sig-fidelity-rating command in signature definition submode to configure the signature fidelity  
rating for a signature.  
The following option applies:  
sig-fidelity-rating—Identifies the weight associated with how well this signature might perform in  
the absence of specific knowledge of the target. The valid value is 0 to 100.  
Configuring the Signature Fidelity Rating  
To configure the signature fidelity rating for a signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
Step 3  
Step 4  
Step 5  
Specify the signature you want to configure.  
sensor(config-sig)# signatures 12000 0  
Specify the signature fidelity rating for this signature.  
sensor(config-sig-sig)# sig-fidelity-rating 50  
Verify the settings.  
sensor(config-sig-sig)# show settings  
<protected entry>  
sig-id: 12000  
subsig-id: 0  
-----------------------------------------------  
alert-severity: low <defaulted>  
sig-fidelity-rating: 50 default: 85  
promisc-delta: 15 <defaulted>  
sig-description  
-----------------------------------------------  
sig-name: Gator Spyware Beacon <defaulted>  
sig-string-info: /download/ User-Agent: Gator <defaulted>  
sig-comment: <defaulted>  
alert-traits: 0 <defaulted>  
release: 71 <defaulted>  
-----------------------------------------------  
Step 6  
Step 7  
Exit signatures submode.  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Configuring Signatures  
Configuring the Status of Signatures  
Use the status command in signature definition submode to specify the status of a specific signature.  
The following options apply:  
status—Identifies whether the signature is enabled, disabled, or retired:  
enabled {true | false}—Enables the signature.  
retired {true | false}—Retires the signature.  
obsoletes signature_ID—Shows the other signatures that have been obsoleted by this signature.  
Caution  
Activating and retiring signatures can take 30 minutes or longer.  
Changing the Signature Status  
To change the status of a signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Step 4  
Choose the signature you want to configure.  
sensor(config-sig)# signatures 12000 0  
Change the status for this signature.  
sensor(config-sig-sig)# status  
sensor(config-sig-sig-sta)# enabled true  
Step 5  
Verify the settings.  
sensor(config-sig-sig-sta)# show settings  
status  
-----------------------------------------------  
enabled: true default: false  
retired: false <defaulted>  
-----------------------------------------------  
sensor(config-sig-sig-sta)#  
Step 6  
Step 7  
Exit signatures submode.  
sensor(config-sig-sig-sta)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Configuring Signatures  
Configuring the Vulnerable OSes for a Signature  
Use the vulnerable-os command in signature definition submode to configure the list of vulnerable OSes  
for a signature.  
The following options apply:  
general-os—Specifies all OS types  
ios—Specifies the variants of Cisco IOS  
mac-os—Specifies the variants of Macintosh OS  
netware—Specifies Netware  
other—Specifies any other OS  
unix—Specifies the variants of UNIX  
aix—Specifies the variants of AIX  
bsd—Specifies the variants of BSD  
hp-ux—Specifies the variants of HP-UX  
irix—Specifies the variants of IRIX  
linux—Specifies the variants of Linux  
solaris—Specifies the variants of Solaris  
windows—Specifies the variants of Microsoft Windows  
windows-nt-2k-xp—Specifies the variants of Microsoft NT, 2000, and XP  
win-nt—Specifies the specific variants of Windows NT  
Configuring Vulnerable OSes  
To configure the vulnerable OSes for a signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Step 4  
Step 5  
Specify the signature you want to configure.  
sensor(config-sig)# signatures 6000 0  
Specify the vulnerable OSes for this signature.  
sensor(config-sig-sig)# vulnerable-os linux|aix  
Verify the settings.  
sensor(config-sig-sig)# show settings  
sig-id: 60000  
subsig-id: 0  
-----------------------------------------------  
alert-severity: medium <defaulted>  
sig-fidelity-rating: 75 <defaulted>  
promisc-delta: 0 <defaulted>  
sig-description  
-----------------------------------------------  
sig-name: My Sig <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Configuring Signatures  
sig-string-info: My Sig Info <defaulted>  
sig-comment: Sig Comment <defaulted>  
alert-traits: 0 <defaulted>  
release: custom <defaulted>  
-----------------------------------------------  
vulnerable-os: aix|linux default: general-os  
*---> engine  
-----------------------------------------------  
-----------------------------------------------  
event-counter  
-----------------------------------------------  
event-count: 1 <defaulted>  
event-count-key: Axxx <defaulted>  
specify-alert-interval  
-----------------------------------------------  
--MORE--  
Step 6  
Step 7  
Exit signatures submode.  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Assigning Actions to Signatures  
Use the event-action command in signature definition submode to configure the actions the sensor takes  
when the signature fires.  
The following options apply:  
event-action—Specifies the type of event action the sensor should perform:  
deny-attacker-inline (inline only)—Does not transmit this packet and future packets from the  
attacker address for a specified period of time.  
deny-attacker-service-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker address victim port pair for a specified period of time.  
deny-attacker-victim-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker/victim address pair for a specified period of time.  
deny-connection-inline (inline only)—Does not transmit this packet and future packets on the  
TCP flow.  
deny-packet-inline (inline only)—Does not transmit this packet.  
log-attacker-packets—Starts IP logging of packets containing the attacker address.  
log-pair-packets—Starts IP logging of packets containing the attacker-victim address pair.  
log-victim-packets—Starts IP logging of packets containing the victim address.  
produce-alert —Writes the event to the Event Store as an alert.  
produce-verbose-alert—Includes an encoded dump (possibly truncated) of the offending  
packet in the alert.  
request-block-connection—Sends a request to the ARC to block this connection.  
request-block-host—Sends a request to the ARC to block this attacker host.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Configuring Signatures  
request-rate-limit—Sends a rate limit request to the ARC to perform rate limiting.  
request-snmp-trap—Sends a request to the Notification Application component of the sensor  
to perform SNMP notification.  
reset-tcp-connection—Sends TCP resets to hijack and terminate the TCP flow.  
modify-packet-inline— Modifies packet data to remove ambiguity about what the end point  
might do with the packet.  
event-action-settings—Enables the external-rate-limit-type:  
none—No rate limiting configured.  
percentage—Specifies the rate limit by traffic percentage (external-rate-limit-percentage).  
Configuring Event Actions  
To configure event actions and event action settings for a signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter signature definition mode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
sensor(config-sig)#  
Step 3  
Step 4  
Step 5  
Specify the signature you want to configure.  
sensor(config-sig)# signatures 1200 0  
Specify the signature engine (for signature 1200 it is the Normalizer engine).  
sensor(config-sig-sig)# engine normalizer  
Configure the event action.  
sensor(config-sig-sig-nor)# event-action produce-alert|request-snmp-trap  
Note  
Each time you configure the event actions for a signature, you overwrite the previous  
configuration. For example, if you always want to produce an alert when the signature is fired,  
you must configure it along with the other event actions you want. Use the | symbol to add more  
than one event action, for example, product-alert|deny-packet-inline|request-snmp-trap.  
Step 6  
Verify the settings.  
sensor(config-sig-sig-nor)# show settings  
normalizer  
-----------------------------------------------  
event-action: produce-alert|request-snmp-trap default:  
produce-alert|deny-packet-inline  
Step 7  
Step 8  
Specify the percentage for rate limiting.  
sensor(config-sig-sig-nor)# event-action-settings  
sensor(config-sig-sig-nor-eve)# external-rate-limit-type percentage  
sensor(config-sig-sig-nor-eve-per)# external-rate-limit-percentage 50  
Verify the settings.  
sensor(config-sig-sig-nor-eve-per)# show settings  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 7 Defining Signatures  
Configuring Signatures  
percentage  
-----------------------------------------------  
external-rate-limit-percentage: 50 default: 100  
-----------------------------------------------  
Step 9  
Exit event action submode.  
sensor(config-sig-sig-nor-eve-per)# exit  
sensor(config-sig-sig-nor-eve)# exit  
sensor(config-sig-sig-nor)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Step 10 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For a detailed description of event actions, see Event Actions, page 8-4.  
Configuring AIC Signatures  
This section describes the Application Inspection and Control (AIC) signatures and how to configure  
them. It contains the following topics:  
Understanding the AIC Engine  
AIC provides thorough analysis of web traffic. It provides granular control over HTTP sessions to  
prevent abuse of the HTTP protocol. It allows administrative control over applications, such as instant  
messaging and gotomypc, that try to tunnel over specified ports. Inspection and policy checks for P2P  
and instant messaging are possible if these applications are running over HTTP. AIC also provides a way  
to inspect FTP traffic and control the commands being issued. You can enable or disable the predefined  
signatures or you can create policies through custom signatures.  
Note  
The AIC engines run when HTTP traffic is received on AIC web ports. If traffic is web traffic, but not  
received on the AIC web ports, the Service HTTP engine is executed. AIC inspection can be on any port  
if it is configured as an AIC web port and the traffic to be inspected is HTTP traffic.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 7 Defining Signatures  
Configuring Signatures  
AIC has the following categories of signatures:  
HTTP request method  
Define request method  
Recognized request methods  
MIME type  
Define content type  
Recognized content type  
Define web traffic policy  
There is one predefined signature, 12674, that specifies the action to take when noncompliant HTTP  
traffic is seen. The parameter Alarm on Non HTTP Traffic enables the signature. By default this  
signature is enabled.  
Transfer encodings  
Associate an action with each method  
List methods recognized by the sensor  
Specify which actions need to be taken when a chunked encoding error is seen  
FTP commands  
Associates an action with an FTP command.  
For More Information  
For a list of signature IDs and descriptions for these signatures, see AIC Request Method Signatures,  
For the procedure for creating a custom MIME signature, see Creating an AIC Signature, page 7-26.  
AIC Engine and Sensor Performance  
Application policy enforcement is a unique sensor feature. Rather than being based on traditional IPS  
technologies that inspect for exploits, vulnerabilities, and anomalies, AIC policy enforcement is  
designed to enforce HTTP and FTP service policies. The inspection work required for this policy  
enforcement is extreme compared with traditional IPS inspection work. A large performance penalty is  
associated with using this feature. When AIC is enabled, the overall bandwidth capacity of the sensor is  
reduced.  
AIC policy enforcement is disabled in the IPS default configuration. If you want to activate AIC policy  
enforcement, we highly recommend that you carefully choose the exact policies of interest and disable  
those you do not need. Also, if your sensor is near its maximum inspection load capacity, we recommend  
that you not use this feature since it can oversubscribe the sensor. We recommend that you use the  
adaptive security appliance firewall to handle this type of policy enforcement.  
Configuring the Application Policy  
Use the application-policy command in signature definition submode to enable the web AIC feature.  
You can configure the sensor to provide Layer 4 to Layer 7 packet inspection to prevent malicious  
attacks related to web and FTP services.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Chapter 7 Defining Signatures  
Configuring Signatures  
The following options apply:  
ftp-enable {true | false}—Enables protection for FTP services. Set to true to require the sensor to  
inspect FTP traffic. The default is false.  
http-policy—Enables inspection of HTTP traffic:  
aic-web-ports—Specifies the variable for ports to look for AIC traffic. The valid range is 0 to  
65535. A comma-separated list of integer ranges a-b[,c-d] within 0-65535. The second number  
in the range must be greater than or equal to the first number. The default is  
80-80,3128-3128,8000-8000,8010-8010,8080-8080,8888-8888,24326-24326.  
http-enable [true | false]—Enables protection for web services. Set to true to require the sensor  
to inspect HTTP traffic for compliance with the RFC. The default is false.  
max-outstanding-http-requests-per-connection—Specifies the maximum allowed HTTP  
requests per connection. The valid value is 1 to 16. The default is 10.  
Configuring the Application Policy  
To configure the application policy, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter application policy submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
sensor(config-sig)# application-policy  
Step 3  
Step 4  
Enable inspection of FTP traffic.  
sensor(config-sig-app)# ftp-enable true  
Configure the HTTP application policy:  
a. Enter HTTP application policy submode.  
sensor(config-sig-app)# http-policy  
b. Enable HTTP application policy enforcement.  
sensor(config-sig-app-htt)# http-enable true  
c. Specify the number of outstanding HTTP requests per connection that can be outstanding without  
having received a response from the server.  
sensor(config-sig-app-htt)# max-outstanding-http-requests-per-connection 5  
d. Edit the AIC ports.  
sensor(config-sig-app-htt)# aic-web-ports 80-80,3128-3128  
Step 5  
Verify your settings.  
sensor(config-sig-app-htt)# exit  
sensor(config-sig-app)# show settings  
application-policy  
-----------------------------------------------  
http-policy  
-----------------------------------------------  
http-enable: true default: false  
max-outstanding-http-requests-per-connection: 5 default: 10  
aic-web-ports: 80-80,3128-3128 default: 80-80,3128-3128,8000-8000,8010-  
8010,8080-8080,8888-8888,24326-24326  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 7 Defining Signatures  
Configuring Signatures  
-----------------------------------------------  
ftp-enable: true default: false  
-----------------------------------------------  
sensor(config-sig-app)#  
Step 6  
Step 7  
Exit signature definition submode.  
sensor(config-sig-app)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
AIC Request Method Signatures  
The HTTP request method has two categories of signatures:  
Define request method—Allows actions to be associated with request methods. You can expand and  
modify the signatures (Define Request Method).  
Recognized request methods—Lists methods that are recognized by the sensor (Recognized Request  
Methods).  
Table 7-1 lists the predefined define request method signatures. Enable the signatures that have the  
predefined method you need.  
Table 7-1  
Request Method Signatures  
Signature ID  
12676  
12677  
12678  
12679  
12680  
12681  
12682  
12683  
12685  
12695  
12696  
12697  
12698  
12699  
12700  
12701  
12702  
12703  
Define Request Method  
Request Method Not Recognized  
Define Request Method PUT  
Define Request Method CONNECT  
Define Request Method DELETE  
Define Request Method GET  
Define Request Method HEAD  
Define Request Method OPTIONS  
Define Request Method POST  
Define Request Method TRACE  
Define Request Method INDEX  
Define Request Method MOVE  
Define Request Method MKDIR  
Define Request Method COPY  
Define Request Method EDIT  
Define Request Method UNEDIT  
Define Request Method SAVE  
Define Request Method LOCK  
Define Request Method UNLOCK  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-1  
Request Method Signatures (continued)  
Signature ID  
12704  
Define Request Method  
Define Request Method REVLABEL  
Define Request Method REVLOG  
Define Request Method REVADD  
Define Request Method REVNUM  
Define Request Method SETATTRIBUTE  
Define Request Method GETATTRIBUTENAME  
Define Request Method GETPROPERTIES  
Define Request Method STARTENV  
Define Request Method STOPREV  
12705  
12706  
12707  
12708  
12709  
12710  
12711  
12712  
For More Information  
For the procedure for enabling signatures, see Configuring the Status of Signatures, page 7-13.  
AIC MIME Define Content Type Signatures  
There are two policies associated with MIME types:  
Define content type—Associates specific actions for the following cases (Define Content Type):  
Deny a specific MIME type, such as an image/jpeg  
Message size violation  
MIME-type mentioned in header and body do not match  
Recognized content type (Recognized Content Type)  
Table 7-2 lists the predefined define content type signatures. Enable the signatures that have the  
predefined content type you need. You can also create custom define content type signatures.  
Table 7-2  
Define Content Type Signatures  
Signature ID  
12621  
Signature Description  
Content Type image/gif Invalid Message Length  
Content Type image/png Verification Failed  
12622 2  
12623 0  
12623 1  
12623 2  
Content Type image/tiff Header Check  
Content Type image/tiff Invalid Message Length  
Content Type image/tiff Verification Failed  
12624 0  
12624 1  
12624 2  
Content Type image/x-3ds Header Check  
Content Type image/x-3ds Invalid Message Length  
Content Type image/x-3ds Verification Failed  
12626 0  
12626 1  
12626 2  
Content Type image/x-portable-bitmap Header Check  
Content Type image/x-portable-bitmap Invalid Message Length  
Content Type image/x-portable-bitmap Verification Failed  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-2  
Define Content Type Signatures (continued)  
Signature ID  
Signature Description  
12627 0  
12627 1  
12627 2  
Content Type image/x-portable-graymap Header Check  
Content Type image/x-portable-graymap Invalid Message Length  
Content Type image/x-portable-graymap Verification Failed  
12628 0  
12628 1  
12628 2  
Content Type image/jpeg Header Check  
Content Type image/jpeg Invalid Message Length  
Content Type image/jpeg Verification Failed  
12629 0  
12629 1  
Content Type image/cgf Header Check  
Content Type image/cgf Invalid Message Length  
12631 0  
12631 1  
Content Type image/x-xpm Header Check  
Content Type image/x-xpm Invalid Message Length  
12633 0  
12633 1  
12633 2  
Content Type audio/midi Header Check  
Content Type audio/midi Invalid Message Length  
Content Type audio/midi Verification Failed  
12634 0  
12634 1  
12634 2  
Content Type audio/basic Header Check  
Content Type audio/basic Invalid Message Length  
Content Type audio/basic Verification Failed  
12635 0  
12635 1  
12635 2  
Content Type audio/mpeg Header Check  
Content Type audio/mpeg Invalid Message Length  
Content Type audio/mpeg Verification Failed  
12636 0  
12636 1  
12636 2  
Content Type audio/x-adpcm Header Check  
Content Type audio/x-adpcm Invalid Message Length  
Content Type audio/x-adpcm Verification Failed  
12637 0  
12637 1  
12637 2  
Content Type audio/x-aiff Header Check  
Content Type audio/x-aiff Invalid Message Length  
Content Type audio/x-aiff Verification Failed  
12638 0  
12638 1  
12638 2  
Content Type audio/x-ogg Header Check  
Content Type audio/x-ogg Invalid Message Length  
Content Type audio/x-ogg Verification Failed  
12639 0  
12639 1  
12639 2  
Content Type audio/x-wav Header Check  
Content Type audio/x-wav Invalid Message Length  
Content Type audio/x-wav Verification Failed  
12641 0  
12641 1  
12641 2  
Content Type text/html Header Check  
Content Type text/html Invalid Message Length  
Content Type text/html Verification Failed  
12642 0  
12642 1  
Content Type text/css Header Check  
Content Type text/css Invalid Message Length  
12643 0  
12643 1  
Content Type text/plain Header Check  
Content Type text/plain Invalid Message Length  
12644 0  
12644 1  
Content Type text/richtext Header Check  
Content Type text/richtext Invalid Message Length  
12645 0  
12645 1  
12645 2  
Content Type text/sgml Header Check  
Content Type text/sgml Invalid Message Length  
Content Type text/sgml Verification Failed  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-2  
Define Content Type Signatures (continued)  
Signature ID  
Signature Description  
12646 0  
12646 1  
12646 2  
Content Type text/xml Header Check  
Content Type text/xml Invalid Message Length  
Content Type text/xml Verification Failed  
12648 0  
12648 1  
12648 2  
Content Type video/flc Header Check  
Content Type video/flc Invalid Message Length  
Content Type video/flc Verification Failed  
12649 0  
12649 1  
12649 2  
Content Type video/mpeg Header Check  
Content Type video/mpeg Invalid Message Length  
Content Type video/mpeg Verification Failed  
12650 0  
12650 1  
Content Type text/xmcd Header Check  
Content Type text/xmcd Invalid Message Length  
12651 0  
12651 1  
12651 2  
Content Type video/quicktime Header Check  
Content Type video/quicktime Invalid Message Length  
Content Type video/quicktime Verification Failed  
12652 0  
12652 1  
Content Type video/sgi Header Check  
Content Type video/sgi Verification Failed  
12653 0  
12653 1  
Content Type video/x-avi Header Check  
Content Type video/x-avi Invalid Message Length  
12654 0  
12654 1  
12654 2  
Content Type video/x-fli Header Check  
Content Type video/x-fli Invalid Message Length  
Content Type video/x-fli Verification Failed  
12655 0  
12655 1  
12655 2  
Content Type video/x-mng Header Check  
Content Type video/x-mng Invalid Message Length  
Content Type video/x-mng Verification Failed  
12656 0  
12656 1  
12656 2  
Content Type application/x-msvideo Header Check  
Content Type application/x-msvideo Invalid Message Length  
Content Type application/x-msvideo Verification Failed  
12658 0  
12658 1  
Content Type application/ms-word Header Check  
Content Type application/ms-word Invalid Message Length  
12659 0  
12659 1  
Content Type application/octet-stream Header Check  
Content Type application/octet-stream Invalid Message Length  
12660 0  
12660 1  
12660 2  
Content Type application/postscript Header Check  
Content Type application/postscript Invalid Message Length  
Content Type application/postscript Verification Failed  
12661 0  
12661 1  
Content Type application/vnd.ms-excel Header Check  
Content Type application/vnd.ms-excel Invalid Message Length  
12662 0  
12662 1  
Content Type application/vnd.ms-powerpoint Header Check  
Content Type application/vnd.ms-powerpoint Invalid Message Length  
12663 0  
12663 1  
12663 2  
Content Type application/zip Header Check  
Content Type application/zip Invalid Message Length  
Content Type application/zip Verification Failed  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-2  
Define Content Type Signatures (continued)  
Signature ID  
Signature Description  
12664 0  
12664 1  
12664 2  
Content Type application/x-gzip Header Check  
Content Type application/x-gzip Invalid Message Length  
Content Type application/x-gzip Verification Failed  
12665 0  
12665 1  
Content Type application/x-java-archive Header Check  
Content Type application/x-java-archive Invalid Message Length  
12666 0  
12666 1  
Content Type application/x-java-vm Header Check  
Content Type application/x-java-vm Invalid Message Length  
12667 0  
12667 1  
12667 2  
Content Type application/pdf Header Check  
Content Type application/pdf Invalid Message Length  
Content Type application/pdf Verification Failed  
12668 0  
12668 1  
Content Type unknown Header Check  
Content Type unknown Invalid Message Length  
12669 0  
12669 1  
Content Type image/x-bitmap Header Check  
Content Type image/x-bitmap Invalid Message Length  
12673 0  
Recognized content type  
For More Information  
For the procedure for enabling signatures, see Configuring the Status of Signatures, page 7-13.  
For the procedure for creating an ACI signature, see Creating an AIC Signature, page 7-26.  
AIC Transfer Encoding Signatures  
There are three policies associated with transfer encoding:  
Associate an action with each method (Define Transfer Encoding)  
List methods recognized by the sensor (Recognized Transfer Encodings)  
Specify which actions need to be taken when a chunked encoding error is seen (Chunked Transfer  
Encoding Error)  
Table 7-3 lists the predefined transfer encoding signatures. Enable the signatures that have the  
predefined transfer encoding method you need.  
Table 7-3  
Transfer Encoding Signatures  
Signature ID  
12686  
Transfer Encoding Method  
Recognized Transfer Encoding  
Define Transfer Encoding Deflate  
Define Transfer Encoding Identity  
Define Transfer Encoding Compress  
Define Transfer Encoding GZIP  
Define Transfer Encoding Chunked  
Chunked Transfer Encoding Error  
12687  
12688  
12689  
12690  
12693  
12694  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Configuring Signatures  
For More Information  
For the procedure for enabling signatures, see Configuring the Status of Signatures, page 7-13.  
AIC FTP Commands Signatures  
Table 7-4 lists the predefined FTP commands signatures. Enable the signatures that have the predefined  
FTP command you need.  
Table 7-4  
FTP Commands Signatures  
Signature ID  
12900  
12901  
12902  
12903  
12904  
12905  
12906  
12907  
12908  
12909  
12910  
12911  
12912  
12913  
12914  
12915  
12916  
12917  
12918  
12919  
12920  
12921  
12922  
12923  
12924  
12925  
12926  
12927  
12928  
12929  
FTP Command  
Unrecognized FTP command  
Define FTP command abor  
Define FTP command acct  
Define FTP command allo  
Define FTP command appe  
Define FTP command cdup  
Define FTP command cwd  
Define FTP command dele  
Define FTP command help  
Define FTP command list  
Define FTP command mkd  
Define FTP command mode  
Define FTP command nlst  
Define FTP command noop  
Define FTP command pass  
Define FTP command pasv  
Define FTP command port  
Define FTP command pwd  
Define FTP command quit  
Define FTP command rein  
Define FTP command rest  
Define FTP command retr  
Define FTP command rmd  
Define FTP command rnfr  
Define FTP command rnto  
Define FTP command site  
Define FTP command smnt  
Define FTP command stat  
Define FTP command stor  
Define FTP command stou  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-4  
FTP Commands Signatures (continued)  
Signature ID  
12930  
FTP Command  
Define FTP command stru  
Define FTP command syst  
Define FTP command type  
Define FTP command user  
12931  
12932  
12933  
For More Information  
For the procedure for enabling signatures, see Configuring the Status of Signatures, page 7-13.  
Creating an AIC Signature  
Caution  
A custom signature can affect the performance of your sensor. Test the custom signature against a  
baseline sensor performance for your network to determine the overall impact of the signature.  
The following example demonstrates how to create a MIME-type signature based on the AIC engine.  
The following options apply:  
event-action—Specifies the action(s) to perform when alert is triggered:  
deny-attacker-inline (inline only)—Does not transmit this packet and future packets from the  
attacker address for a specified period of time.  
deny-attacker-service-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker address victim port pair for a specified period of time.  
deny-attacker-victim-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker/victim address pair for a specified period of time.  
deny-connection-inline (inline only)—Does not transmit this packet and future packets on the  
TCP flow.  
deny-packet-inline (inline only)—Does not transmit this packet.  
log-attacker-packets—Starts IP logging of packets containing the attacker address.  
log-pair-packets—Starts IP logging of packets containing the attacker-victim address pair.  
log-victim-packets—Starts IP logging of packets containing the victim address.  
produce-alert —Writes the event to the Event Store as an alert.  
produce-verbose-alert—Includes an encoded dump (possibly truncated) of the offending  
packet in the alert.  
request-block-connection—Sends a request to the ARC to block this connection.  
request-block-host—Sends a request to the ARC to block this attacker host.  
request-rate-limit—Sends a rate limit request to the ARC to perform rate limiting.  
request-snmp-trap—Sends a request to the Notification Application component of the sensor  
to perform SNMP notification.  
reset-tcp-connection—Sends TCP resets to hijack and terminate the TCP flow.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Configuring Signatures  
modify-packet-inline— Modifies packet data to remove ambiguity about what the end point  
might do with the packet.  
no—Removes an entry or selection setting  
signature-type—Specifies the type of signature desired:  
content-types—Content-types.  
define-web-traffic-policy—Defines web traffic policy.  
max-outstanding-requests-overrun—Inspects for large number of outstanding HTTP  
requests.  
msg-body-pattern—Message body pattern.  
request-methods—Signature types that deal with request methods.  
transfer-encodings—Signature types that deal with transfer encodings.  
Defining a MIME-Type Policy Signature  
To define a MIME-type policy signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter application policy enforcement submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
sensor(config-sig)# signatures 60001 0  
sensor(config-sig-sig)# engine application-policy-enforcement-http  
Step 3  
Step 4  
Step 5  
Step 6  
Specify the event action.  
sensor(config-sig-sig-app)# event-action produce-alert|log-pair-packets  
Define the signature type.  
sensor(config-sig-sig-app)# signature-type content-type define-content-type  
Define the content type.  
sensor(config-sig-sig-app-def)# name MyContent  
Verify your settings.  
sensor(config-sig-sig-app-def)# show settings  
-> define-content-type  
-----------------------------------------------  
name: MyContent  
*---> content-type-details  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-sig-sig-app-def)#  
Step 7  
Exit signatures submode.  
sensor(config-sig-sig-app-def)# exit  
sensor(config-sig-sig-app)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 7 Defining Signatures  
Configuring Signatures  
Step 8  
Press Enter to apply the changes or enter no to discard them.  
Configuring IP Fragment Reassembly  
This section describes IP fragment reassembly, lists the IP fragment reassembly signatures with the  
configurable parameters, describes how to configure these parameters, and how to configure the method  
for IP fragment reassembly. It contains the following topics:  
Understanding IP Fragment Reassembly  
You can configure the sensor to reassemble a datagram that has been fragmented over multiple packets.  
You can specify boundaries that the sensor uses to determine how many datagram fragments it  
reassembles and how long to wait for more fragments of a datagram. The goal is to ensure that the sensor  
does not allocate all its resources to datagrams that cannot be completely reassembled, either because  
the sensor missed some frame transmissions or because an attack has been launched that is based on  
generating random fragmented datagrams.  
Note  
You configure the IP fragment reassembly per signature.  
IP Fragment Reassembly Signatures and Configurable Parameters  
Table 7-5 lists IP fragment reassembly signatures with the parameters that you can configure for IP  
fragment reassembly. The IP fragment reassembly signatures are part of the Normalizer engine.  
Table 7-5  
IP Fragment Reassembly Signatures  
Parameter With Default Value  
and Range  
Signature ID and Name  
Description  
Default Action  
1200 IP Fragmentation  
Buffer Full  
Fires when the total number of  
fragments in the system exceeds the (0-42000)  
Specify Max Fragments 10000 Deny Packet Inline  
Produce Alert1  
threshold set by Max Fragments.  
2
1201 IP Fragment Overlap Fires when the fragments queued for  
a datagram overlap each other.  
Deny Packet Inline  
Produce Alert1  
1202 IP Fragment Overrun Fires when the fragment data (offset Specify Max Datagram Size  
Deny Packet Inline  
Produce Alert3  
- Datagram Too Long  
and size) exceeds the threshold set  
with Max Datagram Size.  
65536 (2000-65536)  
1203 IP Fragment  
Overwrite - Data is  
Overwritten  
Fires when the fragments queued for  
a datagram overlap each other and  
the overlapping data is different.4  
Deny Packet Inline  
Produce Alert5  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-5  
IP Fragment Reassembly Signatures (continued)  
Parameter With Default Value  
and Range  
Signature ID and Name  
Description  
Default Action  
1204 IP Fragment Missing Fires when the datagram is  
Deny Packet Inline  
Produce Alert6  
Initial Fragment  
incomplete and missing the initial  
fragment.  
1205 IP Fragment Too  
Many Datagrams  
Fires when the total number of partial Specify Max Partial Datagrams Deny Packet Inline  
datagrams in the system exceeds the 1000 (0-10000)  
threshold set by Max Partial  
Produce Alert7  
Datagrams.  
1206 IP Fragment Too  
Small  
Fires when there are more than Max Specify Max Small Frags 2  
Deny Packet Inline  
Produce Alert9  
Small Frags of a size less than Min  
(8-1500)  
Fragment Size in one datagram.8  
Specify Min Fragment Size 400  
(1-8)  
1207 IP Fragment Too  
Many Fragments in a  
Datagram  
Fires when there are more than Max Specify Max Fragments per  
Deny Packet Inline  
Produce Alert6  
Fragments per Datagram in one  
datagram.  
Datagram 170 (0-8192)  
1208 IP Fragment  
Incomplete Datagram  
Fires when all of the fragments for a Specify Fragment Reassembly Deny Packet Inline  
datagram have not arrived during the Timeout 60 (0-360)  
Produce Alert6  
Fragment Reassembly Timeout.10  
11  
1225 Fragment Flags  
Invalid  
Fires when a bad combination of  
fragment flags is detected.  
1. Modify Packet Inline and Deny Connection Inline have no effect on this signature. Deny Packet Inline drops the packets and all associated fragments for  
this datagram. If you disable this signature, the default values are still used and packets are dropped (inline mode) or not analyzed (promiscuous mode)  
and no alert is sent.  
2. This signature does not fire when the datagram is an exact duplicate. Exact duplicates are dropped in inline mode regardless of the settings. Modify Packet  
Inline removes the overlapped data from all but one fragment so there is no ambiguity about how the endpoint treats the datagram. Deny Connection  
Inline has no effect on this signature. Deny Packet Inline drops the packet and all associated fragments for this datagram.  
3. Modify Packet Inline and Deny Connection Inline have no effect on this signature. Deny Packet Inline drops the packet and all associated fragments for  
this datagram. Regardless of the actions set the datagram is not processed by the IPS if the datagram is larger than the Max Datagram size.  
4. This is a very unusual event.  
5. Modify Packet Inline removes the overlapped data from all but one fragment so there is no ambiguity about how the endpoint treats the datagram. Deny  
Connection Inline has no effect on this signature. Deny Packet Inline drops the packets and all associated fragments for this datagram.  
6. IPS does not inspect a datagram missing the first fragments regardless of the settings. Modify Packet Inline and Deny Connection Inline have no effect  
on this signature. Deny Packet Inline drops the packet and all associated fragments for this datagram.  
7. Modify Packet Inline and Deny Connection Inline have no effect on this signature. Deny Packet Inline drops the packet and all associated fragments for  
this datagram.  
8. IPS does not inspect the datagram if this signature is on and the number of small fragments is exceeded.  
9. Modify Packet Inline and Deny Connection Inline have no effect on this signature. Deny Packet Inline drops the packet and all associated fragments for  
this datagram.  
10. The timer starts when the packet for the datagram arrives.  
11. Modify Packet Inline modifies the flags to a valid combination. Deny Connection Inline has no effect on this signature. Deny Packet Inline drops the  
packet and all associated fragments for this datagram.  
For More Information  
For more information about the Normalizer engine, see Normalizer Engine, page B-36.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Configuring Signatures  
Configuring IP Fragment Reassembly Parameters  
To configure IP fragment reassembly parameters for a specific signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Step 4  
Step 5  
Step 6  
Specify the IP fragment reassembly signature ID and subsignature ID.  
sensor(config-sig)# signatures 1200 0  
Specify the engine.  
sensor(config-sig-sig)# engine normalizer  
Enter edit default signatures submode.  
sensor(config-sig-sig-nor)# edit-default-sigs-only default-signatures-only  
Enable and change the default setting (if desired) of any of the IP fragment reassembly parameter for  
signature 1200, for example, specifying the maximum fragments.  
sensor(config-sig-sig-nor-def)# specify-max-fragments yes  
sensor(config-sig-sig-nor-def-yes)# max-fragments 20000  
Step 7  
Step 8  
Step 9  
Verify the settings.  
sensor(config-sig-sig-nor-def-yes)# show settings  
yes  
-----------------------------------------------  
max-fragments: 20000 default: 10000  
-----------------------------------------------  
sensor(config-sig-sig-nor-def-yes)#  
Exit signature definition submode.  
sensor(config-sig-sig-nor-def-yes)# exit  
sensor(config-sig-sig-nor-def)# exit  
sensor(config-sig-sig-nor)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter for apply the changes or enter no to discard them.  
Configuring the Method for IP Fragment Reassembly  
Use the fragment-reassembly command in the signature definition submode to configure the method  
the sensor will use to reassemble fragments. You can configure this option if your sensor is operating in  
promiscuous mode. If your sensor is operating in line mode, the method is NT only.  
The following options apply:  
ip-reassemble-mode—Identifies the method the sensor uses to reassemble the fragments based on  
the operating system:  
nt—Specifies the Windows systems (default).  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 7 Defining Signatures  
Configuring Signatures  
solaris—Specifies the Solaris systems.  
linux—Specifies the GNU/Linux systems.  
bsd—Specifies the BSD UNIX systems.  
Configuring the IP Fragment Reassembly Method  
To configure the method for IP fragment reassembly, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter fragment reassembly submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
sensor(config-sig)# fragment-reassembly  
Step 3  
Step 4  
Configure the operating system you want the sensor to use to reassemble IP fragments.  
sensor(config-sig-fra)# ip-reassemble-mode linux  
Verify the setting.  
sensor(config-sig-fra)# show settings  
fragment-reassembly  
-----------------------------------------------  
ip-reassemble-mode: linux default: nt  
-----------------------------------------------  
sensor(config-sig-fra)#  
Step 5  
Step 6  
Exit signature definition submode.  
sensor(config-sig-fra)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Configuring TCP Stream Reassembly  
This section describes TCP stream reassembly, lists the TCP stream reassembly signatures with the  
configurable parameters, describes how to configure TCP stream signatures, and how to configure the  
mode for TCP stream reassembly. It contains the following topics:  
Understanding TCP Stream Reassembly  
You can configure the sensor to monitor only TCP sessions that have been established by a complete  
three-way handshake. You can also configure how long to wait for the handshake to complete, and how  
long to keep monitoring a connection where no more packets have been seen. The goal is to prevent the  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 7 Defining Signatures  
Configuring Signatures  
sensor from creating alerts where a valid TCP session has not been established. There are known attacks  
against sensors that try to get the sensor to generate alerts by simply replaying pieces of an attack. The  
TCP session reassembly feature helps to mitigate these types of attacks against the sensor.  
You configure TCP stream reassembly parameters per signature. You can configure the mode for TCP  
stream reassembly.  
TCP Stream Reassembly Signatures and Configurable Parameters  
Table 7-6 lists TCP stream reassembly signatures with the parameters that you can configure for TCP  
stream reassembly. TCP stream reassembly signatures are part of the Normalizer engine.  
Table 7-6  
TCP Stream Reassembly Signatures  
Parameter With  
Default Value and  
Range  
Signature ID and Name  
Description  
Default Actions  
2
1301 TCP Session Inactivity Timeout1  
Fires when a TCP session has TCP Idle Timeout  
been idle for a TCP Idle  
Timeout.  
3600 (15-3600)  
4
1302 TCP Session Embryonic Timeout3  
1303 TCP Session Closing Timeout5  
Fires when a TCP session has TCP Embryonic  
not completes the three-way  
handshake in TCP embryonic  
timeout seconds.  
Timeout 15  
(3-300)  
6
Fires when a TCP session has TCP Closed Timeout  
not closed completely in TCP 5 (1-60)  
Closed Timeout seconds after  
the first FIN.  
7
1304 TCP Session Packet Queue Overflow This signature allows for  
setting the internal TCP Max  
TCP Max Queue 32  
(0-128)  
Queue size value for the  
TCP Idle Timeout  
Normalizer engine. As a result 3600  
it does not function in  
promiscuous mode. By default  
this signature does not fire an  
alert. If a custom alert event is  
associated with this signature  
and if the queue size is  
exceeded, an alert fires.  
Note  
The IPS signature team  
discourages modifying  
this value.  
1305 TCP Urg Flag Set8  
Fires when the TCP urgent flag TCP Idle Timeout  
is seen 3600  
Modify Packet Inline9  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-6  
TCP Stream Reassembly Signatures (continued)  
Parameter With  
Default Value and  
Range  
Signature ID and Name  
Description  
Default Actions  
1306 0 TCP Option Other  
Fires when a TCP option in the TCP Option Number Modify Packet Inline  
range of TCP Option Number is 6-7,9-255  
Produce Alert10  
seen. All 1306 signatures fire  
(Integer Range Allow  
an alert and do not function in Multiple 0-255  
promiscuous mode.  
constraints)  
TCP Idle Timeout  
3600  
1306 1 TCP SACK Allowed Option  
1306 2 TCP SACK Data Option  
1306 3 TCP Timestamp Option  
1306 4 TCP Window Scale Option  
1306 5 TCP MSS Option  
Fires when a TCP selective  
ACK allowed option is seen.  
All 1306 signatures fire an alert  
and do not function in  
TCP Idle Timeout  
3600  
Modify Packet Inline11  
Modify Packet Inline12  
Modify Packet Inline13  
Modify Packet Inline14  
promiscuous mode.  
Fires when a TCP selective  
ACK data option is seen. All  
1306 signatures fire an alert and  
do not function in promiscuous  
mode.  
TCP Idle Timeout  
3600  
Fires when a TCP timestamp  
option is seen. All 1306  
signatures fire an alert and do  
not function in promiscuous  
mode.  
TCP Idle Timeout  
3600  
Fires when a TCP window scale TCP Idle Timeout  
option is seen. All 1306  
signatures fire an alert and do  
not function in promiscuous  
mode.  
3600  
Fires when a TCP MSS option TCP Idle Timeout  
is detected. All 1306 signatures 3600  
fire an alert and do not function  
Modify Packet Inline  
Modify Packet Inline  
in promiscuous mode.  
1306 6 TCP option data after EOL option Fires when the TCP option list TCP Idle Timeout  
has data after the EOL option. 3600  
All 1306 signatures fire an alert  
and do not function in  
promiscuous mode.  
1307 TCP Window Variation  
1308 TTL Evasion16  
Fires when the right edge of the TCP Idle Timeout  
recv window for TCP moves to 3600  
the right (decreases).  
Deny Connection Inline  
Produce Alert15  
Fires when the TTL seen on one TCP Idle Timeout  
direction of a session is higher 3600  
than the minimum that has been  
observed.  
Modify Packet Inline17  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-6  
TCP Stream Reassembly Signatures (continued)  
Parameter With  
Default Value and  
Range  
Signature ID and Name  
Description  
Default Actions  
1309 TCP Reserved Flags Set  
Fires when the reserved bits  
(including bits used for ECN) 3600  
are set on the TCP header.  
TCP Idle Timeout  
Modify Packet Inline  
Produce Alert18  
1311 TCP Packet Exceeds MSS  
1312 TCP MSS Below Minimum  
1313 TCP Max MSS  
Fires when a packet exceeds the TCP Idle Timeout  
Produce Alert19  
MSS that was exchanged  
during the three-way  
handshake.  
3600  
Fires when the MSS value in a TCP Min MSS 400  
packet containing a SYN flag is (0-16000)  
Modify Packet Inline20  
less that TCP Min MSS.  
TCP Idle Timeout  
3600  
Fires when the MSS value in a TCP Max MSS1460 Modify Packet Inline  
packet containing a SYN flag  
exceed TCP Max MSS  
(0-16000)  
disabled21  
1314 TCP Data SYN  
Fires when TCP payload is sent  
in the SYN packet.  
Deny Packet Inline  
disabled22  
1315 ACK Without TCP Stream  
Fires when an ACK packet is  
sent that does not belong to a  
stream.  
Produce Alert  
disabled23  
1317 Zero Window Probe  
Fires when a zero window  
probe packet is detected.  
Modify Packet Inline Modify Packet Inline  
removes data from the  
Zero Window Probe  
packet.  
133024 0 TCP Drop - Bad Checksum  
1330 1 TCP Drop - Bad TCP Flags  
Fires when TCP packet has bad Modify Packet Inline Deny Packet Inline  
checksum.  
corrects the  
checksum.  
Fires when TCP packet has bad  
flag combination.  
Deny Packet Inline  
1330 2 TCP Drop - Urgent Pointer With  
No Flag  
Fires when TCP packet has a  
URG pointer and no URG flag. clears the pointer.  
Modify Packet Inline Modify Packet Inline  
disabled  
1330 3 TCP Drop - Bad Option List  
Fires when TCP packet has a  
bad option list.  
Deny Packet Inline  
1330 4 TCP Drop - Bad Option Length  
Fires when TCP packet has a  
bad option length.  
Deny Packet Inline  
1330 5 TCP Drop - MSS Option Without Fires when TCP MSS option is Modify Packet Inline Modify Packet Inline  
SYN  
seen in packet without the SYN clears the MSS  
flag set. option.  
1330 6 TCP Drop - WinScale Option  
Without SYN  
Fires when TCP window scale Modify Packet Inline Modify Packet Inline  
option is seen in packet without clears the window  
the SYN flag set.  
scale option.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Configuring Signatures  
Table 7-6  
TCP Stream Reassembly Signatures (continued)  
Parameter With  
Default Value and  
Range  
Signature ID and Name  
Description  
Default Actions  
1330 7 TCP Drop - Bad WinScale Option Fires when a TCP packet has a Modify Packet Inline Modify Packet Inline  
Value  
bad window scale value.  
sets the value to the  
closest constraint  
value.  
1330 8 TCP Drop - SACK Allow Without Fires when the TCP SACK  
Modify Packet Inline Modify Packet Inline  
clears the SACK  
allowed option.  
SYN  
allowed option is seen in a  
packet without the SYN flags  
set.  
1330 9 TCP Drop - Data in SYN|ACK  
1330 10 TCP Drop - Data Past FIN  
Fires when TCP packet with  
SYN and ACK flags set also  
contains data.  
Deny Packet Inline  
Fires when TCP data is  
sequenced after FIN.  
Deny Packet Inline  
Deny Packet Inline  
1330 11 TCP Drop - Timestamp not  
Allowed  
Fires when TCP packet has  
timestamp option when  
timestamp option is not  
allowed.  
1330 12 TCP Drop - Segment Out of Order Fires when TCP segment is out  
of order and cannot be queued.  
Deny Packet Inline  
Deny Packet Inline  
Deny Packet Inline  
1330 13 TCP Drop - Invalid TCP Packet Fires when TCP packet has  
invalid header.  
1330 14 TCP Drop - RST or SYN in  
window  
Fires when TCP packet with  
RST or SYN flag was sent in  
the sequence window but was  
not the next sequence.  
1330 15 TCP Drop - Segment Already  
ACKed  
Fires when TCP packet  
sequence is already ACKed by  
peer (excluding keepalives).  
Deny Packet Inline  
1330 16 TCP Drop - PAWS Failed  
Fires when TCP packet fails  
PAWS check.  
Deny Packet Inline  
Deny Packet Inline  
1330 17 TCP Drop - Segment out of State Fires when TCP packet is not  
Order  
proper for the TCP session  
state.  
1330 18 TCP Drop - Segment out of  
Window  
Fires when TCP packet  
sequence number is outside of  
allowed window.  
Deny Packet Inline  
3050 Half Open SYN Attack  
syn-flood-max-embry  
onic 5000  
3250 TCP Hijack  
max-old-ack 200  
max-old-ack 100  
3251 TCP Hijack Simplex Mode  
1. The timer is reset to 0 after each packet on the TCP session. by default, this signature does not produce an alert. You can choose to produce alerts for  
expiring TCP connections if desired. A statistic of total number of expired flows is updated any time a flow expires.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Configuring Signatures  
2. Modify Packet Inline, Deny Connection Inline, and Deny Packet Inline have no effect on this signature.  
3. The timer starts with the first SYN packet and is not reset. State for the session is reset and any subsequent packets for this flow appear to be out of order  
(unless it is a SYN).  
4. Modify Packet Inline, Deny Connection Inline, and Deny Packet Inline have no effect on this signature.  
5. The timer starts with the first FIN packet and is not reset. State for the session is reset and any subsequent packets for this flow appear to be out of order  
(unless it is a SYN).  
6. Modify Packet Inline, Deny Connection Inline, and Deny Packet Inline have no effect on this signature.  
7. Modify Packet Inline and Deny Packet Inline have no effect on this signature. Deny Connection Inline drops the current packet and the TCP session.  
8. Phrak 57 describes a way to evade security policy using URG pointers. You can normalize the packet when it is in inline mode with this signature.  
9. Modify Packet Inline strips the URG flag and zeros the URG pointer from the packet. Deny Connection Inline drops the current packet and the TCP  
session. Deny Packet Inline drops the packet.  
10. Modify Packet Inline strips the selected option(s) from the packet. Deny Connection Inline drops the current packet and the TCP session. Deny Packet  
Inline drops the packet.  
11. Modify Packet Inline strips the selected ACK allowed option from the packet. Deny Connection Inline drops the current packet and the TCP session. Deny  
Packet Inline drops the packet.  
12. Modify Packet Inline strips the selected ACK allowed option from the packet. Deny Connection Inline drops the current packet and the TCP session. Deny  
Packet Inline drops the packet.  
13. Modify Packet Inline strips the timestamp option from the packet. Deny Connection Inline drops the current packet and the TCP session. Deny Packet  
Inline drops the packet.  
14. Modify Packet Inline strips the window scale option from the packet. Deny Connection Inline drops the current packet and the TCP session. Deny Packet  
Inline drops the packet.  
15. Modify Packet Inline has no effect on this signature. Deny Connection Inline drops the current packet and the TCP connection. Deny Packet Inline drops  
the packet.  
16. This signature is used to cause TTLs to monotonically decrease for each direction on a session. For example, if TTL 45 is the lowest TTL seen from A to  
B, then all future packets from A to B will have a maximum of 45 if Modify Packet Inline is set. Each new low TTL becomes the new maximum for packets  
on that session.  
17. Modify Packet Inline ensures that the IP TTL monotonically decreases. Deny Connection Inline drops the current packet and the TCP session. Deny Packet  
Inline drops the packet.  
18. Modify Packet Inline clears all reserved TCP flags. Deny Connection Inline drops the current packet and the TCP session. Deny Packet Inline drops the  
packet.  
19. Modify Packet Inline has no effect on this signature. Deny Connection Inline drops the current packet and the TCP connection. Deny Packet Inline drops  
the packet.  
20. 2.4.21-15.EL.cisco.1 Modify Packet Inline raises the MSS value to TCP Min MSS. Deny Connection Inline drops the current packet and the TCP session.  
Deny Packet Inline drops the packet 2.4.21-15.EL.cisco.1.  
21. Modify Packet Inline lowers the MSS value to TCP Max MSS. Deny Connection Inline drops the current packet and the TCP session. Deny Packet Inline  
drops the packet 2.4.21-15.EL.cisco.1.  
22. Modify Packet Inline has no effect on this signature. Deny Connection Inline drops the current packet and the TCP session. Deny Packet Inline drops the  
packet.  
23. Modify Packet Inline, Deny Connection Inline, and Deny Packet Inline have no effect on this signature. By default, the 1330 signatures drop packets for  
which this signature sends alerts.  
24. These subsignatures represent the reasons why the Normalizer might drop a TCP packet. By default these subsignatures drop packets. These subsignatures  
let you permit packets that fail the checks in the Normalizer through the IPS. The drop reasons have an entry in the TCP statistics. By default these  
subsignatures do not produce an alert.  
For More Information  
For more information about the Normalizer engine, see Normalizer Engine, page B-36.  
Configuring TCP Stream Reassembly Signatures  
To configure TCP stream reassembly for a specific signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Configuring Signatures  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Step 4  
Step 5  
Step 6  
Specify the TCP stream reassembly signature ID and subsignature ID.  
sensor(config-sig)# signatures 1313 0  
Specify the engine.  
sensor(config-sig-sig)# engine normalizer  
Enter edit default signatures submode.  
sensor(config-sig-sig-nor)# edit-default-sigs-only default-signatures-only  
Enable and change the default setting (if desired) of the maximum MSS parameter for signature 1313.  
sensor(config-sig-sig-nor-def)# specify-tcp-max-mss yes  
sensor(config-sig-sig-nor-def-yes)# tcp-max-mss 1380  
Note  
Changing this parameter from the default of 1460 to 1380 helps prevent fragmentation of traffic  
going through a VPN tunnel.  
Step 7  
Step 8  
Step 9  
Verify the settings.  
sensor(config-sig-sig-nor-def-yes)# show settings  
yes  
-----------------------------------------------  
tcp-max-mss: 1380 default: 1460  
-----------------------------------------------  
sensor(config-sig-sig-nor-def-yes)#  
Exit signature definition submode.  
sensor(config-sig-sig-nor-def-yes)# exit  
sensor(config-sig-sig-nor-def)# exit  
sensor(config-sig-sig-nor)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter for apply the changes or enter no to discard them.  
Configuring the Mode for TCP Stream Reassembly  
Use the stream-reassembly command in the signature definition submode to configure the mode that  
the sensor will use to reassemble TCP sessions.  
Note  
The parameters tcp-3-way-handshake-required and tcp-reassembly-mode only impact sensors  
inspecting traffic in promiscuous mode, not inline mode. To configure asymmetric options for sensors  
inspecting inline traffic, use the inline-TCP-evasion-protection-mode parameter.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Configuring Signatures  
The following options apply:  
tcp-3-way-handshake-required [true | false]—Specifies that the sensor should only track sessions  
for which the 3-way handshake is completed. The default is true.  
tcp-reassembly-mode—Specifies the mode the sensor should use to reassemble TCP sessions:  
strict—Only allows the next expected in the sequence (default).  
loose—Allows gaps in the sequence.  
asym—Allows asymmetric traffic to be reassembled.  
Caution  
The asymmetric option disables TCP window evasion checking.  
Configuring the TCP Stream Reassembly Parameters  
To configure the TCP stream reassembly parameters, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter TCP stream reassembly submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
sensor(config-sig)# stream-reassembly  
Step 3  
Step 4  
Step 5  
Specify that the sensor should only track session for which the 3-way handshake is completed.  
sensor(config-sig-str)# tcp-3-way-handshake-required true  
Specify the mode the sensor should use to reassemble TCP sessions.  
sensor(config-sig-str)# tcp-reassembly-mode strict  
Verify the settings.  
sensor(config-sig-str)# show settings  
stream-reassembly  
-----------------------------------------------  
tcp-3-way-handshake-required: true default: true  
tcp-reassembly-mode: strict default: strict  
-----------------------------------------------  
sensor(config-sig-str)#  
Step 6  
Step 7  
Exit signature definition submode.  
sensor(config-sig-str)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For information on asymmetric inspection options for sensors configured in inline mode, see Inline TCP  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 7 Defining Signatures  
Configuring Signatures  
Configuring IP Logging  
You can configure a sensor to generate an IP session log when the sensor detects an attack. When IP  
logging is configured as a response action for a signature and the signature is triggered, all packets to  
and from the source address of the alert are logged for a specified period of time.  
Note  
IP logging allows a maximum limit of 20 concurrent IP log files. Once the limit of 20 is reached, you  
receive the following message in main.log: Cid/W errWarnIpLogProcessor::addIpLog: Ran out of  
file descriptors.  
Use the ip-log command in the signature definition submode to configure IP logging.  
The following options apply:  
ip-log-bytes—Identifies the maximum number of bytes you want logged. The valid value is 0 to  
2147483647. The default is 0.  
ip-log-packets—Identifies the number of packets you want logged. The valid value is 0 to 65535.  
The default is 0.  
ip-log-time—Identifies the duration you want the sensor to log. The valid value is 30 to 300  
seconds. The default is 30 seconds.  
Note  
When the sensor meets any one of the IP logging conditions, it stops IP logging.  
Configuring IP Logging Parameters  
To configure the IP logging parameters, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter IP log submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
sensor(config-sig)# ip-log  
Step 3  
Specify the IP logging parameters:  
a. Specify the maximum number of bytes you want logged.  
sensor(config-sig-ip)# ip-log-bytes 200000  
b. Specify the number of packets you want logged.  
sensor(config-sig-ip)# ip-log-packets 150  
c. Specify the length of time you want the sensor to log.  
sensor(config-sig-ip)# ip-log-time 60  
Step 4  
Verify the settings.  
sensor(config-sig-ip)# show settings  
ip-log  
-----------------------------------------------  
ip-log-packets: 150 default: 0  
ip-log-time: 60 default: 30  
ip-log-bytes: 200000 default: 0  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 7 Defining Signatures  
Creating Custom Signatures  
sensor(config-sig-ip)#  
Step 5  
Step 6  
Exit signature definition submode.  
sensor(config-sig-ip)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Creating Custom Signatures  
This section describes how to create custom signatures and contains the following topics:  
Sequence for Creating a Custom Signature  
Use the following sequence when you create a custom signature:  
Step 1  
Step 2  
Select a signature engine.  
Assign the signature identifiers:  
Signature ID  
SubSignature ID  
Signature name  
Alert notes (optional)  
User comments (optional)  
Step 3  
Step 4  
Assign the engine-specific parameters. The parameters differ for each signature engine, although there  
is a group of master parameters that applies to each engine.  
Assign the alert response:  
Signature fidelity rating  
Severity of the alert  
Step 5  
Step 6  
Assign the alert behavior.  
Apply the changes.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Example String TCP Engine Signature  
The String engine is a generic-based pattern-matching inspection engine for ICMP, TCP, and UDP  
protocols. The String engine uses a regular expression engine that can combine multiple patterns into a  
single pattern-matching table allowing for a single search through the data. There are three String  
engines: String ICMP, String TCP, and String UDP.  
Caution  
Note  
A custom signature can affect the performance of your sensor. Test the custom signature against a  
baseline sensor performance for your network to determine the overall impact of the signature.  
This procedure also applies to String UDP and ICMP signatures.  
The following options apply:  
default—Sets the value back to the system default setting.  
direction—Specifies the direction of the traffic:  
from-service—Traffic from service port destined to client port.  
to-service—Traffic from client port destined to service port.  
event-action—Specifies the action(s) to perform when alert is triggered:  
deny-attacker-inline (inline only)—Does not transmit this packet and future packets from the  
attacker address for a specified period of time.  
deny-attacker-service-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker address victim port pair for a specified period of time.  
deny-attacker-victim-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker/victim address pair for a specified period of time.  
deny-connection-inline (inline only)—Does not transmit this packet and future packets on the  
TCP flow.  
deny-packet-inline (inline only)—Does not transmit this packet.  
log-attacker-packets—Starts IP logging of packets containing the attacker address.  
log-pair-packets—Starts IP logging of packets containing the attacker-victim address pair.  
log-victim-packets—Starts IP logging of packets containing the victim address.  
produce-alert —Writes the event to the Event Store as an alert.  
produce-verbose-alert—Includes an encoded dump (possibly truncated) of the offending  
packet in the alert.  
request-block-connection—Sends a request to the ARC to block this connection.  
request-block-host—Sends a request to the ARC to block this attacker host.  
request-rate-limit—Sends a rate limit request to the ARC to perform rate limiting.  
request-snmp-trap—Sends a request to the Notification Application component of the sensor  
to perform SNMP notification.  
reset-tcp-connection—Sends TCP resets to hijack and terminate the TCP flow.  
modify-packet-inline— Modifies packet data to remove ambiguity about what the end point  
might do with the packet.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Chapter 7 Defining Signatures  
Creating Custom Signatures  
no—Removes an entry or selection setting.  
regex-string —Specifies a regular expression to search for in a single TCP packet.  
service-ports—Specifies the ports or port ranges where the target service may reside. The valid  
range is 0 to 65535. It is a separated list of integer ranges a-b[,c-d] within 0 to 65535. The second  
number in the range must be greater than or equal to the first number.  
specify-exact-match-offset {yes | no}—(Optional) Enables exact match offset:  
exact-match-offset—Specifies the exact stream offset the regular expression string must report  
for a match to be valid. The value is 0 to 65535.  
specify-min-match-length {yes | no}—(Optional) Enables minimum match length:  
min-match-length—Specifies the minimum number of bytes the regular expression string must  
match. The value is 0 to 65535.  
strip-telnet-options {true | false}—Strips the Telnet option characters from the data before the  
pattern is searched.  
swap-attacker-victim {true | false}—Swaps the attacker and victim addresses and ports (source  
and destination) in the alert message and in any actions taken. The default is false.  
Creating a String TCP Engine Signature  
To create a signature based on the String TCP engine, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Specify a signature ID and subsignature ID for the signature. Custom signatures are in the range of 60000  
to 65000.  
sensor(config-sig)# signatures 60025 0  
Step 4  
Step 5  
Enter signature description submode.  
sensor(config-sig-sig)# sig-description  
Specify a name for the new signature. You can also specify a additional comments about the sig using  
the sig-comment command or additional information about the signature using the sig-string-info  
command.  
sensor(config-sig-sig-sig)# sig-name This is my new name  
Step 6  
Step 7  
Step 8  
Step 9  
Exit signature description submode.  
sensor(config-sig-sig-sig)# exit  
Specify the string TCP engine.  
sensor(config-sig-sig)# engine string-tcp  
Specify the service ports.  
sensor(config-sig-sig-str)# service-ports 23  
Specify the direction.  
sensor(config-sig-sig-str)# direction to-service  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Step 10 Specify the regex string to search for in the TCP packet. You can change the event actions if needed  
according to your security policy using the event-action command. The default event action is  
produce-alert.  
sensor(config-sig-sig-str)# regex-string This-is-my-new-Sig-regex  
Step 11 You can modify the following optional parameters for this custom String TCP signature:  
specify-exact-match-offset  
specify-min-match-length  
strip-telnet-options  
swap-attacker-victim.  
Step 12 Verify the settings.  
sensor(config-sig-sig-str)# show settings  
string-tcp  
-----------------------------------------------  
event-action: produce-alert <defaulted>  
strip-telnet-options: false <defaulted>  
specify-min-match-length  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
regex-string: This-is-my-new-Sig-regex  
service-ports: 23  
direction: to-service default: to-service  
specify-exact-match-offset  
-----------------------------------------------  
no  
-----------------------------------------------  
specify-max-match-offset  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
specify-min-match-offset  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
swap-attacker-victim: false <defaulted>  
-----------------------------------------------  
sensor(config-sig-sig-str)#  
Step 13 Exit signature definition submode.  
sensor(config-sig-sig-str)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Step 14 Press Enter to apply the changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Example Service HTTP Engine Signature  
The Service HTTP engine is a service-specific string-based pattern-matching inspection engine. The  
HTTP protocol is one of the most commonly used in networks of today. In addition, it requires the most  
amount of preprocessing time and has the most number of signatures requiring inspection making it  
critical to the overall performance of the system.  
The Service HTTP engine uses a Regex library that can combine multiple patterns into a single  
pattern-matching table allowing a single search through the data. This engine searches traffic directed  
only to web services, or HTTP requests. You cannot inspect return traffic with this engine. You can  
specify separate web ports of interest in each signature in this engine.  
HTTP deobfuscation is the process of decoding an HTTP message by normalizing encoded characters  
to ASCII equivalent characters. It is also known as ASCII normalization.  
Before an HTTP packet can be inspected, the data must be deobfuscated or normalized to the same  
representation that the target system sees when it processes the data. It is ideal to have a customized  
decoding technique for each host target type, which involves knowing what operating system and web  
server version is running on the target. The Service HTTP engine has default deobfuscation behavior for  
the Microsoft IIS web server.  
The following options apply:  
de-obfuscate {true | false}—Applies anti-evasive deobfuscation before searching.  
default—Sets the value back to the system default setting.  
event-action —Specifies the action(s) to perform when alert is triggered:  
deny-attacker-inline (inline only)—Does not transmit this packet and future packets from the  
attacker address for a specified period of time.  
deny-attacker-service-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker address victim port pair for a specified period of time.  
deny-attacker-victim-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker/victim address pair for a specified period of time.  
deny-connection-inline (inline only)—Does not transmit this packet and future packets on the  
TCP flow.  
deny-packet-inline (inline only)—Does not transmit this packet.  
log-attacker-packets—Starts IP logging of packets containing the attacker address.  
log-pair-packets—Starts IP logging of packets containing the attacker-victim address pair.  
log-victim-packets—Starts IP logging of packets containing the victim address.  
produce-alert —Writes the event to the Event Store as an alert.  
produce-verbose-alert—Includes an encoded dump (possibly truncated) of the offending  
packet in the alert.  
request-block-connection—Sends a request to the ARC to block this connection.  
request-block-host—Sends a request to the ARC to block this attacker host.  
request-rate-limit—Sends a rate limit request to the ARC to perform rate limiting.  
request-snmp-trap—Sends a request to the Notification Application component of the sensor  
to perform SNMP notification.  
reset-tcp-connection—Sends TCP resets to hijack and terminate the TCP flow.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 7 Defining Signatures  
Creating Custom Signatures  
modify-packet-inline— Modifies packet data to remove ambiguity about what the end point  
might do with the packet.  
max-field-sizes —Grouping for maximum field sizes:  
specify-max-arg-field-length {yes | no}—Enables max-arg-field-length (optional).  
specify-max-header-field-length {yes | no}—Enables max-header-field-length (optional).  
specify-max-request-length {yes | no}—Enables max-request-length (optional).  
specify-max-uri-field-length {yes | no}—Enables max-uri-field-length (optional).  
no—Removes an entry or selection setting.  
regex—Regular expression grouping:  
specify-arg-name-regex—Enables arg-name-regex (optional).  
specify-header-regex —Enables header-regex (optional).  
specify-request-regex—Enables request-regex (optional).  
specify-uri-regex—Enables uri-regex (optional).  
service-ports —A comma-separated list of ports or port ranges where the target service may reside.  
swap-attacker-victim {true | false}—Whether address (and ports) source and destination are  
swapped in the alarm message. The default is false for no swapping.  
Creating a Service HTTP Engine Signature  
To create a custom signature based on the Service HTTP engine, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Specify a signature ID and a subsignature ID for the signature. Custom signatures are in the range of  
60000 to 65000.  
sensor(config-sig)# signatures 63000 0  
Step 4  
Step 5  
Step 6  
Step 7  
Step 8  
Enter signature description mode.  
sensor(config-sig-sig)# sig-description  
Specify a signature name.  
sensor(config-sig-sig-sig)# sig-name myWebSig  
Specify the alert traits. The valid range is from 0 to 65535.  
sensor(config-sig-sig-sig)# alert-traits 2  
Exit signature description submode.  
sensor(config-sig-sig-sig)# exit  
Specify the alert frequency.  
sensor(config-sig-sig)# alert-frequency  
sensor(config-sig-sig-ale)# summary-mode fire-all  
sensor(config-sig-sig-ale-fir)# summary-key Axxx  
sensor(config-sig-sig-ale-fir)# specify-summary-threshold yes  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Creating Custom Signatures  
sensor(config-sig-sig-ale-fir-yes)# summary-threshold 200  
Step 9  
Exit alert frequency submode.  
sensor(config-sig-sig-ale-fir-yes)# exit  
sensor(config-sig-sig-ale-fir)# exit  
sensor(config-sig-sig-ale)# exit  
Step 10 Configure the signature to apply anti-evasive deobfuscation before searching:  
sensor(config-sig-sig)# engine service-http  
sensor(config-sig-sig-ser)# de-obfuscate true  
Step 11 Configure the Regex parameters.  
sensor(config-sig-sig)# engine service-http  
sensor(config-sig-sig-ser)# regex  
sensor(config-sig-sig-ser-reg)# specify-uri-regex yes  
sensor(config-sig-sig-ser-reg-yes)# uri-regex [Mm][Yy][Ff][Oo][Oo]  
Step 12 Exit Regex submode.  
sensor(config-sig-sig-ser-reg-yes)# exit  
sensor(config-sig-sig-ser-reg-)# exit  
Step 13 Configure the service ports using the signature variable WEBPORTS.  
sensor(config-sig-sig-ser)# service-ports $WEBPORTS  
Step 14 Exit signature definition submode.  
sensor(config-sig-sig-ser)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Step 15 Press Enter to apply the changes or enter no to discard them.  
Example Meta Engine Signature  
Caution  
A large number of Meta engine signatures could adversely affect overall sensor performance.  
The Meta engine defines events that occur in a related manner within a sliding time interval. This engine  
processes events rather than packets. As signature events are generated, the Meta engine inspects them  
to determine if they match any or several Meta definitions. The Meta engine generates a signature event  
after all requirements for the event are met.  
All signature events are handed off to the Meta engine by the Signature Event Action Processor. The  
Signature Event Action Processor hands off the event after processing the minimum hits option.  
Summarization and event action are processed after the Meta engine has processed the component  
events.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Meta Signature Engine Enhancement  
The purpose of the Meta engine is to detect a specified payload from an attacker and a corresponding  
payload from the victim. It is also used to inspect streams at different offsets. The Meta engine supports  
the AND and OR logical operators. ANDNOT capability has been added to the Meta engine. This clause  
is a negative clause used to complement the existing positive clause-based signatures. The previous  
signature format had the following form:  
IF (A and B and C) then Alarm; alternatively, IF (A or B or C) then Alarm is also  
supported; where A, B, and C are meta component signatures.  
The addition of the negative clause allows for the following logic:  
IF (A and/or B) AND NOT (C and/or D) then Alarm.  
The (C and/or D) is the negative clause and is satisfied if (C and D) [alternatively (C or D)] do not occur  
before the Meta Reset Interval time expires.  
A component of the positive clause must occur before the negative clause(s) to establish the Meta  
tracking state. The Meta engine cannot track the lack of past behavior. The state of the negative clause  
is evaluated when the Meta Reset Interval time expires.  
Caution  
A custom signature can affect the performance of your sensor. Test the custom signature against a  
baseline sensor performance for your network to determine the overall impact of the signature.  
The Meta engine is different from other engines in that it takes alerts as input where most engines take  
packets as input.  
The following options apply:  
component-list name1—Specifies the list of Meta components:  
edit—Edits an existing entry in the list.  
insert —Inserts a new entry into the list.  
move—Moves an entry in the list.  
begin—Places the entry at the beginning of the active list.  
end—Places the entry at the end of the active list.  
inactive—Places the entry into the inactive list.  
before—Places the entry before the specified entry.  
after—Places the entry after the specified entry.  
component-count—Specifies the number of times component must fire before this component  
is satisfied.  
component-sig-id—Specifies the signature ID of the signature to match this component on.  
component-subsig-id—Specifies the subsignature ID of the signature to match this component  
on.  
is-not-component {true | false}—Specifies that the component is a NOT component.  
component-list-in-order {true | false}—Specifies whether to have the component list fire in order.  
For example, if signature 1001 in the m2 component fires before signature 1000 in the m1  
component, the Meta signature will not fire.  
all-components-required {true | false}—Specifies to use all components. This option works with  
the all-not-components-required option, if you have NOT components configured as required, the  
Meta signature will not fire.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Creating Custom Signatures  
all-not-components-required {true | false}—Specifies to use all of the NOT components.  
swap-attacker-victim {true | false}—Swaps the attacker and victim addresses and ports (source  
and destination) in the alert message and in any actions taken.  
meta-reset-interval—Specifies the time in seconds to reset the Meta signature. The valid range is  
0 to 3600 seconds. The default is 60 seconds.  
meta-key—Specifies the storage type for the Meta signature:  
AaBb—Attacker and victim addresses and ports.  
AxBx—Attacker and victim addresses.  
Axxx—Attacker address.  
xxBx—Victim address.  
unique-victim-ports—Specifies the number of unique victims ports required per Meta signature.  
The valid range is 1 to 256.  
event-action—Specifies the action(s) to perform when an alert is triggered:  
deny-attacker-inline (inline only)—Does not transmit this packet and future packets from the  
attacker address for a specified period of time.  
deny-attacker-service-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker address victim port pair for a specified period of time.  
deny-attacker-victim-pair-inline (inline only)—Does not transmit this packet and future  
packets on the attacker/victim address pair for a specified period of time.  
deny-connection-inline (inline only)—Does not transmit this packet and future packets on the  
TCP flow.  
deny-packet-inline (inline only)—Does not transmit this packet.  
log-attacker-packets—Starts IP logging of packets containing the attacker address.  
log-pair-packets—Starts IP logging of packets containing the attacker-victim address pair.  
log-victim-packets—Starts IP logging of packets containing the victim address.  
produce-alert —Writes the event to the Event Store as an alert.  
produce-verbose-alert—Includes an encoded dump (possibly truncated) of the offending  
packet in the alert.  
request-block-connection—Sends a request to the ARC to block this connection.  
request-block-host—Sends a request to the ARC to block this attacker host.  
request-rate-limit—Sends a rate limit request to the ARC to perform rate limiting.  
request-snmp-trap—Sends a request to the Notification Application component of the sensor  
to perform SNMP notification.  
reset-tcp-connection—Sends TCP resets to hijack and terminate the TCP flow.  
modify-packet-inline— Modifies packet data to remove ambiguity about what the end point  
might do with the packet.  
Note  
Signature 64000 subsignature 0 will fire when it sees the alerts from signature 1000 subsignature 0 and  
signature 1001 subsignature 0 on the same source address. The source address selection is a result of the  
meta key default value of Axxx. You can change the behavior by changing the meta key setting to xxBx  
(destination address) for example.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Creating a Meta Engine Signature  
To create a signature based on the Meta engine, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Specify a signature ID and a subsignature ID for the signature. Custom signatures are in the range of  
60000 to 65000.  
sensor(config-sig)# signatures 64000 0  
Step 4  
Step 5  
Step 6  
Step 7  
Step 8  
Step 9  
Specify the signature engine.  
sensor(config-sig-sig)# engine meta  
Insert a signature (named m1) at the beginning of the list.  
sensor(config-sig-sig-met)# component-list insert m1 begin  
Specify the signature ID of the signature on which to match this component.  
sensor(config-sig-sig-met-com)# component-sig-id 1000  
Exit component list submode.  
sensor(config-sig-sig-met-com)# exit  
Insert another signature (named m2) at the end of the list.  
sensor(config-sig-sig-met)# component-list insert m2 end  
Specify the signature ID of the signature on which to match this component.  
sensor(config-sig-sig-met-com)# component-sig-id 1001  
Step 10 Configure the component list not to fire in order.  
sensor(config-sig-sig-met-com)# component-list-in-order false  
Step 11 Specify to use all components you have created.  
sensor(config-sig-sig-met-com)# all-components-required true  
Step 12 Specify not to use all of the NOT components.  
sensor(config-sig-sig-met-com)# all-not-components-required false  
Step 13 Verify the settings.  
sensor(config-sig-sig-met-com)# exit  
sensor-128(config-sig-sig-met)# show settings  
meta  
-----------------------------------------------  
event-action: produce-alert <defaulted>  
swap-attacker-victim: false <defaulted>  
meta-reset-interval: 60 <defaulted>  
component-list (ordered min: 1, max: 32, current: 2 - 2 active, 0 inactive)  
-----------------------------------------------  
ACTIVE list-contents  
-----------------------------------------------  
NAME: m1  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 7 Defining Signatures  
Creating Custom Signatures  
component-sig-id: 1000  
component-subsig-id: 0 default: 0  
component-count: 1 default: 1  
is-not-component: false <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
NAME: m2  
-----------------------------------------------  
component-sig-id: 1001  
component-subsig-id: 0 <defaulted>  
component-count: 1 <defaulted>  
is-not-component: true default: false  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
meta-key  
-----------------------------------------------  
Axxx  
-----------------------------------------------  
unique-victims: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
component-list-in-order: false default: false  
all-components-required: true default: true  
all-nots-required: false default: false  
-----------------------------------------------  
sensor(config-sig-sig-met)#  
Step 14 Exit signature definition submode.  
sensor(config-sig-sig-met)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Step 15 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For more information on Signature Event Action Processor, see Signature Event Action Processor,  
For more information on the Meta engine, see Meta Engine, page B-33.  
Example IPv6 Engine Signature  
Caution  
A custom signature can affect the performance of your sensor. Test the custom signature against a  
baseline sensor performance for your network to determine the overall impact of the signature.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Creating Custom Signatures  
The following example Atomic IP Advanced custom signature prohibits Protocol ID 88 over IPv6.  
To create a signature based on the Atomic IP Advanced signature engine, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
Step 3  
Specify a signature ID and a subsignature ID for the signature. Custom signatures are in the range of  
60000 to 65000.  
sensor(config-sig)# signatures 60000 0  
Step 4  
Step 5  
Step 6  
Step 7  
Specify the signature engine.  
sensor(config-sig-sig)# engine atomic-ip-advanced  
Specify the IP version.  
sensor(config-sig-sig-ato)# specify-ip-version yes  
Specify IPv6.  
sensor(config-sig-sig-ato-yes)# version ipv6  
Specify the L4 protocol.  
sensor(config-sig-sig-ato-yes-ipv)# exit  
sensor(config-sig-sig-ato-yes)# exit  
sensor(config-sig-sig-ato)# specify-l4-protocol yes  
Step 8  
Step 9  
Specify protocol ID 88.  
sensor(config-sig-sig-ato-yes)# l4-protocol other-protocol  
sensor(config-sig-sig-ato-yes-oth)# other-ip-protocol-id 88  
Verify the settings.  
sensor(config-sig-sig-ato-yes-oth)# show settings  
other-protocol  
-----------------------------------------------  
other-ip-protocol-id: 88  
-----------------------------------------------  
sensor(config-sig-sig-ato-yes-oth)#  
Step 10 Exit signature definition submode.  
sensor(config-sig-sig-ato-yes-oth)# exit  
sensor(config-sig-sig-ato-yes)# exit  
sensor(config-sig-sig-ato)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes?[yes]:  
Step 11 Press Enter to apply the changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 7 Defining Signatures  
Creating Custom Signatures  
For More Information  
For more information about the Atomic IP Advanced engine and a list of the parameters, see Atomic  
For more information on the Atomic engines, see Atomic Engine, page B-14.  
Example String XL TCP Engine Match Offset Signature  
Caution  
A custom signature can affect the performance of your sensor. Test the custom signature against a  
baseline sensor performance for your network to determine the overall impact of the signature.  
Note  
This procedure also applies to String XLUDP and String XL ICMP signatures, with the exception of the  
parameter service-ports, which does not apply to String XL ICMP signatures.  
The following example demonstrates how to create a custom String XL TCP signature that searches for  
exact, maximum, or minimum offsets. You can modify the following optional match offset parameters  
for this custom String XL TCP signature:  
specify-exact-match-offset {yes |no}—Enables exact match offset:  
exact-match-offset—Specifies the exact stream offset in bytes the regular expression string  
must report for a match to be valid. The value is 0 to 65535.  
specify-max-match-offset {yes |no}—Enables maximum match length:  
max-match-offset—Specifies the maximum stream offset in bytes the regular expression string  
must report for a match to be valid. The value is 0 to 65535.  
specify-min-match-offset {yes |no}—Enables minimum match offset:  
min-match-offset—Specifies the minimum stream offset in bytes the regular expression string  
must report for a match to be valid. The value is 0 to 65535.  
Creating a String XL TCP Engine Signature  
To create a custom signature based on the String XL TCP engine that searches for matches, follow these  
steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Step 4  
Specify a signature ID and subsignature ID for the signature. Custom signatures are in the range of 60000  
to 65000.  
sensor(config-sig)# signatures 60003 0  
Enter signature description submode.  
sensor(config-sig-sig)# sig-description  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Step 5  
Specify a name for the new signature. You can also specify a additional comments about the sig using  
the sig-comment command or additional information about the signature using the sig-string-info  
command.  
sensor(config-sig-sig-sig)# sig-name This is my new name  
Step 6  
Step 7  
Step 8  
Step 9  
Exit signature description submode.  
sensor(config-sig-sig-sig)# exit  
Specify the String XL TCP engine.  
sensor(config-sig-sig)# engine string-xl-tcp  
Specify the service ports.  
sensor(config-sig-sig-str)# service-ports 80  
Specify the direction.  
sensor(config-sig-sig-str)# direction to-service  
Step 10 Change the event actions if needed according to your security policy by using the event-action  
command. The default event action is produce-alert.  
Step 11 Make sure raw regex is turned off:  
sensor(config-sig-sig-str)# specify-raw-regex-string no  
Note  
Raw Regex is regular expression syntax used for raw mode processing. It is expert mode only  
and targeted for use by the Cisco IPS signature development team or only those who are under  
supervision by the Cisco IPS signature development team. You can configure a String XL  
signature in either regular Regex or raw Regex.  
Step 12 Specify the regex string to search for in the TCP packet.  
sensor(config-sig-sig-str-no)# regex-string tcpstring  
Step 13 Exit raw regex mode to configure optional String XL TCP parameters.  
sensor(config-sig-sig-str-no)# exit  
sensor(config-sig-sig-str)#  
Step 14 Specify an exact match offset for this signature.  
sensor(config-sig-sig-str)# specify-exact-match-offset yes  
sensor(config-sig-sig-str-yes)# exact-match-offset 20  
Note  
If you have exact match offset set to yes, you cannot configure maximum or minimum match  
offset. If you have exact match offset set to no, you can configure both maximum and minimum  
match offset at the same time.  
Step 15 Turn off exact match offset and specify a maximum match offset for this signature.  
sensor(config-sig-sig-str-yes)# exit  
sensor(config-sig-sig-str)# specify-exact-match-offset no  
sensor(config-sig-sig-str-no)# specify-max-match-offset yes  
sensor(config-sig-sig-str-no-yes)# max-match-offset 30  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Step 16 Specify a minimum match offset for this signature.  
sensor(config-sig-sig-str-no-yes)# exit  
sensor(config-sig-sig-str-no)# specify-min-match-offset yes  
sensor(config-sig-sig-str-no-yes)# min-match-offset 20  
Step 17 Verify the settings.  
sensor(config-sig-sig-str-no-yes)# exit  
sensor(config-sig-sig-str-no)# exit  
sensor(config-sig-sig-str)# show settings  
string-xl-tcp  
-----------------------------------------------  
event-action: produce-alert <defaulted>  
strip-telnet-options: false <defaulted>  
direction: to-service default: to-service  
service-ports: 80  
specify-max-stream-length  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
specify-raw-regex-string  
-----------------------------------------------  
no  
-----------------------------------------------  
regex-string: tcpstring  
dot-all: false <defaulted>  
end-optional: false <defaulted>  
no-case: false <defaulted>  
stingy: false <defaulted>  
utf8: false <defaulted>  
specify-min-match-length  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
swap-attacker-victim: false <defaulted>  
specify-exact-match-offset  
-----------------------------------------------  
no  
-----------------------------------------------  
specify-max-match-offset  
-----------------------------------------------  
yes  
-----------------------------------------------  
max-match-offset: 30  
-----------------------------------------------  
-----------------------------------------------  
specify-min-match-offset  
-----------------------------------------------  
yes  
-----------------------------------------------  
min-match-offset: 20  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-sig-sig-str)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Step 18 Exit signature definition submode.  
sensor(config-sig-sig-str)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Step 19 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For detailed information about the String XL signature engine, see String XL Engines, page B-65.  
Example String XL TCP Engine Minimum Match Length Signature  
Caution  
A custom signature can affect the performance of your sensor. Test the custom signature against a  
baseline sensor performance for your network to determine the overall impact of the signature.  
Note  
This procedure also applies to String XL UDP and String XL ICMP signatures, with the exception of the  
parameter service-ports, which does not apply to String XL ICMP signatures.  
You can modify the following optional parameters to work with a specific Regex string:  
dot-all true {true | false}—If set to true, matches [\x00-\xFF] including \n; if set to false, matches  
anything in the range [\x00-\xFF] except \n. The default is false.  
specify-min-match-length {yes | no}—Enables minimum match length:  
min-match-length—Specifies the maximum number of bytes the regular expression string  
must match for the pattern to be considered a hit. The value is 0 to 65535.  
stingy {true | false}—If set to true, specifies to stop looking for larger matches after the first  
completed match. The default is false.  
Note  
Stingy can only be used with min-match-length; otherwise, it is ignored.  
utf8 {true | false}—If set to true, treats all legal UTF-8 byte sequences in the expression as a single  
character. The default is false.  
Creating a String XL TCP Engine Signature  
The following example demonstrates how to create a custom String XL TCP signature that searches for  
minimum match length with stingy, dot all, and UTF-8 turned on.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Creating Custom Signatures  
To create a custom signature based on the String XL TCP engine that searches for minimum match length  
with stingy, dot all, and UTF-8 turned on, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig1  
Step 3  
Specify a signature ID and subsignature ID for the signature.  
sensor(config-sig)# signatures 60004 0  
Custom signatures are in the range of 60000 to 65000.  
Step 4  
Step 5  
Enter signature description submode.  
sensor(config-sig-sig)# sig-description  
Specify a name for the new signature. You can also specify a additional comments about the sig using  
the sig-comment command or additional information about the signature using the sig-string-info  
command.  
sensor(config-sig-sig-sig)# sig-name This is my new name  
Step 6  
Step 7  
Step 8  
Step 9  
Exit signature description submode.  
sensor(config-sig-sig-sig)# exit  
Specify the String XL TCP engine.  
sensor(config-sig-sig)# engine string-xl-tcp  
Specify the service ports.  
sensor(config-sig-sig-str)# service-ports 80  
Specify the direction.  
sensor(config-sig-sig-str)# direction to-service  
Step 10 Change the event actions if needed according to your security policy by using the event-action  
command. The default event action is produce-alert.  
Step 11 Make sure raw regex is turned off:  
sensor(config-sig-sig-str)# specify-raw-regex-string no  
Note  
Raw Regex is regular expression syntax used for raw mode processing. It is expert mode only  
and targeted for use by the Cisco IPS signature development team or only those who are under  
supervision by the Cisco IPS signature development team. You can configure a String XL  
signature in either regular Regex or raw Regex.  
Step 12 Specify the regex string to search for in the TCP packet with dot all turned on.  
sensor(config-sig-sig-str-no)# regex-string ht+p[\r].  
sensor(config-sig-sig-str-no)# dot-all true  
Step 13 Specify a minimum match length for this signature that can only be used with stingy.  
sensor(config-sig-sig-str-no)# specify-min-match-length yes  
sensor(config-sig-sig-str-no-yes)# min-match-length 100  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 7 Defining Signatures  
Creating Custom Signatures  
sensor(config-sig-sig-str-no-yes)# exit  
sensor(config-sig-sig-str-no)# stingy true  
Step 14 Verify the settings:  
sensor(config-sig-sig-str-no)# show settings  
no  
-----------------------------------------------  
regex-string: ht+p[\r\].  
dot-all: true default: false  
end-optional: false <defaulted>  
no-case: false <defaulted>  
stingy: true default: false  
utf8: false <defaulted>  
specify-min-match-length  
-----------------------------------------------  
yes  
-----------------------------------------------  
min-match-length: 100  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-sig-sig-str-no)#  
Step 15 Specify a new Regex string to search for and turn on UTF-8.  
sensor(config-sig-sig-str-no)# regex-string \x5c\x31\x30\x2e\x30[\x00-\xff]+\  
x2e\x31\x5c\x74\x65\x6d\x70  
sensor(config-sig-sig-str-no)# utf8 true  
Step 16 Verify the settings:  
sensor(config-sig-sig-str-no)# show settings  
no  
-----------------------------------------------  
regex-string: \x5c\x31\x30\x2e\x30[\x00-\xff]+\x2e\x31\x5c\x74\x65\x6d\x70  
dot-all: true default: false  
end-optional: false <defaulted>  
no-case: false <defaulted>  
stingy: true default: false  
utf8: true default: false  
specify-min-match-length  
-----------------------------------------------  
yes  
-----------------------------------------------  
min-match-length: 100  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
Step 17 Exit signature definition submode.  
sensor(config-sig-sig-str-no)# exit  
sensor(config-sig-sig-str)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Step 18 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For detailed information about the String XL signature engine, see String XL Engines, page B-65.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Defining Signatures  
Creating Custom Signatures  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
7-58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
8
Configuring Event Action Rules  
This chapter explains how to add event action rules policies and how to configure event action rules. It  
contains the following sections:  
Event Action Rules Notes and Caveats  
The following notes and caveats apply to configuring event action rules:  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a  
block or rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action  
is not carried out.  
Global correlation inspection and the reputation filtering deny features do not support IPv6  
addresses. For global correlation inspection, the sensor does not receive or process reputation data  
for IPv6 addresses. The risk rating for IPv6 addresses is not modified for global correlation  
inspection. Similarly, network participation does not include event data for attacks from IPv6  
addresses. And finally, IPv6 addresses do not appear in the deny list.  
You must preface the event variable with a dollar ($) sign to indicate that you are using a variable  
rather than a string.  
Connection blocks and network blocks are not supported on adaptive security appliances. Adaptive  
security appliances only support host blocks with additional connection information.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 8 Configuring Event Action Rules  
Understanding Security Policies  
You cannot delete the event action override for deny-packet-inline because it is protected. If you do  
not want to use that override, set the override-item-status to disabled for that entry.  
Passive OS fingerprinting is enabled by default and the IPS contains a default vulnerable OS list for  
each signature.  
Understanding Security Policies  
You can create multiple security policies and apply them to individual virtual sensors. A security policy  
is made up of a signature definition policy, an event action rules policy, and an anomaly detection policy.  
Cisco IPS contains a default signature definition policy called sig0, a default event action rules policy  
called rules0, and a default anomaly detection policy called ad0. You can assign the default policies to  
a virtual sensor or you can create new policies. The use of multiple security policies lets you create  
security policies based on different requirements and then apply these customized policies per VLAN or  
physical interface.  
Understanding Event Action Rules  
Event action rules are a group of settings you configure for the event action processing component of the  
sensor. These rules dictate the actions the sensor performs when an event occurs. The event action  
processing component is responsible for the following functions:  
Calculating the risk rating  
Adding event action overrides  
Filtering event action  
Executing the resulting event action  
Summarizing and aggregating events  
Maintaining a list of denied attackers  
Note  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or  
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried  
out.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 8 Configuring Event Action Rules  
Signature Event Action Processor  
Signature Event Action Processor  
The Signature Event Action Processor coordinates the data flow from the signature event in the Alarm  
Channel to processing through the Signature Event Action Override, the Signature Event Action Filter,  
and the Signature Event Action Handler. It consists of the following components:  
Alarm Channel—The unit that represents the area to communicate signature events from the  
SensorApp inspection path to signature event handling.  
Signature Event Action Override—Adds actions based on the risk rating value. Signature Event  
Action Override applies to all signatures that fall in the range of the configured risk rating threshold.  
Each Signature Event Action Override is independent and has a separate configuration value for  
each action type.  
Signature Event Action Filter—Subtracts actions based on the signature ID, addresses, and risk  
rating of the signature event. The input to the Signature Event Action Filter is the signature event  
with actions possibly added by the Signature Event Action Override.  
Note  
The Signature Event Action Filter can only subtract actions, it cannot add new actions.  
The following parameters apply to the Signature Event Action Filter:  
Signature ID  
Subsignature ID  
Attacker address  
Attacker port  
Victim address  
Victim port  
Risk rating threshold range  
Actions to subtract  
Sequence identifier (optional)  
Stop-or-continue bit  
Enable action filter line bit  
Victim OS relevance or OS relevance  
Signature Event Action Handler—Performs the requested actions. The output from the Signature  
Event Action Handler is the actions being performed and possibly an evIdsAlert written to the Event  
Store.  
Figure 8-1 on page 8-4 illustrates the logical flow of the signature event through the Signature Event  
Action Processor and the operations performed on the action for this event. It starts with the signature  
event with configured action received in the Alarm Channel and flows top to bottom as the signature  
event passes through the functional components of the Signature Event Action Processor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Chapter 8 Configuring Event Action Rules  
Event Actions  
Figure 8-1  
Signature Event Through Signature Event Action Processor  
Signature event with  
configured action  
Signature event  
Event count  
Consumed  
signature event  
Signature event  
action override  
Add action based on RR  
Signature event  
action filter  
Subtract action based on  
signature, address, port, RR, etc.  
Signature event  
summary filter  
Subtract action based on  
current summary mode  
Signature event  
action handler  
Perform action  
For More Information  
For more information on risk rating, see Calculating the Risk Rating, page 8-13.  
Event Actions  
The IPS has the following event actions:  
Alert and Log Actions  
produce-alert—Writes the event to the Event Store as an alert.  
Note  
The produce-alert action is not automatic when you enable alerts for a signature. To have an  
alert created in the Event Store, you must select produce-alert. If you add a second action,  
you must include produce-alert if you want an alert sent to the Event Store. Also, every time  
you configure the event actions, a new list is created and it replaces the old list. Make sure  
you include all the event actions you need for each signature.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 8 Configuring Event Action Rules  
Event Actions  
Note  
There are other event actions that force a produce-alert. These actions use produce-alert as  
the vehicle for performing the action. Even if produce-alert is not selected or is filtered, the  
alert is still produced. The actions are the following: produce-verbose-alert,  
request-snmp-trap, log-attacker-packets, log-victim-packets, and log-pair-packets.  
Note  
A produce-alert event action is added for an event when global correlation has increased the  
risk rating of an event, and has added either the deny-packet-inline or deny-attacker-inline  
event action.  
produce-verbose-alert—Includes an encoded dump of the offending packet in the alert. This action  
causes an alert to be written to the Event Store, even if produce-alert is not selected.  
log-attacker-packets—Starts IP logging on packets that contain the attacker address and sends an  
alert. This action causes an alert to be written to the Event Store, even if produce-alert is not  
selected.  
log-victim-packets—Starts IP logging on packets that contain the victim address and sends an alert.  
This action causes an alert to be written to the Event Store, even if produce-alert is not selected.  
log-pair-packets—Starts IP logging on packets that contain the attacker/victim address pair. This  
action causes an alert to be written to the Event Store, even if produce-alert is not selected.  
request-snmp-trap—Sends a request to the Notification Application component of the sensor to  
perform SNMP notification. This action causes an alert to be written to the Event Store, even if  
produce-alert is not selected. You must have SNMP configured on the sensor to implement this  
action.  
Deny Actions  
deny-packet-inline (inline only)—Terminates the packet.  
Note  
You cannot delete the event action override for deny-packet-inline because it is protected. If  
you do not want to use that override, set the override-item-status to disabled for that entry.  
deny-connection-inline (inline only)—Terminates the current packet and future packets on this TCP  
flow.  
deny-attacker-victim-pair-inline (inline only)—Does not transmit this packet and future packets on  
the attacker/victim address pair for a specified period of time.  
deny-attacker-service-pair-inline (inline only)—Does not transmit this packet and future packets on  
the attacker address victim port pair for a specified period of time.  
deny-attacker-inline (inline only)—Terminates the current packet and future packets from this  
attacker address for a specified period of time.  
The sensor maintains a list of attackers being denied by the system. To remove an entry from the  
denied attacker list, you can view the list of attackers and clear the entire list, or you can wait for  
the timer to expire. The timer is a sliding timer for each entry. Therefore, if attacker A is being  
denied, but issues another attack, the timer for attacker A is reset and attacker A remains in the  
denied attacker list until the timer expires. If the denied attacker list is at capacity and cannot add a  
new entry, the packet is still denied.  
modify-packet-inline (inline only)—Modifies packet data to remove ambiguity about what the end  
point might do with the packet.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 8 Configuring Event Action Rules  
Event Actions  
Note  
You cannot use modify-packet-inline as an action when adding event action filters or  
overrides.  
Other Actions  
request-block-connection—Sends a request to ARC to block this connection. You must have  
blocking devices configured to implement this action.  
Note  
Connection blocks and network blocks are not supported on adaptive security appliances.  
Adaptive security appliances only support host blocks with additional connection  
information.  
Note  
IPv6 does not support request-block-connection.  
request-block-host—Sends a request to ARC to block this attacker host. You must have blocking  
devices configured to implement this action.  
Note  
IPv6 does not support request-block-host.  
request-rate-limit—Sends a rate limit request to ARC to perform rate limiting. You must have rate  
limiting devices configured to implement this action.  
Note  
The request-rate-limit action applies to a select set of signatures.  
Note  
IPv6 does not support request-rate-limit.  
reset-tcp-connection—Sends TCP resets to hijack and terminate the TCP flow. The  
reset-tcp-connection action only works on TCP signatures that analyze a single connection. It does  
not work for sweeps or floods.  
Understanding Deny Packet Inline  
For signatures that have deny-packet-inline configured as an action or for an event action override that  
adds deny-packet-inline as an action, the following actions may be taken:  
dropped-packet  
denied-flow  
tcp-one-way-reset-sent  
The deny-packet-inline action is represented as a dropped packet action in the alert. When a  
deny-packet-inline occurs for a TCP connection, it is automatically upgraded to a  
deny-connection-inline action and seen as a denied flow in the alert. If the IPS denies just one packet,  
the TCP continues to try to send that same packet again and again, so the IPS denies the entire connection  
to ensure it never succeeds with the resends.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 8 Configuring Event Action Rules  
Event Action Rules Configuration Sequence  
When a deny-connection-inline occurs, the IPS also automatically sends a TCP one-way reset, which  
shows up as a TCP one-way reset sent in the alert. When the IPS denies the connection, it leaves an open  
connection on both the client (generally the attacker) and the server (generally the victim). Too many  
open connections can result in resource problems on the victim. So the IPS sends a TCP reset to the  
victim to close the connection on the victim side (usually the server), which conserves the resources of  
the victim. It also prevents a failover that would otherwise allow the connection to fail over to a different  
network path and reach the victim. The IPS leaves the attacker side open and denies all traffic from it.  
TCP Reset Differences Between IPS Appliances and ASA IPS Modules  
The IPS appliance sends TCP reset packets to both the attacker and victim when reset-tcp-connection is  
selected. The IPS appliance sends a TCP reset packet only to the victim under the following  
circumstances:  
When a deny-packet-inline or deny-connection-inline is selected  
When TCP-based signatures and reset-tcp-connection have NOT been selected  
In the case of the ASA IPS modules, the TCP reset request is sent to the ASA, and then the ASA sends  
the TCP reset packets. The ASA sends TCP reset packets to both the attacker and victim when the  
reset-tcp-connection is selected. When deny-packet-inline or deny-connection-inline is selected, the  
ASA sends the TCP reset packet to either the attacker or victim depending on the configuration of the  
signature. Signatures configured to swap the attacker and victim when reporting the alert can cause the  
ASA to send the TCP reset packet to the attacker.  
TCP Normalizer Signature Warning  
You receive the following warning if you disable a default-enabled TCP Normalizer signature or remove  
a default-enabled modify packet inline, deny packet inline, or deny connection inline action:  
Use caution when disabling, retiring, or changing the event action settings of a <Sig ID>  
TCP Normalizer signature for a sensor operating in IPS mode. The TCP Normalizer signature  
default values are essential for proper operation of the sensor.  
If the sensor is seeing duplicate packets, consider assigning the traffic to multiple  
virtual sensors. If you are having problems with asymmetric or out-of-order TCP packets,  
consider changing the normalizer mode from strict evasion protection to asymmetric mode  
protection. Contact Cisco TAC if you require further assistance.  
For More Information  
For procedure for configuring denied attackers, see Monitoring and Clearing the Denied Attackers  
For the procedure for configuring the general settings, see Configuring the General Settings,  
For the procedures for configuring blocking devices, see Chapter 14, “Configuring Attack Response  
For the procedures for configuring SNMP, see Chapter 15, “Configuring SNMP.”  
Event Action Rules Configuration Sequence  
Follow these steps when configuring the event action rules component of the IPS:  
1. Create any variables that you want to use in event action filters.  
2. Create target value ratings. Assign target value ratings to your network assets so that you can  
calculate the risk rating.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 8 Configuring Event Action Rules  
Working With Event Action Rules Policies  
3. Create overrides to add actions based on the risk rating value. Assign a risk rating to each event  
action type.  
4. Create filters. Assign filters to subtract actions based on the ID, IP addresses, and risk rating of the  
signature.  
5. Create OS mappings. OS mappings are used for the attack relevance rating in the calculation of the  
risk rating for an alert.  
6. Configure the general settings. Specify whether you want to use the summarizer, the meta event  
generator, or configure denied attacker parameters.  
Working With Event Action Rules Policies  
Use the service event-action-rules name command in service event action rules submode to create an  
event action rules policy. The values of this event action rules policy are the same as the default event  
action rules policy, rules0, until you edit them. Or you can use the copy event-action-rules  
source_destination command in privileged EXEC mode to make a copy of an existing policy and then  
edit the values of the new policy as needed. Use the list event-action-rules-configurations command  
in privileged EXEC mode to list the event action rules policies. Use the no service event-action-rules  
name command in global configuration mode to delete an event action rules policy. Use the default  
service event-action-rules name command in global configuration mode to reset the event action rules  
policy to factory settings.  
Working With Event Action Rules Policies  
To create, copy, display, edit, and delete event action rules policies, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Create an event action rules policy.  
sensor# configure terminal  
sensor(config)# service event-action-rules MyRules  
sensor(config-eve)# exit  
Apply Changes?[yes]: yes  
sensor(config)# exit  
sensor#  
Step 3  
Copy an existing event action rules policy to a new event action rules policy.  
sensor# copy event-action-rules rules0 rules1  
sensor#  
Note  
You receive an error if the policy already exists or if there is not enough space available for the  
new policy.  
Step 4  
Accept the default event action rules policy values or edit the following parameters.  
a. Add event action rules variables.  
b. Configure event action rules overrides.  
c. Configure event action rules filters.  
d. Configure the event action rules general settings.  
e. Configure the event action rules target value rating.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                       
Chapter 8 Configuring Event Action Rules  
Event Action Variables  
f. Configure the event action rules OS identification settings.  
Step 5  
Display a list of event action rules policies on the sensor:  
sensor# list event-action-rules-configurations  
Event Action Rules  
Instance  
rules0  
temp  
MyRules  
rules1  
Size  
255  
707  
255  
141  
Virtual Sensor  
vs0  
N/A  
N/A  
vs1  
sensor#  
Step 6  
Delete an event action rules policy.  
sensor(config)# no service event-action-rules MyRules  
sensor(config)#  
Note  
You cannot delete the default event action rules policy, rules0.  
Step 7  
Confirm the event action rules instance has been deleted.  
sensor# list event-action-rules-configurations  
Event Action Rules  
Instance  
rules0  
rules1  
Size  
112  
142  
Virtual Sensor  
vs0  
N/A  
sensor#  
Step 8  
Reset an event action rules policy to factory settings.  
sensor# configure terminal  
sensor(config)# default service event-action-rules rules1  
sensor(config)#  
For More Information  
For the procedure for adding event action rules variables, see Event Action Variables, page 8-9.  
For the procedure for configuring event action rules overrides, see Configuring Event Action  
For the procedure for configuring event action rules filters, see Configuring Event Action Filters,  
For the procedure for configuring the general settings, see Configuring General Settings, page 8-32.  
For the procedure for configuring event action rules target value ratings, see Configuring Target  
For the procedure for configuring OS maps, see Configuring OS Identifications, page 8-26.  
Event Action Variables  
This section describes event action variables, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 8 Configuring Event Action Rules  
Event Action Variables  
Understanding Event Action Variables  
Note  
Global correlation inspection and the reputation filtering deny features do not support IPv6 addresses.  
For global correlation inspection, the sensor does not receive or process reputation data for IPv6  
addresses. The risk rating for IPv6 addresses is not modified for global correlation inspection. Similarly,  
network participation does not include event data for attacks from IPv6 addresses. And finally, IPv6  
addresses do not appear in the deny list.  
Note  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or  
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried  
out.  
You can create event variables and then use those variables in event action filters. When you want to use  
the same value within multiple filters, use a variable. When you change the value of the variable, any  
filter that uses that variable is updated with the new value.  
Note  
You must preface the event variable with a dollar ($) sign to indicate that you are using a variable rather  
than a string.  
Some variables cannot be deleted because they are necessary to the signature system. If a variable is  
protected, you cannot select it to edit it. You receive an error message if you try to delete protected  
variables. You can edit only one variable at a time.  
IPv4 Addresses  
When configuring IPv4 addresses, specify the full IP address or ranges or set of ranges:  
192.0.2.3-192.0.2.26  
10.90.1.1  
192.56.10.1-192.56.10.255  
10.1.1.1-10.2.255.255, 192.0.2.3-192.0.2.26  
IPv6 Addresses  
When configuring IPv6 addresses, use the following format:  
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XX  
XX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXX  
X:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>]  
Note  
IPv6 addresses are 128 bits represented in hexadecimal and divided into eight 16-bit groups  
separated by colons. You can skip the leading zeros and you can represent the zeroed groups in  
the middle with a double colon (::). You must start the address with the 2001:db8 prefix.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 8 Configuring Event Action Rules  
Event Action Variables  
Timesaver  
If you have an IP address space that applies to your engineering group and there are no Windows systems  
in that group, and you are not worried about any Windows-based attacks to that group, you could set up  
a variable to be the IP address space of the engineering group. You could then use this variable to  
configure a filter that would ignore all Windows-based attacks for this group.  
Adding, Editing, and Deleting Event Action Variables  
Note  
Global correlation inspection and the reputation filtering deny features do not support IPv6 addresses.  
For global correlation inspection, the sensor does not receive or process reputation data for IPv6  
addresses. The risk rating for IPv6 addresses is not modified for global correlation inspection. Similarly,  
network participation does not include event data for attacks from IPv6 addresses. And finally, IPv6  
addresses do not appear in the deny list.  
Note  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or  
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried  
out.  
Use the variables variable_name address ip_address command in service event action rules submode  
to create an IPv4 event action variable. The IPv4 address can be one address, a range, or ranges separated  
by a comma. Use the variables variable_name ipv6-address ip_address command in service event  
action rules submode to create an IPv6 event action variable. Use the no variables variable_name  
command in service event action rules submode to delete an event action variable.  
Note  
IPv6 addresses are 128 bits represented in hexadecimal and divided into eight 16-bit groups separated  
by colons. You can skip the leading zeros and you can represent the zeroed groups in the middle with a  
double colon (::). You must start the address with the 2001:db8 prefix.  
Working With Event Action Variables  
To add, delete, and edit event action variables, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter event action rules submode.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules0  
Step 3  
Step 4  
Add an IPv4 event action rules variable. The valid values for address are A.B.C.D-A.B.C.D  
[,A.B.C.D-A.B.C.D].  
sensor(config-eve)# variables variable-ipv4 address 192.0.2.3  
Add an IPv6 event action rules variable. The valid form for ipv6-address is:  
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XX  
XX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXX  
X:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>]  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 8 Configuring Event Action Rules  
Event Action Variables  
sensor(config-eve)# variables variable-ipv6 ipv6-address  
2001:0db8:3c4d:0015:0000:0000:abcd:ef12  
Step 5  
Verify that you added the event action rules variable.  
sensor(config-eve)# show settings  
variables (min: 0, max: 256, current: 2)  
-----------------------------------------------  
variableName: variable-ipv6  
-----------------------------------------------  
ipv6-address: 2001:0db8:3c4d:0015:0000:0000:abcd:ef12 default: ::0-FFFF  
:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF  
-----------------------------------------------  
variableName: variable-ipv4  
-----------------------------------------------  
address: 192.0.2.3 default: 0.0.0.0-255.255.255.255  
-----------------------------------------------  
-----------------------------------------------  
Step 6  
Step 7  
To edit an event action rules variable, change the IPv6 address to a range.  
sensor(config-eve)# variables variable-ipv6 ipv6-address  
::0-FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF  
Verify that you edited the event action rules variable.  
sensor(config-eve)# show settings  
variables (min: 0, max: 256, current: 2)  
-----------------------------------------------  
variableName: variable-ipv6  
-----------------------------------------------  
ipv6-address: ::0-FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF default: ::0  
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF  
-----------------------------------------------  
Step 8  
Step 9  
Delete an event action rules variable.  
sensor(config-eve)# no variables variable-ipv6  
Verify the event action rules variable you deleted.  
sensor(config-eve)# show settings  
variables (min: 0, max: 256, current: 1)  
-----------------------------------------------  
variableName: variableipv4  
-----------------------------------------------  
address: 192.0.2.3 default: 0.0.0.0-255.255.255.255  
-----------------------------------------------  
-----------------------------------------------  
Step 10 Exit event action rules submode.  
sensor(config-eve)# exit  
Apply Changes:?[yes]:  
Step 11 Press Enter to apply your changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Configuring Event Action Rules  
Configuring Target Value Ratings  
Configuring Target Value Ratings  
This section describes what risk rating is and how to use it to configure target value ratings. This section  
contains the following topics:  
Calculating the Risk Rating  
A risk rating (RR) is a value between 0 and 100 that represents a numerical quantification of the risk  
associated with a particular event on the network. The calculation takes into account the value of the  
network asset being attacked (for example, a particular server), so it is configured on a per-signature  
basis using the attack severity rating and the signature fidelity rating, and on a per-server basis using the  
target value rating. The risk rating is calculated from several components, some of which are configured,  
some collected, and some derived.  
Note  
The risk rating is associated with alerts not signatures.  
Risk ratings let you prioritize alerts that need your attention. These risk rating factors take into  
consideration the severity of the attack if it succeeds, the fidelity of the signature, the reputation score  
of the attacker from the global correlation data, and the overall value of the target host to you. The risk  
rating is reported in the evIdsAlert.  
The following values are used to calculate the risk rating for a particular event:  
Signature fidelity rating (SFR)—A weight associated with how well this signature might perform in  
the absence of specific knowledge of the target. The signature fidelity rating is configured per  
signature and indicates how accurately the signature detects the event or condition it describes.  
Signature fidelity rating is calculated by the signature author on a per-signature basis. The signature  
author defines a baseline confidence ranking for the accuracy of the signature in the absence of  
qualifying intelligence on the target. It represents the confidence that the detected behavior would  
produce the intended effect on the target platform if the packet under analysis were allowed to be  
delivered. For example, a signature that is written with very specific rules (specific regular  
expression) has a higher signature fidelity rating than a signature that is written with generic rules.  
Note  
The signature fidelity rating does not indicate how bad the detected event may be.  
Attack severity rating (ASR)—A weight associated with the severity of a successful exploit of the  
vulnerability. The attack severity rating is derived from the alert severity parameter (informational,  
low, medium, or high) of the signature. The attack severity rating is configured per signature and  
indicates how dangerous the event detected is.  
Note  
The attack severity rating does not indicate how accurately the event is detected.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Chapter 8 Configuring Event Action Rules  
Configuring Target Value Ratings  
Target value rating (TVR)—A weight associated with the perceived value of the target.  
Target value rating is a user-configurable value (zero, low, medium, high, or mission critical) that  
identifies the importance of a network asset (through its IP address). You can develop a security  
policy that is more stringent for valuable corporate resources and looser for less important resources.  
For example, you could assign a target value rating to the company web server that is higher than  
the target value rating you assign to a desktop node. In this example, attacks against the company  
web server have a higher risk rating than attacks against the desktop node. Target value rating is  
configured in the event action rules policy.  
Attack relevance rating (ARR)—A weight associated with the relevancy of the targeted operating  
system. Attack relevancy rating is a derived value (relevant, unknown, or not relevant), which is  
determined at alert time. The relevant operating systems are configured per signature.  
Promiscuous delta (PD)—A weight associated with the promiscuous delta, which can be subtracted  
from the overall risk rating in promiscuous mode. Promiscuous delta is in the range of 0 to 30 and  
is configured per signature.  
Note  
If the trigger packet is not inline, the promiscuous delta is subtracted from the rating.  
Watch list rating (WLR)—A weight associated with the CSA MC watch list in the range of 0 to 100  
(CSA MC only uses the range 0 to 35). If the attacker for the alert is found on the watch list, the  
watch list rating for that attacker is added to the rating.  
Figure 8-2 illustrates the risk rating formula:  
Figure 8-2  
Risk Rating Formula  
ASR TVR SFR  
*
*
RR =  
+ ARR - PD + WLR  
10000  
Understanding Threat Rating  
\
Threat rating is risk rating that has been lowered by event actions that have been taken. Nonlogging event  
actions have a threat rating adjustment. The largest threat rating from all the event actions taken is  
subtracted from the risk rating. The event actions have the following threat ratings:  
deny-attacker-inline—45  
deny-attacker-victim-pair-inline—40  
deny-attacker-service-pair-inline—40  
deny-connection-inline—35  
deny-packet-inline—35  
modify-packet-inline—35  
request-block-host—20  
request-block-connection—20  
reset-tcp-connection—20  
request-rate-limit—20  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                           
Chapter 8 Configuring Event Action Rules  
Configuring Target Value Ratings  
Adding, Editing, and Deleting Target Value Ratings  
Note  
Global correlation inspection and the reputation filtering deny features do not support IPv6 addresses.  
For global correlation inspection, the sensor does not receive or process reputation data for IPv6  
addresses. The risk rating for IPv6 addresses is not modified for global correlation inspection. Similarly,  
network participation does not include event data for attacks from IPv6 addresses. And finally, IPv6  
addresses do not appear in the deny list.  
Note  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or  
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried  
out.  
You can assign a target value rating to your network assets. The target value rating is one of the factors  
used to calculate the risk rating value for each alert. You can assign different target value ratings to  
different targets. Events with a higher risk rating trigger more severe signature event actions.  
For IPv4 address, use the target-value {zerovalue | low | medium | high | mission-critical}  
target-address ip_address command in service event action rules submode to add target value ratings  
for your network assets. The default is medium. Use the no target-value {zerovalue | low | medium |  
high | mission-critical} command in service event action rules submode to delete target value ratings.  
For IPv6 addresses, use the ipv6-target-value {zerovalue | low | medium | high | mission-critical}  
ipv6-target-address ip_address command in service event action rules submode to add target value  
ratings for your network assets. The default is medium. Use the no ipv6-target-value {zerovalue | low  
| medium | high | mission-critical} command in service event action rules submode to delete target  
value ratings.  
The following options apply:  
target-value—Specifies the IPv4 target value rating:  
zerovalue—No value of this target.  
low—Lower value of this target.  
medium—Normal value of this target (default).  
high—Elevated value of this target.  
mission-critical—Extreme value of this target.  
no target-value—Removes the IPv4 target value rating.  
target-address ip_address—Specifies the range set of IP address(es) for IPv4 addresses in the  
following form: <A.B.C.D>-<A.B.C.D>[,<A.B.C.D>-<A.B.C.D>]  
ipv6-target-value—Specifies the IPv6 target value rating:  
zerovalue—No value of this target.  
low—Lower value of this target.  
medium—Normal value of this target (default).  
high—Elevated value of this target.  
mission-critical—Extreme value of this target.  
no ipv6-target-value—Removes the IPv6 target value rating.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Chapter 8 Configuring Event Action Rules  
Configuring Target Value Ratings  
ipv6-target-address ip_address—Specifies the range set of IP address(es) for IPv6 addresses in the  
following form:  
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:  
XXXX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-  
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>]  
Adding, Editing, and Deleting Target Value Ratings  
To add, edit, and delete target value ratings for your network assets, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter event action rules submode.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules1  
Step 3  
Step 4  
Assign an IPv4 target value rating to the network asset.  
sensor(config-eve)# target-value mission-critical target-address 192.0.2.0  
Assign an IPv6 target value rating to the network asset.  
sensor(config-eve)# ipv6-target-value mission-critical ipv6-target-address  
2001:0db8:3c4d:0015:0000:0000:abcd:ef12  
Step 5  
Verify that you added the target value rating.  
sensor(config-eve)# show settings  
-----------------------------------------------  
target-value (min: 0, max: 5, current: 1)  
-----------------------------------------------  
target-value-setting: mission-critical  
target-address: 192.0.2.0 default: 0.0.0.0-255.255.255.255  
-----------------------------------------------  
ipv6-target-value (min: 0, max: 5, current: 2)  
-----------------------------------------------  
ipv6-target-value-setting: mission-critical  
ipv6-target-address: 2001:0db8:3c4d:0015:0000:0000:abcd:ef12 default: ::0-  
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF  
-----------------------------------------------  
sensor(config-eve)#  
Step 6  
Step 7  
To edit a target value rating, change the target value rating setting of the asset.  
sensor(config-eve)# target-value low target-address 192.0.2.0  
Verify that you edited the target value rating.  
sensor(config-eve)# show settings  
-----------------------------------------------  
target-value (min: 0, max: 5, current: 1)  
-----------------------------------------------  
target-value-setting: low  
target-address: 192.0.2.0 default: 0.0.0.0-255.255.255.255  
-----------------------------------------------  
Step 8  
Step 9  
Delete the target value rating.  
sensor(config-eve)# no ipv6-target-value mission-critical  
Verify that you deleted the target value rating.  
sensor(config-eve)# show settings  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Overrides  
ipv6-target-value (min: 0, max: 5, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
Step 10 Exit event action rules submode.  
sensor(config-rul)# exit  
Apply Changes:?[yes]:  
Step 11 Press Enter to apply your changes or enter no to discard them.  
Configuring Event Action Overrides  
This section describes event action overrides, and contains the following topics:  
Understanding Event Action Overrides  
You can add an event action override to change the actions associated with an event based on the risk  
rating of that event. Event action overrides are a way to add event actions globally without having to  
configure each signature individually. Each event action has an associated risk rating range. If a  
signature event occurs and the risk rating for that event falls within the range for an event action, that  
action is added to the event. For example, if you want any event with a risk rating of 85 or more to  
generate an SNMP trap, you can set the risk rating range for request-snmp-trap to 85-100. If you do not  
want to use action overrides, you can disable the entire event action override component.  
Note  
Connection blocks and network blocks are not supported on adaptive security appliances. Adaptive  
security appliances only support host blocks with additional connection information.  
Adding, Editing, Enabling, and Disabling Event Action Overrides  
Use the overrides {request-block-connection | request-block-host | deny-attacker-inline |  
deny-packet-inline | deny-attacker-service-pair-inline | deny-attacker-victim-pair-inline |  
deny-connection-inline | log-attacker-packets | log-victim-packets | log-pair-packets |  
reset-tcp-connection | produce-alert | produce-verbose-alert | request-rate-limit |  
request-snmp-trap} command in service event action rules submode to configure the parameters of  
event action overrides. Use the no overrides command in service event action rules submode to delete  
the parameters of event action overrides.  
Configure the override event actions, then the risk rating range, then enable or disable the override.  
Note  
You cannot delete the event action override for deny-packet-inline because it is protected. If you do not  
want to use that override, set the override-item-status to disabled for that entry.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Overrides  
The following options apply:  
no overrides—Removes an entry or selection setting.  
override-item-status {enabled | disabled}—Enables or disables the use of this override item. The  
default is enabled.  
risk-rating-range—Specifies the range of risk rating values for this override item. The default is 0  
to 100.  
show—Displays system settings and/or history information.  
Configuring Event Action Overrides  
To add event action overrides, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter event action rules submode.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules0  
sensor(config-eve)#  
Step 3  
Assign the action for the override:  
Deny packets from the source IP address of the attacker.  
sensor(config-eve)# overrides deny-attacker-inline  
sensor(config-eve-ove)#  
Do not transmit the single packet causing the alert.  
sensor(config-eve)# overrides deny-packet-inline  
sensor(config-eve-ove)#  
Do not transmit packets on the specified TCP connection.  
sensor(config-eve)# overrides deny-connection-inline  
sensor(config-eve-ove)#  
Send TCP RST packets to terminate the connection.  
sensor(config-eve)# overrides reset-tcp-connection  
sensor(config-eve-ove)#  
Request a block of the connection.  
sensor(config-eve)# overrides request-block-connection  
sensor(config-eve-ove)#  
Request a block of the attacker host.  
sensor(config-eve)# overrides request-block-host  
sensor(config-eve-ove)#  
Log the packets from the attacker IP address.  
sensor(config-eve)# overrides log-attacker-packets  
sensor(config-eve-ove)#  
Log the packets from the victim IP address.  
sensor(config-eve)# overrides log-victim-packets  
sensor(config-eve-ove)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Overrides  
Log packets from both the attacker and victim IP addresses.  
sensor(config-eve)# overrides log-pair-packets  
sensor(config-eve-ove)#  
Write an alert to Event Store.  
sensor(config-eve)# overrides produce-alert  
sensor(config-eve-ove)#  
Write verbose alerts to Event Store.  
sensor(config-eve)# overrides produce-verbose-alert  
sensor(config-eve-ove)#  
Write events that request an SNMP trap to the Event Store.  
sensor(config-eve)# overrides request-snmp-trap  
sensor(config-eve-ove)#  
Step 4  
Configure the risk rating for this override item. The default risk rating range is 0 to 100. Set it to a  
different value, such as 85 to 100.  
sensor(config-eve-ove)# risk-rating-range 85-100  
Step 5  
Step 6  
Enable or disable the use of this override item. The default is enabled.  
sensor(config-eve-ove)# override-item-status {enabled | disabled}  
Verify the settings.  
sensor(config-eve-ove)# exit  
sensor(config-eve)# show settings  
action-to-add: deny-attacker-inline  
-----------------------------------------------  
override-item-status: Enabled default: Enabled  
risk-rating-range: 85-100 default: 0-100  
-----------------------------------------------  
Step 7  
Step 8  
Edit the risk rating of an event action override.  
sensor(config-eve)# overrides deny-attacker-inline  
sensor(config-eve-ove)# risk-rating 95-100  
Verify that you edited the event action override.  
sensor(config-eve-ove)# exit  
sensor(config-eve)# show settings  
-----------------------------------------------  
overrides (min: 0, max: 14, current: 1)  
-----------------------------------------------  
override-item-status: Enabled <defaulted>  
risk-rating-range: 95-100 default: 0-100  
-----------------------------------------------  
Step 9  
Delete the event action override.  
sensor(config-eve)# no overrides deny-attacker-inline  
sensor(config-eve-ove)#  
Step 10 Verify that you deleted the event action override.  
sensor(config-eve-ove)# exit  
sensor(config-eve)# show settings  
overrides (min: 0, max: 14, current: 1)  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Filters  
action-to-add: deny-attacker-inline  
-----------------------------------------------  
override-item-status: Enabled <defaulted>  
risk-rating-range: 95 default: 0-100  
-----------------------------------------------  
override-item-status: Enabled <defaulted>  
risk-rating-range: 90-100 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
Step 11 Exit event action rules submode.  
sensor(config-eve)# exit  
Apply Changes:?[yes]:  
Step 12 Press Enter to apply your changes or enter no to discard them.  
For More Information  
For a detailed description of all the event actions, see Event Actions, page 8-4.  
Configuring Event Action Filters  
This section describes event action filters, and contains the following topics:  
Understanding Event Action Filters  
Note  
Note  
Global correlation inspection and the reputation filtering deny features do not support IPv6 addresses.  
For global correlation inspection, the sensor does not receive or process reputation data for IPv6  
addresses. The risk rating for IPv6 addresses is not modified for global correlation inspection. Similarly,  
network participation does not include event data for attacks from IPv6 addresses. And finally, IPv6  
addresses do not appear in the deny list.  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or  
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried  
out.  
Event action filters are processed as an ordered list and you can move filters up or down in the list. Filters  
let the sensor perform certain actions in response to the event without requiring the sensor to perform all  
actions or remove the entire event. Filters work by removing actions from an event. A filter that removes  
all actions from an event effectively consumes the event.  
Note  
When filtering sweep signatures, we recommend that you do not filter the destination addresses. If there  
are multiple destination addresses, only the last address is used for matching the filter.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Filters  
Caution  
Event action filters based on source and destination IP addresses do not function for the Sweep engine,  
because they do not filter as regular signatures. To filter source and destination IP addresses in sweep  
alerts, use the source and destination IP address filter parameters in the Sweep engine signatures.  
Configuring Event Action Filters  
Note  
Global correlation inspection and the reputation filtering deny features do not support IPv6 addresses.  
For global correlation inspection, the sensor does not receive or process reputation data for IPv6  
addresses. The risk rating for IPv6 addresses is not modified for global correlation inspection. Similarly,  
network participation does not include event data for attacks from IPv6 addresses. And finally, IPv6  
addresses do not appear in the deny list.  
Note  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or  
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried  
out.  
You can configure event action filters to remove specific actions from an event or to discard an entire  
event and prevent further processing by the sensor. You can use event action variables that you defined  
to group addresses for your filters.  
Note  
You must preface the event variable with a dollar sign ($) to indicate that you are using a variable rather  
than a string. Otherwise, you receive the Bad source and destinationerror.  
Use the filters {edit | insert | move] name1 [begin | end | inactive | before | after} command in service  
event action rules submode to set up event action filters.  
The following options apply:  
actions-to-remove—Specifies the event actions to remove for this filter item.  
attacker-address-range—Specifies the range set of IPv4 attacker address(es) for this item (for  
example, 192.0.2.0-192.0.2.254,192.3.2.0-192.3.2.254).  
Note  
The second IP address in the range must be greater then or equal to the first IP address. If  
you do not specify an attacker address range, all IPv4 attacker addresses are matched.  
attacker-port-range—Specifies the range set of attacker port(s) for this item (for example,  
147-147,8000-10000).  
default—Sets the value back to the system default setting.  
deny-attacker-percentage—Specifies the percentage of packets to deny for deny attacker features.  
The valid range is 0 to 100. The default is 100.  
filter-item-status {enabled | disabled}—Enables or disables the use of this filter item.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Filters  
ipv6-attacker-address-range—Specifies the range set of IPv6 attacker address(es) for this item  
(for example,  
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:  
XXXX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-  
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>].  
Note  
The second IPv6 address in the range must be greater than or equal to the first IPv6 address.  
If you do not specify an IPv6 attacker address range, all IPv6 attacker addresses are matched.  
ipv6-victim-address-range—Specifies the range set of victim address(es) for this item (for  
example,  
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:  
XXXX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-  
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>].  
Note  
The second IPv6 address in the range must be greater than or equal to the first IPv6 address.  
If you do not specify an IPv6 victim address range, all IPv6 victim addresses are matched.  
no—Removes an entry or selection setting.  
os-relevance—Specifies the event OS relevance for this filter:  
relevant—Specifies that the event is relevant to the target OS.  
not-relevant—Specifies that the event is not relevant to the target OS.  
unknown—It is unknown whether the event is relevant to the target OS.  
risk-rating-range—Specifies the range of risk rating values for this filter item.  
signature-id-range—Specifies the range set of signature ID(s) for this item (for example,  
1000-2000,3000-3000).  
stop-on-match {true | false}—Specifies to continue evaluating filters or stop when this filter item  
is matched.  
subsignature-id-range—Specifies the range set of subsignature ID(s) for this item (for example,  
0-2,5-5).  
user-comment —Lets you add your comments about this filter item.  
victim-address-range—Specifies the range set of victim address(es) for this item (for example,  
10.20.1.0-10.20.1.255,10.20.5.0-10.20.5.255).  
Note  
The second IP address in the range must be greater then or equal to the first IP address. If  
you do not specify a victim address range, all IPv4 attacker addresses are matched.  
victim-port-range—Specifies the range set of victim port(s) for this item (for example,  
147-147,8000-10000).  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Filters  
Configuring Event Action Filters  
To configure event action filters, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter event action rules submode.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules1  
sensor(config-eve)#  
Step 3  
Step 4  
Create the filter name. Use name1, name2, and so forth to name your event action filters. Use the begin  
| end | inactive | before | after keywords to specify where you want to insert the filter.  
sensor(config-eve)# filters insert name1 begin  
Specify the values for this filter:  
a. Specify the signature ID range. The default is 900 to 65535.  
sensor(config-eve-fil)# signature-id-range 1000-1005  
b. Specify the subsignature ID range. The default is 0 to 255.  
sensor(config-eve-fil)# subsignature-id-range 1-5  
c. Specify the attacker address range for IPv4 or IPv6.  
sensor(config-eve-fil)# attacker-address-range 192.0.2.3-192.0.2.26  
sensor(config-eve-fil)# ipv6-attacker-address-range  
2001:0db8:3c4d:0015:0000:0000:abcd:ef12  
d. Specify the victim address range for IPv4 or IPv6.  
sensor(config-eve-fil)# victim-address-range 192.56.10.1-192.56.10.255  
sensor(config-eve-fil)# ipv6-victim-address-range ::0-FFFF:FFFF:FFFF:FFFF:FFFF:  
FFFF:FFFF:FFFF  
e. Specify the victim port range. The default is 0 to 65535.  
sensor(config-eve-fil)# victim-port-range 0-434  
f. Specify the OS relevance. The default is 0 to 100.  
sensor(config-eve-fil)# os-relevance relevant  
g. Specify the risk rating range.The default is 0 to 100.  
sensor(config-eve-fil)# risk-rating-range 85-100  
h. Specify the actions to remove.  
sensor(config-eve-fil)# actions-to-remove reset-tcp-connection  
i. If you are filtering a deny action, set the percentage of deny actions you want. The default is 100.  
sensor(config-eve-fil)# deny-attacker-percentage 90  
j. Specify the status of the filter to either disabled or enabled. The default is enabled.  
sensor(config-eve-fil)# filter-item-status {enabled | disabled}  
k. Specify the stop on match parameter. True tells the sensor to stop processing filters if this item  
matches. False tells the sensor to continue processing filters even if this item matches.  
sensor(config-eve-fil)# stop-on-match {true | false}  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Filters  
l. Add any comments you want to use to explain this filter.  
sensor(config-eve-fil)# user-comment NEW FILTER  
Step 5  
Verify the settings for the filter.  
sensor(config-eve-fil)# show settings  
NAME: name1  
-----------------------------------------------  
signature-id-range: 1000-10005 default: 900-65535  
subsignature-id-range: 1-5 default: 0-255  
attacker-address-range: 192.0.2.3-192.0.2.26 default: 0.0.0.0-255.255.255.255  
victim-address-range: 192.56.10.1-192.56.10.255 default: 0.0.0.0-255.255.255.255  
ipv6-attacker-address-range: 2001:0db8:3c4d:0015:0000:0000:abcd:ef12 default:  
::0-FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF  
ipv6-victim-address-range: ::0-FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF default:  
::0-FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF  
attacker-port-range: 0-65535 <defaulted>  
victim-port-range: 1-343 default: 0-65535  
risk-rating-range: 85-100 default: 0-100  
actions-to-remove: reset-tcp-connection default:  
deny-attacker-percentage: 90 default: 100  
filter-item-status: Enabled default: Enabled  
stop-on-match: True default: False  
user-comment: NEW FILTER default:  
os-relevance: relevant default: relevant|not-relevant|unknown  
------------------------------------------------  
senor(config-eve-fil)#  
Step 6  
Edit an existing filter.  
sensor(config-eve)# filters edit name1  
Step 7  
Step 8  
Edit the parameters (see Steps 4a through 4l).  
Move a filter up or down in the filter list.  
sensor(config-eve-fil)# exit  
sensor(config-eve)# filters move name5 before name1  
Step 9  
Verify that you have moved the filters.  
sensor(config-eve-fil)# exit  
sensor(config-eve)# show settings  
-----------------------------------------------  
filters (min: 0, max: 4096, current: 5 - 4 active, 1 inactive)  
-----------------------------------------------  
ACTIVE list-contents  
-----------------------------------------------  
NAME: name5  
-----------------------------------------------  
signature-id-range: 900-65535 <defaulted>  
subsignature-id-range: 0-255 <defaulted>  
attacker-address-range: 0.0.0.0-255.255.255.255 <defaulted>  
victim-address-range: 0.0.0.0-255.255.255.255 <defaulted>  
attacker-port-range: 0-65535 <defaulted>  
victim-port-range: 0-65535 <defaulted>  
risk-rating-range: 0-100 <defaulted>  
actions-to-remove: <defaulted>  
filter-item-status: Enabled <defaulted>  
stop-on-match: False <defaulted>  
user-comment: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Configuring Event Action Rules  
Configuring Event Action Filters  
NAME: name1  
-----------------------------------------------  
signature-id-range: 900-65535 <defaulted>  
subsignature-id-range: 0-255 <defaulted>  
attacker-address-range: 0.0.0.0-255.255.255.255 <defaulted>  
victim-address-range: 0.0.0.0-255.255.255.255 <defaulted>  
attacker-port-range: 0-65535 <defaulted>  
victim-port-range: 0-65535 <defaulted>  
risk-rating-range: 0-100 <defaulted>  
actions-to-remove: <defaulted>  
filter-item-status: Enabled <defaulted>  
stop-on-match: False <defaulted>  
user-comment: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
NAME: name2  
-----------------------------------------------  
signature-id-range: 900-65535 <defaulted>  
subsignature-id-range: 0-255 <defaulted>  
attacker-address-range: 0.0.0.0-255.255.255.255 <defaulted>  
victim-address-range: 0.0.0.0-255.255.255.255 <defaulted>  
attacker-port-range: 0-65535 <defaulted>  
victim-port-range: 0-65535 <defaulted>  
risk-rating-range: 0-100 <defaulted>  
actions-to-remove: <defaulted>  
filter-item-status: Enabled <defaulted>  
stop-on-match: False <defaulted>  
user-comment: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
INACTIVE list-contents  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-eve)#  
Step 10 Move a filter to the inactive list.  
sensor(config-eve)# filters move name1 inactive  
Step 11 Verify that the filter has been moved to the inactive list.  
sensor(config-eve-fil)# exit  
sensor(config-eve)# show settings  
-----------------------------------------------  
INACTIVE list-contents  
-----------------------------------------------  
-----------------------------------------------  
NAME: name1  
-----------------------------------------------  
signature-id-range: 900-65535 <defaulted>  
subsignature-id-range: 0-255 <defaulted>  
attacker-address-range: 0.0.0.0-255.255.255.255 <defaulted>  
victim-address-range: 0.0.0.0-255.255.255.255 <defaulted>  
attacker-port-range: 0-65535 <defaulted>  
victim-port-range: 0-65535 <defaulted>  
risk-rating-range: 0-100 <defaulted>  
actions-to-remove: <defaulted>  
filter-item-status: Enabled <defaulted>  
stop-on-match: False <defaulted>  
user-comment: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-eve)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Configuring Event Action Rules  
Configuring OS Identifications  
Step 12 Exit event action rules submode.  
sensor(config-eve)# exit  
Apply Changes:?[yes]:  
Step 13 Press Enter to apply your changes or enter no to discard them.  
For More Information  
For the procedure for configuring event action variables, see Adding, Editing, and Deleting Event Action  
Configuring OS Identifications  
This section describes OS identifications and how to configure OS maps, and contains the following  
topics:  
Understanding Passive OS Fingerprinting  
Passive OS fingerprinting lets the sensor determine the OS that hosts are running. The sensor analyzes  
network traffic between hosts and stores the OS of these hosts with their IP addresses. The sensor  
inspects TCP SYN and SYNACK packets exchanged on the network to determine the OS type.  
The sensor then uses the OS of the target host OS to determine the relevance of the attack to the victim  
by computing the attack relevance rating component of the risk rating. Based on the relevance of the  
attack, the sensor may alter the risk rating of the alert for the attack and/or the sensor may filter the alert  
for the attack. You can then use the risk rating to reduce the number of false positive alerts (a benefit in  
IDS mode) or definitively drop suspicious packets (a benefit in IPS mode). Passive OS fingerprinting  
also enhances the alert output by reporting the victim OS, the source of the OS identification, and the  
relevance to the victim OS in the alert.  
Passive OS fingerprinting consists of three components:  
Passive OS learning—Passive OS learning occurs as the sensor observes traffic on the network.  
Based on the characteristics of TCP SYN and SYNACK packets, the sensor makes a determination  
of the OS running on the host of the source IP address.  
User-configurable OS identification—You can configure OS host maps, which take precedence over  
learned OS maps.  
Computation of attack relevance rating and risk rating—The sensor uses OS information to  
determine the relevance of the attack signature to the targeted host. The attack relevance is the attack  
relevance rating component of the risk rating value for the attack alert. The sensor uses the OS type  
reported in the host posture information imported from the CSA MC to compute the attack relevance  
rating.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 8 Configuring Event Action Rules  
Configuring OS Identifications  
There are three sources of OS information. The sensor ranks the sources of OS information in the  
following order:  
1. Configured OS maps—OS maps you enter. Configured OS maps reside in the event action rules  
policy and can apply to one or many virtual sensors.  
Note  
You can specify multiple operating systems for the same IP address. The last one in the list  
is the operating system that is matched.  
2. Imported OS maps—OS maps imported from an external data source. Imported OS maps are global  
and apply to all virtual sensors.  
Note  
Currently the CSA MC is the only external data source.  
3. Learned OS maps—OS maps observed by the sensor through the fingerprinting of TCP packets with  
the SYN control bit set. Learned OS maps are local to the virtual sensor that sees the traffic.  
When the sensor needs to determine the OS for a target IP address, it consults the configured OS maps.  
If the target IP address is not in the configured OS maps, the sensor looks in the imported OS maps. If  
the target IP address is not in the imported OS maps, the sensor looks in the learned OS maps. If it cannot  
find it there, the sensor treats the OS of the target IP address as unknown.  
Note  
Passive OS fingerprinting is enabled by default and the IPS contains a default vulnerable OS list for each  
signature.  
Passive OS Fingerprinting Configuration Considerations  
You do not have to configure passive OS fingerprinting for it to function. IPS provides a default  
vulnerable OS list for each signature and passive analysis is enabled by default.  
You can configure the following aspects of passive OS fingerprinting:  
Define OS maps—We recommend configuring OS maps to define the identity of the OS running on  
critical systems. It is best to configure OS maps when the OS and IP address of the critical systems  
are unlikely to change.  
Limit the attack relevance rating calculation to a specific IP address range—This limits the attack  
relevance rating calculations to IP addresses on the protected network.  
Import OS maps—Importing OS maps provides a mechanism for accelerating the learning rate and  
fidelity of the OS identifications made through passive analysis. If you have an external product  
interface, such as the CSA MC, you can import OS identifications from it.  
Define event action rules filters using the OS relevance value of the target—This provides a way to  
filter alerts solely on OS relevance.  
Disable passive analysis—Stops the sensor from learning new OS maps.  
Edit signature vulnerable OS lists—The vulnerable OS list specifies what OS types are vulnerable  
to each signature. The default, general-os, applies to all signatures that do not specify a vulnerable  
OS list.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 8 Configuring Event Action Rules  
Configuring OS Identifications  
Adding, Editing, Deleting, and Moving Configured OS Maps  
Use the os-identifications command in the service event action rules submode to configure OS host  
mappings, which take precedence over learned OS mappings. You can add, edit, and delete configured  
OS maps. You can move them up and down in the list to change the order in which the sensor computes  
the attack relevance rating and risk rating for that particular IP address and OS type combination.  
You can also move them up and down in the list to change the order in which the sensor resolves the OS  
associated with a particular IP address. Configured OS mappings allow for ranges, so for network  
192.168.1.0/24 an administrator might define the following(Table 8-1):  
Table 8-1  
Example Configured OS Mapping  
IP Address Range Set  
OS  
192.168.1.1  
IOS  
192.168.1.2-192.168.1.10,192.168.1.25  
192.168.1.1-192.168.1.255  
UNIX  
Windows  
More specific mappings should be at the beginning of the list. Overlap in the IP address range sets is  
allowed, but the entry closest to the beginning of the list takes precedence.  
The following options apply:  
calc-arr-for-ip-range—Calculates the attack relevance rating for victims in this range. The value is  
<A.B.C.D>-<A.B.C.D>[,<A.B.C.D>-<A.B.C.D>], for example,  
10.20.1.0-10.20.1.255,10.20.5.0-10.20.5.255).  
Note  
The second IP address in the range must be greater than or equal to the first IP address.  
configured-os-map {edit | insert | move] name1[begin | end | inactive | before | after}—Specifies  
a collection of administrator-defined mappings of IP addresses to OS IDs (configured OS mappings  
take precedence over imported and learned OS mappings).  
ip—Specifies the host IP address (or addresses) running the specified OS. The value is  
<A.B.C.D>-<A.B.C.D>[,<A.B.C.D>-<A.B.C.D>], for example,  
10.20.1.0-10.20.1.255,10.20.5.0-10.20.5.255.  
Note  
The second IP address in the range must be greater than or equal to the first IP address.  
os—Specifies the OS type the host (or hosts) is running:  
general-os—All OS types  
iosVariants of Cisco IOS  
mac-osVariants of the Apple System OS prior to OS X  
netware—Netware  
other —Any Other OS  
unixVariants of UNIX  
aixVariants of AIX  
bsdVariants of BSD  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 8 Configuring Event Action Rules  
Configuring OS Identifications  
hp-uxVariants of HP-UX  
irixVariants of IRIX  
linuxVariants of Linux  
solarisVariants of Solaris  
windowsVariants of Microsoft Windows  
windows-nt-2k-xpVariants of NT, 2000, and XP  
win-nt—Specific variants of Windows NT  
unknown—Unknown OS  
default—Sets the value back to the system default setting.  
no—Removes an entry or selection setting.  
passive-traffic-analysis {enabled | disabled}—Enables/disables passive OS fingerprinting  
analysis.  
Configuring OS Maps  
To configure OS maps, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter event action rules submode.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules1  
sensor(config-eve)#  
Step 3  
Step 4  
Create the OS map. Use name1, name2, and so forth to name your OS maps. Use the begin | end |  
inactive | before | after keywords to specify where you want to insert the filter.  
sensor(config-eve)# os-identification  
sensor(config-eve-os)# configured-os-map insert name1 begin  
sensor(config-eve-os-con)#  
Specify the values for this OS map:  
a. Specify the host IP address.  
sensor(config-eve-os-con)# ip 192.0.2.0-192.0.2.255  
b. Specify the host OS type.  
sensor(config-eve-os-con)# os unix  
Caution  
Step 5  
You can specify multiple operating systems for the same IP address. The last one in the list is the  
operating system that is matched.  
Verify the settings for the OS map.  
sensor(config-eve-os-con)# show settings  
NAME: name1  
-----------------------------------------------  
ip: 192.0.2.0-192.0.2.255 default:  
os: unix  
-----------------------------------------------  
sensor(config-eve-os-con)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 8 Configuring Event Action Rules  
Configuring OS Identifications  
Step 6  
Specify the attack relevance rating range for the IP address.  
sensor(config-eve-os-con)# exit  
sensor(config-eve-os)# calc-arr-for-ip-range 192.0.2.1 to 192.0.2.25  
Step 7  
Step 8  
Enable passive OS fingerprinting.  
sensor(config-eve-os)# passive-traffic-analysis enabled  
Edit an existing OS map.  
sensor(config-eve-os)# configured-os-map edit name1  
sensor(config-eve-os-con)#  
Step 9  
Edit the parameters (see Steps 4 through 7).  
Step 10 Move an OS map up or down in the OS maps list.  
sensor(config-eve-os-con)# exit  
sensor(config-eve-os)# configured-os-map move name5 before name1  
Step 11 Verify that you have moved the OS maps.  
sensor(config-eve-os)# show settings  
os-identification  
-----------------------------------------------  
calc-arr-for-ip-range: 192.0.2.1-192.0.2.25 default: 0.0.0.0-255.255.255.255  
configured-os-map (ordered min: 0, max: 50, current: 2 - 2 active, 0 inactive)  
-----------------------------------------------  
ACTIVE list-contents  
-----------------------------------------------  
NAME: name2  
-----------------------------------------------  
ip: 192.0.2.33 default:  
os: aix  
-----------------------------------------------  
-----------------------------------------------  
NAME: name1  
-----------------------------------------------  
ip: 192.0.2.0-192.0.2.255 default:  
os: unix  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
passive-traffic-analysis: Enabled default: Enabled  
-----------------------------------------------  
ips-ssp(config-eve-os)#  
Step 12 Move an OS map to the inactive list.  
sensor(config-eve-os)# configured-os-map move name1 inactive  
Step 13 Verify that the filter has been moved to the inactive list.  
sensor(config-eve-os)# show settings  
os-identification  
-----------------------------------------------  
calc-arr-for-ip-range: 192.0.2.33 default: 0.0.0.0-255.255.255.255  
configured-os-map (ordered min: 0, max: 50, current: 2 - 1 active, 1 inactive)  
-----------------------------------------------  
ACTIVE list-contents  
-----------------------------------------------  
NAME: name2  
-----------------------------------------------  
ip: 192.0.2.33 default:  
os: aix  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 8 Configuring Event Action Rules  
Configuring OS Identifications  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
INACTIVE list-contents  
-----------------------------------------------  
NAME: name1  
-----------------------------------------------  
ip: 192.0.2.0-192.0.2.255 default:  
os: unix  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
passive-traffic-analysis: Enabled default: Enabled  
--MORE--#  
Step 14 Delete an OS map.  
sensor(config-eve-os)# no configured-os-map name2  
Step 15 Verify that the OS map has been deleted.  
sensor(config-eve-os)# show settings  
os-identification  
-----------------------------------------------  
calc-arr-for-ip-range: 192.0.2.33 default: 0.0.0.0-255.255.255.255  
configured-os-map (ordered min: 0, max: 50, current: 1 - 0 active, 1 inactive)  
-----------------------------------------------  
INACTIVE list-contents  
-----------------------------------------------  
NAME: name1  
-----------------------------------------------  
ip: 192.0.2.0-192.0.2.255 default:  
os: unix  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
passive-traffic-analysis: Enabled default: Enabled  
-----------------------------------------------  
ips-ssp(config-eve-os)#  
Step 16 Exit event action rules submode.  
sensor(config-eve-os)# exit  
sensor(config-eve)# exit  
Apply Changes:?[yes]:  
Step 17 Press Enter to apply your changes or enter no to discard them.  
Displaying and Clearing OS Identifications  
Use the show os-identification [virtual-sensor] learned [ip-address] command in EXEC mode to  
display OS IDs associated with IP addresses that were learned by the sensor through passive analysis.  
Use the clear os-identification [virtual-sensor] learned [ip-address] command in EXEC mode to delete  
OS IDs associated with IP addresses that were learned by the sensor through passive analysis.  
When you specify an IP address, only the OS identification for the specified IP address is displayed or  
cleared. If you specify a virtual sensor, only the OS identifications for the specified sensor is displayed  
or cleared. If you specify an IP address without a virtual sensor, the IP address is displayed or cleared  
on all virtual sensors.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 8 Configuring Event Action Rules  
Configuring General Settings  
The following options apply:  
virtual-sensor—(Optional) Specifies the learned addresses of the virtual sensor that should be  
displayed or cleared.  
ip-address—(Optional) Specifies the IP address to query or clear. The sensor displays or clears the  
OS ID mapped to the specified IP address.  
Displaying and Clearing OS Identifications  
To display and clear OS IDs, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Note  
An account with viewer privileges can display OS IDs.  
Display the learned OS IDs associated with a specific IP address.  
sensor# show os-identification learned 192.0.2.0  
Virtual Sensor vs0:  
10.1.1.12 windows  
sensor# show os-identification learned  
Virtual Sensor vs0:  
10.1.1.12 windows  
Virtual Sensor vs1:  
10.1.0.1  
10.1.0.2  
10.1.0.3  
unix  
windows  
windows  
sensor#  
Step 3  
Step 4  
Clear the learned OS IDs for a specific IP address on all virtual sensors.  
sensor# clear os-identification learned 192.0.2.0  
Verify that the OS IDs have been cleared.  
sensor# show statistics os-identification  
Statistics for Virtual Sensor vs0  
OS Identification  
Configured  
Imported  
Learned  
Statistics for Virtual Sensor vs1  
OS Identification  
Configured  
Imported  
Learned  
sensor#  
Configuring General Settings  
This section describes the general settings, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 8 Configuring Event Action Rules  
Configuring General Settings  
Understanding Event Action Summarization  
Summarization decreases the volume of alerts sent out from the sensor by providing basic aggregation  
of events into a single alert. Special parameters are specified for each signature and they influence the  
handling of the alerts. Each signature is created with defaults that reflect a preferred normal behavior.  
However, you can tune each signature to change this default behavior within the constraints for each  
engine type.  
The nonalert-generating actions (deny, block, TCP reset) go through the filters for each signature event  
unsummarized. The alert-generating actions are not performed on these summarized alerts; instead the  
actions are applied to the one summary alert and then put through the filters.  
If you select one of the other alert-generating actions and do not have it filtered out, the alert is created  
even if you do not select produce-alert. To prevent alerts from being created, you must have all  
alert-generating actions filtered out.  
Summarization and event actions are processed after the Meta engine has processed the component  
events. This lets the sensor watch for suspicious activity transpiring over a series of events.  
Understanding Event Action Aggregation  
Basic aggregation provides two operating modes. The simple mode involves configuring a threshold  
number of hits for a signature that must be met before the alert is sent. A more advanced mode is  
timed-interval counting. In this mode, the sensor tracks the number of hits per second and only sends  
alerts when that threshold is met. In this example, a hit is a term used to describe an event, which is  
basically an alert, but it is not sent out of the sensor as an alert until the threshold number of hits has  
been exceeded.  
You can choose from the following summarization options:  
fire-all—Fires an alert each time the signature is triggered. If the threshold is set for summarization,  
alerts are fired for each execution until summarization occurs. After summarization starts, only one  
alert every summary interval fires for each address set. Alerts for other address sets are either all  
seen or separately summarized. The signature reverts to fire all mode after a period of no alerts for  
that signature.  
summary—Fires an alert the first time a signature is triggered, and then additional alerts for that  
signature are summarized for the duration of the summary interval. Only one alert every summary  
interval should fire for each address set. If the global summary threshold is reached, the signature  
goes into global summarization mode.  
global-summarization—Fires an alert for every summary interval. Signatures can be preconfigured  
for global summarization.  
fire-once—Fires an alert for each address set. You can upgrade this mode to global summarization  
mode.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                   
Chapter 8 Configuring Event Action Rules  
Configuring General Settings  
Configuring the General Settings  
Use the following commands in service event action rules submode to configure general event action  
rules settings:  
global-block-timeout —Specifies the number of minutes to block a host or connection. The valid  
range is 0 to 10000000. The default is 30 minutes.  
global-deny-timeout—Specifies the number of seconds to deny attackers inline. The valid range is  
0 to 518400. The default is 3600.  
global-filters-status {enabled | disabled}—Enables or disables the use of the filters. The default is  
enabled.  
global-metaevent-status {enabled | disabled}—Enables or disables the use of the Meta Event  
Generator. The default is enabled.  
global-overrides-status {enabled | disabled}—Enables or disables the use of the overrides. The  
default is enabled.  
global-summarization-status {enabled | disabled}—Enables or disables the use of the  
summarizer. The default is enabled.  
max-denied-attackers—Limits the number of denied attackers possible in the system at any one  
time. The valid range is 0 to 100000000. The default is 10000.  
Configuring Event Action General Settings  
To configure event action general settings, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter event action rules submode.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules0  
Step 3  
Step 4  
Step 5  
Step 6  
Enter general submode.  
sensor(config)# general  
Enable or disable the meta event generator. The default is enabled.  
sensor(config-eve-gen)# global-metaevent-status {enabled | disabled}  
Enable or disable the summarizer. The default is enabled.  
sensor(config-eve-gen)# global-summarization-status {enabled | disabled}  
Configure the denied attackers inline event action:  
a. Limit the number of denied attackers in the system at any given time. The default is 1000.  
sensor(config-eve-gen)# max-denied-attackers 100  
b. Configure the amount of seconds to deny attackers in the system. The default is 3600 seconds.  
sensor(config-eve-gen)# global-deny-timeout 1000  
Step 7  
Configure the number of minutes to block a host or a connection. The default is 30 minutes.  
sensor(config-eve-gen)# global-block-timeout 20  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Chapter 8 Configuring Event Action Rules  
Configuring the Denied Attackers List  
Step 8  
Step 9  
Enable or disable any overrides that you have set up. The default is enabled.  
sensor(config-eve-gen)# global-overrides-status {enabled | disabled}  
Enable or disable any filters that you have set up. The default is enabled.  
sensor(config-eve-gen)# global-filters-status {enabled | disabled}  
Step 10 Verify the settings for general submode.  
sensor(config-eve-gen)# show settings  
general  
-----------------------------------------------  
global-overrides-status: Enabled default: Enabled  
global-filters-status: Enabled default: Enabled  
global-summarization-status: Enabled default: Enabled  
global-metaevent-status: Enabled default: Enabled  
global-deny-timeout: 1000 default: 3600  
global-block-timeout: 20 default: 30  
max-denied-attackers: 100 default: 10000  
-----------------------------------------------  
sensor(config-eve-gen)#  
Step 11 Exit event action rules submode.  
sensor(config-eve-gen)# exit  
sensor(config-eve)# exit  
Apply Changes:?[yes]:  
Step 12 Press Enter to apply your changes or enter no to discard them.  
Configuring the Denied Attackers List  
This section describes the denied attackers list and how to add, clear, and monitor the list. It contains the  
following topics:  
Adding a Deny Attacker Entry to the Denied Attackers List  
Use the deny attacker [virtual-sensor name] [ip-address attacker-ip-address] | victim  
victim-ip-address | port port-number] command to add a single deny attacker entry to the list of denied  
attackers. Use the no form of the command to delete the deny attacker entry from the list.  
The following options apply:  
name—(Optional) Specifies the name of the virtual sensor to which the deny attackers entry should  
be added.  
attacker-ip-address—Specifies the attacker IP address.  
victim-ip-address—(Optional) Specifies the victim IP address.  
port-number—(Optional) Specifies the victim port number. The valid range is 0 to 65535.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 8 Configuring Event Action Rules  
Configuring the Denied Attackers List  
Adding Entries to the Denied Attacker List  
To add a deny attacker entry to the list of denied attackers, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Add a deny attacker entry with an IP address of 192.0.2.0.  
sensor# deny attacker ip-address 192.0.2.0  
Warning: Executing this command will add deny attacker address on all virtual sensors.  
Continue? [yes]:  
Step 3  
Step 4  
Enter yesto add this deny attacker entry for all virtual sensors.  
Add a deny attacker entry to a specific virtual sensor.  
sensor# deny attacker virtual-sensor vs0 ip-address 192.0.2.0  
Step 5  
Remove the deny attacker entry from the list.  
sensor# no deny attacker ip-address 10.1.1.1  
Warning: Executing this command will delete this address from the list of attackers being  
denied by all virtual sensors.  
Continue? [yes]:  
Step 6  
Enter yesto remove the deny attacker entry from the list.  
Note  
To immediately stop denying attackers, you must use the clear denied-attackers command to  
clear the denied attackers list.  
For More Information  
For the procedure for clearing denied attackers permanently from the denied attackers list, see  
Monitoring and Clearing the Denied Attackers List  
Use the show statistics denied-attackers command to display the list of denied attackers. Use the clear  
denied-attackers [virtual_sensor] [ip-address ip_address] command to delete the denied attackers list  
and clear the virtual sensor statistics.  
If your sensor is configured to operate in inline mode, the traffic is passing through the sensor. You can  
configure signatures to deny packets, connections, and attackers while in inline mode, which means that  
single packets, connections, and specific attackers are denied, that is, not transmitted, when the sensor  
encounters them. When the signature fires, the attacker is denied and placed in a list. As part of sensor  
administration, you may want to delete the list or clear the statistics in the list.  
The following options apply:  
virtual_sensor—(Optional) Specifies the virtual sensor whose denied attackers list should be  
cleared.  
ip_address—(Optional) Specifies the IP address to clear.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 8 Configuring Event Action Rules  
Configuring the Denied Attackers List  
Displaying and Deleting Denied Attackers  
To display the list of denied attackers and delete the list and clear the statistics, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Display the list of denied IP addresses. The statistics show that there are two IP addresses being denied  
at this time.  
sensor# show statistics denied-attackers  
Denied Attackers and hit count for each.  
10.20.4.2 = 9  
10.20.5.2 = 5  
Step 3  
Delete the denied attackers list.  
sensor# clear denied-attackers  
Warning: Executing this command will delete all addresses from the list of attackers  
currently being denied by the sensor.  
Continue with clear? [yes]:  
Step 4  
Step 5  
Enter yesto clear the list.  
Delete the denied attackers list for a specific virtual sensor.  
sensor# clear denied-attackers vs0  
Warning: Executing this command will delete all addresses from the list of attackers being  
denied by virtual sensor vs0.  
Continue with clear? [yes]:  
Step 6  
Step 7  
Enter yesto clear the list.  
Remove a specific IP address from the denied attackers list for a specific virtual sensor.  
sensor# clear denied-attackers vs0 ip-address 192.0.2.0  
Warning: Executing this command will delete ip address 192.0.2.0 from the list of  
attackers being denied by virtual sensor vs0.  
Continue with clear? [yes]:  
Step 8  
Step 9  
Enter yesto clear the list.  
Verify that you have cleared the list. You can use the show statistics denied-attackers or show statistics  
virtual-sensor command.  
sensor# show statistics denied-attackers  
Denied Attackers and hit count for each.  
Denied Attackers and hit count for each.  
Statistics for Virtual Sensor vs0  
Denied Attackers with percent denied and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
Statistics for Virtual Sensor vs1  
Denied Attackers with percent denied and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
sensor#  
sensor# show statistics virtual-sensor  
Virtual Sensor Statistics  
Statistics for Virtual Sensor vs0  
Name of current Signature-Definition instance = sig0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 8 Configuring Event Action Rules  
Monitoring Events  
Name of current Event-Action-Rules instance = rules0  
List of interfaces monitored by this virtual sensor = mypair  
Denied Address Information  
Number of Active Denied Attackers = 0  
Number of Denied Attackers Inserted = 2  
Number of Denied Attackers Total Hits = 287  
Number of times max-denied-attackers limited creation of new entry = 0  
Number of exec Clear commands during uptime = 1  
Denied Attackers and hit count for each.  
Step 10 Clear only the statistics.  
sensor# show statistics virtual-sensor clear  
Step 11 Verify that you have cleared the statistics. The statistics have all been cleared except for the Number of  
Active Denied Attackersand Number of exec Clear commands during uptimecategories. It is  
important to know if the list has been cleared.  
sensor# show statistics virtual-sensor  
Virtual Sensor Statistics  
Statistics for Virtual Sensor vs0  
Name of current Signature-Definition instance = sig0  
Name of current Event-Action-Rules instance = rules0  
List of interfaces monitored by this virtual sensor = mypair  
Denied Address Information  
Number of Active Denied Attackers = 2  
Number of Denied Attackers Inserted = 0  
Number of Denied Attackers Total Hits = 0  
Number of times max-denied-attackers limited creation of new entry = 0  
Number of exec Clear commands during uptime = 1  
Denied Attackers and hit count for each.  
10.20.2.5 = 0  
10.20.5.2 = 0  
Monitoring Events  
This section describes how to display and clear events from the Event Store, and contains the following  
topics:  
Displaying Events  
Note  
The Event Store has a fixed size of 30 MB for all platforms.  
Note  
Events are displayed as a live feed. To cancel the request, press Ctrl-C.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 8 Configuring Event Action Rules  
Monitoring Events  
Use the show events [{alert [informational] [low] [medium] [high] [include-traits traits]  
[exclude-traits traits] [min-threat-rating min-rr] [max-threat-rating max-rr] | error [warning]  
[error] [fatal] | NAC | status}] [hh:mm:ss [month day [year]] | past hh:mm:ss] command to display  
events from Event Store. Events are displayed beginning at the start time. If you do not specify a start  
time, events are displayed beginning at the current time. If you do not specify an event type, all events  
are displayed.  
The following options apply:  
alert—Displays alerts. Provides notification of some suspicious activity that may indicate an attack  
is in process or has been attempted. Alert events are generated by the Analysis Engine whenever a  
signature is triggered by network activity. If no level is selected (informational, low, medium, or  
high), all alert events are displayed.  
include-traits—Displays alerts that have the specified traits.  
exclude-traits—Does not display alerts that have the specified traits.  
traits—Specifies the trait bit position in decimal (0 to 15).  
min-threat-rating—Displays events with a threat rating above or equal to this value. The default is  
0. The valid range is 0 to 100.  
max-threat-rating—Displays events with a threat rating below or equal to this value. The default  
is 100. The valid range is 0 to 100.  
error—Displays error events. Error events are generated by services when error conditions are  
encountered. If no level is selected (warning, error, or fatal), all error events are displayed.  
NAC—Displays the ARC (block) requests.  
Note  
The ARC is formerly known as NAC. This name change has not been completely  
implemented throughout the IDM, the IME, and the CLI.  
status—Displays status events.  
past—Displays events starting in the past for the specified hours, minutes, and seconds.  
hh:mm:ss—Specifies the hours, minutes, and seconds in the past to begin the display.  
Note  
The show events command continues to display events until a specified event is available. To exit, press  
Ctrl-C.  
Displaying Events  
To display events from the Event Store, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display all events starting now. The feed continues showing all events until you press Ctrl-C.  
sensor# show events  
evError: eventId=1041472274774840147 severity=warning vendor=Cisco  
originator:  
hostId: sensor2  
appName: cidwebserver  
appInstanceId: 12075  
time: 2011/01/07 04:41:45 2011/01/07 04:41:45 UTC  
errorMessage: name=errWarning received fatal alert: certificate_unknown  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 8 Configuring Event Action Rules  
Monitoring Events  
evError: eventId=1041472274774840148 severity=error vendor=Cisco  
originator:  
hostId: sensor2  
appName: cidwebserver  
appInstanceId: 351  
time: 2011/01/07 04:41:45 2011/01/07 04:41:45 UTC  
errorMessage: name=errTransport WebSession::sessionTask(6) TLS connection exce  
ption: handshake incomplete.  
Step 3  
Display the block requests beginning at 10:00 a.m. on February 9, 2011.  
sensor# show events NAC 10:00:00 Feb 9 2011  
evShunRqst: eventId=1106837332219222281 vendor=Cisco  
originator:  
deviceName: Sensor1  
appName: NetworkAccessControllerApp  
appInstance: 654  
time: 2011/02/09 10:33:31 2011/08/09 13:13:31  
shunInfo:  
host: connectionShun=false  
srcAddr: 11.0.0.1  
destAddr:  
srcPort:  
destPort:  
protocol: numericType=0 other  
timeoutMinutes: 40  
evAlertRef: hostId=esendHost 123456789012345678  
sensor#  
Step 4  
Display errors with the warning level starting at 10:00 a.m. on February 9, 2011.  
sensor# show events error warning 10:00:00 Feb 9 2011  
evError: eventId=1041472274774840197 severity=warning vendor=Cisco  
originator:  
hostId: sensor  
appName: cidwebserver  
appInstanceId: 12160  
time: 2011/01/07 04:49:25 2011/01/07 04:49:25 UTC  
errorMessage: name=errWarning received fatal alert: certificate_unknown  
Step 5  
Display alerts from the past 45 seconds.  
sensor# show events alert past 00:00:45  
evIdsAlert: eventId=1109695939102805307 severity=medium vendor=Cisco  
originator:  
hostId: sensor  
appName: sensorApp  
appInstanceId: 367  
time: 2011/03/02 14:15:59 2011/03/02 14:15:59 UTC  
signature: description=Nachi Worm ICMP Echo Request id=2156 version=S54  
subsigId: 0  
sigDetails: Nachi ICMP  
interfaceGroup:  
vlan: 0  
participants:  
attacker:  
addr: locality=OUT 10.89.228.202  
target:  
addr: locality=OUT 10.89.150.185  
riskRatingValue: 70  
interface: fe0_1  
protocol: icmp  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Configuring Event Action Rules  
Monitoring Events  
evIdsAlert: eventId=1109695939102805308 severity=medium vendor=Cisco  
originator:  
--MORE--  
Step 6  
Display events that began 30 seconds in the past.  
sensor# show events past 00:00:30  
evStatus: eventId=1041526834774829055 vendor=Cisco  
originator:  
hostId: sensor  
appName: mainApp  
appInstanceId: 2215  
time: 2011/01/08 02:41:00 2011/01/08 02:41:00 UTC  
controlTransaction: command=getVersion successful=true  
description: Control transaction response.  
requestor:  
user: cids  
application:  
hostId: 64.101.182.101  
appName: -cidcli  
appInstanceId: 2316  
evStatus: eventId=1041526834774829056 vendor=Cisco  
originator:  
hostId: sensor  
appName: login(pam_unix)  
appInstanceId: 2315  
time: 2011/01/08 02:41:00 2011/01/08 02:41:00 UTC  
syslogMessage:  
description: session opened for user cisco by cisco(uid=0)  
Clearing Events from Event Store  
Use the clear events command to clear the Event Store.  
To clear events from the Event Store, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Clear the Event Store.  
sensor# clear events  
Warning: Executing this command will remove all events currently stored in the event  
store.  
Continue with clear? []:  
Step 3  
Enter yesto clear the events.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 8 Configuring Event Action Rules  
Monitoring Events  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
8-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
9
Configuring Anomaly Detection  
This chapter describes anomaly detection (AD) and its features and how to configure them. This chapter  
contains the following topics:  
Anomaly Detection Notes and Caveats  
The following notes and caveats apply to configuring anomaly detection:  
Anomaly detection is disabled by default. You must enable it to configure or apply an anomaly  
detection policy. Enabling anomaly detection results in a decrease in performance.  
Anomaly detection assumes it gets traffic from both directions. If the sensor is configured to see  
only one direction of traffic, you should turn off anomaly detection. Otherwise, when anomaly  
detection is running in an asymmetric environment, it identifies all traffic as having incomplete  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 9 Configuring Anomaly Detection  
Understanding Security Policies  
connections, that is, as scanners, and sends alerts for all traffic flows. Using asymmetric mode  
protection with anomaly detection enabled causes excessive resource usage and possible false  
positives for anomaly detection signatures.  
Understanding Security Policies  
You can create multiple security policies and apply them to individual virtual sensors. A security policy  
is made up of a signature definition policy, an event action rules policy, and an anomaly detection policy.  
Cisco IPS contains a default signature definition policy called sig0, a default event action rules policy  
called rules0, and a default anomaly detection policy called ad0. You can assign the default policies to  
a virtual sensor or you can create new policies. The use of multiple security policies lets you create  
security policies based on different requirements and then apply these customized policies per VLAN or  
physical interface.  
Understanding Anomaly Detection  
The anomaly detection component of the sensor detects worm-infected hosts. This enables the sensor to  
be less dependent on signature updates for protection again worms and scanners, such as Code Red and  
SQL Slammer and so forth. The anomaly detection component lets the sensor learn normal activity and  
send alerts or take dynamic response actions for behavior that deviates from what it has learned as  
normal behavior.  
Note  
Anomaly detection does not detect email-based worms, such as Nimda.  
Anomaly detection detects the following two situations:  
When the network starts on the path of becoming congested by worm traffic.  
When a single worm-infected source enters the network and starts scanning for other vulnerable  
hosts.  
Understanding Worms  
Caution  
Anomaly detection assumes it gets traffic from both directions. If the sensor is configured to see only  
one direction of traffic, you should turn off anomaly detection. Otherwise, when anomaly detection is  
running in an asymmetric environment, it identifies all traffic as having incomplete connections, that is,  
as scanners, and sends alerts for all traffic flows. Using asymmetric mode protection with anomaly  
detection enabled causes excessive resource usage and possible false positives for anomaly detection  
signatures.  
Worms are automated, self-propagating, intrusion agents that make copies of themselves and then  
facilitate their spread. Worms attack a vulnerable host, infect it, and then use it as a base to attack other  
vulnerable hosts. They search for other hosts by using a form of network inspection, typically a scan,  
and then propagate to the next target. A scanning worm locates vulnerable hosts by generating a list of  
IP addresses to probe, and then contacts the hosts. Code Red worm, Sasser worm, Blaster worm, and the  
Slammer worm are examples of worms that spread in this manner.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                   
Chapter 9 Configuring Anomaly Detection  
Anomaly Detection Modes  
Anomaly detection identifies worm-infected hosts by their behavior as scanners. To spread, a worm must  
find new hosts. It finds them by scanning the Internet or network using TCP, UDP, and other protocols  
to generate unsuccessful attempts to access different destination IP addresses. A scanner is defined as a  
source IP address that generates events on the same destination port (in TCP and UDP) for too many  
destination IP addresses.  
The events that are important for TCP protocol are nonestablished connections, such as a SYN packet  
that does not have its SYN-ACK response for a given amount of time. A worm-infected host that scans  
using TCP protocol generates nonestablished connections on the same destination port for an anomalous  
number of IP addresses.  
The events that are important for UDP protocol are unidirectional connections, such as a UDP  
connection where all packets are going only in one direction. A worm-infected host that scans using UDP  
protocol generates UDP packets but does not receive UDP packets on the same quad within a timeout  
period on the same destination port for multiple destination IP addresses.  
The events that are important for other protocols, such as ICMP, are from a source IP address to many  
different destination IP addresses, that is, packets that are received in only one direction.  
Caution  
If a worm has a list of IP addresses it should infect and does not have to use scanning to spread itself (for  
example, it uses passive mapping—listening to the network as opposed to active scanning), it is not  
detected by the anomaly detection worm policies. Worms that receive a mailing list from probing files  
within the infected host and email this list are also not detected, because no Layer 3/Layer 4 anomaly is  
generated.  
For More Information  
For the procedure for turning off anomaly detection, see Disabling Anomaly Detection, page 9-48.  
Anomaly Detection Modes  
If you have anomaly detection enabled, it initially conducts a “peacetime” learning process when the  
most normal state of the network is reflected. Anomaly detection then derives a set of policy thresholds  
that best fit the normal network.  
Anomaly detection has the following modes:  
Learning accept mode—Anomaly detection conducts an initial learning accept mode for the default  
period of 24 hours. We assume that during this phase no attack is being carried out. Anomaly  
detection creates an initial baseline, known as a knowledge base (KB), of the network traffic. The  
default interval value for periodic schedule is 24 hours and the default action is rotate, meaning that  
a new KB is saved and loaded, and then replaces the initial KB after 24 hours.  
Note  
Anomaly detection does not detect attacks when working with the initial KB, which is  
empty. After the default of 24 hours, a KB is saved and loaded and now anomaly detection  
also detects attacks.  
Note  
Depending on your network complexity, you may want to have anomaly detection in  
learning accept mode for longer than the default 24 hours.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 9 Configuring Anomaly Detection  
Anomaly Detection Zones  
Detect mode—For ongoing operation, the sensor should remain in detect mode. This is for 24 hours  
a day, 7 days a week. Once a KB is created and replaces the initial KB, anomaly detection detects  
attacks based on it. It looks at the network traffic flows that violate thresholds in the KB and sends  
alerts. As anomaly detection looks for anomalies, it also records gradual changes to the KB that do  
not violate the thresholds and thus creates a new KB. The new KB is periodically saved and takes  
the place of the old one thus maintaining an up-to-date KB.  
Inactive mode—You can turn anomaly detection off by putting it in inactive mode. Under certain  
circumstances, anomaly detection should be in inactive mode, for example, if the sensor is running  
in an asymmetric environment. Because anomaly detection assumes it gets traffic from both  
directions, if the sensor is configured to see only one direction of traffic, anomaly detection  
identifies all traffic as having incomplete connections, that is, as scanners, and sends alerts for all  
traffic flows. Having anomaly detection running also lowers performance.  
Example  
The following example summarizes the default anomaly detection configuration. If you add a virtual  
sensor at 11:00 pm and do not change the default anomaly detection configuration, anomaly detection  
begins working with the initial KB and only performs learning. Although it is in detect mode, it cannot  
detect attacks until it has gathered information for 24 hours and replaced the initial KB. At the first start  
time (10:00 am by default), and the first interval (24 hours by default), the learning results are saved to  
a new KB and this KB is loaded and replaces the initial KB. Because the anomaly detection is in detect  
mode by default, now that anomaly detection has a new KB, the anomaly detection begins to detect  
attacks.  
For More Information  
For the procedures for putting anomaly detection in different modes, see Adding, Editing, and  
For more information about how worms operate, see Understanding Worms, page 9-2.  
Anomaly Detection Zones  
By subdividing the network into zones, you can achieve a lower false negative rate. A zone is a set of  
destination IP addresses. There are three zones, internal, illegal, and external, each with its own  
thresholds.  
The external zone is the default zone with the default Internet range of 0.0.0.0-255.255.255.255. By  
default, the internal and illegal zones contain no IP addresses. Packets that do not match the set of IP  
addresses in the internal or illegal zone are handled by the external zone.  
We recommend that you configure the internal zone with the IP address range of your internal network.  
If you configure it in this way, the internal zone is all the traffic that comes to your IP address range, and  
the external zone is all the traffic that goes to the Internet.  
You can configure the illegal zone with IP address ranges that should never be seen in normal traffic, for  
example, unallocated IP addresses or part of your internal IP address range that is unoccupied. An illegal  
zone can be very helpful for accurate detection, because we do not expect any legal traffic to reach this  
zone. This allows very low thresholds, which in turn can lead to very quick worm virus detection.  
For More Information  
For the procedures for configuring zones, see Configuring the Internal Zone, page 9-11, Configuring the  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 9 Configuring Anomaly Detection  
Anomaly Detection Configuration Sequence  
Anomaly Detection Configuration Sequence  
You can configure the detection part of anomaly detection. You can configure a set of thresholds that  
override the KB learned thresholds. However, anomaly detection continues learning regardless of how  
you configure the detection. You can also import, export, and load a KB and you can view a KB for data.  
Follow this sequence when configuring anomaly detection:  
1. Create an anomaly detection policy to add to the virtual sensors. Or you can use the default anomaly  
detection policy, ad0.  
2. Add the anomaly detection policy to your virtual sensors.  
3. Enable anomaly detection.  
4. Configure the anomaly detection zones and protocols.  
5. For the first 24 hours anomaly detection performs learning to create a populated KB. The initial KB  
is empty and during the default 24 hours, anomaly detection collects data to use to populate the KB.  
If you want the learning period to be longer than the default period of 24 hours, you must manually  
set the mode to learning accept.  
6. Let the sensor run in learning accept mode for at least 24 hours (the default). You should let the  
sensor run in learning accept mode for at least 24 hours so it can gather information on the normal  
state of the network for the initial KB. However, you should change the amount of time for learning  
accept mode according to the complexity of your network. After the time period, the sensor saves  
the initial KB as a baseline of the normal activity of your network.  
Note  
We recommend leaving the sensor in learning accept mode for at least 24 hours, but letting  
the sensor run in learning accept mode for longer, even up to a week, is better.  
7. If you manually set anomaly detection to learning accept mode, switch back to detect mode.  
8. Configure the anomaly detection parameters:  
Configure the worm timeout and which source and destination IP addresses should be bypassed  
by anomaly detection. After this timeout, the scanner threshold returns to the configured value.  
Decide whether you want to enable automatic KB updates when anomaly detection is in detect  
mode.  
Configure the 18 anomaly detection worm signatures to have more event actions than just the  
default produce-alert. For example, configure them to have deny-attacker event actions.  
For More Information  
For the procedures for putting anomaly detection in different modes, see Adding, Editing, and  
For the procedure for configuring a new anomaly detection policy, see Working With Anomaly  
For more information on configuring zones, see Configuring the Internal Zone, page 9-11,  
For more information on anomaly detection modes, see Anomaly Detection Modes, page 9-3.  
For more information about configuring learning accept mode, see Configuring Learning Accept  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 9 Configuring Anomaly Detection  
Anomaly Detection Signatures  
For more information on configuring anomaly detection signatures, see Anomaly Detection  
For more information on Deny Attacker event actions, see Event Actions, page 8-4.  
Anomaly Detection Signatures  
The Traffic Anomaly engine contains nine anomaly detection signatures covering three protocols (TCP,  
UDP, and other). Each signature has two subsignatures, one for the scanner and the other for the  
worm-infected host (or a scanner under worm attack). When anomaly detection discovers an anomaly, it  
triggers an alert for these signatures. All anomaly detection signatures are enabled by default and the  
alert severity for each one is set to high.  
When a scanner is detected but no histogram anomaly occurred, the scanner signature fires for that  
attacker (scanner) IP address. If the histogram signature is triggered, the attacker addresses that are doing  
the scanning each trigger the worm signature (instead of the scanner signature). The alert details state  
which threshold is being used for the worm detection now that the histogram has been triggered. From  
that point on, all scanners are detected as worm-infected hosts.  
The following anomaly detection event actions are possible:  
produce-alert—Writes the event to the Event Store.  
deny-attacker-inline—(Inline only) Does not transmit this packet and future packets originating  
from the attacker address for a specified period of time.  
log-attacker-packets—Starts IP logging for packets that contain the attacker address.  
deny-attacker-service-pair-inline—Blocks the source IP address and the destination port.  
request-snmp-trapRequest—Sends a request to NotificationApp to perform SNMP notification.  
request-block-host—Sends a request to ARC to block this host (the attacker).  
Table 9-1 lists the anomaly detection worm signatures.  
Table 9-1 Anomaly Detection Worm Signatures  
Signature ID Subsignature ID Name  
Description  
13000  
0
Internal TCP Scanner Identified a single scanner over a TCP  
protocol in the internal zone.  
13000  
1
Internal TCP Scanner Identified a worm attack over a TCP  
protocol in the internal zone; the TCP  
histogram threshold was crossed and a  
scanner over a TCP protocol was  
identified.  
13001  
13001  
0
1
Internal UDP Scanner Identified a single scanner over a UDP  
protocol in the internal zone.  
Internal UDP Scanner Identified a worm attack over a UDP  
protocol in the internal zone; the UDP  
histogram threshold was crossed and a  
scanner over a UDP protocol was  
identified.  
13002  
0
Internal Other Scanner Identified a single scanner over an Other  
protocol in the internal zone.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 9 Configuring Anomaly Detection  
Anomaly Detection Signatures  
Table 9-1  
Anomaly Detection Worm Signatures (continued)  
Description  
Signature ID Subsignature ID Name  
13002  
1
Internal Other Scanner Identified a worm attack over an Other  
protocol in the internal zone; the Other  
histogram threshold was crossed and a  
scanner over an Other protocol was  
identified.  
13003  
13003  
0
1
External TCP Scanner Identified a single scanner over a TCP  
protocol in the external zone.  
External TCP Scanner Identified a worm attack over a TCP  
protocol in the external zone; the TCP  
histogram threshold was crossed and a  
scanner over a TCP protocol was  
identified.  
13004  
13004  
0
1
External UDP Scanner Identified a single scanner over a UDP  
protocol in the external zone.  
External UDP Scanner Identified a worm attack over a UDP  
protocol in the external zone; the UDP  
histogram threshold was crossed and a  
scanner over a UDP protocol was  
identified.  
13005  
13005  
0
1
External Other Scanner Identified a single scanner over an Other  
protocol in the external zone.  
External Other Scanner Identified a worm attack over an Other  
protocol in the external zone; the Other  
histogram threshold was crossed and a  
scanner over an Other protocol was  
identified.  
13006  
13006  
0
1
Illegal TCP Scanner  
Identified a single scanner over a TCP  
protocol in the illegal zone.  
Illegal TCP Scanner  
Identified a worm attack over a TCP  
protocol in the illegal zone; the TCP  
histogram threshold was crossed and a  
scanner over a TCP protocol was  
identified.  
13007  
13007  
0
1
Illegal UDP Scanner  
Illegal UDP Scanner  
Identified a single scanner over a UDP  
protocol in the illegal zone.  
Identified a worm attack over a UDP  
protocol in the illegal zone; the UDP  
histogram threshold was crossed and a  
scanner over a UDP protocol was  
identified.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Enabling Anomaly Detection  
Table 9-1  
Anomaly Detection Worm Signatures (continued)  
Description  
Signature ID Subsignature ID Name  
13008  
13008  
0
Illegal Other Scanner  
Identified a single scanner over an Other  
protocol in the illegal zone.  
1
Illegal Other Scanner  
Identified a worm attack over an Other  
protocol in the illegal zone; the Other  
histogram threshold was crossed and a  
scanner over an Other protocol was  
identified.  
For More Information  
For the procedure for assigning actions to signatures, see Assigning Actions to Signatures, page 7-15.  
Enabling Anomaly Detection  
To enable anomaly detection, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter analysis engine submode.  
sensor# configure terminal  
sensor(config)# service analysis-engine  
sensor(config-ana)#  
Step 3  
Step 4  
Enter the virtual sensor name that contains the anomaly detection policy you want to enable.  
sensor(config-ana)# virtual-sensor vs0  
sensor(config-ana-vir)#  
Enable anomaly detection operational mode.  
sensor(config-ana-vir)# anomaly-detection  
sensor(config-ana-vir-ano)# operational-mode detect  
sensor(config-ana-vir-ano)#  
Step 5  
Step 6  
Exit analysis engine submode.  
sensor(config-ana-vir-ano)# exit  
sensor(config-ana-vir)# exit  
sensor(config-ana-)# exit  
Apply Changes:?[yes]:  
Press Enter to apply your changes or enter no to discard them.  
Working With Anomaly Detection Policies  
Use the service anomaly-detection name command in service anomaly detection submode to create an  
anomaly detection policy. The values of this anomaly detection policy are the same as the default  
anomaly detection policy, ad0, until you edit them. Or you can use the copy anomaly-detection  
source_destination command in privileged EXEC mode to make a copy of an existing policy and then  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 9 Configuring Anomaly Detection  
Working With Anomaly Detection Policies  
edit the values of the new policy as needed. Use the list anomaly-detection-configurations command  
in privileged EXEC mode to list the anomaly detection policies. Use the no service anomaly-detection  
name command in global configuration mode to delete an anomaly detection policy. Use the default  
service anomaly-detection name command in global configuration mode to reset the anomaly detection  
policy to factory settings.  
Working With Anomaly Detection Policies  
To create, copy, display, edit, and delete anomaly detection policies, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Create an anomaly detection policy.  
sensor# configure terminal  
sensor(config)# service anomaly-detection MyAnomaly Detection  
Editing new instance MyAnomaly Detection.  
sensor(config-ano)# exit  
Apply Changes?[yes]: yes  
sensor(config)# exit  
sensor#  
Step 3  
Or copy an existing anomaly detection policy to a new anomaly detection policy.  
sensor# copy anomaly-detection ad0 ad1  
sensor#  
Note  
You receive an error if the policy already exists or if there is not enough space available for the  
new policy.  
Step 4  
Step 5  
Accept the default anomaly detection policy values or edit the following parameters:  
a. Configure the operational settings.  
b. Configure the zones.  
c. Configure learning accept mode.  
d. Learn how to work with KBs.  
Display a list of anomaly detection policies on the sensor.  
sensor# list anomaly-detection-configurations  
Anomaly Detection  
Instance  
ad0  
temp  
Size  
255  
707  
Virtual Sensor  
vs0  
N/A  
MyAnomaly Detection  
255  
N/A  
ad1  
141  
vs1  
sensor#  
Step 6  
Delete an anomaly detection policy.  
sensor# configure terminal  
sensor(config)# no service anomaly-detection MyAnomaly Detection  
sensor(config)# exit  
sensor#  
Note  
You cannot delete the default anomaly detection policy, ad0.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Chapter 9 Configuring Anomaly Detection  
Configuring Anomaly Detection Operational Settings  
Step 7  
Verify that the anomaly detection instance has been deleted.  
sensor# list anomaly-detection-configurations  
Anomaly Detection  
Instance  
ad0  
ad1  
Size  
204  
141  
Virtual Sensor  
vs0  
N/A  
sensor#  
Step 8  
Reset an anomaly detection policy to factory settings.  
sensor# configure terminal  
sensor(config)# default service anomaly-detection ad1  
sensor(config)#  
For More Information  
For the procedure for configuring operational settings, see Configuring Anomaly Detection  
For the procedures for configuring anomaly detection zones, see Configuring the Internal Zone,  
For the procedure for configuring learning accept mode, see Configuring Learning Accept Mode,  
For the procedure for working with KBs, see Working With KB Files, page 9-40.  
Configuring Anomaly Detection Operational Settings  
Use the worm-timeout command in service anomaly detection submode to set the worm detection  
timeout. After this timeout, the scanner threshold returns to the configured value. Use the ignore  
command in service anomaly detection submode to configure source and destination IP addresses that  
you want the sensor to ignore when anomaly detection is gathering information for a KB. Anomaly  
detection does not track these source and destination IP addresses and the KB thresholds are not affected  
by these IP addresses.  
The following options apply:  
worm-timeout—Specifies the amount of time in seconds for the worm termination timeout. The  
range is 120 to 10,000,000 seconds. The default is 600 seconds.  
ignore—Specifies the IP addresses that should be ignored while anomaly detection is processing:  
enabled {true | false}—Enables/disables the list of ignored IP addresses. The default is  
enabled.  
source-ip-address-range—Specifies the source IP addresses that you want anomaly detection  
to ignore during processing.  
dest-ip-address-range—Specifies the destination IP addresses that you want anomaly  
detection to ignore during processing.  
Note  
IP addresses are in the form of <A.B.C.D>-<A.B.C.D>[,<A.B.C.D>-<A.B.C.D>].  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
Configuring Anomaly Detection Operational Settings  
To specify anomaly detection operational settings, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad1  
Step 3  
Step 4  
Specify the worm timeout.  
sensor(config-ano)# worm-timeout 800  
Verify the setting.  
sensor(config-ano)# show settings  
worm-timeout: 800 seconds default: 600  
Step 5  
Specify the destination IP addresses that you want to be ignored while anomaly detection is processing.  
sensor(config-ano)# ignore  
sensor(config-ano-ign)# dest-ip-address-range 10.10.5.5,10.10.2.1-10.10.2.30  
Step 6  
Step 7  
Specify the source IP addresses that you want to be ignored while anomaly detection is processing.  
sensor(config-ano-ign)# source-ip-address-range 10.20.30.108-10.20.30.191  
Verify the settings.  
sensor(config-ano-ign)# show settings  
ignore  
-----------------------------------------------  
enabled: true default: true  
source-ip-address-range: 10.20.30.108-10.20.30.191 default: 0.0.0.0  
dest-ip-address-range: 10.10.5.5,10.10.2.1-10.10.2.30 default: 0.0.0.0  
-----------------------------------------------  
sensor(config-ano-ign)#  
Step 8  
Step 9  
Exit anomaly detection submode.  
sensor(config-ano-ign)# exit  
sensor(config-ano)# exit  
Apply Changes:?[yes]:  
Press Enter to apply your changes or enter no to discard them.  
Configuring the Internal Zone  
This section describes how to configure the internal zone, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
Understanding the Internal Zone  
The internal zone should represent your internal network. It should receive all the traffic that comes to  
your IP address range. If the zone is disabled, packets to this zone are ignored. By default the zone is  
enabled. You then add the IP addresses that belong to this zone. If you do not configure IP addresses for  
all zones, all packets are sent to the default zone, the external zone.  
You can enable or disable TCP, UDP, and other protocols for the internal zone. You can configure a  
destination port for the TCP and UDP protocols and a protocol number for the other protocols. You can  
either use the default thresholds or override the scanner settings and add your own thresholds and  
histograms.  
Configuring the Internal Zone  
Use the internal-zone {enabled | ip-address-range | tcp | udp |other} command in service  
anomaly-detection submode to enable the internal zone, add IP addresses to the internal zone, and  
specify protocols.  
The following options apply:  
enabled {false | true}—Enables/disables the zone.  
ip-address-range—Specifies the IP addresses of the subnets in the zone. The valid value is  
<A.B.C.D>-<A.B.C.D>[,<A.B.C.D>-<A.B.C.D>].  
Note  
The second IP address in the range must be greater than or equal to the first IP address.  
tcp—Lets you configure TCP protocol.  
udp—Lets you configure UDP protocol.  
other—Lets you configure other protocols besides TCP and UDP.  
Configuring the Internal Zone  
To configure the internal zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection internal zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# internal-zone  
sensor(config-ano-int)#  
Step 3  
Step 4  
Enable the internal zone.  
sensor(config-ano-int)# enabled true  
Configure the IP addresses to be included in the internal zone.  
sensor(config-ano-int)# ip-address-range 192.0.2.72-192.0.2.108  
Step 5  
Step 6  
Configure TCP protocol.  
Configure UDP protocol.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
Step 7  
Configure the other protocols.  
For More Information  
For the procedure for configuring TCP protocol, see Configuring TCP Protocol for the Internal  
For the procedure for configuring UDP protocol, see Configuring UDP Protocol for the Internal  
For the procedure for configuring other protocols, see Configuring Other Protocols for the Internal  
Configuring TCP Protocol for the Internal Zone  
Use the tcp {enabled | dst-port number | default-thresholds} command in service anomaly detection  
internal zone submode to enable and configure the TCP service.  
The following options apply:  
enabled {false | true}—Enables/disables TCP protocol.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
dst-port number—Defines thresholds for specific destination ports. The valid values are 0 to 65535.  
enabled {true | false}—Enables/disables the service.  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Configuring Internal Zone TCP Protocol  
To configure TCP protocol for the internal zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection internal zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# internal-zone  
sensor(config-ano-int)#  
Step 3  
Step 4  
Enable TCP protocol.  
sensor(config-ano-int)# tcp  
sensor(config-ano-int-tcp)# enabled true  
Associate a specific port with TCP protocol.  
sensor(config-ano-int-tcp)# dst-port 20  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
sensor(config-ano-int-tcp-dst)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-int-tcp-dst)# enabled true  
To override the scanner values for that port. You can use the default scanner values, or you can override  
them and configure your own scanner values.  
sensor(config-ano-int-tcp-dst)# override-scanner-settings yes  
sensor(config-ano-int-tcp-dst-yes)#  
Step 7  
To add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-int-tcp-dst-yes)# threshold-histogram low num-source-ips 100  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-int-tcp-dst-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-int-tcp-dst-yes)# exit  
sensor(config-ano-int-tcp-dst)# exit  
sensor(config-ano-int-tcp)# exit  
sensor(config-ano-int-tcp)# default-thresholds  
sensor(config-ano-int-tcp-def)# default-thresholds  
sensor(config-ano-int-tcp-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-int-tcp-def)# scanner-threshold 120  
Step 10 Verify the TCP configuration settings.  
sensor(config-ano-int-tcp)# show settings  
tcp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 4)  
-----------------------------------------------  
number: 20  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
yes  
-----------------------------------------------  
scanner-threshold: 120 default: 200  
threshold-histogram (min: 0, max: 3, current: 1)  
-----------------------------------------------  
dest-ip-bin: low  
num-source-ips: 100  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
number: 23  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 113  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 567  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 120 default: 200  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium  
num-source-ips: 120 default: 1  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
sensor(config-ano-int-tcp)#  
Configuring UDP Protocol for the Internal Zone  
Use the udp {enabled | dst-port number | default-thresholds} command in service anomaly detection  
internal zone submode to enable and configure the UDP service.  
The following options apply:  
enabled {false | true}—Enables/disables UDP protocol.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
dst-port number—Defines thresholds for specific destination ports. The valid values are 0 to 65535.  
enabled {true | false}—Enables/disables the service.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Configuring the Internal Zone UDP Protocol  
To configure UDP protocol for a zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection internal zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# internal-zone  
sensor(config-ano-int)#  
Step 3  
Step 4  
Enable UDP protocol.  
sensor(config-ano-int)# udp  
sensor(config-ano-int-udp)# enabled true  
Associate a specific port with UDP protocol.  
sensor(config-ano-int-udp)# dst-port 20  
sensor(config-ano-int-udp-dst)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-int-udp-dst)# enabled true  
To override the scanner values for that port. You can use the default scanner values, or you can override  
them and configure your own scanner values.  
sensor(config-ano-int-udp-dst)# override-scanner-settings yes  
sensor(config-ano-int-udp-dst-yes)#  
Step 7  
To add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-int-udp-dst-yes)# threshold-histogram low num-source-ips 100  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-int-udp-dst-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-int-udp-dst-yes)# exit  
sensor(config-ano-int-udp-dst)# exit  
sensor(config-ano-int-udp)# default-thresholds  
sensor(config-ano-int-udp-def)# default-thresholds  
sensor(config-ano-int-udp-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-int-udp-def)# scanner-threshold 120  
Step 10 Verify the UDP configuration settings.  
sensor(config-ano-int-udp)# show settings  
udp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 4)  
-----------------------------------------------  
number: 20  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
yes  
-----------------------------------------------  
scanner-threshold: 100 default: 200  
threshold-histogram (min: 0, max: 3, current: 1)  
-----------------------------------------------  
dest-ip-bin: low  
num-source-ips: 100  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
number: 23  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 113  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 567  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 120 default: 200  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium  
num-source-ips: 120 default: 1  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
sensor(config-ano-int-udp)#  
Configuring Other Protocols for the Internal Zone  
Use the other {enabled | protocol number | default-thresholds} command in service anomaly detection  
internal zone submode to enable and configure the other services.  
The following options apply:  
enabled {false | true}—Enables/disables other protocols.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
protocol-number number—Defines thresholds for specific protocols. The valid values are 0 to 255.  
enabled {true | false}—Enables/disables the service.  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Configuring the Internal Zone Other Protocols  
To configure other protocols for a zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection internal zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# internal-zone  
sensor(config-ano-int)#  
Step 3  
Step 4  
Enable the other protocols.  
sensor(config-ano-int)# other  
sensor(config-ano-int-oth)# enabled true  
Associate a specific number for the other protocols.  
sensor(config-ano-int-oth)# protocol-number 5  
sensor(config-ano-int-oth-pro)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-int-oth-pro)# enabled true  
To override the scanner values for that protocol. You can use the default scanner values, or you can  
override them and configure your own scanner values.  
sensor(config-ano-int-oth-pro)# override-scanner-settings yes  
sensor(config-ano-int-oth-pro-yes)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Configuring the Internal Zone  
Step 7  
To add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-int-oth-pro-yes)# threshold-histogram high num-source-ips 75  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-int-oth-pro-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-int-oth-pro-yes)# exit  
sensor(config-ano-int-oth-pro)# exit  
sensor(config-ano-int-oth)# default-thresholds  
sensor(config-ano-int-oth-def)# default-thresholds  
sensor(config-ano-int-oth-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-int-oth-def)# scanner-threshold 120  
Step 10 Verify the other configuration settings.  
sensor(config-ano-int-oth)# show settings  
other  
-----------------------------------------------  
protocol-number (min: 0, max: 255, current: 1)  
-----------------------------------------------  
number: 5  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
yes  
-----------------------------------------------  
scanner-threshold: 95 default: 200  
threshold-histogram (min: 0, max: 3, current: 1)  
-----------------------------------------------  
dest-ip-bin: high  
num-source-ips: 75  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 200 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
sensor(config-ano-int-oth)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Configuring the Illegal Zone  
Configuring the Illegal Zone  
This section describes how to configure the illegal zone, and contains the following topics:  
Understanding the Illegal Zone  
The illegal zone should represent IP address ranges that should never be seen in normal traffic, for  
example, unallocated IP addresses or part of your internal IP address range that is unoccupied. You then  
add the IP addresses that belong to this zone. If you do not configure IP addresses for all zones, all  
packets are sent to the default zone, the external zone.  
You can enable or disable TCP, UDP, and other protocols for the internal zone. You can configure a  
destination port for the TCP and UDP protocols and a protocol number for the other protocols. You can  
either use the default thresholds or override the scanner settings and add your own thresholds and  
histograms.  
Configuring the Illegal Zone  
Use the illegal-zone {enabled | ip-address-range | tcp | udp |other} command in service anomaly  
detection submode to enable the illegal zone, add IP addresses to the illegal zone, and specify protocols.  
The following options apply:  
enabled {false | true}—Enables/disables the zone.  
ip-address-range—Specifies the IP addresses of the subnets in the zone. The valid value is  
<A.B.C.D>-<A.B.C.D>[,<A.B.C.D>-<A.B.C.D>].  
Note  
The second IP address in the range must be greater than or equal to the first IP address.  
tcp—Lets you configure TCP protocol.  
udp—Lets you configure UDP protocol.  
other—Lets you configure other protocols besides TCP and UDP.  
Configuring the Illegal Zone  
To configure the illegal zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection illegal zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# illegal-zone  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 9 Configuring Anomaly Detection  
Configuring the Illegal Zone  
sensor(config-ano-ill)#  
Step 3  
Step 4  
Enable the illegal zone.  
sensor(config-ano-ill)# enabled true  
Configure the IP addresses to be included in the illegal zone.  
sensor(config-ano-ill)# ip-address-range 192.0.2.72-192.0.2.108  
Step 5  
Step 6  
Step 7  
Configure TCP protocol.  
Configure UDP protocol.  
Configure the other protocols.  
For More Information  
For the procedure for configuring TCP protocol, see Configuring TCP Protocol for the Illegal Zone,  
For the procedure for the UDP protocol, see Configuring UDP Protocol for the Illegal Zone,  
For the procedure for configuring other protocols, see Configuring Other Protocols for the Illegal  
Configuring TCP Protocol for the Illegal Zone  
Use the tcp {enabled | dst-port number | default-thresholds} command in service anomaly detection  
illegal zone submode to enable and configure the TCP service.  
The following options apply:  
enabled {false | true}—Enables/disables TCP protocol.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
dst-port number—Defines thresholds for specific destination ports. The valid values are 0 to 65535.  
enabled {true | false}—Enables/disables the service.  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 9 Configuring Anomaly Detection  
Configuring the Illegal Zone  
Configuring the Illegal Zone TCP Protocol  
To configure TCP protocol for illegal zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection illegal zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# illegal-zone  
sensor(config-ano-ill)#  
Step 3  
Step 4  
Enable TCP protocol.  
sensor(config-ano-ill)# tcp  
sensor(config-ano-ill-tcp)# enabled true  
Associate a specific port with TCP protocol.  
sensor(config-ano-ill-tcp)# dst-port 20  
sensor(config-ano-ill-tcp-dst)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-ill-tcp-dst)# enabled true  
Override the scanner values for that port. You can use the default scanner values, or you can override  
them and configure your own scanner values.  
sensor(config-ano-ill-tcp-dst)# override-scanner-settings yes  
sensor(config-ano-ill-tcp-dst-yes)#  
Step 7  
Add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-ill-tcp-dst-yes)# threshold-histogram low num-source-ips 100  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-ill-tcp-dst-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-ill-tcp-dst-yes)# exit  
sensor(config-ano-ill-tcp-dst)# exit  
sensor(config-ano-ill-tcp)# exit  
sensor(config-ano-ill-tcp)# default-thresholds  
sensor(config-ano-ill-tcp-def)# default-thresholds  
sensor(config-ano-ill-tcp-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-ill-tcp-def)# scanner-threshold 120  
Step 10 Verify the TCP configuration settings.  
sensor(config-ano-ill-tcp)# show settings  
tcp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 4)  
-----------------------------------------------  
number: 20  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
yes  
-----------------------------------------------  
scanner-threshold: 100 default: 200  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 9 Configuring Anomaly Detection  
Configuring the Illegal Zone  
threshold-histogram (min: 0, max: 3, current: 1)  
-----------------------------------------------  
dest-ip-bin: low  
num-source-ips: 100  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
number: 23  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 113  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 567  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 120 default: 200  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium  
num-source-ips: 120 default: 1  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
sensor(config-ano-ill-tcp)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Configuring the Illegal Zone  
Configuring UDP Protocol for the Illegal Zone  
Use the udp {enabled | dst-port number | default-thresholds} command in service anomaly detection  
illegal zone submode to enable and configure the UDP service.  
The following options apply:  
enabled {false | true}—Enables/disables UDP protocol.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
dst-port number—Defines thresholds for specific destination ports. The valid values are 0 to 65535.  
enabled {true | false}—Enables/disables the service.  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Configuring the Illegal Zone UDP Protocol  
To configure UDP protocol for a zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection illegal zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# illegal-zone  
sensor(config-ano-ill)#  
Step 3  
Step 4  
Enable UDP protocol.  
sensor(config-ano-ill)# udp  
sensor(config-ano-ill-udp)# enabled true  
Associate a specific port with UDP protocol.  
sensor(config-ano-ill-udp)# dst-port 20  
sensor(config-ano-ill-udp-dst)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-ill-udp-dst)# enabled true  
Override the scanner values for that port. You can use the default scanner values, or you can override  
them and configure your own scanner values.  
sensor(config-ano-ill-udp-dst)# override-scanner-settings yes  
sensor(config-ano-ill-udp-dst-yes)#  
Step 7  
Add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-ill-udp-dst-yes)# threshold-histogram low num-source-ips 100  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Configuring the Illegal Zone  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-ill-udp-dst-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-ill-udp-dst-yes)# exit  
sensor(config-ano-ill-udp-dst)# exit  
sensor(config-ano-ill-udp)# exit  
sensor(config-ano-ill-udp)# default-thresholds  
sensor(config-ano-ill-udp-def)# default-thresholds  
sensor(config-ano-ill-udp-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-ill-udp-def)# scanner-threshold 120  
Step 10 Verify the UDP configuration settings.  
sensor(config-ano-ill-udp)# show settings  
udp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 4)  
-----------------------------------------------  
number: 20  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
yes  
-----------------------------------------------  
scanner-threshold: 100 default: 200  
threshold-histogram (min: 0, max: 3, current: 1)  
-----------------------------------------------  
dest-ip-bin: low  
num-source-ips: 100  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
number: 23  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 113  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 567  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Configuring the Illegal Zone  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 120 default: 200  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium  
num-source-ips: 120 default: 1  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
sensor(config-ano-ill-udp)#  
Configuring Other Protocols for the Illegal Zone  
Use the other {enabled | protocol number | default-thresholds} command in service anomaly detection  
illegal zone submode to enable and configure the other services.  
The following options apply:  
enabled {false | true}—Enables/disables other protocols.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
protocol-number number—Defines thresholds for specific protocols. The valid values are 0 to 255.  
enabled {true | false}—Enables/disables the service.  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Configuring the Illegal Zone Other Protocols  
To configure other protocols for a zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection illegal zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Configuring the Illegal Zone  
sensor(config-ano)# illegal-zone  
sensor(config-ano-ill)#  
Step 3  
Step 4  
Enable the other protocols.  
sensor(config-ano-ill)# other  
sensor(config-ano-ill-oth)# enabled true  
Associate a specific number for the other protocols.  
sensor(config-ano-ill-oth)# protocol-number 5  
sensor(config-ano-ill-oth-pro)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-ill-oth-pro)# enabled true  
Override the scanner values for that protocol. You can use the default scanner values, or you can override  
them and configure your own scanner values.  
sensor(config-ano-ill-oth-pro)# override-scanner-settings yes  
sensor(config-ano-ill-oth-pro-yes)#  
Step 7  
Add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-ill-oth-pro-yes)# threshold-histogram high num-source-ips 75  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-ill-oth-pro-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-ill-oth-pro-yes)# exit  
sensor(config-ano-ill-oth-pro)# exit  
sensor(config-ano-ill-oth)# default-thresholds  
sensor(config-ano-ill-oth-def)# default-thresholds  
sensor(config-ano-ill-oth-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-ill-oth-def)# scanner-threshold 120  
Step 10 Verify the other protocols configuration settings.  
sensor(config-ano-ill-oth)# show settings  
other  
-----------------------------------------------  
protocol-number (min: 0, max: 255, current: 1)  
-----------------------------------------------  
number: 5  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
yes  
-----------------------------------------------  
scanner-threshold: 95 default: 200  
threshold-histogram (min: 0, max: 3, current: 1)  
-----------------------------------------------  
dest-ip-bin: high  
num-source-ips: 75  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Configuring the External Zone  
-----------------------------------------------  
scanner-threshold: 200 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
sensor(config-ano-ill-oth)#  
Configuring the External Zone  
This section describes how to configure the external zone, and contains the following topics:  
Understanding the External Zone  
The external zone is the default zone with the default Internet range of 0.0.0.0-255.255.255.255. By  
default, the internal and illegal zones contain no IP addresses. Packets that do not match the set of IP  
addresses in the internal or illegal zone are handled by the external zone.  
You can enable or disable TCP, UDP, and other protocols for the external zone. You can configure a  
destination port for the TCP and UDP protocols and a protocol number for the other protocols. You can  
either use the default thresholds or override the scanner settings and add your own thresholds and  
histograms.  
Configuring the External Zone  
Use the external-zone {enabled | tcp | udp |other} command in service anomaly detection submode to  
enable the external zone and specify protocols.  
The following options apply:  
enabled {false | true}—Enables/disables the zone.  
tcp—Lets you configure TCP protocol.  
udp—Lets you configure UDP protocol.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 9 Configuring Anomaly Detection  
Configuring the External Zone  
other—Lets you configure other protocols besides TCP and UDP.  
Configuring the External Zone  
To configure the external zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection external zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# external-zone  
sensor(config-ano-ext)#  
Step 3  
Enable the external zone.  
sensor(config-ano-ext)# enabled true  
Step 4  
Step 5  
Step 6  
Configure TCP protocol.  
Configure UDP protocol.  
Configure the other protocols.  
For More Information  
For the procedure for configuring TCP protocol, see Configuring TCP Protocol for the External  
For the procedure for configuring UDP protocol, see Configuring UDP Protocol for the External  
For the procedure for configuring other protocols, see Configuring Other Protocols for the External  
Configuring TCP Protocol for the External Zone  
Use the tcp {enabled | dst-port number | default-thresholds} command in service anomaly detection  
external zone submode to enable and configure the TCP service.  
The following options apply:  
enabled {false | true}—Enables/disables TCP protocol.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
dst-port number—Defines thresholds for specific destination ports. The valid values are 0 to 65535.  
enabled {true | false}—Enables/disables the service.  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Configuring the External Zone  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Configuring the External Zone TCP Protocol  
To configure TCP protocol for the external zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection external zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# external-zone  
sensor(config-ano-ext)#  
Step 3  
Step 4  
Enable TCP protocol.  
sensor(config-ano-ext)# tcp  
sensor(config-ano-ext-tcp)# enabled true  
Associate a specific port with TCP protocol.  
sensor(config-ano-ext-tcp)# dst-port 20  
sensor(config-ano-ext-tcp-dst)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-ext-tcp-dst)# enabled true  
Override the scanner values for that port. You can use the default scanner values, or you can override  
them and configure your own scanner values.  
sensor(config-ano-ext-tcp-dst)# override-scanner-settings yes  
sensor(config-ano-ext-tcp-dst-yes)#  
Step 7  
Add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-ext-tcp-dst-yes)# threshold-histogram low num-source-ips 100  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-ext-tcp-dst-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-ext-tcp-dst-yes)# exit  
sensor(config-ano-ext-tcp-dst)# exit  
sensor(config-ano-ext-tcp)# exit  
sensor(config-ano-ext-tcp)# default-thresholds  
sensor(config-ano-ext-tcp-def)# default-thresholds  
sensor(config-ano-ext-tcp-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-ext-tcp-def)# scanner-threshold 120  
Step 10 Verify the TCP configuration settings.  
sensor(config-ano-ext-tcp)# show settings  
tcp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 4)  
-----------------------------------------------  
number: 20  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 9 Configuring Anomaly Detection  
Configuring the External Zone  
yes  
-----------------------------------------------  
scanner-threshold: 100 default: 200  
threshold-histogram (min: 0, max: 3, current: 1)  
-----------------------------------------------  
dest-ip-bin: low  
num-source-ips: 100  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
number: 23  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 113  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 567  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 120 default: 200  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium  
num-source-ips: 120 default: 1  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
sensor(config-ano-ext-tcp)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Configuring the External Zone  
Configuring UDP Protocol for the External Zone  
Use the udp {enabled | dst-port number | default-thresholds} command in service anomaly detection  
external zone submode to enable and configure the UDP service.  
The following options apply:  
enabled {false | true}—Enables/disables UDP protocol.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
dst-port number—Defines thresholds for specific destination ports. The valid values are 0 to 65535.  
enabled {true | false}—Enables/disables the service.  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Configuring the External Zone UDP Protocol  
To configure UDP protocol for a zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection external zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# external-zone  
sensor(config-ano-ext)#  
Step 3  
Step 4  
Enable UDP protocol.  
sensor(config-ano-ext)# udp  
sensor(config-ano-ext-udp)# enabled true  
Associate a specific port with UDP protocol.  
sensor(config-ano-ext-udp)# dst-port 20  
sensor(config-ano-ext-udp-dst)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-ext-udp-dst)# enabled true  
Override the scanner values for that port. You can use the default scanner values, or you can override  
them and configure your own scanner values.  
sensor(config-ano-ext-udp-dst)# override-scanner-settings yes  
sensor(config-ano-ext-udp-dst-yes)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Configuring the External Zone  
Step 7  
Add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-ext-udp-dst-yes)# threshold-histogram low num-source-ips 100  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-ext-udp-dst-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-ext-udp-dst-yes)# exit  
sensor(config-ano-ext-udp-dst)# exit  
sensor(config-ano-ext-udp)# default-thresholds  
sensor(config-ano-ext-udp-def)# default-thresholds  
sensor(config-ano-ext-udp-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-ext-udp-def)# scanner-threshold 120  
Step 10 Verify the UDP configuration settings.  
sensor(config-ano-ext-udp)# show settings  
udp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 4)  
-----------------------------------------------  
number: 20  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
yes  
-----------------------------------------------  
scanner-threshold: 100 default: 200  
threshold-histogram (min: 0, max: 3, current: 1)  
-----------------------------------------------  
dest-ip-bin: low  
num-source-ips: 100  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
number: 23  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 113  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
number: 567  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Configuring the External Zone  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 120 default: 200  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium  
num-source-ips: 120 default: 1  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
sensor(config-ano-ext-udp)#  
Configuring Other Protocols for the External Zone  
Use the other {enabled | protocol number | default-thresholds} command in service anomaly detection  
external zone submode to enable and configure the other services.  
The following options apply:  
enabled {false | true}—Enables/disables other protocols.  
default-thresholds—Defines thresholds to be used for all ports not specified in the destination port  
map:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
protocol-number number—Defines thresholds for specific protocols. The valid values are 0 to 255.  
enabled {true | false}—Enables/disables the service.  
override-scanner-settings {yes | no}—Lets you override the scanner values:  
threshold-histogram {low | medium | high} num-source-ips number—Sets values in the  
threshold histogram.  
scanner-threshold—Sets the scanner threshold. The default is 200.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 9 Configuring Anomaly Detection  
Configuring the External Zone  
Configuring the External Zone Other Protocols  
To configure other protocols for a zone, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection external zone submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# external-zone  
sensor(config-ano-ext)#  
Step 3  
Step 4  
Enable the other protocols.  
sensor(config-ano-ext)# other  
sensor(config-ano-ext-oth)# enabled true  
Associate a specific number for the other protocols.  
sensor(config-ano-ext-oth)# protocol-number 5  
sensor(config-ano-ext-oth-pro)#  
Step 5  
Step 6  
Enable the service for that port.  
sensor(config-ano-ext-oth-pro)# enabled true  
Override the scanner values for that protocol. You can use the default scanner values, or you can override  
them and configure your own scanner values.  
sensor(config-ano-ext-oth-pro)# override-scanner-settings yes  
sensor(config-ano-ext-oth-pro-yes)#  
Step 7  
Add a histogram for the new scanner settings. Enter the number of destination IP addresses (low,  
medium, or high) and the number of source IP addresses you want associated with this histogram.  
sensor(config-ano-ext-oth-pro-yes)# threshold-histogram high num-source-ips 75  
Step 8  
Step 9  
Set the scanner threshold.  
sensor(config-ano-ext-oth-pro-yes)# scanner-threshold 100  
Configure the default thresholds for all other unspecified ports.  
sensor(config-ano-ext-oth-pro-yes)# exit  
sensor(config-ano-ext-oth-pro)# exit  
sensor(config-ano-ext-oth)# default-thresholds  
sensor(config-ano-ext-oth-def)# default-thresholds  
sensor(config-ano-ext-oth-def)# threshold-histogram medium num-source-ips 120  
sensor(config-ano-ext-oth-def)# scanner-threshold 120  
Step 10 Verify the other protocols configuration settings.  
sensor(config-ano-ext-oth)# show settings  
other  
-----------------------------------------------  
protocol-number (min: 0, max: 255, current: 1)  
-----------------------------------------------  
number: 5  
-----------------------------------------------  
override-scanner-settings  
-----------------------------------------------  
yes  
-----------------------------------------------  
scanner-threshold: 95 default: 200  
threshold-histogram (min: 0, max: 3, current: 1)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 9 Configuring Anomaly Detection  
Configuring Learning Accept Mode  
-----------------------------------------------  
dest-ip-bin: high  
num-source-ips: 75  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 200 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true default: true  
-----------------------------------------------  
sensor(config-ano-ext-oth)#  
Configuring Learning Accept Mode  
This section describes KBs and histograms and how to configure learning accept mode. It contains the  
following topics:  
The KB and Histograms  
The KB has a tree structure, and contains the following information:  
KB name  
Zone name  
Protocol  
Service  
The KB holds a scanner threshold and a histogram for each service. If you have learning accept mode  
set to auto and the action set to rotate, a new KB is created every 24 hours and used in the next 24 hours.  
If you have learning accept mode set to auto and the action is set to save only, a new KB is created, but  
the current KB is used. If you do not have learning accept mode set to auto, no KB is created.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Configuring Learning Accept Mode  
Note  
Learning accept mode uses the sensor local time.  
The scanner threshold defines the maximum number of zone IP addresses that a single source IP address  
can scan. The histogram threshold defines the maximum number of source IP addresses that can scan  
more than the specified numbers of zone IP addresses.  
Anomaly detection identifies a worm attack when there is a deviation from the histogram that it has  
learned when no attack was in progress (that is, when the number of source IP addresses that  
concurrently scan more than the defined zone destination IP address is exceeded). For example, if the  
scanning threshold is 300 and the histogram for port 445, if anomaly detection identifies a scanner that  
scans 350 zone destination IP addresses, it produces an action indicating that a mass scanner was  
detected. However, this scanner does not yet verify that a worm attack is in progress. Table 9-2 describes  
this example.  
Table 9-2  
Example Histogram  
Number of source IP addresses  
10  
5
5
2
Number of destination IP addresses  
20  
100  
When anomaly detection identifies six concurrent source IP addresses that scan more than 20 zone  
destination IP addresses on port 445, it produces an action with an unspecified source IP address that  
indicates anomaly detection has identified a worm attack on port 445. The dynamic filter threshold, 20,  
specifies the new internal scanning threshold and causes anomaly detection to lower the threshold  
definition of a scanner so that anomaly detection produces additional dynamic filters for each source IP  
address that scans more than the new scanning threshold (20).  
You can override what the KB learned per anomaly detection policy and per zone. If you understand your  
network traffic, you may want to use overrides to limit false positives.  
Triggering the High Category Histogram Before the Single-Scanner Threshold  
Based on the default histogram (nonlearned knowledge base [KB]) values, histogram-based detection  
can occur before single-scanner detection.  
Single scanner detection is based on the scanner threshold settings. The scanner threshold setting is a  
single number for that port or protocol and zone. Any single IP address scanning more than that number  
of hosts of that port or protocol in that zone is alerted as a scanner.  
There is a histogram for that port or protocol and zone that tracks how many systems normally scan a  
smaller number of hosts (10 hosts, 20 hosts, or 100 hosts). When more than that normal number of  
scanners are seen, then a worm is declared and all IPs scanning more than the associated number of hosts  
are alerted on as being a worm scanner.  
Note  
An IP source address can be alerted on as being a worm scanner without ever reaching the scanner  
threshold. The scanner threshold is used to detect single systems scanning a large number of hosts and  
is tracked separately from the algorithms for detecting worms.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 9 Configuring Anomaly Detection  
Configuring Learning Accept Mode  
Configuring Learning Accept Mode  
Use the learning-accept-mode command in service anomaly detection submode to configure whether  
you want the sensor to create a new KB every so many hours. You can configure whether the KB is  
created and loaded (rotate) or saved (save only). You can schedule how often and when the KB is loaded  
or saved.  
The new updated KB file name is the current date and time, YYYY-Mon-dd-hh_mm_ss, where Mon is the  
three-letter abbreviation of the month.  
Note  
Anomaly detection learning accept mode uses the sensor local time.  
The following options apply:  
learning-accept-mode—Specifies if and when the KB is saved and loaded:  
auto— Configures the sensor to automatically accept the KB.  
manual—Does not save the KB.  
Note  
You can save and load the KB using the anomaly-detection {load | save} commands.  
action—Specifies whether to rotate or save the KB:  
save-only—Saves the new KB. You can examine it and decide whether to load it into anomaly  
detection.  
Note  
You can load the KB using the anomaly-detection load command.  
rotate—Saves the new KB and loads it as the current KB according to the schedule you define.  
schedule— Configures a schedule to accept the KB:  
calendar-schedule {days-of-week} {times-of-day}—Starts learning accept mode at specific  
times on specific days.  
periodic-schedule {interval} {start-time}—Starts learning accept mode at specific periodic  
intervals.  
Configuring Learning Accept Mode  
The first saving begins after a full interval between configuration time and start time. For example, if the  
time is now 16:00 and you configure start time at 16:30 with an interval of one hour, the first KB is saved  
at 17:30, because there was no one-hour interval between 16:00 and 16:30.  
To configure learning accept mode, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter anomaly detection submode.  
sensor# configure terminal  
sensor(config)# service anomaly-detection ad1  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Configuring Learning Accept Mode  
Step 3  
Specify how the KB is saved and loaded:  
a. Specify that the KB is automatically saved and loaded. Go to Step 4.  
sensor(config-ano)# learning-accept-mode auto  
sensor(config-ano-aut)#  
b. Specify that the KB is going to be manually saved and loaded. Go to Step 6.  
sensor(config-ano)# learning-accept-mode manual  
sensor(config-ano-man)#  
Step 4  
Specify how you want the KB automatically accepted:  
a. Save the KB so that you can inspect it and decide whether to load it. Go to Step 6.  
sensor(config-ano-aut)# action save-only  
b. Have the KB saved and loaded as the current KB according to the schedule you define. Continue  
with Step 5.  
sensor(config-ano-aut)# action rotate  
Step 5  
Schedule the automatic KB saves and loads:  
Calendar schedule—With this schedule the KB is saved and loaded every Monday at midnight.  
sensor(config-ano-aut)# schedule calendar-schedule  
sensor(config-ano-aut-cal)# days-of-week monday  
sensor(config-ano-aut-cal)# times-of-day time 24:00:00  
Periodic schedule—With this schedule the KB is saved and loaded every 24 hours at midnight.  
sensor(config-ano-aut)# schedule periodic-schedule  
sensor(config-ano-aut-per)# start-time 24:00:00  
sensor(config-ano-aut-per)# interval 24  
Step 6  
Verify the settings.  
sensor(config-ano-aut-per)# exit  
sensor(config-ano-aut)# show settings  
auto  
-----------------------------------------------  
action: rotate default: rotate  
schedule  
-----------------------------------------------  
periodic-schedule  
-----------------------------------------------  
start-time: 12:00:00 default: 10:00:00  
interval: 24 hours default: 24  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
Step 7  
Step 8  
Exit anomaly detection submode.  
sensor(config-ano-aut)# exit  
sensor(config-ano)# exit  
Apply Changes:?[yes]:  
Press Enter to apply your changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Working With KB Files  
For More Information  
For the procedures for saving and loading anomaly detection KBs manually, see Saving and Loading  
Working With KB Files  
This section describes how to display, load, save, copy, rename and delete KB files. It also provides the  
procedures for comparing two KB files and for displaying the thresholds of a KB file. It contains the  
following topics:  
Displaying KB Files  
Use the show ad-knowledge-base [virtual-sensor] files command in privileged EXEC mode to display  
the available KB files for a virtual sensor.  
Note  
The * before the file name indicates that this KB file is the currently loaded KB file.  
To display KB files, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the KB files for all virtual sensors.  
sensor# show ad-knowledge-base files  
Virtual Sensor vs0  
Filename  
initial  
2003-Jan-28-10_00_01  
Size  
84  
84  
Created  
04:27:07 CDT Wed Jan 29 2003  
04:27:07 CDT Wed Jan 29 2003  
*
Virtual Sensor vs1  
Filename  
Size  
84  
84  
84  
84  
84  
84  
84  
84  
84  
84  
84  
84  
84  
84  
84  
84  
Created  
initial  
14:35:38 CDT Tue Mar 14 2006  
10:00:00 CDT Thu Mar 16 2006  
10:00:00 CDT Fri Mar 17 2006  
10:00:00 CDT Sat Mar 18 2006  
10:00:00 CDT Sun Mar 19 2006  
10:00:00 CDT Mon Mar 20 2006  
10:00:00 CDT Tue Mar 21 2006  
10:00:00 CDT Wed Mar 22 2006  
10:00:00 CDT Thu Mar 23 2006  
10:00:00 CDT Fri Mar 24 2006  
10:00:00 CDT Sat Mar 25 2006  
10:00:00 CDT Sun Mar 26 2006  
10:00:00 CDT Mon Mar 27 2006  
10:00:00 CDT Thu Jan 02 2003  
10:00:00 CDT Fri Jan 03 2003  
10:00:00 CDT Sat Jan 04 2003  
2006-Mar-16-10_00_00  
2006-Mar-17-10_00_00  
2006-Mar-18-10_00_00  
2006-Mar-19-10_00_00  
2006-Mar-20-10_00_00  
2006-Mar-21-10_00_00  
2006-Mar-22-10_00_00  
2006-Mar-23-10_00_00  
2006-Mar-24-10_00_00  
2006-Mar-25-10_00_00  
2006-Mar-26-10_00_00  
2006-Mar-27-10_00_00  
2003-Jan-02-10_00_00  
2003-Jan-03-10_00_00  
2003-Jan-04-10_00_00  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 9 Configuring Anomaly Detection  
Working With KB Files  
2003-Jan-05-10_00_00  
2003-Jan-06-10_00_00  
sensor#  
84  
84  
10:00:00 CDT Sun Jan 05 2003  
10:00:00 CDT Mon Jan 06 2003  
Step 3  
Display the KB files for a specific virtual sensor.  
sensor# show ad-knowledge-base vs0 files  
Virtual Sensor vs0  
Filename  
initial  
Size  
84  
Created  
10:24:58 CDT Tue Mar 14 2006  
10:00:00 CDT Thu Mar 16 2006  
10:00:00 CDT Fri Mar 17 2006  
10:00:00 CDT Sat Mar 18 2006  
10:00:00 CDT Sun Mar 19 2006  
10:00:00 CDT Mon Mar 20 2006  
2006-Mar-16-10_00_00  
2006-Mar-17-10_00_00  
2006-Mar-18-10_00_00  
2006-Mar-19-10_00_00  
2006-Mar-20-10_00_00  
84  
84  
84  
84  
84  
Saving and Loading KBs Manually  
Use these commands in privileged EXEC mode to manually save and load KBs.  
The following options apply:  
show ad-knowledge-base virtual-sensor files—Displays the available KB files per virtual sensor.  
anomaly-detection virtual-sensor load {initial | file name}—Sets the KB file as the current KB for  
the specified virtual sensor. If AD is active, the file is loaded as the current KB.  
anomaly-detection virtual-sensor save [new-name]—Retrieves the current KB file and saves it  
locally.  
Manually Saving and Loading KBs  
To manually save and load a KB, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Locate the KB you want to load.  
sensor# show ad-knowledge-base vs0 files  
Virtual Sensor vs0  
Filename  
initial  
Size  
84  
Created  
10:24:58 CDT Tue Mar 14 2006  
10:00:00 CDT Thu Mar 16 2006  
10:00:00 CDT Fri Mar 17 2006  
10:00:00 CDT Sat Mar 18 2006  
10:00:00 CDT Sun Mar 19 2006  
10:00:00 CDT Mon Mar 20 2006  
2006-Mar-16-10_00_00  
2006-Mar-17-10_00_00  
2006-Mar-18-10_00_00  
2006-Mar-19-10_00_00  
2006-Mar-20-10_00_00  
84  
84  
84  
84  
84  
Step 3  
Step 4  
Load the KB file as the current KB file for a specific virtual sensor.  
sensor# anomaly-detection vs0 load file 2006-Mar-16-10_00_00  
sensor#  
Save the current KB file and store it as a new name.  
sensor# anomaly-detection vs0 save my-KB  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 9 Configuring Anomaly Detection  
Working With KB Files  
Note  
An error is generated if anomaly detection is not active when you enter this command. You  
cannot overwrite the initial file.  
Copying, Renaming, and Erasing KBs  
Use these commands in privileged EXEC mode to manually copy, rename, and erase KB files.  
The following options apply:  
copy ad-knowledge-base virtual-sensor {current | initial | file name} destination-url—Copies the  
KB file (current, initial, or the file name you enter) to a specified destination URL.  
Note  
Copying a file to a name that already exists overwrites it.  
copy ad-knowledge-base virtual-sensor source-url new-name—Copies a KB with a new file name  
to the source URL you specify.  
Note  
You cannot use the current keyword as a new-name. A new current KB file is created with  
the load command.  
rename ad-knowledge-base virtual-sensor {current | file name} new-name—Renames an existing  
KB file.  
erase ad-knowledge-base [virtual-sensor [name]]—Removes all KB files from a virtual sensor, or  
just one KB file if you use the name option.  
You cannot erase the initial KB file or the KB file loaded as the current KB.The exact format of the  
source and destination URLs varies according to the file. Here are the valid types:  
ftp:—Source or destination URL for an FTP network server. The syntax for this prefix is:  
ftp:[//[username@] location]/relativeDirectory]/filename  
ftp:[//[username@]location]//absoluteDirectory]/filename  
scp:—Source or destination URL for the SCP network server. The syntax for this prefix is:  
scp:[//[username@] location]/relativeDirectory]/filename  
scp:[//[username@] location]//absoluteDirectory]/filename  
Note  
If you use FTP or SCP protocol, you are prompted for a password. If you use SCP protocol,  
you must add the remote host to the SSH known hosts list.  
http:—Source URL for the web server. The syntax for this prefix is:  
http:[[/[username@]location]/directory]/filename  
https:—Source URL for the web server. The syntax for this prefix is:  
https:[[/[username@]location]/directory]/filename  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 9 Configuring Anomaly Detection  
Working With KB Files  
Note  
If you use HTTPS protocol, the remote host must be a TLS trusted host.  
Copying, Renaming, and Removing KB Files  
To copy, rename, and remove KB files, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Locate the KB file you want to copy.  
sensor# show ad-knowledge-base vs0 files  
Virtual Sensor vs0  
Filename  
initial  
Size  
84  
Created  
10:24:58 CDT Tue Mar 14 2006  
10:00:00 CDT Thu Mar 16 2006  
10:00:00 CDT Fri Mar 17 2006  
10:00:00 CDT Sat Mar 18 2006  
10:00:00 CDT Sun Mar 19 2006  
10:00:00 CDT Mon Mar 20 2006  
2006-Mar-16-10_00_00  
2006-Mar-17-10_00_00  
2006-Mar-18-10_00_00  
2006-Mar-19-10_00_00  
2006-Mar-20-10_00_00  
84  
84  
84  
84  
84  
Step 3  
Copy the KB file to a user on a computer with the IP address 10.1.1.1.  
sensor# copy ad-knowledge-base vs0 file 2006-Mar-16-10_00_00  
scp://[email protected]/AD/my-KB  
password: ********  
sensor#  
Step 4  
Step 5  
Step 6  
Rename a KB file.  
sensor# rename ad-knowledge-base vs0 2006-Mar-16-10_00_00 My-KB  
sensor#  
Remove a KB file from a specific virtual sensor.  
sensor# erase ad-knowledge-base vs0 2006-Mar-16-10_00_00  
sensor#  
Remove all KB files except the file loaded as current and the initial KB file from a virtual sensor.  
sensor# erase ad-knowledge-base vs0  
Warning: Executing this command will delete all virtual sensor 'vs0' knowledge bases  
except the file loaded as current and the initial knowledge base.  
Continue with erase? [yes]: yes  
sensor#  
Step 7  
Remove all KB files except the file loaded as current and the initial KB file from all virtual sensors.  
sensor# erase ad-knowledge-base  
Warning: Executing this command will delete all virtual sensor knowledge bases except the  
file loaded as current and the initial knowledge base.  
Continue with erase? [yes]: yes  
sensor#  
For More Information  
For the procedure for creating a new KB using the load command, see Saving and Loading KBs  
For the procedure for adding hosts to the SSH known hosts list, see Adding Hosts to the SSH Known  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 9 Configuring Anomaly Detection  
Working With KB Files  
For the procedure for adding TLS trusted hosts, see Adding TLS Trusted Hosts, page 3-52.  
Displaying the Differences Between Two KBs  
Use the show ad-knowledge-base virtual-sensor diff {current | initial | file name1}{current | initial |  
file name2} [diff-percentage] command in privileged EXEC mode to display the differences between  
two KBs.  
The following options apply:  
virtual-sensor—Specifies the name of the virtual sensor that contains the KB files you want to  
compare.  
name1—Specifies the name of the first existing KB file to compare.  
name2—Specifies the name of the second existing KB file to compare.  
current—Specifies the currently loaded KB.  
initial—Specifies the initial KB.  
file—Specifies the name of an existing KB file.  
diff-percentage—(Optional) Displays the services where the thresholds differ more than the  
specified percentage. The valid values are 1 to 100. The default is 10%.  
Comparing Two KBs  
To compare two KBs, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Locate the file you want to compare.  
sensor# show ad-knowledge-base vs0 files  
Virtual Sensor vs0  
Filename  
initial  
2006-Jun-28-10_00_01  
Size  
84  
84  
Created  
04:27:07 CDT Wed Jan 29 2003  
04:27:07 CDT Thu Jun 29 2006  
*
sensor#  
Step 3  
Compare the currently loaded file (the file with the *) with the initial KB for virtual sensor vs0.  
sensor# show ad-knowledge-base vs0 diff initial file 2006-Jun-28-10_00_01  
Initial Only Services/Protocols  
External Zone  
TCP Services  
Service = 30  
Service = 20  
UDP Services  
None  
Other Protocols  
Protocol = 1  
Illegal Zone  
None  
Internal Zone  
None  
2006-Jun-28-10_00_01 Only Services/Protocols  
External Zone  
None  
Illegal Zone  
None  
Internal Zone  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Working With KB Files  
None  
Thresholds differ more than 10%  
External Zone  
None  
Illegal Zone  
TCP Services  
Service = 31  
Service = 22  
UDP Services  
None  
Other Protocols  
Protocol = 3  
Internal Zone  
None  
sensor#  
Displaying the Thresholds for a KB  
Use the show ad-knowledge-base virtual-sensor thresholds {current | initial | file name} [zone  
{external | illegal | internal]} {[protocol {tcp | udp}] [dst-port port] | [protocol other] [number  
protocol-number]} command in privileged EXEC mode to display the thresholds in a KB.  
The following options apply:  
virtual-sensor—Specifies the name of the virtual sensor that contains the KB files you want to  
compare.  
name—Specifies the name of the existing KB file.  
current—Specifies the currently loaded KB.  
initial—Specifies the initial KB.  
file—Specifies the name of an existing KB file.  
zone—(Optional) Displays the thresholds for the specified zone. The default displays information  
for all zones.  
external—Displays the thresholds for the external zone.  
illegal—Displays the thresholds for the illegal zone.  
internal—Displays the thresholds for the internal zone.  
protocol—(Optional) Displays the thresholds for the specified protocol. The default displays  
information about all protocols.  
tcp—Displays the thresholds for the TCP protocol.  
udp—Displays the thresholds for the UDP protocol.  
other—Displays the thresholds for the other protocols besides TCP or UDP.  
dst-port—(Optional) Displays thresholds for the specified port. The default displays information  
about all TCP and/or UDP ports.  
port—Specifies the port number. The valid values are 0 to 65535.  
number—(Optional) Displays thresholds for the specified other protocol number. The default  
displays information for all other protocols.  
protocol-number—Specifies the protocol number. The valid values are 0 to 255.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 9 Configuring Anomaly Detection  
Working With KB Files  
Displaying KB Thresholds  
To display the KB thresholds, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Locate the file for which you want to display thresholds:  
sensor# show ad-knowledge-base vs1 files  
Virtual Sensor vs1  
Filename  
initial  
Size  
84  
Created  
10:24:58 CDT Tue Mar 14 2006  
10:00:00 CDT Thu Mar 16 2006  
10:00:00 CDT Fri Mar 17 2006  
10:00:00 CDT Sat Mar 18 2006  
10:00:00 CDT Sun Mar 19 2006  
10:00:00 CDT Mon Mar 27 2006  
05:00:00 CDT Mon Apr 24 2006  
05:00:00 CDT Tue Apr 25 2006  
2006-Mar-16-10_00_00  
2006-Mar-17-10_00_00  
2006-Mar-18-10_00_00  
2006-Mar-19-10_00_00  
2006-Mar-27-10_00_00  
2006-Apr-24-05_00_00  
2006-Apr-25-05_00_00  
84  
84  
84  
84  
84  
88  
88  
*
Step 3  
Display thresholds contained in a specific file for the illegal zone.  
sensor# show ad-knowledge-base vs0 thresholds file 2006-Nov-11-10_00_00 zone illegal  
AD Thresholds  
Creation Date = 2006-Nov-11-10_00_00  
KB = 2006-Nov-11-10_00_00  
Illegal Zone  
TCP Services  
Default  
Scanner Threshold  
User Configuration = 200  
Threshold Histogram - User Configuration  
Low = 10  
Medium = 3  
High = 1  
UDP Services  
Default  
Scanner Threshold  
User Configuration = 200  
Threshold Histogram - User Configuration  
Low = 10  
Medium = 3  
High = 1  
Other Services  
Default  
Scanner Threshold  
User Configuration = 200  
Threshold Histogram - User Configuration  
Low = 10  
Medium = 3  
High = 1  
sensor#  
Step 4  
Display thresholds contained in the current KB illegal zone, protocol TCP, and destination port 20.  
sensor# show ad-knowledge-base vs0 thresholds current zone illegal protocol tcp dst-port  
20  
AD Thresholds  
Creation Date = 2006-Nov-14-10_00_00  
KB = 2006-Nov-14-10_00_00  
Illegal Zone  
TCP Services  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 9 Configuring Anomaly Detection  
Displaying Anomaly Detection Statistics  
Default  
Scanner Threshold  
User Configuration = 200  
Threshold Histogram - User Configuration  
Low = 10  
Medium = 3  
High = 1  
sensor#  
Step 5  
Display thresholds contained in the current KB illegal zone, and protocol other.  
sensor# show ad-knowledge-base vs0 thresholds current zone illegal protocol other  
AD Thresholds  
Creation Date = 2006-Nov-14-10_00_00  
KB = 2006-Nov-14-10_00_00  
Illegal Zone  
Other Services  
Default  
Scanner Threshold  
User Configuration = 200  
Threshold Histogram - User Configuration  
Low = 10  
Medium = 3  
High = 1  
sensor#  
Displaying Anomaly Detection Statistics  
Use the show statistics anomaly-detection [virtual-sensor-name] command in privileged EXEC mode  
to display the statistics for anomaly detection. You can see if an attack is in progress (Attack in  
progress or No attack). You can also see when the next KB will be saved (Next KB rotation at  
10:00:00 UTC Wed Apr 26 2006).  
Note  
The clear command is not available for anomaly detection statistics.  
To display anomaly detection statistics, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the anomaly detection statistics for a specific virtual sensor.  
sensor# show statistics anomaly-detection vs0  
Statistics for Virtual Sensor vs0  
No attack  
Detection - ON  
Learning - ON  
Next KB rotation at 10:00:00 UTC Wed Apr 26 2006  
Internal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
External Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Illegal Zone  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Disabling Anomaly Detection  
TCP Protocol  
UDP Protocol  
Other Protocol  
sensor#  
Step 3  
Display the statistics for all virtual sensors.  
sensor# show statistics anomaly-detection  
Statistics for Virtual Sensor vs0  
No attack  
Detection - ON  
Learning - ON  
Next KB rotation at 10:00:01 UTC Wed Jun 29 2006  
Internal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
External Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Illegal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Statistics for Virtual Sensor vs1  
No attack  
Detection - ON  
Learning - ON  
Next KB rotation at 10:00:00 UTC Wed Jul 29 2006  
Internal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
External Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Illegal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
sensor#  
Disabling Anomaly Detection  
If you have anomaly detection enabled and you have your sensor configured to see only one direction of  
traffic, you should disable anomaly detection. Otherwise, you will receive many alerts, because anomaly  
detection sees asymmetric traffic as having incomplete connections, that is, like worm scanners, and fires  
alerts.  
To disable anomaly detection, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter analysis engine submode.  
sensor# configure terminal  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 9 Configuring Anomaly Detection  
Disabling Anomaly Detection  
sensor(config)# service analysis-engine  
sensor(config-ana)#  
Step 3  
Step 4  
Enter the virtual sensor name that contains the anomaly detection policy you want to disable.  
sensor(config-ana)# virtual-sensor vs0  
sensor(config-ana-vir)#  
Disable anomaly detection operational mode.  
sensor(config-ana-vir)# anomaly-detection  
sensor(config-ana-vir-ano)# operational-mode inactive  
sensor(config-ana-vir-ano)#  
Step 5  
Step 6  
Exit analysis engine submode.  
sensor(config-ana-vir-ano)# exit  
sensor(config-ana-vir)# exit  
sensor(config-ana-)# exit  
Apply Changes:?[yes]:  
Press Enter to apply your changes or enter no to discard them.  
For More Information  
For more information about how worms operate, see Understanding Worms, page 9-2.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Configuring Anomaly Detection  
Disabling Anomaly Detection  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
9-50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
10  
Configuring Global Correlation  
This chapter provides information for configuring global correlation. It contains the following sections:  
Global Correlation Notes and Caveats  
The following notes and caveats apply to configuring global correlation:  
The global correlation features are supported in IPS 7.0 and later.  
As with signature updates, when the sensor applies a global correlation update, it may trigger  
bypass. Whether or not bypass is triggered depends on the traffic load of the sensor and the size of  
the signature/global correlation update. If bypass mode is turned off, an inline sensor stops passing  
traffic while the update is being applied.  
Network participation requires a network connection to the Internet.  
Valid license—You must have a valid sensor license for automatic signature updates and global  
correlation features to function. You can still configure and display statistics for the global  
correlation features, but the global correlation databases are cleared and no updates are attempted.  
Once you install a valid license, the global correlation features are reactivated.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 10 Configuring Global Correlation  
Understanding Global Correlation  
Global correlation inspection and the reputation filtering deny features do not support IPv6  
addresses. For global correlation inspection, the sensor does not receive or process reputation data  
for IPv6 addresses. The risk rating for IPv6 addresses is not modified for global correlation  
inspection. Similarly, network participation does not include event data for attacks from IPv6  
addresses. And finally, IPv6 addresses do not appear in the deny list.  
The sensor must operate in inline mode so that the global correlation features can increase efficacy  
by being able to use the inline deny actions.  
For global correlation to function, you must have either a DNS server or an HTTP proxy server  
configured at all times.  
Understanding Global Correlation  
You can configure global correlation so that your sensors are aware of network devices with a reputation  
for malicious activity, and can take action against them. Participating IPS devices in a centralized Cisco  
threat database, the SensorBase Network, receive and absorb global correlation updates. The reputation  
information contained in the global correlation updates is factored in to the analysis of network traffic,  
which increases IPS efficacy, since traffic is denied or allowed based on the reputation of the source IP  
address. The participating IPS devices send data back to the Cisco SensorBase Network, which results  
in a feedback loop that keeps the updates current and global.  
You can configure the sensor to participate in the global correlation updates and/or in sending telemetry  
data or you can turn both services off. You can view reputation scores in events and see the reputation  
score of the attacker. You can also view statistics from the reputation filter.  
Participating in the SensorBase Network  
The Cisco IPS contains a security capability, Cisco Global Correlation, which uses the immense security  
intelligence that we have amassed over the years. At regular intervals, the Cisco IPS receives threat  
updates from the Cisco SensorBase Network, which contain detailed information about known threats  
on the Internet, including serial attackers, Botnet harvesters, Malware outbreaks, and dark nets. The IPS  
uses this information to filter out the worst attackers before they have a chance to attack critical assets.  
It then incorporates the global threat data in to its system to detect and prevent malicious activity even  
earlier.  
If you agree to participate in the SensorBase Network, Cisco will collect aggregated statistics about  
traffic sent to your IPS. This includes summary data on the Cisco IPS network traffic properties and how  
this traffic was handled by the Cisco appliances. We do not collect the data content of traffic or other  
confidential business or personal information. All data is aggregated and sent by secure HTTP to the  
Cisco SensorBase Network servers in periodic intervals. All data shared with Cisco will be anonymous  
and treated as strictly confidential.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 10 Configuring Global Correlation  
Understanding Reputation  
Table 10-1 shows how we use the data.  
Table 10-1 Cisco Network Participation Data Use  
Participation Level Type of Data  
Partial Protocol attributes  
(TCP maximum segment size and understand threat exposure.  
Purpose  
Tracks potential threats and helps us to  
options string, for example)  
Attack type  
Used to understand current attacks and  
(signature fired and risk rating, for attack severity.  
example)  
Connecting IP address and port  
Identifies attack source.  
Summary IPS performance  
(CPU utilization, memory usage,  
inline vs. promiscuous, for  
example)  
Tracks product efficacy.  
Full  
Victim IP address and port  
Detects threat behavioral patterns.  
When you enable Partial or Full Network Participation, the Network Participation Disclaimer appears.  
You must enter yes to participate. If you do not have a license installed, you receive a warning telling  
you that global correlation inspection and reputation filtering are disabled until the sensor is licensed.  
You can obtain a license at http://www.cisco.com/go/license.  
For More Information  
For information on how to obtain and install a sensor license, see Installing the License Key, page 3-54.  
Understanding Reputation  
Similar to human social interaction, reputation is an opinion toward a device on the Internet. It enables  
the installed base of IPS sensors in the field to collaborate using the existing network infrastructure. A  
network device with reputation is most likely either malicious or infected. You can view reputation  
information and statistics in the IDM, IME, or the CLI.  
The IPS sensor collaborates with the global correlation servers (also known as reputation servers) to  
improve the efficacy of the sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 10 Configuring Global Correlation  
Understanding Network Participation  
Figure 10-1 shows the role of the sensor and the global correlation servers.  
Figure 10-1 IPS Management and Global Correlation Server Interaction  
Cisco IPS  
Sensor  
Application  
Events  
Config  
Event  
Manager  
Reputation  
Telemetry  
Database  
Query  
Management Tools  
Reputation  
Client  
(CLI/IDM/IME/  
CSM/MARS)  
UI  
Support  
Cisco Data Clients  
(CA-Sig, Sec-Analysis)  
Reputation  
Server(s)  
Reputation  
Database  
The global correlation servers provide information to the sensor about certain IP addresses that may  
identify malicious or infected hosts. The sensor uses this information to determine which actions, if any,  
to perform when potentially harmful traffic is received from a host with known reputation. Because the  
global correlation database changes rapidly, the sensor must periodically download global correlation  
updates from the global correlation servers.  
Caution  
As with signature updates, when the sensor applies a global correlation update, it may trigger bypass.  
Whether or not bypass is triggered depends on the traffic load of the sensor and the size of the  
signature/global correlation update. If bypass mode is turned off, an inline sensor stops passing traffic  
while the update is being applied.  
For More Information  
For more information about viewing global correlation statistics, see Displaying Statistics, page 17-28.  
Understanding Network Participation  
Network participation lets us collect nearly real-time data from sensors around the world. Sensors  
installed at customer sites can send data to the SensorBase Network. These data feed in to the global  
correlation database to increase reputation fidelity. Communication between sensors and the SensorBase  
Network involves an HTTPS request and response over TCP/IP. Network participation gathers the  
following data:  
Signature ID  
Attacker IP address  
Attacker port  
Maximum segment size  
Victim IP address  
Victim port  
Signature version  
TCP options string  
Reputation score  
Risk rating  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 10 Configuring Global Correlation  
Understanding Efficacy  
Data gathered from the sensor health metrics  
The statistics for network participation show the hits and misses for alerts, the reputation actions, and  
the counters of packets that have been denied.  
Note  
Network participation requires a network connection to the Internet.  
There are three modes for network participation:  
Off—The network participation server does not collect data, track statistics, or try to contact the  
Cisco SensorBase Network.  
Partial Participation—The network participation server collects data, tracks statistics, and  
communicates with the SensorBase Network. Data considered to be potentially sensitive is filtered  
out and never sent.  
Full Participation—The network participation server collects data, tracks statistics, and  
communicates with the SensorBase Network. All data collected is sent except the IP addresses that  
you exclude from the network participation data.  
Caution  
As with signature updates, when the sensor applies a global correlation update, it may trigger bypass.  
Whether or not bypass is triggered depends on the traffic load of the sensor and the size of the  
signature/global correlation update. If bypass mode is turned off, an inline sensor stops passing traffic  
while the update is being applied.  
For More Information  
For more information on network participation, see Configuring Network Participation, page 10-11.  
For more information on bypass mode, see Configuring Inline Bypass Mode, page 4-33.  
Understanding Efficacy  
Obtaining data from participating IPS clients and using that in conjunction with the existing corpus of  
threat knowledge improves the efficacy of the IPS. We measure efficacy based on the following:  
False positives as a percentage of actionable events  
False negatives as a percentage of threats that do not result in actionable events  
Actionable events as a percentage of all events  
The IPS signature team uses the data to improve signature fidelity and the IPS engineering team uses the  
data to better understand the various types of sensor deployment.  
For More Information  
For more information about reputation and risk rating, see Understanding Reputation and Risk Rating,  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 10 Configuring Global Correlation  
Understanding Reputation and Risk Rating  
Understanding Reputation and Risk Rating  
Risk rating is the concept of the probability that a network event is malicious. You assign a numerical  
quantification of the risk associated with a particular event on the network. By default, an alert with an  
extreme risk rating shuts down traffic. Reputation indicates the probability that a particular attacker IP  
address will initiate malicious behavior based on its known past activity. A certain score is computed for  
this reputation by the Alarm Channel and added to risk rating, thus improving the efficacy of the IPS.  
When the attacker has a bad reputation score, an incremental risk is added to the risk rating to make it  
more aggressive.  
The Alarm Channel handles signature events from the data path. The alert processing units have multiple  
aggregation techniques, action overrides, action filters, attacker reputation, and per-action custom  
handling methods. We use the large reputation data from the reputation participation client to score  
attackers in the Alarm Channel and then use this score to influence the risk rating and actions of the alert.  
For More Information  
For a detailed description of risk rating, see Calculating the Risk Rating, page 8-13.  
For a detailed description of threat rating, see Understanding Threat Rating, page 8-14.  
For a detailed description of event action filters, see Configuring Event Action Filters, page 8-20.  
For a detailed description of the Alarm Channel, see Understanding the SensorApp, page A-23.  
For a detailed description of event action aggregation, see Understanding Event Action Aggregation,  
Global Correlation Features and Goals  
There are three main features of global correlation:  
Global Correlation Inspection—We use the global correlation reputation knowledge of attackers to  
influence alert handling and deny actions when attackers with a bad score are seen on the sensor.  
Reputation Filtering—Applies automatic deny actions to packets from known malicious sites.  
Network Reputation—Sensor sends alert and TCP fingerprint data to the SensorBase Network.  
Global correlation has the following goals:  
Dealing intelligently with alerts thus improving efficacy.  
Improving protection against known malicious sites.  
Sharing telemetry data with the SensorBase Network to improve visibility of alerts and sensor  
actions on a global scale.  
Simplifying configuration settings.  
Automatic handling of the uploads and downloads of the information.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 10 Configuring Global Correlation  
Global Correlation Requirements  
Global Correlation Requirements  
Global correlation has the following requirements:  
Valid license—You must have a valid sensor license for global correlation features to function. You  
can still configure and display statistics for the global correlation features, but the global correlation  
databases are cleared and no updates are attempted. Once you install a valid license, the global  
correlation features are reactivated.  
Network Participation disclaimer—You must agree to the disclaimer to participate.  
External connectivity for the sensor and a DNS server—The global correlation features of Cisco IPS  
require the sensor to connect to the Cisco SensorBase Network. Domain name resolution is also  
required for these features to function. You can either configure the sensor to connect through an  
HTTP proxy server that has a DNS client running on it, or you can assign an Internet routeable  
address to the management interface of the sensor and configure the sensor to use a DNS server. In  
Cisco IPS the HTTP proxy and DNS servers are used only by the global correlation features.  
If you are connecting through an HTTP proxy, make sure you have the following configuration:  
The proxy must allow HTTP requests from the IPS systems to http://updates.ironport.com/ibrs/  
on port 80.  
The proxy must allow HTTPS requests from the IPS systems to update-manifests.ironport.com  
on port 443.  
The firewall must allow access from the proxy to the internet (any destination address) on ports  
80 and 443.  
If you are NOT connecting through the HTTP proxy:  
The firewall must allow access from each IPS to the Internet (any destination address) on ports  
80 and 443.  
Note  
The IPS does not support the use of authenticated proxies.  
Sensors deployed in an environment with a slow command and control connection will be slow to  
download global correlation updates.  
No IPv6 address support—Global correlation inspection and the reputation filtering deny features  
do not support IPv6 addresses. For global correlation inspection, the sensor does not receive or  
process reputation data for IPv6 addresses. The risk rating for IPv6 addresses is not modified for  
global correlation inspection. Similarly, network participation does not include event data for  
attacks from IPv6 addresses. And finally, IPv6 addresses do not appear in the deny list.  
Sensor in inline mode—The sensor must operate in inline mode so that the global correlation  
features can increase efficacy by being able to use the inline deny actions.  
Sensor that supports the global correlation features  
IPS version that supports the global correlation features  
For More Information  
For information on how to obtain and install a sensor license, see Installing the License Key,  
For information about the Network Participation disclaimer, see Participating in the SensorBase  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 10 Configuring Global Correlation  
Understanding Global Correlation Sensor Health Metrics  
For information about configuring an HTTP proxy or DNS server to support global correlation, see  
Understanding Global Correlation Sensor Health Metrics  
For global correlation, the following metrics are added to sensor health monitoring:  
Green indicates that the last update was successful.  
Yellow indicates that there has not been a successful update within the past day (86,400 seconds).  
Red indicates that there has not been a successful update within the last three days (259,200  
seconds).  
For network participation, the following metrics are added to sensor health monitoring:  
Green indicates that the last connection was successful.  
Yellow indicates that less than 6 connections failed in a row.  
Red indicates that more than 6 connections failed in a row.  
Use the health-monitor command in service submode to configure the health statistics for the sensor.  
Use the show health command to see the results of the health-monitor command.  
Global correlation health status defaults to red and changes to green after a successful global correlation  
update. Successful global correlation updates require a DNS server or an HTTP proxy server. If the  
sensor is deployed in an environment where a DNS or HTTP proxy server is not available, you can  
address the red global correlation health and overall sensor health status by disabling global correlation  
and configuring sensor health status not to include global correlation health status.  
For More Information  
For more information about the sensor health metrics and how to enable/disable Global Correlation  
For the procedure to view sensor health metrics, see Showing Sensor Overall Health Status,  
For information about configuring an HTTP proxy or DNS server to support global correlation, see  
For the procedure to disable global correlation, see Configuring Global Correlation Inspection and  
Configuring Global Correlation Inspection and Reputation  
Filtering  
This section describes global correlation inspection and reputation filtering, and how to configure them.  
It contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 10 Configuring Global Correlation  
Configuring Global Correlation Inspection and Reputation Filtering  
Understanding Global Correlation Inspection and Reputation Filtering  
You can configure the sensor to use updates from the SensorBase Network to adjust the risk rating. The  
client determines which updates are available and applicable to the sensor by communicating with the  
global correlation update server and a file server, which is a two-phase process. In the first phase the  
sensor sends a client manifest to the global correlation update sever via an HTTPS POST request. The  
server then returns the server manifest document in the HTTPS response. In the next phase the sensor  
identifies the updates that are available and how to obtain them from a file server. The sensor downloads  
the encrypted update files via HTTP from the file server using the information in the server manifest.  
The integrity of these update files has been verified by comparing its MD5 hash with the hash value  
specified in the server manifest.  
Figure 10-2 demonstrates how the global correlation update client obtains the files.  
Figure 10-2  
Global Correlation Update Client  
Client Manifest  
Server Manifest  
Global  
Correlation  
Update Server  
Global  
Correlation  
Client  
Update Files  
File  
Server  
Caution  
You must have a valid sensor license for global correlation features to function. You can still configure  
and display statistics for the global correlation features, but the global correlation databases are cleared  
and no updates are attempted. Once you install a valid license, the global correlation features are  
reactivated.  
Once you configure global correlation, updates are automatic and happen at regular intervals,  
approximately every five minutes by default, but this interval may be modified by the global correlation  
server. The sensor gets a full update and then applies an incremental update periodically.  
You configure an HTTP proxy or a DNS server in the service network-setting submode. If you turn on  
global correlation, you can choose how aggressively you want the deny actions to be enforced against  
malicious hosts. You can then enable reputation filtering to deny access to known malicious hosts. If you  
only want a report of what could have happened, you can enable test-global-correlation. This puts the  
sensor in audit mode, and actions the sensor would have performed are generated in the events.  
Use the show health command in privileged EXEC mode to display the overall health status information  
of the sensor. The health status categories are rated by red and green with red being critical.  
Caution  
As with signature updates, when the sensor applies a global correlation update, it may trigger bypass.  
Whether or not bypass is triggered depends on the traffic load of the sensor and the size of the  
signature/global correlation update. If bypass mode is turned off, an inline sensor stops passing traffic  
while the update is being applied.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 10 Configuring Global Correlation  
Configuring Global Correlation Inspection and Reputation Filtering  
For More Information  
For the procedure for configuring global correlation features, see Configuring Global Correlation  
For the procedure to view sensor health metrics, see Showing Sensor Overall Health Status,  
For information on the CollaborationApp, see CollaborationApp, page A-27.  
For more information on bypass mode, see Configuring Inline Bypass Mode, page 4-33.  
Configuring Global Correlation Inspection and Reputation Filtering  
Caution  
For automatic and global correlation updates to function, you must have either a DNS server or an HTTP  
proxy server configured at all times.  
The following options apply:  
global-correlation-inspection {on | off}—Turns global correlation inspection on or off. When  
turned on, the sensor uses updates from the SensorBase network to adjust the risk rating. The default  
is on.  
global-correlation-inspection-influence {permissive | standard | aggressive}—Lets you choose  
the level of global correlation inspection. The default is standard.  
permissive—Global correlation data has little influence in the decision to deny traffic.  
standard—Global correlation moderately influences the decision to deny traffic.  
aggressive—Global correlation data heavily influences the decision to deny traffic.  
reputation-filtering {on | off}—Turns reputation filtering on or off. When turned on, the sensor  
denies access to malicious hosts that are listed in the global correlation database. The default is on.  
test-global-correlation {on | off}—Enables reporting of deny actions that are affected by global  
correlation. Allows you to test the global correlation features without actually denying any hosts.  
The default is off.  
Configuring Global Correlation  
To configure global correlation features, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter global correlation submode.  
sensor# configure terminal  
sensor(config)# service global-correlation  
sensor(config-glo)#  
Step 3  
Step 4  
Turn on global correlation inspection.  
sensor(config-glo)# global-correlation-inspection on  
sensor(config-glo)#  
Specify the level of global correlation inspection.  
sensor(config-glo)# global-correlation-inspection-influence aggressive  
sensor(config-glo)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 10 Configuring Global Correlation  
Configuring Network Participation  
Step 5  
Step 6  
Step 7  
Turn on reputation filtering.  
sensor(config-glo)# reputation-filtering on  
sensor(config-glo)#  
Test global correlation data, but do not actually deny traffic.  
sensor(config-glo)# test-global-correlation on  
sensor(config-glo)#  
Verify the settings.  
sensor(config-glo)# show settings  
global-correlation-inspection: on default: on  
global-correlation-inspection-influence: aggressive default: standard  
reputation-filtering: on default: on  
test-global-correlation: on default: off  
sensor(config-glo)#  
Step 8  
Step 9  
Exit global correlation submode.  
sensor(config-glo)# exit  
Apply Changes:?[yes]:  
Press Enter to apply your changes or enter no to discard them.  
For More Information  
For information about configuring a proxy or DNS server to support global correlation, see  
For information on how to obtain and install a sensor license, see Installing the License Key,  
For more information about the sensor health metrics, see Showing Sensor Overall Health Status,  
Configuring Network Participation  
You can configure the sensor to send data to the SensorBase Network. You can configure the sensor to  
fully participate and send all data to the SensorBase Network. Or you can configure the sensor to collect  
the data but to omit potentially sensitive data, such as the destination IP address of trigger packets.  
Note  
Configuring the sensor for partial network participation limits a third party from extracting  
reconnaissance information about your internal network from the global correlation database.  
The following option applies:  
network-participation—Sets the level of network participation. The default is off.  
off—No data is contributed to the SensorBase network.  
partial—Data is contributed to the SensorBase network but potentially sensitive information is  
withheld.  
full—All data is contributed to the SensorBase network.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 10 Configuring Global Correlation  
Configuring Network Participation  
Note  
You must accept the network participation disclaimer to turn on network participation.  
Turning on Network Participation  
To turn on network participation, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter global correlation submode.  
sensor# configure terminal  
sensor(config)# service global-correlation  
sensor(config-glo)#  
Step 3  
Step 4  
Turn on network participation.  
sensor(config-glo)# network-participation [full | partial]  
sensor(config-glo)# exit  
Enter yesto agree to participate in the SensorBase Network.  
If you agree to participate in the SensorBase Network, Cisco will collect aggregated  
statistics about traffic sent to your IPS. This includes summary data on the Cisco IPS  
network traffic properties and how this traffic was handled by the Cisco appliances. We do  
not collect the data content of traffic or other sensitive business or personal  
information. All data is aggregated and sent via secure HTTP to the Cisco SensorBase  
Network servers in periodic intervals. All data shared with Cisco will be anonymous and  
treated as strictly confidential.  
The table below describes how the data will be used by Cisco.  
Participation Level = "Partial":  
* Type of Data: Protocol Attributes (e.g. TCP max segment size and  
options string)  
Purpose: Track potential threats and understand threat exposure  
* Type of Data: Attack Type (e.g. Signature Fired and Risk Rating)  
Purpose: Used to understand current attacks and attack severity  
* Type of Data: Connecting IP Address and port  
Purpose: Identifies attack source  
* Type of Data: Summary IPS performance (CPU utilization memory usage,  
inline vs. promiscuous, etc)  
Purpose: Tracks product efficacy  
Participation Level = "Full" additionally includes:  
* Type of Data: Victim IP Address and port  
Purpose: Detect threat behavioral patterns  
Do you agree to participate in the SensorBase Network?[no]:  
Step 5  
Verify the settings.  
sensor(config-glo)# show settings  
network-participation: full default: off  
global-correlation-inspection: on default: on  
global-correlation-inspection-influence: aggressive default: standard  
reputation-filtering: on default: on  
test-global-correlation: on default: off  
sensor(config-glo)#  
Step 6  
Exit global correlation submode.  
sensor(config-glo)# exit  
Apply Changes:?[yes]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 10 Configuring Global Correlation  
Troubleshooting Global Correlation  
Step 7  
Press Enter to apply your changes or enter no to discard them.  
For More Information  
For more information about participating in the SensorBase Network, see Participating in the  
Troubleshooting Global Correlation  
Make sure you observe the following when configuring global correlation:  
Because global correlation updates occur through the sensor management interface, firewalls must  
allow port 443/80 traffic.  
You must have an HTTP proxy server or a DNS server configured to allow global correlation  
features to function.  
If you have an HTTP proxy server configured, the proxy must allow port 443/80 traffic from IPS  
systems.  
You must have a valid IPS license to allow global correlation features to function.  
Global correlation features only contain external IP addresses, so if you position a sensor in an  
internal lab, you may never receive global correlation information.  
Make sure your sensor supports the global correlation features.  
Make sure your IPS version supports the global correlation features.  
For More Information  
For the procedure for configuring a DNS or HTTP proxy server, see Configuring the DNS and Proxy  
For the procedure for obtaining an IPS license, see Installing the License Key, page 3-54.  
Disabling Global Correlation  
If your sensor is deployed in an environment where a DNS server or HTTP proxy server is not available,  
you may want to disable global correlation so that global correlation health does not appear as red in the  
overall sensor health, thus indicating a problem. You can also configure sensor health to exclude global  
correlation status.  
The following options apply:  
global-correlation-inspection {on | off}—Turns global correlation inspection on or off. When  
turned on, the sensor uses updates from the SensorBase network to adjust the risk rating. The default  
is on.  
reputation-filtering {on | off}—Turns reputation filtering on or off. When turned on, the sensor  
denies access to malicious hosts that are listed in the global correlation database. The default is on.  
network-participation—Sets the level of network participation. The default is off.  
off—No data is contributed to the SensorBase network.  
partial—Data is contributed to the SensorBase network but potentially sensitive information is  
withheld.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 10 Configuring Global Correlation  
Displaying Global Correlation Statistics  
full—All data is contributed to the SensorBase network.  
Disabling Global Correlation  
To disable global correlation features, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter global correlation submode.  
sensor# configure terminal  
sensor(config)# service global-correlation  
sensor(config-glo)#  
Step 3  
Step 4  
Step 5  
Step 6  
Turn off global correlation inspection.  
sensor(config-glo)# global-correlation-inspection off  
sensor(config-glo)#  
Turn off reputation filtering.  
sensor(config-glo)# reputation-filtering off  
sensor(config-glo)#  
Turn off network participation.  
sensor(config-glo)# network-participation off  
sensor(config-glo)# exit  
Verify the settings.  
sensor(config-glo)# show settings  
network-participation: full default: off  
global-correlation-inspection: on default: off  
reputation-filtering: on default: off  
sensor(config-glo)#  
Step 7  
Step 8  
Exit global correlation submode.  
sensor(config-glo)# exit  
Apply Changes:?[yes]:  
Press Enter to apply your changes or enter no to discard them.  
Displaying Global Correlation Statistics  
Use the show statistics global-correlation command to display global correlation statistics. Use the  
show statistics global-correlation [name | clear] command to display statistics for these components for  
all virtual sensors. If you provide the virtual sensor name, the statistics for that virtual sensor only are  
displayed.  
To display and clear global correlation statistics for the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the statistics for global correlation.  
sensor# show statistics global-correlation  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 10 Configuring Global Correlation  
Displaying Global Correlation Statistics  
Network Participation:  
Counters:  
Total Connection Attempts = 4347  
Total Connection Failures = 155  
Connection Failures Since Last Success = 0  
Connection History:  
Connection Attempt on June 17 2012, at 21:57:19 UTC = Successful  
Connection Attempt on June 17 2012, at 21:54:18 UTC = Successful  
Connection Attempt on June 17 2012, at 21:51:17 UTC = Successful  
Connection Attempt on June 17 2012, at 21:48:17 UTC = Successful  
Connection Attempt on June 17 2012, at 21:45:16 UTC = Successful  
Updates:  
Status Of Last Update Attempt = Disabled  
Time Since Last Successful Update = never  
Counters:  
Update Failures Since Last Success = 0  
Total Update Attempts = 0  
Total Update Failures = 0  
Update Interval In Seconds = 300  
Update Server = update-manifests.ironport.com  
Update Server Address = Unknown  
Current Versions:  
Warnings:  
Details:  
Last fail log =  
sensor#  
Step 3  
Clear the statistics for global correlation:  
sensor# show statistics global-correlation clear  
Network Participation:  
Counters:  
Total Connection Attempts = 0  
Total Connection Failures = 0  
Connection Failures Since Last Success = 0  
Connection History:  
Connection Attempt on June 17 2012, at 22:03:20 UTC = Successful  
Connection Attempt on June 17 2012, at 22:00:19 UTC = Successful  
Connection Attempt on June 17 2012, at 21:57:19 UTC = Successful  
Connection Attempt on June 17 2012, at 21:54:18 UTC = Successful  
Connection Attempt on June 17 2012, at 21:51:17 UTC = Successful  
Updates:  
Status Of Last Update Attempt = Disabled  
Time Since Last Successful Update = never  
Counters:  
Update Failures Since Last Success = 0  
Total Update Attempts = 0  
Total Update Failures = 0  
Update Interval In Seconds = 300  
Update Server = update-manifests.ironport.com  
Update Server Address = Unknown  
Current Versions:  
Warnings:  
Details:  
Last fail log =  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 10 Configuring Global Correlation  
Displaying Global Correlation Statistics  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
10-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
11  
Configuring External Product Interfaces  
This chapter explains how to configure external product interfaces. It contains the following sections:  
External Product Interface Notes and Caveats  
The following notes and caveats apply to external product interfaces:  
In Cisco IPS, you can only add interfaces to the CSA MC.  
You can only enable two CSA MC interfaces.  
You must add the CSA MC as a trusted host so the sensor can communicate with it.  
Understanding External Product Interfaces  
Note  
In Cisco IPS, you can only add interfaces to the CSA MC.  
The external product interface is designed to receive and process information from external security and  
management products. These external security and management products collect information that can be  
used to automatically enhance the sensor configuration information. For example, the types of  
information that can be received from external products include host profiles (the host OS configuration,  
application configuration, and security posture) and IP addresses that have been identified as causing  
malicious network activity.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
11-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 11 Configuring External Product Interfaces  
Understanding the CSA MC  
Understanding the CSA MC  
The CSA MC enforces a security policy on network hosts. It has two components:  
Agents that reside on and protect network hosts.  
Management Console (MC)—An application that manages agents. It downloads security policy  
updates to agents and uploads operational information from agents.  
The CSA MC receives host posture information from the CSA agents it manages. It also maintains a  
watch list of IP addresses that it has determined should be quarantined from the network. The CSA MC  
sends two types of events to the sensor—host posture events and quarantined IP address events.  
Host posture events (called imported OS identifications in IPS) contain the following information:  
Unique host ID assigned by the CSA MC  
CSA agent status  
Host system hostname  
Set of IP addresses enabled on the host  
CSA software version  
CSA polling status  
CSA test mode status  
NAC posture  
For example, when an OS-specific signature fires whose target is running that OS, the attack is highly  
relevant and the response should be greater. If the target OS is different, then the attack is less relevant  
and the response may be less critical. The signature attack relevance rating is adjusted for this host.  
The quarantined host events (called the watch list in IPS) contain the following information:  
IP address  
Reason for the quarantine  
Protocol associated with a rule violation (TCP, UDP, or ICMP)  
Indicator of whether a rule-based violation was associated with an established session or a UDP  
packet.  
For example, if a signature fires that lists one of these hosts as the attacker, it is presumed to be that much  
more serious. The risk rating is increased for this host. The magnitude of the increase depends on what  
caused the host to be quarantined.  
The sensor uses the information from these events to determine the risk rating increase based on the  
information in the event and the risk rating configuration settings for host postures and quarantined IP  
addresses.  
Note  
The host posture and watch list IP address information is not associated with a virtual sensor, but is  
treated as global information.  
Secure communications between the CSA MC and the IPS sensor are maintained through SSL/TLS. The  
sensor initiates SSL/TLS communications with the CSA MC. This communication is mutually  
authenticated. The CSA MC authenticates by providing X.509 certificates. The sensor uses  
username/password authentication.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
11-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 11 Configuring External Product Interfaces  
External Product Interface Issues  
Note  
You can only enable two CSA MC interfaces.  
Caution  
You must add the CSA MC as a trusted host so the sensor can communicate with it.  
For More Information  
For the procedure for adding trusted hosts, see Adding TLS Trusted Hosts, page 3-52.  
External Product Interface Issues  
When the external product interface receives host posture and quarantine events, the following issues  
can arise:  
The sensor can store only a certain number of host records:  
If the number of records exceeds 10,000, subsequent records are dropped.  
If the 10,000 limit is reached and then it drops to below 9900, new records are no longer  
dropped.  
Hosts can change an IP address or appear to use another host IP address, for example, because of  
DHCP lease expiration or movement in a wireless network. In the case of an IP address conflict, the  
sensor presumes the most recent host posture event to be the most accurate.  
A network can include overlapping IP address ranges in different VLANs, but host postures do not  
include VLAN ID information. You can configure the sensor to ignore specified address ranges.  
A host can be unreachable from the CSA MC because it is behind a firewall. You can exclude  
unreachable hosts.  
The CSA MC event server allows up to ten open subscriptions by default. You can change this value.  
You must have an administrative account and password to open subscriptions.  
CSA data is not virtualized; it is treated globally by the sensor.  
Host posture OS and IP addresses are integrated into passive OS fingerprinting storage. You can  
view them as imported OS profiles.  
You cannot see the quarantined hosts.  
The sensor must recognize each CSA MC host X.509 certificate. You must add them as a trusted  
host.  
You can configure a maximum of two external product devices.  
For More Information  
For more information on working with OS maps and identifications, see Adding, Editing, Deleting,  
For the procedure for adding trusted hosts, see Adding TLS Trusted Hosts, page 3-52.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
11-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 11 Configuring External Product Interfaces  
Configuring the CSA MC to Support the IPS Interface  
Configuring the CSA MC to Support the IPS Interface  
Note  
For more detailed information about host posture events and quarantined IP address events, refer to  
You must configure the CSA MC to send host posture events and quarantined IP address events to the  
sensor. To configure the CSA MC to support IPS interfaces, follow these steps:  
Step 1  
Step 2  
Choose Events > Status Summary.  
In the Network Status section, click No beside Host history collection enabled, and then click Enable  
in the popup window.  
Note  
Host history collection is enabled globally for the system. This feature is disabled by default  
because the MC log file tends to fill quickly when it is turned on.  
Step 3  
Step 4  
Step 5  
Choose Systems > Groups to create a new group (with no hosts) to use in conjunction with  
administrator account you will next create.  
Choose Maintenance > Administrators > Account Management to create a new CSA MC  
administrator account to provide IPS access to the MC system.  
Create a new administrator account with the role of Monitor. This maintains the security of the MC by  
not allowing this new account to have configure privileges.  
Note  
Remember the username and password for this administrator account because you need them to  
configure external product interfaces on the sensor.  
Step 6  
Step 7  
Choose Maintenance > Administrators > Access Control to further limit this administrator account.  
In the Access Control window, select the administrator you created and select the group you created.  
Note  
When you save this configuration, you further limit the MC access of this new administrator  
account with the purpose of maintaining security on the CSA MC.  
Adding External Product Interfaces and Posture ACLs  
Caution  
In the Cisco IPS, the only external product interfaces you can add are CSA MC interfaces. The Cisco  
IPS supports two CSA MC interfaces.  
Use the cisco-security-agents-mc-settings ip-address command in service external product interfaces  
submode to add the CSA MC as an external product interface.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
11-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 11 Configuring External Product Interfaces  
Adding External Product Interfaces and Posture ACLs  
The following options apply:  
enabled {yes | no}—Enables/disables the receipt of information from the CSA MC.  
host-posture-settings—Specifies how host postures received from the CSA MC are handled:  
allow-unreachable-postures {yes | no}—Allows postures for hosts that are not reachable by  
the CSA MC.  
A host is not reachable if the CSA MC cannot establish a connection with the host on any IP  
addresses in the posture of the host. This option is useful in filtering the postures whose IP  
addresses may not be visible to the IPS or may be duplicated across the network. This filter is  
most applicable in network topologies where hosts that are not reachable by the CSA MC are  
also not reachable by the IPS, for example if the IPS and the CSA MC are on the same network  
segment.  
enabled {yes | no}—Enables/disables receipt of host postures from the CSA MC.  
posture-acls {edit | insert | move} name1 {begin | end | inactive | before | after}—Specifies  
the list of permitted or denied posture addresses. This command provides a mechanism for  
filtering postures that have IP addresses that may not be visible to the IPS or may be duplicated  
across the network.  
action {permit | deny}—Specifies the permit or deny postures that match the specified network  
address.  
network-address address—Specifies the network address, in the form x.x.x.x/nn, for postures  
to be permitted or denied.  
password—Specifies the password used to log in to the CSA MC.  
port —Specifies the TCP port to connect to on the CSA MC. The valid range is 1 to 65535. The  
default is 443.  
username —Specifies the username used to log in to the CSA MC.  
watchlist-address-settings—Specifies how watch listed addresses received from the CSA MC are  
handled:  
enabled {yes | no}—Enables/disables receipt of watch list addresses from the CSA MC.  
manual-rr-increase—Specifies the number added to an event RR because the attacker has been  
manually watch-listed by the CSA MC. The valid range is 0 to 35. The default is 25.  
packet-rr-increase—Specifies the number added to an event risk rating because the attacker  
has been watch listed by the CSA MC because of a sessionless packet-based policy violation.  
The valid range is 0 to 35. The default is 10.  
session-rr-increase—Specifies the number added to an event risk rating because the attacker  
has been watch-listed by the CSA MC because of a session-based policy violation. The valid  
range is 0 to 35. The default is 25.  
Note  
Make sure you add the external product as a trusted host so the sensor can communicate with it.  
Adding External Product Interfaces  
To add external product interfaces, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter external product interfaces submode.  
sensor# configure terminal  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
11-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 11 Configuring External Product Interfaces  
Adding External Product Interfaces and Posture ACLs  
sensor(config)# service external-product-interface  
Step 3  
Add the CSA MC interface.  
sensor(config-ext)# cisco-security-agents-mc-settings 209.165.200.225  
sensor(config-ext-cis)#  
Step 4  
Step 5  
Step 6  
Enable receipt of information from the CSA MC.  
sensor(config-ext-cis)# enabled yes  
Change the default port setting.  
sensor(config-ext-cis)# port 80  
Configure the login settings:  
a. Enter the username.  
sensor(config-ext-cis)# username jsmith  
b. Enter and confirm the password.  
sensor(config-ext-cis)# password  
Enter password[]: *******  
Re-enter password: *******  
sensor(config-ext-cis)#  
Note  
Steps 7 through 10 are optional. If you do not perform Steps 7 though 10, the default values  
are used to receive all the CSA MC information with no filters applied.  
Step 7  
(Optional) Configure the watch list settings:  
a. Allow the watch list information to be passed from the external product to the sensor.  
sensor(config-ext-cis-wat)# enabled yes  
Note  
If you do not enable the watch list, the watch list information received from a CSA MC is  
deleted.  
b. Change the percentage of the manual watch list RR from the default of 25.  
sensor(config-ext-cis-wat)# manual-rr-increase 30  
c. Change the percentage of the session-based watch list RR from the default of 25.  
sensor(config-ext-cis-wat)# session-rr-increase 30  
d. Change the percentage of the packet-based watch list RR from the default of 10.  
sensor(config-ext-cis-wat)# packet-rr-increase 20  
Step 8  
(Optional) Allow the host posture information to be passed from the external product to the sensor.  
sensor(config-ext-cis)# host-posture-settings  
sensor(config-ext-cis-hos)# enabled yes  
Note  
If you do not enable the host posture information, the host posture information received from a  
CSA MC is deleted.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
11-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 11 Configuring External Product Interfaces  
Adding External Product Interfaces and Posture ACLs  
Step 9  
(Optional) Allow the host posture information from unreachable hosts to be passed from the external  
product to the sensor.  
sensor(config-ext-cis-hos)# allow-unreachable-postures yes  
Note  
A host is not reachable if the CSA MC cannot establish a connection with the host on any of the  
IP addresses in the host’s posture. This option is useful in filtering the postures whose IP  
addresses may not be visible to the IPS or may be duplicated across the network. This filter is  
most applicable in network topologies where hosts that are not reachable by the CSA MC are  
also not reachable by the IPS, for example if the IPS and the CSA MC are on the same network  
segment.  
Step 10 Configure a posture ACL:  
a. Add the posture ACL into the ACL list.  
sensor(config-ext-cis-hos)# posture-acls insert name1 begin  
sensor(config-ext-cis-hos-pos)#  
Note  
Posture ACLs are network address ranges for which host postures are allowed or denied. Use  
posture ACLs to filter postures that have IP addresses that may not be visible to the IPS or  
may be duplicated across the network.  
b. Enter the network address the posture ACL will use.  
sensor(config-ext-cis-hos-pos)# network-address 192.0.2.0/24  
c. Choose the action (deny or permit) the posture ACL will take.  
sensor(config-ext-cis-hos-pos)# action permit  
Step 11 Verify the settings.  
sensor(config-ext-cis-hos-pos)# exit  
sensor(config-ext-cis-hos)# exit  
sensor(config-ext-cis)# exit  
sensor(config-ext)# show settings  
cisco-security-agents-mc-settings (min: 0, max: 2, current: 1)  
-----------------------------------------------  
ip-address: 209.165.200.225  
-----------------------------------------------  
interface-type: extended-sdee <protected>  
enabled: yes default: yes  
url: /csamc50/sdee-server <protected>  
port: 80 default: 443  
use-ssl  
-----------------------------------------------  
always-yes: yes <protected>  
-----------------------------------------------  
username: jsmith  
password: <hidden>  
host-posture-settings  
-----------------------------------------------  
enabled: yes default: yes  
allow-unreachable-postures: yes default: yes  
posture-acls (ordered min: 0, max: 10, current: 1 - 1 active, 0 inactive)  
-----------------------------------------------  
ACTIVE list-contents  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
11-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 11 Configuring External Product Interfaces  
Troubleshooting External Product Interfaces  
-----------------------------------------------  
NAME: name1  
-----------------------------------------------  
network-address: 192.0.2.0/24  
action: permit  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
watchlist-address-settings  
-----------------------------------------------  
enabled: yes default: yes  
manual-rr-increase: 30 default: 25  
session-rr-increase: 30 default: 25  
packet-rr-increase: 20 default: 10  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ext)#  
Step 12 Exit external product interface submode.  
sensor(config-ext)# exit  
Apply Changes:?[yes]:  
Step 13 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for adding trusted hosts, see Adding TLS Trusted Hosts, page 3-52.  
Troubleshooting External Product Interfaces  
To troubleshoot external product interfaces, check the following:  
Make sure the interface is active by checking the output from the show statistics  
external-product-interface command.  
Make sure you have added the CSA MC IP address to the trusted hosts. If you forgot to add it, add  
it, wait a few minutes and then check again.  
Confirm subscription login information by opening and closing a subscription on the CSA MC using  
the browser.  
Check the Event Store for the CSA MC subscription errors.  
For More Information  
For the procedure for adding trusted hosts, see Adding TLS Trusted Hosts, page 3-52.  
For the procedure for displaying events, see Clearing Events from Event Store, page 8-41.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
11-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
C H A P T E R  
12  
Configuring IP Logging  
This chapter describes how to configure IP logging on the sensor. It contains the following sections:  
IP Logging Notes and Caveats  
The following notes and caveats apply to IP logging:  
Enabling IP logging slows down system performance.  
IP logging allows a maximum limit of 20 concurrent IP log files. Once the limit of 20 is reached,  
you receive the following message in main.log: Cid/W errWarnIpLogProcessor::addIpLog: Ran  
out of file descriptors.  
You cannot delete or manage IP log files. The no iplog command does not delete IP logs, it only  
stops more packets from being recorded for that IP log. IP logs are stored in a circular buffer that is  
never filled because new IP logs overwrite old ones.  
You can configure IP logging restrictions using the permit-packet-logging true | false command.  
On IPS sensors with multiple processors, packets may be captured out of order in the IP logs and by  
the packet command. Because the packets are not processed using a single processor, the packets  
can become out of sync when received from multiple processors.  
For More Information  
For detailed information about the packet-related command restrictions, see Configuring Packet  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
12-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 12 Configuring IP Logging  
Understanding IP Logging  
Understanding IP Logging  
You can manually configure the sensor to capture all IP traffic associated with a host you specify by IP  
address. You can specify how long you want the IP traffic to be logged, how many packets you want  
logged, and how many bytes you want logged. The sensor stops logging IP traffic at the first parameter  
you specify.  
You can also have the sensor log IP packets every time a particular signature is fired. You can specify  
how long you want the sensor to log IP traffic and how many packets and bytes you want logged.  
You can copy the IP logs from the sensor and have them analyzed by a tool that can read packet files in  
a libpcap format, such as Wireshark or TCPDUMP.  
Note  
Note  
Each alert references IP logs that are created because of that alert. If multiple alerts create IP logs for  
the same IP address, only one IP log is created for all the alerts. Each alert references the same IP log.  
However, the output of the IP log status only shows the event ID of the first alert triggering the IP log.  
IP logging allows a maximum limit of 20 concurrent IP log files. Once the limit of 20 is reached, you  
receive the following message in main.log: Cid/W errWarnIpLogProcessor::addIpLog: Ran out of  
file descriptors.  
Configuring Automatic IP Logging  
Use the ip-log-packets number, ip-log-time number, and ip-log-bytes number commands to configure  
automatic IP logging parameters on the sensor.  
The following options apply:  
ip-log-packets—Identifies the number of packets you want logged. The valid value is 0 to 65535.  
The default is 0.  
ip-log-time—Identifies the duration you want the sensor to log packets. The valid value is 0 to  
65535 minutes. The default is 30 minutes.  
ip-log-bytes —Identifies the maximum number of bytes you want logged. The valid value is 0 to  
2147483647. The default is 0.  
default—Resets the parameters.  
Note  
An automatic IP log continues capturing packets until one of these parameters is reached.  
Automatic IP logging is configured on a per signature basis or as an event action override. The following  
actions trigger automatic IP logging:  
log-attacker-packets  
log-victim-packets  
log-pair-packets  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
12-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 12 Configuring IP Logging  
Configuring Manual IP Logging for a Specific IP Address  
Configuring Automatic IP Logging  
To configure automatic IP logging parameters, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Enter signature definition IP log configuration submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
sensor(config-sig)# ip-log  
Step 3  
Step 4  
Step 5  
Step 6  
Specify the number of packets you want the sensor to log.  
sensor(config-sig-ip)# ip-log-packets 200  
Specify the duration you want the sensor to log packets.  
sensor(config-sig-ip)# ip-log-time 60  
Specify the number of bytes you want logged.  
sensor(config-sig-ip)# ip-log-bytes 5024  
Verify the settings.  
sensor(config-sig-ip)# show settings  
ip-log  
-----------------------------------------------  
ip-log-packets: 200 default: 0  
ip-log-time: 60 default: 30  
ip-log-bytes: 5024 default: 0  
-----------------------------------------------  
sensor(config-sig-ip)#  
Step 7  
Step 8  
Exit IP logging submode.  
sensor(config-sig-ip)# exit  
sensor(config-sig)# exit  
Apply Changes?:[yes]:  
Press Enter to apply the changes or type no to discard the changes.  
For More Information  
To copy and view an IP log file, see Copying IP Log Files to Be Viewed, page 12-7.  
For more information on event actions, see Assigning Actions to Signatures, page 7-15 and  
Configuring Manual IP Logging for a Specific IP Address  
Use the iplog name ip_address [duration minutes] [packets numPackets] [bytes numBytes] command  
to log IP packets manually on a virtual sensor for a specific IP address.  
The following options apply:  
name—Specifies the virtual sensor on which to begin and end logging.  
ip_address—Logs packets containing the specified source and/or destination IP address.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
12-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 12 Configuring IP Logging  
Configuring Manual IP Logging for a Specific IP Address  
minutes—Specifies the duration the logging should be active. The valid range is 1 to 60 minutes.  
The default is 10 minutes.  
numPackets—Specifies the maximum number of packets to log. The valid range is 0 to 4294967295.  
The default is 1000 packets.  
numBytes—Specifies the maximum number of bytes to log. The valid range is 0 to 4294967295. A  
value of 0 indicates unlimited bytes.  
Note  
The minutes, numPackets, and numBytes parameters are optional, you do not have to specify all three.  
However, if you include more than one parameter, the sensor continues logging only until the first  
threshold is reached. For example, if you set the duration to 5 minutes and the number of packets to 1000,  
the sensor stops logging after the 1000th packet is captured, even if only 2 minutes have passed.  
Configuring Manual IP Logging  
To manually log packets on a virtual sensor for a specific IP address, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Start IP logging for a specific IP address.  
sensor# iplog vs0 192.0.2.1 duration 5  
Logging started for virtual sensor vs0, IP address 192.0.2.1, Log ID 1  
Warning: IP Logging will affect system performance.  
sensor#  
The example shows the sensor logging all IP packets for 5 minutes to and from the IP address 192.0.2.1.  
Note  
Make note of the Log ID for future reference.  
Step 3  
Monitor the IP log status with the iplog-status command.  
sensor# iplog-status  
Log ID:  
1
IP Address 1:  
Virtual Sensor:  
Status:  
192.0.2.1  
vs0  
added  
Event ID:  
0
0
0
Bytes Captured:  
Packets Captured:  
sensor  
Note  
Each alert references IP logs that are created because of that alert. If multiple alerts create IP  
logs for the same IP address, only one IP log is created for all the alerts. Each alert references  
the same IP log. However, the output of the IP log status only shows the event ID of the first alert  
triggering the IP log.  
For More Information  
To stop logging IP packets for a specific IP address, see Stopping Active IP Logs, page 12-6.  
To log IP packets as an event associated with a signature, see Configuring Automatic IP Logging,  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
12-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 12 Configuring IP Logging  
Displaying the Contents of IP Logs  
To copy and view an IP log file, see Copying IP Log Files to Be Viewed, page 12-7.  
Displaying the Contents of IP Logs  
Use the iplog-status [log-id log_id] [brief] [reverse] [ | {begin regular_expression | exclude  
regular_expression | include regular_expression }] command to display the description of the available  
IP log contents.  
When the log is created, the status reads added. If and when the first entry is inserted in the log, the status  
changes to started. When the log is completed, because it reaches the packet count limit, for example,  
the status changes to completed.  
The following options apply:  
log_id—(Optional) Specifies the log ID of the file for which you want to see the status.  
brief—(Optional) Displays a summary of IP log status information for each log.  
reverse—(Optional) Displays the list in reverse chronological order (newest log first).  
|—(Optional) Indicates that an output processing specification follows.  
regular_expression—Specifies any regular expression found in the IP log status output.  
begin—Searches the output of the more command and displays the output from the first instance of  
a specified string.  
exclude—Filters the IP log status output so that it excludes lines that contain a particular regular  
expression.  
include—Filters the IP log status output so that it includes lines that contain a particular regular  
expression.  
Displaying IP Logs  
To view the contents of IP logs, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the status of all IP logs.  
sensor# iplog-status  
Log ID:  
2425  
IP Address 1:  
Virtual Sensor:  
Status:  
192.0.2.1  
vs0  
started  
Start Time:  
Packets Captured:  
2003/07/30 18:24:18 2002/07/30 12:24:18 CST  
1039438  
Log ID:  
2342  
IP Address 1:  
IP Address 2:  
Virtual Sensor:  
Status:  
192.0.2.10  
192.0.2.20  
vs0  
completed  
Event ID:  
209348  
Start Time:  
End Time:  
2003/07/30 18:24:18 2002/07/30 12:24:18 CST  
2003/07/30 18:34:18 2002/07/30 12:34:18 CST  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
12-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 12 Configuring IP Logging  
Stopping Active IP Logs  
Step 3  
Display a brief list of all IP logs.  
sensor# iplog-status brief  
Log ID  
2425  
2342  
VS  
vs0  
vs0  
IP Address1  
192.0.2.10  
192.0.2.20  
Status  
started  
completed  
Event ID  
N/A  
209348  
Start Date  
2003/07/30  
2003/07/30  
sensor#  
Stopping Active IP Logs  
Use the no iplog [log-id log_id | name name] command to stop logging for the logs that are in the  
startedstate and to remove logs that are in the addedstate. The no iplog command does not remove or  
delete the IP log. It only signals to the sensor to stop capturing additional packets on that IP log.  
Note  
Using the no iplog command on an added state IP log stops the IP log. The added state means that the  
IP log is still empty (no packets). Stopping it when there are no packets means you are stopping an empty  
IP log. An empty log is removed when it is stopped.  
The following options apply:  
log_id—Specifies the log ID of the logging session to stop. Use the iplog-status command to find  
the log ID.  
name—Specifies the virtual sensor on which to begin or end logging.  
Disabling IP Logging Sessions  
To disable one or all IP logging sessions, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Stop a particular IP logging session:  
a. Find the log ID of the session you want to stop.  
sensor# iplog-status  
Log ID:  
1
IP Address 1:  
Virtual Sensor:  
Status:  
192.0.2.1  
vs0  
added  
Event ID:  
0
0
0
Bytes Captured:  
Packets Captured:  
sensor#  
Note  
Each alert references IP logs that are created because of that alert. If multiple alerts create  
IP logs for the same IP address, only one IP log is created for all the alerts. Each alert  
references the same IP log. However, the output of the IP log status only shows the event ID  
of the first alert triggering the IP log.  
b. Stop the IP log session.  
sensor# no iplog log-id 137857512  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
12-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 12 Configuring IP Logging  
Copying IP Log Files to Be Viewed  
Step 3  
Step 4  
Stop all IP logging sessions on a virtual sensor.  
sensor# no iplog name vs0  
Verify that IP logging has been stopped. When the logs are stopped, the status shows them as completed.  
sensor# iplog-status  
Log ID:  
1
IP Address 1:  
Virtual Sensor:  
Status:  
192.0.2.1  
vs0  
completed  
Event ID:  
0
0
0
Bytes Captured:  
Packets Captured:  
sensor#  
Copying IP Log Files to Be Viewed  
Use the copy iplog log_id destination_url command to copy IP log files to an FTP or SCP server so that  
you can view them with a sniffing tool such as Ethereal or TCPDUMP.  
The following options apply:  
log_id—Specifies the log ID of the logging session. You can retrieve the log ID using the  
iplog-status command.  
destination_url—Specifies the location of the destination file to be copied. It can be a URL or a  
keyword.  
The exact format of the source and destination URLs varies according to the file. Here are the valid  
types:  
ftp:—Destination URL for an FTP network server. The syntax for this prefix is:  
ftp:[//[username@] location]/relativeDirectory]/filename  
ftp:[//[username@]location]//absoluteDirectory]/filename  
scp:—Destination URL for the SCP network server. The syntax for this prefix is:  
scp:[//[username@] location]/relativeDirectory]/filename  
scp:[//[username@] location]//absoluteDirectory]/filename  
When you use FTP or SCP protocol, you are prompted for a password.  
Copying IP Log Files  
To copy IP log files to an FTP or SCP server, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Monitor the IP log status with the iplog-status command until you see that the status reads completed  
for the log ID of the log file that you want to copy.  
sensor# iplog-status  
Log ID:  
2425  
IP Address:  
Virtual Sensor:  
Status:  
192.0.2.1  
vs0  
started  
Start Time:  
2003/07/30 18:24:18 2002/07/30 12:24:18 CST  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
12-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 12 Configuring IP Logging  
Copying IP Log Files to Be Viewed  
Packets Captured:  
1039438  
Log ID:  
2342  
IP Address:  
Virtual Sensor:  
Status:  
192.0.2.2  
vs0  
completed  
Event ID:  
Start Time:  
End Time:  
sensor#  
209348  
2003/07/30 18:24:18 2002/07/30 12:24:18 CST  
2003/07/30 18:34:18 2002/07/30 12:34:18 CST  
Step 3  
Copy the IP log to your FTP or SCP server.  
sensor# copy iplog 2342 ftp://[email protected]/user/iplog1  
Password: ******** Connected to 209.165.200.225 (209.165.200.225). 220 linux.machine.com  
FTP server (Version wu-2.6.0(1) Mon Feb 28 10:30 :36 EST 2000) ready. ftp> user (username)  
root 331 Password required for root. Password:230 User root logged in. ftp> 200 Type set  
to I. ftp> put iplog.8518.tmp iplog1 local: iplog.8518.tmp remote: iplog1 227 Entering  
Passive Mode (2,4,6,8,179,125) 150 Opening BINARY mode data connection for iplog1. 226  
Transfer complete. 30650 bytes sent in 0.00246 secs (1.2e+04 Kbytes/sec) ftp>  
Step 4  
Open the IP log using a sniffer program such as Wireshark or TCPDUMP. For more information on  
Wireshark, go to http://www.wireshark.org. For more information on TCPDUMP, go to  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
12-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
13  
Displaying and Capturing Live Traffic on an  
Interface  
This chapter describes how to display, capture, copy, and erase packet files. It contains the following  
sections:  
Packet Display And Capture Notes and Caveats  
The following notes and caveats apply to capturing packet files:  
Although capturing live traffic off the interface does not disrupt any of the functionality of the  
sensor, it does cause significant performance degradation.  
Changing the interface configuration results in abnormal termination of any packet command  
running on that interface.  
You can configure packet capture/display restrictions using the permit-packet-logging true | false  
command.  
On IPS sensors with multiple processors, packets may be captured out of order in the IP logs and by  
the packet command. Because the packets are not processed using a single processor, the packets  
can become out of sync when received from multiple processors.  
When the IPS 4510 and IPS 4520 are configured in VLAN pairs, the packet display command does  
not work without the VLAN option if the expression keyword is also used.  
For More Information  
For detailed information about the packet-related command restrictions, see Configuring Packet  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
13-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 13 Displaying and Capturing Live Traffic on an Interface  
Understanding Packet Display and Capture  
Understanding Packet Display and Capture  
You can display or capture live traffic from an interface and have the live traffic or a previously captured  
file put directly on the screen. Storage is available for one local file only, subsequent capture requests  
overwrites an existing file. The size of the storage file varies depending on the platform. A message may  
be displayed if the maximum file size is reached before the requested packet count is captured.  
Displaying Live Traffic on an Interface  
Use the packet display interface_name [snaplen length] [count count] [verbose] [expression  
expression] command to display live traffic from an interface directly on your screen. Use the packet  
display iplog id [verbose] [expression expression] to display IP logs.  
Note  
To terminate the live display, press Ctrl-C.  
The following options apply:  
interface_name—Specifies the interface name, interface type (GigabitEthernet, FastEthernet,  
Management, PortChannel) followed by slot/port. You can only use an interface name that exists in  
the system.  
snaplen—(Optional) Specifies the maximum number of bytes captured for each packet. The valid  
range is 68 to 1600. The default is 0. A value of 0 means use the required length to catch whole  
packets.  
count—(Optional) Specifies the maximum number of packets to capture. The valid range is 1 to  
10000.  
Note  
If you do not specify this option, the capture terminates after the maximum file size is  
captured.  
verbose—(Optional) Displays the protocol tree for each packet rather than a one-line summary.  
expression—Specifies the packet-display filter expression. This expression is passed directly to  
TCPDUMP and must meet the TCPDUMP expression syntax.  
Note  
Note  
The expression syntax is described in the TCPDUMP man page.  
If you use the expression option when monitoring packets with VLAN headers, the  
expression does not match properly unless vlan and is added to the beginning of the  
expression. For example, packet display iplog 926299444 verbose expression icmp Will  
NOT show ICMP packets; packet display iplog 926299444 verbose expression vlan and  
icmp WILL show ICMP packets. It is often necessary to use expression vlan and on the IPS  
appliance interfaces connected to trunk ports.  
file-info—Displays information about the stored packet file. File-info displays the following  
information:  
Captured by: user:id, Cmd: cliCmd  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
13-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 13 Displaying and Capturing Live Traffic on an Interface  
Displaying Live Traffic on an Interface  
Start: yyyy/mm/dd hh:mm:ss zone, End: yyyy/mm/dd hh:mm:ss zone or in-progress.  
Where user = the username of user initiating capture, id = the CLI ID of the user, and cliCmd = the  
command entered to perform the capture.  
Caution  
Executing the packet display command causes significant performance degradation.  
Displaying Live Traffic From an Interface  
To configure the sensor to display live traffic from an interface on the screen, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator or operator privileges.  
Display the live traffic on the interface you are interested in, for example, GigabitEthernet0/1.  
sensor# packet display GigabitEthernet0/1  
Warning: This command will cause significant performance degradation  
tcpdump: listening on ge0_1, link-type EN10MB (Ethernet), capture size 65535 bytes  
03:43:05.691883 IP (tos 0x10, ttl 64, id 55460, offset 0, flags [DF], length: 100)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 4233955485:4233955533(48) ack  
1495691730 win 8576 <nop,nop,timestamp 44085169 226014949>  
03:43:05.691975 IP (tos 0x10, ttl 64, id 55461, offset 0, flags [DF], length: 164)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 48:160(112) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014949>  
03:43:05.691998 IP (tos 0x10, ttl 64, id 53735, offset 0, flags [DF], length: 52)  
10.89.147.50.41805 > 10.89.147.31.22: . [tcp sum ok] 1:1(0) ack 48 win 11704  
<nop,nop,timestamp 226014949 44085169>  
03:43:05.693165 IP (tos 0x10, ttl 64, id 53736, offset 0, flags [DF], length: 52)  
10.89.147.50.41805 > 10.89.147.31.22: . [tcp sum ok] 1:1(0) ack 160 win 11704  
<nop,nop,timestamp 226014949 44085169>  
03:43:05.693351 IP (tos 0x10, ttl 64, id 55462, offset 0, flags [DF], length: 316)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 160:424(264) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014949>  
03:43:05.693493 IP (tos 0x10, ttl 64, id 55463, offset 0, flags [DF], length: 292)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 424:664(240) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014949>  
03:43:05.693612 IP (tos 0x10, ttl 64, id 55464, offset 0, flags [DF], length: 292)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 664:904(240) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014949>  
03:43:05.693628 IP (tos 0x10, ttl 64, id 53737, offset 0, flags [DF], length: 52)  
10.89.147.50.41805 > 10.89.147.31.22: . [tcp sum ok] 1:1(0) ack 424 win 11704  
<nop,nop,timestamp 226014949 44085169>  
03:43:05.693654 IP (tos 0x10, ttl 64, id 53738, offset 0, flags [DF], length: 52)  
10.89.147.50.41805 > 10.89.147.31.22: . [tcp sum ok] 1:1(0) ack 664 win 11704  
<nop,nop,timestamp 226014949 44085169>  
03:43:05.693926 IP (tos 0x10, ttl 64, id 55465, offset 0, flags [DF], length: 292)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 904:1144(240) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014949>  
03:43:05.694043 IP (tos 0x10, ttl 64, id 55466, offset 0, flags [DF], length: 292)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 1144:1384(240) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014949>  
03:43:05.694163 IP (tos 0x10, ttl 64, id 55467, offset 0, flags [DF], length: 292)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 1384:1624(240) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014949>  
03:43:05.694209 IP (tos 0x10, ttl 64, id 53739, offset 0, flags [DF], length: 52)  
10.89.147.50.41805 > 10.89.147.31.22: . [tcp sum ok] 1:1(0) ack 1384 win 11704  
<nop,nop,timestamp 226014950 44085169>  
03:43:05.694283 IP (tos 0x10, ttl 64, id 55468, offset 0, flags [DF], length: 292)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 1624:1864(240) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014950>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
13-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 13 Displaying and Capturing Live Traffic on an Interface  
Capturing Live Traffic on an Interface  
03:43:05.694402 IP (tos 0x10, ttl 64, id 55469, offset 0, flags [DF], length: 292)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 1864:2104(240) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014950>  
03:43:05.694521 IP (tos 0x10, ttl 64, id 55470, offset 0, flags [DF], length: 292)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 2104:2344(240) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014950>  
03:43:05.694690 IP (tos 0x10, ttl 64, id 53740, offset 0, flags [DF], length: 52)  
10.89.147.50.41805 > 10.89.147.31.22: . [tcp sum ok] 1:1(0) ack 2344 win 11704  
<nop,nop,timestamp 226014950 44085169>  
03:43:05.694808 IP (tos 0x10, ttl 64, id 55471, offset 0, flags [DF], length: 300)  
10.89.147.31.22 > 10.89.147.50.41805: P [tcp sum ok] 2344:2592(248) ack 1 win 8576  
<nop,nop,timestamp 44085169 226014950>  
Step 3  
You can use the expression option to limit what you display, for example, only TCP packets.  
Note  
As described in the TCPDUMP man page, the protocol identifiers tcp, udp, and icmp are also  
keywords and must be escaped by using two back slashes (\\).  
sensor# packet display GigabitEthernet0/1 verbose expression ip proto \\tcp  
Warning: This command will cause significant performance degradation  
tcpdump: listening on ge0_1, link-type EN10MB (Ethernet), capture size 65535 bytes  
03:42:02.509738 IP (tos 0x10, ttl 64, id 27743, offset 0, flags [DF], length: 88)  
10.89.147.31.22 > 64.101.182.54.47039: P [tcp sum ok] 3449098782:3449098830(48) ack  
3009767154 win 8704  
03:42:02.509834 IP (tos 0x10, ttl 64, id 27744, offset 0, flags [DF], length: 152)  
10.89.147.31.22 > 64.101.182.54.47039: P [tcp sum ok] 48:160(112) ack 1 win 8704  
03:42:02.510248 IP (tos 0x0, ttl 252, id 55922, offset 0, flags [none], length: 40)  
64.101.182.54.47039 > 10.89.147.31.22: . [tcp sum ok] 1:1(0) ack 160 win 8760  
03:42:02.511262 IP (tos 0x10, ttl 64, id 27745, offset 0, flags [DF], length: 264)  
10.89.147.31.22 > 64.101.182.54.47039: P [tcp sum ok] 160:384(224) ack 1 win 8704  
03:42:02.511408 IP (tos 0x10, ttl 64, id 27746, offset 0, flags [DF], length: 248)  
10.89.147.31.22 > 64.101.182.54.47039: P [tcp sum ok] 384:592(208) ack 1 win 8704  
03:42:02.511545 IP (tos 0x10, ttl 64, id 27747, offset 0, flags [DF], length: 240)  
10.89.147.31.22 > 64.101.182.54.47039: P [tcp sum ok] 592:792(200) ack 1 win 8704  
Step 4  
Display information about the packet file.  
sensor# packet display file-info  
Captured by: cisco:25579, Cmd: packet capture GigabitEthernet0/1  
Start: 2003/02/03 02:56:48 UTC, End: 2003/02/03 02:56:51 UTC  
sensor#  
Capturing Live Traffic on an Interface  
Use the packet capture interface_name [snaplen length] [count count] [expression expression]  
command to capture live traffic on an interface. Only one user can use the packet capture command at  
a time. A second user request results in an error message containing information about the user currently  
executing the capture.  
Caution  
Executing the packet capture command causes significant performance degradation.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
13-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 13 Displaying and Capturing Live Traffic on an Interface  
Capturing Live Traffic on an Interface  
The packet capture command captures the libpcap output into a local file. Use the packet display  
packet-file [verbose] [expression expression] command to view the local file. Use the packet display  
file-info to display information about the local file, if any.  
The following options apply:  
interface_name—Specifies the logical interface name. You can only use an interface name that  
exists in the system.  
snaplen—Specifies the maximum number of bytes captured for each packet (optional). The valid  
range is 68 to 1600. The default is 0.  
count—Specifies the maximum number of packets to capture (optional). The valid range is 1 to  
10000.  
Note  
If you do not specify this option, the capture terminates after the maximum file size is  
captured.  
expression—Specifies the packet-capture filter expression. This expression is passed directly to  
TCPDUMP and must meet the TCPDUMP expression syntax.  
file-info—Displays information about the stored packet file.  
File-info displays the following information:  
Captured by: user:id, Cmd: cliCmd  
Start: yyyy/mm/dd hh:mm:ss zone, End: yyyy/mm/dd hh:mm:ss zone or in-progress  
Where user = username of user initiating capture, id = CLI ID of the user, and cliCmd = command  
entered to perform the capture.  
verbose—Displays the protocol tree for each packet rather than a one-line summary. This parameter  
is optional.  
Capturing Live Traffic on an Interface  
To configure the sensor to capture live traffic on an interface, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator or operator privileges.  
Capture the live traffic on the interface you are interested in, for example, GigabitEthernet0/1.  
sensor# packet capture GigabitEthernet0/1  
Warning: This command will cause significant performance degradation  
tcpdump: WARNING: ge0_1: no IPv4 address assigned  
tcpdump: listening on ge0_1, link-type EN10MB (Ethernet), capture size 65535 bytes  
125 packets captured  
126 packets received by filter  
0 packets dropped by kernel  
Step 3  
View the captured packet file.  
sensor# packet display packet-file  
reading from file /usr/cids/idsRoot/var/packet-file, link-type EN10MB (Ethernet)  
03:03:13.216768 802.1d config TOP_CHANGE 8000.00:04:9a:66:35:01.8025 root 8000.0  
0:04:6d:f9:e8:82 pathcost 8 age 2 max 20 hello 2 fdelay 15  
03:03:13.232881 IP 64.101.182.244.1978 > 10.89.130.108.23: . ack 3266153791 win  
64328  
03:03:13.232895 IP 10.89.130.108.23 > 64.101.182.244.1978: P 1:157(156) ack 0 wi  
n 5840  
03:03:13.433136 IP 64.101.182.244.1978 > 10.89.130.108.23: . ack 157 win 65535  
03:03:13.518335 IP 10.89.130.134.42342 > 255.255.255.255.42342: UDP, length: 76  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
13-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 13 Displaying and Capturing Live Traffic on an Interface  
Copying the Packet File  
03:03:15.218814 802.1d config TOP_CHANGE 8000.00:04:9a:66:35:01.8025 root 8000.0  
0:04:6d:f9:e8:82 pathcost 8 age 2 max 20 hello 2 fdelay 15  
03:03:15.546866 IP 64.101.182.244.1978 > 10.89.130.108.23: P 0:2(2) ack 157 win  
65535  
03:03:15.546923 IP 10.89.130.108.23 > 64.101.182.244.1978: P 157:159(2) ack 2 wi  
n 5840  
03:03:15.736377 IP 64.101.182.244.1978 > 10.89.130.108.23: . ack 159 win 65533  
03:03:17.219612 802.1d config TOP_CHANGE 8000.00:04:9a:66:35:01.8025 root 8000.0  
0:04:6d:f9:e8:82 pathcost 8 age 2 max 20 hello 2 fdelay 15  
03:03:19.218535 802.1d config TOP_CHANGE 8000.00:04:9a:66:35:01.8025 root 8000.0  
0:04:6d:f9:e8:82 pathcost 8 age 2 max 20 hello 2 fdelay 15  
03:03:19.843658 IP 64.101.182.143.3262 > 10.89.130.23.445: P 3749577803:37495778  
56(53) ack 3040953472 win 64407  
03:03:20.174835 IP 161.44.55.250.1720 > 10.89.130.60.445: S 3147454533:314745453  
3(0) win 65520 <mss 1260,nop,nop,sackOK>  
03:03:21.219958 802.1d config TOP_CHANGE 8000.00:04:9a:66:35:01.8025 root 8000.0  
0:04:6d:f9:e8:82 pathcost 8 age 2 max 20 hello 2 fdelay 15  
03:03:21.508907 IP 161.44.55.250.1809 > 10.89.130.61.445: S 3152179859:315217985  
9(0) win 65520 <mss 1260,nop,nop,sackOK>  
03:03:23.221004 802.1d config TOP_CHANGE 8000.00:04:9a:66:35:01.8025 root 8000.0  
0:04:6d:f9:e8:82 pathcost 8 age 2 max 20 hello 2 fdelay 15  
03:03:23.688099 IP 161.44.55.250.1975 > 10.89.130.63.445: S 3160484670:316048467  
0(0) win 65520 <mss 1260,nop,nop,sackOK>  
03:03:25.219054 802.1d config TOP_CHANGE 8000.00:04:9a:66:35:01.8025 root 8000.0  
0:04:6d:f9:e8:82 pathcost 8 age 2 max 20 hello 2 fdelay 15  
03:03:25.846552 IP 172.20.12.10.2984 > 10.89.130.127.445: S 1345848756:134584875  
6(0) win 64240 <mss 1460,nop,nop,sackOK>  
03:03:26.195342 IP 161.44.55.250.2178 > 10.89.130.65.445: S 3170518052:317051805  
2(0) win 65520 <mss 1260,nop,nop,sackOK>  
03:03:27.222725 802.1d config TOP_CHANGE 8000.00:04:9a:66:35:01.8025 root 8000.0  
0:04:6d:f9:e8:82 pathcost 8 age 2 max 20 hello 2 fdelay 15  
03:03:27.299178 IP 161.44.55.250.2269 > 10.89.130.66.445: S 3174717959:317471795  
9(0) win 65520 <mss 1260,nop,nop,sackOK>  
03:03:27.308798 arp who-has 161.44.55.250 tell 10.89.130.66  
03:03:28.383028 IP 161.44.55.250.2349 > 10.89.130.67.445: S 3178636061:317863606  
1(0) win 65520 <mss 1260,nop,nop,sackOK>  
--MORE--  
Step 4  
View any information about the packet file.  
sensor# packet display file-info  
Captured by: cisco:8874, Cmd: packet capture GigabitEthernet0/1  
Start: 2003/01/07 00:12:50 UTC, End: 2003/01/07 00:15:30 UTC  
sensor#  
Copying the Packet File  
Use the copy packet-file destination_url command to copy the packet file to an FTP or SCP server for  
saving or further analysis with another tool, such as Wireshark or TCPDUMP.  
The following options apply:  
packet-file—Specifies the locally stored libpcap file that you captured using the packet capture  
command.  
destination_url—Specifies the location of the destination file to be copied. It can be a URL or a  
keyword.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
13-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 13 Displaying and Capturing Live Traffic on an Interface  
Erasing the Packet File  
Note  
The exact format of the source and destination URLs varies according to the file.  
ftp:—Destination URL for an FTP network server. The syntax for this prefix is:  
ftp:[//[username@] location]/relativeDirectory]/filename  
ftp:[//[username@]location]//absoluteDirectory]/filename  
scp:—Destination URL for the SCP network server. The syntax for this prefix is:  
scp:[//[username@] location]/relativeDirectory]/filename  
scp:[//[username@] location]//absoluteDirectory]/filename  
Note  
When you use FTP or SCP protocol, you are prompted for a password.  
To copy packets files to an FTP or SCP server, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Copy the packet-file to an FTP or SCP server.  
sensor# copy packet-file scp://[email protected]/work/  
Password: *********  
packet-file  
sensor#  
100% 1670  
0.0KB/s  
00:00  
Step 3  
View the packet file with Wireshark or TCPDUMP.  
Erasing the Packet File  
Use the erase packet-file command to erase the packet file. There is only one packet file. It is 16 MB  
and is over-written each time you use the packet capture command. To erase the packet file, follow  
these steps:  
Step 1  
Display information about the current captured packet file.  
sensor# packet display file-info  
Captured by: cisco:1514, Cmd: packet capture GigabitEthernet0/1  
Start: 2005/02/15 03:55:00 CST, End: 2005/02/15 03:55:05 CST  
sensor#  
Step 2  
Step 3  
Erase the packet file.  
sensor# erase packet-file  
sensor#  
Verify that you have erased the packet file.  
sensor# packet display file-info  
No packet-file available.  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
13-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 13 Displaying and Capturing Live Traffic on an Interface  
Erasing the Packet File  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
13-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
14  
Configuring Attack Response Controller for  
Blocking and Rate Limiting  
This chapter provides information for setting up the ARC to perform blocking and rate limiting on the  
sensor. It the following sections:  
Blocking Notes and Caveats  
The following notes and caveats apply to blocking:  
The ARC is formerly known as Network Access Controller. Although the name has been changed,  
the IDM, the IME, and the CLI contain references to Network Access Controller, nac, and  
network-access.  
Blocking is not supported on the FWSM in multiple mode admin context.  
Connection blocks and network blocks are not supported on adaptive security appliances. Adaptive  
security appliances only support host blocks with additional connection information.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Understanding Blocking  
Do not confuse blocking with the ability of the sensor to drop packets. The sensor can drop packets  
when the following actions are configured for a sensor in inline mode: deny packet inline, deny  
connection inline, and deny attacker inline.  
The ACLs that ARC makes should never be modified by you or any other system. These ACLs are  
temporary and new ACLs are constantly being created by the sensor. The only modifications that  
you can make are to the Pre- and Post-Block ACLs.  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a  
block or rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action  
is not carried out.  
Two sensors cannot control blocking or rate limiting on the same device. If this situation is needed,  
configure one sensor as the master blocking sensor to manage the devices and the other sensors can  
forward their requests to the master blocking sensor.  
Pre-Block and Post-Block ACLS do not apply to rate limiting.  
When you add a master blocking sensor, you reduce the number of blocking devices per sensor. For  
example, if you want to block on 10 security appliances and 10 routers with one blocking  
interface/direction each, you can assign 10 to the sensor and assign the other 10 to a master blocking  
sensor.  
While blocking is disabled, the ARC continues to receive blocks and track the time on active blocks,  
but will not apply new blocks or remove blocks from the managed devices. After blocking is  
reenabled, the blocks on the devices are updated.  
We recommend that you do not permit the sensor to block itself, because it may stop communicating  
with the blocking device. You can configure this option if you can ensure that if the sensor creates  
a rule to block its own IP address, it will not prevent the sensor from accessing the blocking device.  
You MUST create a user profile before configuring the blocking device.  
Understanding Blocking  
The ARC is responsible for managing network devices in response to suspicious events by blocking  
access from attacking hosts and networks. The ARC blocks the IP address on the devices it is managing.  
It sends the same block to all the devices it is managing, including any other master blocking sensors.  
The ARC monitors the time for the block and removes the block after the time has expired.  
The ARC completes the action response for a new block in no more than 7 seconds. In most cases, it  
completes the action response in less time. To meet this performance goal, you should not configure the  
sensor to perform blocks at too high a rate or to manage too many blocking devices and interfaces. We  
recommend that the maximum number of blocks not exceed 250 and the maximum number of blocking  
items not exceed 10. To calculate the maximum number of blocking items, a security appliance counts  
as one blocking item per blocking context. A router counts as one blocking item per blocking  
interface/direction. A switch running Catalyst software counts as one blocking item per blocking VLAN.  
If the recommended limits are exceeded, the ARC may not apply blocks in a timely manner or may not  
be able to apply blocks at all.  
Caution  
Blocking is not supported on the FWSM in multiple mode admin context.  
For security appliances configured in multi-mode, Cisco IPS does not include VLAN information in the  
block request. Therefore you must make sure the IP addresses being blocked are correct for each security  
appliance. For example, the sensor is monitoring packets on a security appliance customer context that  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Understanding Blocking  
is configured for VLAN A, but is blocking on a different security appliance customer context that is  
configured for VLAN B. Addresses that trigger blocks on VLAN A may refer to a different host on  
VLAN B.  
There are three types of blocks:  
Host block—Blocks all traffic from a given IP address.  
Connection block—Blocks traffic from a given source IP address to a given destination IP address  
and destination port. Multiple connection blocks from the same source IP address to either a  
different destination IP address or destination port automatically switch the block from a connection  
block to a host block.  
Network block—Blocks all traffic from a given network. You can initiate host and connection blocks  
manually or automatically when a signature is triggered. You can only initiate network blocks  
manually.  
Note  
Connection blocks and network blocks are not supported on adaptive security appliances. Adaptive  
security appliances only support host blocks with additional connection information.  
Caution  
Do not confuse blocking with the ability of the sensor to drop packets. The sensor can drop packets when  
the following actions are configured for a sensor in inline mode: deny packet inline, deny connection  
inline, and deny attacker inline.  
For automatic blocks, you must configure request-block-host or request-block-connection as the event  
action for particular signatures, and add them to any event action overrides you have configured, so that  
the SensorApp sends a block request to the ARC when the signature is triggered. When the ARC receives  
the block request from the SensorApp, it updates the device configurations to block the host or  
connection.  
On Cisco routers and Catalyst 6500 series switches, ARC creates blocks by applying ACLs or VACLs.  
ACLs and VACLs permit or deny passage of data packets through interface directions or VLANs. Each  
ACL or VACL contains permit and deny conditions that apply to IP addresses. The security appliances  
do not use ACLs or VACLs. The built-in shun and no shun command is used.  
Caution  
The ACLs that ARC makes should never be modified by you or any other system. These ACLs are  
temporary and new ACLs are constantly being created by the sensor. The only modifications that you  
can make are to the Pre- and Post-Block ACLs.  
You need the following information for the ARC to manage a device:  
Login user ID (if the device is configured with AAA).  
Login password.  
Enable password (not needed if the user has enable privileges).  
Interfaces to be managed (for example, ethernet0, vlan100).  
Any existing ACL or VACL information you want applied at the beginning (Pre-Block ACL or  
VACL) or end (Post-Block ACL or VACL) of the ACL or VACL that will be created. This does not  
apply to the security appliances because they do not use ACLs to block.  
Whether you are using Telnet or SSH to communicate with the device.  
IP addresses (host or range of hosts) you never want blocked.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Understanding Rate Limiting  
How long you want the blocks to last.  
Tip  
To check the status of the ARC, type show statistics network-access at the sensor#. The output shows  
the devices you are managing, any active blocks and rate limits, and the status of all devices..  
Note  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or  
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried  
out.  
For More Information  
For the procedure to add request-block-host or request-block-connection event actions to a  
For the procedure for configuring overrides that add the request-block-host or  
request-block-connection event actions to alerts of a specific risk rating, see Adding, Editing,  
For more information on Pre- and Post-Block ACLs, see How the Sensor Manages Devices,  
Understanding Rate Limiting  
The ARC is responsible for rate limiting traffic in protected networks. Rate limiting lets sensors restrict  
the rate of specified traffic classes on network devices. Rate limit responses are supported for the Host  
Flood and Net Flood engines, and the TCP half-open SYN signature. The ARC can configure rate limits  
on network devices running Cisco IOS 12.3 or later. Master blocking sensors can also forward rate limit  
requests to blocking forwarding sensors.  
To add a rate limit, you specify the following:  
Source address and/or destination address for any rate limit  
Source port and/or destination port for rate limits with TCP or UDP protocol  
You can also tune rate limiting signatures. You must also set the action to request-rate-limit and set the  
percentage for these signatures.  
Note  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or  
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried  
out.  
Table 14-1 lists the supported rate limiting signatures and parameters.  
Table 14-1  
Rate Limiting Signatures  
Destination IP  
Address Allowed Data  
Signature ID  
2152  
Signature Name  
Protocol  
ICMP  
ICMP Flood Host  
ICMP Smurf Attack  
Yes  
Yes  
echo-request  
echo-reply  
2153  
ICMP  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Understanding Service Policies for Rate Limiting  
Table 14-1  
Rate Limiting Signatures (continued)  
Destination IP  
Address Allowed Data  
Signature ID  
4002  
Signature Name  
Protocol  
UDP Flood Host  
UDP  
ICMP  
ICMP  
ICMP  
UDP  
TCP  
Yes  
No  
No  
No  
No  
No  
No  
none  
6901  
Net Flood ICMP Reply  
Net Flood ICMP Request  
Net Flood ICMP Any  
Net Flood UDP  
echo-reply  
echo-request  
None  
6902  
6903  
6910  
None  
6920  
Net Flood TCP  
None  
3050  
TCP HalfOpenSyn  
TCP  
halfOpenSyn  
Tip  
To check the status of the ARC, type show statistics network-access at the sensor#. The output shows  
the devices you are managing, any active blocks and rate limits, and the status of all devices..  
For More Information  
For the procedure for configuring rate limiting on a router, see Configuring Blocking and Rate  
For the procedure for configuring a sensor to be a master blocking sensor, see Configuring the  
Understanding Service Policies for Rate Limiting  
You must not apply a service policy to an interface/direction that is configured for rate limiting. If you  
do so, the rate limit action will fail. Before configuring rate limits, confirm that there is no service policy  
on the interface/direction, and remove it if one exists. The ARC does not remove the existing rate limit  
unless it is one that the ARC had previously added.  
Rate limits use ACLs, but not in the same way as blocks. Rate limits use acls and class-map entries to  
identify traffic, and policy-map and service-policy entries to police the traffic.  
Before Configuring ARC  
Caution  
Two sensors cannot control blocking or rate limiting on the same device. If this situation is needed,  
configure one sensor as the master blocking sensor to manage the devices and the other sensors can  
forward their requests to the master blocking sensor.  
Note  
When you add a master blocking sensor, you reduce the number of blocking devices per sensor. For  
example, if you want to block on 10 security appliances and 10 routers with one blocking  
interface/direction each, you can assign 10 to the sensor and assign the other 10 to a master blocking  
sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Supported Devices  
Before you configure the ARC for blocking or rate limiting, make sure you do the following:  
Analyze your network topology to understand which devices should be blocked by which sensor,  
and which addresses should never be blocked.  
Gather the usernames, device passwords, enable passwords, and connections types (Telnet or SSH)  
needed to log in to each device.  
Know the interface names on the devices.  
Know the names of the Pre-Block ACL or VACL and the Post-Block ACL or VACL if needed.  
Understand which interfaces should and should not be blocked and in which direction (in or out).  
You do not want to accidentally shut down an entire network.  
For More Information  
For the procedure for configuring the master blocking sensor, see Configuring the Sensor to be a Master  
Supported Devices  
Caution  
If the recommended limits are exceeded, the ARC may not apply blocks in a timely manner or may not  
be able to apply blocks at all.  
By default, the ARC supports up to 250 devices in any combination. The following devices are supported  
for blocking by the ARC:  
Cisco series routers using Cisco IOS 11.2 or later (ACLs):  
Cisco 1600 series router  
Cisco 1700 series router  
Cisco 2500 series router  
Cisco 2600 series router  
Cisco 2800 series router  
Cisco 3600 series router  
Cisco 3800 series router  
Cisco 7200 series router  
Cisco 7500 series router  
Catalyst 5000 switches with RSM with IOS 11.2(9)P or later (ACLs)  
Catalyst 6500 switches and 7600 routers with IOS 12.1(13)E or later (ACLs)  
Catalyst 6500 switches 7600 routers with Catalyst software version 7.5(1) or later (VACLs)  
Supervisor Engine 1A with PFC  
Supervisor Engine 1A with MSFC1  
Supervisor Engine 1A with MFSC2  
Supervisor Engine 2 with MSFC2  
Supervisor Engine 720 with MSFC3  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking Properties  
Note  
We support VACL blocking on the Supervisor Engine and ACL blocking on the MSFC.  
PIX Firewall with version 6.0 or later (shun command)  
501  
506E  
515E  
525  
535  
ASA with version 7.0 or later (shun command)  
ASA 5510  
ASA 5520  
ASA 5540  
FWSM 1.1 or later (shun command)  
You configure blocking using either ACLs, VACLS, or the shun command. All firewall and ASA models  
support the shun command.  
The following devices are supported for rate limiting by the ARC:  
Cisco series routers using Cisco IOS 12.3 or later:  
Cisco 1700 series router  
Cisco 2500 series router  
Cisco 2600 series router  
Cisco 2800 series router  
Cisco 3600 series router  
Cisco 3800 series router  
Cisco 7200 series router  
Cisco 7500 series router  
Caution  
The ARC cannot perform rate limits on 7500 routers with VIP. The ARC reports the error but cannot rate  
limit.  
Configuring Blocking Properties  
You can change the default blocking properties. It is best to use the default properties, but if you need to  
change them, use the following procedures:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking Properties  
Allowing the Sensor to Block Itself  
Caution  
We recommend that you do not permit the sensor to block itself, because it may stop communicating  
with the blocking device. You can configure this option if you can ensure that if the sensor creates a rule  
to block its own IP address, it will not prevent the sensor from accessing the blocking device.  
Use the allow-sensor-block {true | false} command in the service network access submode to configure  
the sensor to block itself. To allow the sensor to block itself, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
Step 3  
Step 4  
Step 5  
Enter general submode.  
sensor(config-net)# general  
Configure the sensor to block itself. By default, this value is false.  
sensor(config-net-gen)# allow-sensor-block true  
Verify the settings.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: true default: false  
block-enable: true default: true  
block-max-entries: 100 default: 250  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 192.0.2.1  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 209.165.200.224/27  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
--MORE--  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
Step 6  
Step 7  
Configure the sensor not to block itself.  
sensor(config-net-gen)# allow-sensor-block false  
Verify the setting.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false default: false  
block-enable: true default: true  
block-max-entries: 100 default: 250  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 192.0.2.1  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 209.165.200.224/27  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
--MORE--  
Step 8  
Step 9  
Exit network access submode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Disabling Blocking  
Note  
For blocking to operate, you must set up devices to do the blocking.  
Use the block-enable {true | false} command in the service network access submode to enable or disable  
blocking on the sensor. By default, blocking is enabled on the sensor. If the ARC is managing a device  
and you need to manually configure something on that device, you should disable blocking first. You  
want to avoid a situation in which both you and the ARC could be making a change at the same time on  
the same device. This could cause the device and/or the ARC to crash.  
Caution  
If you disable blocking for maintenance on the devices, make sure you enable it after the maintenance  
is complete or the network will be vulnerable to attacks that would otherwise be blocked  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
Note  
While blocking is disabled, the ARC continues to receive blocks and track the time on active blocks, but  
will not apply new blocks or remove blocks from the managed devices. After blocking is reenabled, the  
blocks on the devices are updated.  
To disable blocking or rate limiting, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Step 5  
Enter general submode.  
sensor(config-net)# general  
Disable blocking on the sensor. By default, this value is set to true.  
sensor(config-net-gen)# block-enable false  
Verify the settings.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false default: false  
block-enable: false default: true  
block-max-entries: 100 default: 250  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 192.0.2.1  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 209.165.200.224/27  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
--MORE--  
Step 6  
Step 7  
Enable blocking on the sensor.  
sensor(config-net-gen)# block-enable true  
Verify that the setting has been returned to the default.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false default: false  
block-enable: true default: true  
block-max-entries: 100 default: 250  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 192.0.2.1  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 209.165.200.224/27  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
--MORE--  
Step 8  
Step 9  
Exit network access submode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for configuring the sensor to manage Cisco routers, see Configuring the Sensor  
For the procedure for configuring the sensor to manage Cisco routers and switches, seeConfiguring  
Specifying Maximum Block Entries  
Caution  
We do not recommend setting the maximum block entries higher than 250. Some devices have problems  
with larger numbers of ACL or shun entries. Refer to the documentation for each device to determine its  
limits before increasing this number.  
Note  
The number of blocks will not exceed the maximum block entries. If the maximum is reached, new  
blocks will not occur until existing blocks time out and are removed.  
Use the block-max-entries command in the service network access submode to configure the maximum  
block entries. You can set how many blocks are to be maintained simultaneously (1 to 65535). The  
default value is 250. To change the maximum number of block entries, follow these steps:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Step 5  
Enter general submode.  
sensor(config-net)# general  
Change the maximum number of block entries.  
sensor(config-net-gen)# block-max-entries 100  
Verify the setting.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false default: false  
block-enable: true <defaulted>  
block-max-entries: 100 default: 250  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 192.0.2.1  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 209.165.200.224/27  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
--MORE--  
Step 6  
Step 7  
Return to the default value of 250 blocks.  
sensor(config-net-gen)# default block-max-entries  
Verify the setting.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false default: false  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 1)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
-----------------------------------------------  
ip-address: 192.0.2.1  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 209.165.200.224/27  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
--MORE--  
Step 8  
Step 9  
Exit network access submode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Specifying the Block Time  
Note  
If you change the default block time, you are changing a signature parameter, which affects all  
signatures.  
Note  
The time for manual blocks is set when you request the block.  
Use the global-block-timeout command in the service event action rules submode to change the amount  
of time an automatic block lasts. The default is 30 minutes. To change the default block time, follow  
these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter event action rules submode.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules0  
sensor(config-rul)#  
Step 3  
Step 4  
Step 5  
Enter general submode.  
sensor(config-rul)# general  
Specify the block time. The value is the time duration of the block event in minutes (0 to 10000000).  
sensor(config-rul-gen)# global-block-timeout 60  
Verify the setting.  
sensor(config-rul-gen)# show settings  
general  
-----------------------------------------------  
global-overrides-status: Enabled <defaulted>  
global-filters-status: Enabled <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
global-summarization-status: Enabled <defaulted>  
global-metaevent-status: Enabled <defaulted>  
global-deny-timeout: 3600 <defaulted>  
global-block-timeout: 60 default: 30  
max-denied-attackers: 10000 <defaulted>  
-----------------------------------------------  
sensor(config-rul-gen)#  
Step 6  
Step 7  
Exit event action rules submode.  
sensor(config-rul-gen)# exit  
sensor(config-rul)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Note  
There is a time delay while the signatures are updated.  
Enabling ACL Logging  
Use the enable-acl-logging {true | false} command in the service network access submode to enable  
ACL logging, which causes ARC to append the log parameter to block entries in the ACL or VACL. This  
causes the device to generate syslog events when packets are filtered. Enable ACL logging only applies  
to routers and switches. The default is disabled.  
To enable ACL logging, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode:  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Step 5  
Enter general submode.  
sensor(config-net)# general  
Enable ACL logging.  
sensor(config-net-gen)# enable-acl-logging true  
Verify that ACL logging is enabled.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: true default: false  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
Step 6  
Step 7  
Disable ACL logging by using the false keyword.  
sensor(config-net-gen)# enable-acl-logging false  
Verify that ACL logging is disabled.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false default: false  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
Step 8  
Step 9  
Exit network access mode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Enabling Writing to NVRAM  
Use the enable-nvram-write {true | false} command to configure the sensor to have the router write to  
NVRAM when ARC first connects. If enable-nvram-write is enabled, NVRAM is written each time the  
ACLs are updated. The default is disabled.  
Enabling NVRAM writing ensures that all changes for blocking are written to NVRAM. If the router is  
rebooted, the correct blocks will still be active. If NVRAM writing is disabled, a short time without  
blocking occurs after a router reboot. And not enabling NVRAM writing increases the life of the  
NVRAM and decreases the time for new blocks to be configured.  
To enable writing to NVRAM, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Step 5  
Enter general submode.  
sensor(config-net)# general  
Enable writing to NVRAM.  
sensor(config-net-gen)# enable-nvram-write true  
Verify that writing to NVRAM is enabled.  
sensor(config-net-gen)# show settings  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: true default: false  
enable-acl-logging: false default: false  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
Step 6  
Step 7  
Disable writing to NVRAM.  
sensor(config-net-gen)# enable-nvram-write false  
Verify that writing to NVRAM is disabled.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false default: false  
enable-acl-logging: false default: false  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
Step 8  
Step 9  
Exit network access submode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Logging All Blocking Events and Errors  
Use the log-all-block-events-and-errors {true | false} command in the service network access submode  
to configure the sensor to log events that follow blocks from start to finish. For example, when a block  
is added to or removed from a device, an event is logged. You may not want all these events and errors  
to be logged. Disabling log-all-block-events-and-errors suppresses the new events and errors. The  
default is enabled.  
To disable blocking event and error logging, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access mode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Enter general submode.  
sensor(config-net)# general  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
Step 4  
Step 5  
Disable blocking event and error logging.  
sensor(config-net-gen)# log-all-block-events-and-errors false  
Verify that logging is disabled.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: false default: true  
enable-nvram-write: false default: false  
enable-acl-logging: false default: false  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
Step 6  
Step 7  
Enable blocking event and error logging.  
sensor(config-net-gen)# log-all-block-events-and-errors true  
Verify that logging is enabled.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true default: true  
enable-nvram-write: false default: false  
enable-acl-logging: false default: false  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
Step 8  
Step 9  
Exit network access mode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or type no to discard them.  
Configuring the Maximum Number of Blocking Interfaces  
Use the max-interfaces command to configure the maximum number of interfaces for performing  
blocks. For example, a PIX Firewall counts as one interface. A router with one interface counts as one,  
but a router with two interfaces counts as two. At most you can configure 250 blocking interfaces on a  
router, switch, or firewall. You can configure up to 250 Catalyst 6K switches, 250 routers, and 250  
firewalls.  
The max-interfaces command configures the limit of the sum total of all interfaces and devices. In  
addition to configuring the limit on the sum total of interfaces and devices, there is a fixed limit on the  
number of blocking interfaces you can configure per device. Use the show settings command in network  
access mode to view the specific maximum limits per device.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
To configure the maximum number of blocking interfaces, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access mode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Step 5  
Enter general submode.  
sensor(config-net)# general  
Specify the maximum number of interfaces.  
sensor(config-net-gen)# max-interfaces 50  
Verify the number of maximum interfaces.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true default: true  
enable-nvram-write: false default: false  
enable-acl-logging: false default: false  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 50 default: 250  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
Step 6  
Step 7  
Return the setting to the default of 250.  
sensor(config-net-gen)# default max-interfaces  
Verify the default setting.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true default: true  
enable-nvram-write: false default: false  
enable-acl-logging: false default: false  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
----------------------------------------------  
Step 8  
Step 9  
Exit network access mode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Disabling Blocking  
Configuring Addresses Never to Block  
Use the never-block-hosts and the never-block-networks commands in the service network access  
submode to configure hosts and network that should never be blocked.  
The following options apply:  
ip_address—Specifies the IP address of the device that should never be blocked.  
ip_address/netmask—Specifies the IP address of the network that should never be blocked. The  
format is A.B.C.D/nn.  
You must tune your sensor to identify hosts and networks that should never be blocked, not even  
manually, because you may have a trusted network device whose normal, expected behavior appears to  
be an attack. Such a device should never be blocked, and trusted, internal networks should never be  
blocked. You can specify a single host or an entire network.  
Note  
The never-block-hosts and the never-block-networks commands apply only to the Request Block Host  
and Request Block Connection event actions. It does not apply to the Deny Attacker Inline, Deny  
Connection Inline, or Deny Packet Inline event actions. Use event action rules to filter out the hosts that  
you do not want blocked, denied, or dropped.  
Configuring Addresses Never to Be Blocked  
To set up addresses never to be blocked by blocking devices, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Enter general submode.  
sensor(config-net)# general  
Specify the address that should never be blocked:  
For a single host  
sensor(config-net-gen)# never-block-hosts 192.0.2.1  
For a network  
sensor(config-net-gen)# never-block-networks 209.165.200.224/27  
Step 5  
Verify the settings.  
sensor(config-net-gen)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false default: false  
block-enable: true default: true  
block-max-entries: 100 default: 250  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring User Profiles  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 2)  
-----------------------------------------------  
ip-address: 192.0.2.1  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 2)  
-----------------------------------------------  
ip-address: 209.165.200.224/27  
--MORE--  
Step 6  
Step 7  
Exit network access submode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for configuring event action filters, see Configuring Event Action Filters, page 8-21.  
Configuring User Profiles  
Note  
If the username or password is not needed to log in to the device, do not set a value for it.  
Note  
You MUST create a user profile before configuring the blocking device.  
Use the user-profiles profile_name command in the service network access submode to set up user  
profiles for the other devices that the senor will manage. The user profiles contain userid, password, and  
enable password information. For example, routers that all share the same passwords and usernames can  
be under one user profile. To set up user profiles, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access mode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Step 5  
Create the user profile name.  
sensor(config-net)# user-profiles PROFILE1  
Enter the username for that user profile.  
sensor(config-net-use)# username username  
Specify the password for the user.  
sensor(config-net-use)# password  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking and Rate Limiting Devices  
Enter password[]: ********  
Re-enter password ********  
Step 6  
Step 7  
Specify the enable password for the user.  
sensor(config-net-use)# enable-password  
Enter enable-password[]: ********  
Re-enter enable-password ********  
Verify the settings.  
sensor(config-net-use)# show settings  
profile-name: PROFILE1  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: jsmith default:  
-----------------------------------------------  
sensor(config-net-use)#  
Step 8  
Step 9  
Exit network access submode.  
sensor(config-net-use)# exit  
sensor(config-net)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
Configuring Blocking and Rate Limiting Devices  
This section describes how to configure devices that the sensor uses to perform blocking or rate limiting.  
It contains the following topics:  
How the Sensor Manages Devices  
Note  
ACLs do not apply to rate limiting devices.  
The ARC uses ACLs on Cisco routers and switches to manage those devices. These ACLs are built as  
follows:  
1. A permit line with the sensor IP address or, if specified, the NAT address of the sensor.  
Note  
If you permit the sensor to be blocked, this line does not appear in the ACL.  
2. Pre-Block ACL (if specified). This ACL must already exist on the device.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking and Rate Limiting Devices  
Note  
The ARC reads the lines in the ACL and copies these lines to the beginning of the ACL.  
3. Any active blocks.  
4. Either specify a Post-Block ACL, which must already exist on the device, or specify permit ip any  
any (do not use if a Post-Block ACL is specified). The ARC reads the lines in the ACL and copies  
these lines to the end of the ACL.  
Note  
Make sure the last line in the ACL is permit ip any any if you want all unmatched packets  
to be permitted.  
The ARC uses two ACLs to manage devices. Only one is active at any one time. It uses the offline ACL  
name to build the new ACL, then applies it to the interface. The ARC then reverses the process on the  
next cycle.  
Caution  
The ACLs that the ARC makes should never be modified by you or any other system. These ACLs are  
temporary and new ACLs are constantly being created by the sensor. The only modifications that you  
can make are to the Pre- and Post-Block ACLs.  
If you need to modify the Pre-Block or Post-Block ACL, do the following:  
1. Disable blocking on the sensor.  
2. Make the changes to the configuration of the device.  
3. Reenable blocking on the sensor.  
When blocking is reenabled, the sensor reads the new device configuration.  
Caution  
A single sensor can manage multiple devices, but you cannot use multiple sensors to control a single  
device. In this case, use a master blocking sensor.  
For More Information  
For the procedure for enabling blocking, see Configuring Blocking Properties, page 14-7.  
For the procedure for configuring the sensor to be a master blocking sensor, see Configuring the  
Configuring the Sensor to Manage Cisco Routers  
This section describes how to configure the sensor to manage Cisco routers. It contains the following  
topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking and Rate Limiting Devices  
Routers and ACLs  
Note  
Pre-Block and Post-Block ACLS do not apply to rate limiting.  
You create and save Pre-Block and Post-Block ACLs in your router configuration. These ACLs must be  
extended IP ACLs, either named or numbered. See your router documentation for more information on  
creating ACLs. Enter the names of these ACLs that are already configured on your router in the  
Pre-Block ACL and Post-Block ACL fields.  
The Pre-Block ACL is mainly used for permitting what you do not want the sensor to ever block. When  
a packet is checked against the ACL, the first line that gets matched determines the action. If the first  
line matched is a permit line from the Pre-Block ACL, the packet is permitted even though there may be  
a deny line (from an automatic block) listed later in the ACL. The Pre-Block ACL can override the deny  
lines resulting from the blocks.  
The Post-Block ACL is best used for additional blocking or permitting that you want to occur on the  
same interface or direction. If you have an existing ACL on the interface or direction that the sensor will  
manage, that existing ACL can be used as a Post-Block ACL. If you do not have a Post-Block ACL, the  
sensor inserts permit ip any any at the end of the new ACL.  
When the sensor starts up, it reads the contents of the two ACLs. It creates a third ACL with the  
following entries:  
A permit line for the sensor IP address  
Copies of all configuration lines of the Pre-Block ACL  
A deny line for each address being blocked by the sensor  
Copies of all configuration lines of the Post-Block ACL  
The sensor applies the new ACL to the interface and direction that you designate.  
Note  
When the new ACL is applied to an interface or direction of the router, it removes the application of any  
other ACL to that interface or direction.  
Configuring the Sensor to Manage Cisco Routers  
To configure a sensor to manage a Cisco router to perform blocking and rate limiting, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Specify the IP address for the router controlled by the ARC.  
sensor(config-net)# router-devices ip_address  
Enter the logical device name that you created when you configured the user profile. The ARC accepts  
anything you enter. It does not check to see if the user profile exists.  
sensor(config-net-rou)# profile-name user_profile_name  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking and Rate Limiting Devices  
Step 5  
Specify the method used to access the sensor. If unspecified, SSH 3DES is used.  
sensor(config-net-rou)# communication {telnet | ssh-3des}  
Note  
If you are using 3DES, you must use the command ssh host-key ip_address to accept the key or  
ARC cannot connect to the device.  
Step 6  
Specify the sensor NAT address.  
sensor(config-net-rou)# nat-address nat_address  
Note  
This changes the IP address in the first line of the ACL from the address of the sensor to the NAT  
address. This is not a NAT address configured on the device being managed. It is the address the  
sensor is translated to by an intermediate device, one that is between the sensor and the device  
being managed.  
Step 7  
Specify whether the router will perform blocking, rate limiting, or both.  
Note  
The default is blocking. You do not have to configure response capabilities if you want the router  
to perform blocking only.  
a. Rate limiting only  
sensor(config-net-rou)# response-capabilities rate-limit  
b. Both blocking and rate limiting  
sensor(config-net-rou)# response-capabilities block|rate-limit  
Step 8  
Specify the interface name and direction.  
sensor(config-net-rou)# block-interfaces interface_name {in | out}  
Caution  
Step 9  
The name of the interface must either be the complete name of the interface or an abbreviation that the  
router recognizes with the interface command.  
(Optional) Add the pre-ACL name (blocking only).  
sensor(config-net-rou-blo)# pre-acl-name pre_acl_name  
Step 10 (Optional) Add the post-ACL name (blocking only).  
sensor(config-net-rou-blo)# post-acl-name post_acl_name  
Step 11 Verify the settings.  
sensor(config-net-rou-blo)# exit  
sensor(config-net-rou)# show settings  
ip-address: 192.0.2.1  
-----------------------------------------------  
communication: ssh-3des default: ssh-3des  
nat-address: 19.89.149.219 default: 0.0.0.0  
profile-name: PROFILE1  
block-interfaces (min: 0, max: 100, current: 1)  
-----------------------------------------------  
interface-name: GigabitEthernet0/1  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking and Rate Limiting Devices  
direction: in  
-----------------------------------------------  
pre-acl-name: <defaulted>  
post-acl-name: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
response-capabilities: block|rate-limit default: block  
-----------------------------------------------  
sensor(config-net-rou)#  
Step 12 Exit network access submode.  
sensor(config-net-rou)# exit  
sensor(config-net)# exit  
sensor(config)# exit  
Apply Changes:?[yes]:  
Step 13 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for configuring user profiles, see Configuring User Profiles, page 14-20.  
For the procedure for adding a device to the known hosts list, see Adding Hosts to the SSH Known  
Configuring the Sensor to Manage Catalyst 6500 Series Switches and Cisco  
7600 Series Routers  
This section describes how to configure the sensor to manage Cisco switches. It contains the following  
topics:  
Switches and VACLs  
You can configure the ARC to block using VACLs on the switch itself when running Cisco Catalyst  
software, or to block using router ACLs on the MSFC or on the switch itself when running Cisco IOS  
software. This section describes blocking using VACLs. You cannot configure switches that use VACLs  
to perform rate limiting. You must configure the blocking interfaces on the Catalyst 6500 series switch  
and specify the VLAN of traffic you want blocked.  
You create and save Pre-Block and Post-Block VACLs in your switch configuration. These VACLs must  
be extended IP VACLs, either named or numbered. See your switch documentation for more information  
on creating VACLs. Enter the names of these VACLs that are already configured on your switch in the  
Pre-Block VACL and Post-Block VACL fields.  
The Pre-Block VACL is used mainly for permitting what you do not want the sensor to ever block. When  
a packet is checked against the VACL, the first line that gets matched determines the action. If the first  
line matched is a permit line from the Pre-Block VACL, the packet is permitted even though there may  
be a deny line (from an automatic block) listed later in the VACL. The Pre-Block VACL can override the  
deny lines resulting from the blocks.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking and Rate Limiting Devices  
The Post-Block VACL is best used for additional blocking or permitting that you want to occur on the  
same VLAN. If you have an existing VACL on the VLAN that the sensor will manage, the existing VACL  
can be used as a Post-Block VACL. If you do not have a Post-Block V ACL, the sensor inserts permit  
ip any any at the end of the new VACL.  
When the sensor starts up, it reads the contents of the two VACLs. It creates a third VACL with the  
following entries:  
A permit line for the sensor IP address  
Copies of all configuration lines of the Pre-Block VACL  
A deny line for each address being blocked by the sensor  
Copies of all configuration lines of the Post-Block VACL  
The sensor applies the new VACL to the VLAN that you designate.  
Note  
When the new VACL is applied to a VLAN of the switch, it removes the application of any other VACL  
to that VLAN.  
For More Information  
For the procedure for configuring blocking using router ACLs, see Configuring Blocking and Rate  
Configuring the Sensor to Manage Catalyst 6500 Series Switches and Cisco 7600 Series Routers  
To configure the sensor to manage Catalyst 6500 series switches and Cisco 7600 series routers, follow  
these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Specify the IP address for the router controlled by the ARC.  
sensor(config-net)# cat6k-devices ip_address  
Enter the user profile name that you created when you configured the user profile. The ARC accepts  
anything you type. It does not accept it, check to see if the logical device exists.  
sensor(config-net-cat)# profile-name user_profile_name  
Step 5  
Specify the method used to access the sensor. If unspecified, SSH 3DES is used.  
sensor(config-net-cat)# communication {telnet | ssh-3des}  
Note  
If you are using 3DES, you must use the command ssh host-key ip_address to accept the key or  
ARC cannot connect to the device.  
Step 6  
Specify the sensor NAT address.  
sensor(config-net-cat)# nat-address nat_address  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Blocking and Rate Limiting Devices  
Note  
This changes the IP address in the first line of the ACL from the IP address of the sensor to the  
NAT address. This is not a NAT address configured on the device being managed. It is the  
address the sensor is translated to by an intermediate device, one that is between the sensor and  
the device being managed.  
Step 7  
Step 8  
Step 9  
Specify the VLAN number.  
sensor(config-net-cat)# block-vlans vlan_number  
(Optional) Add the pre-VACL name.  
sensor(config-net-cat-blo)# pre-vacl-name pre_vacl_name  
(Optional) Add the post-VACL name.  
sensor(config-net-cat-blo)# post-vacl-name post_vacl_name  
Step 10 Exit network access submode.  
sensor(config-net-cat-blo)# exit  
sensor(config-net-cat)# exit  
sensor(config-net)# exit  
sensor(config)# exit  
Apply Changes:?[yes]:  
Step 11 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for configuring user profiles, see Configuring User Profiles, page 14-20.  
For the procedure for adding a device to the known hosts list, see Adding Hosts to the SSH Known  
Configuring the Sensor to Manage Cisco Firewalls  
To configure the sensor to manage Cisco firewalls, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)#  
Step 3  
Step 4  
Specify the IP address for the firewall controlled by the ARC.  
sensor(config-net)# firewall-devices ip_address  
Enter the user profile name that you created when you configured the user profile. ARC accepts anything  
you type. It does not check to see if the logical device exists.  
sensor(config-net-fir)# profile-name user_profile_name  
Step 5  
Specify the method used to access the sensor. If unspecified, SSH 3DES is used.  
sensor(config-net-fir)# communication {telnet | ssh-3des}  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring the Sensor to be a Master Blocking Sensor  
Note  
If you are using 3DES, you must use the command ssh host-key ip_address to accept the key or  
the ARC cannot connect to the device.  
Step 6  
Specify the sensor NAT address.  
sensor(config-net-fir)# nat-address nat_address  
Note  
This changes the IP address in the first line of the ACL from the IP address of the sensor to the  
NAT address. This is not a NAT address configured on the device being managed. It is the  
address the sensor is translated to by an intermediate device, one that is between the sensor and  
the device being managed.  
Step 7  
Step 8  
Exit network access submode.  
sensor(config-net-fir)# exit  
sensor(config-net)# exit  
sensor(config)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for configuring user profiles, see Configuring User Profiles, page 14-20.  
For the procedure for adding a device to the known hosts list, see Adding Hosts to the SSH Known  
Configuring the Sensor to be a Master Blocking Sensor  
Multiple sensors (blocking forwarding sensors) can forward blocking requests to a specified master  
blocking sensor, which controls one or more devices. The master blocking sensor is the ARC running on  
a sensor that controls blocking on one or more devices on behalf of one or more other sensors. The ARC  
on a master blocking sensor controls blocking on devices at the request of the ARCs running on other  
sensors. Master blocking sensors can also forward rate limits.  
Caution  
Two sensors cannot control blocking or rate limiting on the same device. If this situation is needed,  
configure one sensor as the master blocking sensor to manage the devices and the other sensors can  
forward their requests to the master blocking sensor.  
When you add a master blocking sensor, you reduce the number of blocking devices per sensor. For  
example, if you want to block on 10 firewalls and 10 routers with one blocking interface/direction each,  
you can assign 10 to the sensor and assign the other 10 to a master blocking sensor.  
On the blocking forwarding sensor, identify which remote host serves as the master blocking sensor; on  
the master blocking sensor you must add the blocking forwarding sensors to its access list.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring the Sensor to be a Master Blocking Sensor  
If the master blocking sensor requires TLS for web connections, you must configure the ARC of the  
blocking forwarding sensor to accept the X.509 certificate of the master blocking sensor remote host.  
Sensors by default have TLS enabled, but you can change this option.  
Note  
Typically the master blocking sensor is configured to manage the network devices. Blocking forwarding  
sensors are not normally configured to manage other network devices, although doing so is permissible.  
Even if you have no devices configured for blocking or rate limiting, a sensor that is configured for  
blocking or rate limiting can forward blocking and rate limiting requests to a master blocking sensor.  
When a signature fires that has blocking or rate limit requests configured as event actions, the sensor  
forwards the block or rate limit request to the master blocking sensor, which then performs the block or  
rate limit.  
Caution  
Only one sensor should control all blocking interfaces on a device.  
Use the master-blocking-sensors master_blocking_sensor_ip_address command in the service  
network access submode to configure a master blocking sensor.  
The following options apply:  
master_blocking_sensor_ip_address—Specifies the IP address of sensor for forward block requests.  
password—Specifies the account password of sensor for forward block requests.  
port—Specifies the port of sensor for forward block requests.  
tls {true | false} —Set to true if the remote sensor requires TLS; otherwise, set to false.  
username—Specifies the account name of sensor for forward block requests.  
Configuring the Master Blocking Sensor  
To configure ARC on a sensor to forward blocks to a master blocking sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges on both the master blocking sensor and  
the blocking forwarding sensor.  
Enter configuration mode on both sensors.  
sensor# configure terminal  
Step 3  
Configure TLS if necessary:  
a. On the master blocking sensor, check to see if it requires TLS and what port number is used. If  
enable-tlsis true, go to Step b.  
sensor(config)# service web-server  
sensor(config-web)# show settings  
enable-tls: true <defaulted>  
port: 443 <defaulted>  
server-id: HTTP/1.1 compliant <defaulted>  
sensor(config-web)#  
b. On the blocking forwarding sensor, configure it to accept the X.509 certificate of the master  
blocking sensor.  
sensor(config-web)# exit  
sensor(config)# tls trusted-host ip-address master_blocking_sensor_ip_address port  
port_number  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring the Sensor to be a Master Blocking Sensor  
Example  
sensor(config)# tls trusted-host ip-address 192.0.2.1 port 8080  
Certificate MD5 fingerprint is  
F4:4A:14:BA:84:F4:51:D0:A4:E2:15:38:7E:77:96:D8Certificate SHA1 fingerprint is  
84:09:B6:85:C5:43:60:5B:37:1E:6D:31:6A:30:5F:7E:4D:4D:E8:B2  
Would you like to add this to the trusted certificate table for this host?[yes]:  
Note  
You are prompted to accept the certificate based on the certificate fingerprint. Sensors  
provide only self-signed certificates (instead of certificates signed by a recognized  
certificate authority). You can verify the master blocking sensor host sensor certificate by  
logging in to the host sensor and typing the show tls fingerprint command to see that the  
fingerprints of the host certificate match.  
Step 4  
Step 5  
Enter yesto accept the certificate from the master blocking sensor.  
Enter network access mode.  
sensor(config)# service network-access  
Step 6  
Step 7  
Step 8  
Step 9  
Enter general submode.  
sensor(config-net)# general  
Add a master blocking sensor entry.  
sensor(config-net-gen)# master-blocking-sensors master_blocking_sensor_ip_address  
Specify the username for an administrative account on the master blocking sensor host.  
sensor(config-net-gen-mas)# username username  
Specify the password for the user.  
sensor(config-net-gen-mas)# password  
Enter password []: *****  
Re-enter mbs-password []: *****  
sensor(config-net-gen-mas)#  
Step 10 Specify the port number for the host HTTP communications. The default is 80/443 if not specified.  
sensor(config-net-gen-mas)# port port_number  
Step 11 Specify whether or not the host uses TLS/SSL.  
sensor(config-net-gen-mas)# tls {true | false}  
sensor(config-net-gen-mas)  
Note  
If you set the value to true, you need to use the command tls trusted-host ip-address  
master_blocking_sensor_ip_address.  
Step 12 Exit network access submode.  
sensor(config-net-gen-mas)# exit  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
sensor(config)# exit  
Apply Changes:?[yes]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Host Blocking  
Step 13 Press Enter to apply the changes or enter no to discard them.  
Step 14 On the master blocking sensor, add the block forwarding sensor IP address to the access list.  
For More Information  
For the procedure for adding the blocking forward sensor IP address to the access list, see Changing the  
Configuring Host Blocking  
Note  
Connection blocks and network blocks are not supported on adaptive security appliances. Adaptive  
security appliances only support host blocks with additional connection information.  
Use the block host ip-address [timeout minutes] command in privileged EXEC mode to block a host.  
Use the no form of the command to remove a block on a host. You must have blocking configured before  
you can set up host blocks. You can also view a list of hosts that are being blocked. If you do not  
configure the amount of time for the host block, it is permanent.  
The following options apply:  
ip-address—Specifies the IP address of the host to be blocked.  
minutes—(Optional) Specifies the duration of the host block in minutes. The valid range is 0 to  
70560 minutes.  
Blocking a Host  
To block a host, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Configure the host block for 15 minutes, for example. The host block ends in 15 minutes.  
sensor# block host 192.0.2.1 timeout 15  
Step 3  
Step 4  
Start a host block. The host block lasts until you remove it.  
sensor# block host 192.0.2.1  
End the host block.  
sensor# no block host 192.0.2.1  
sensor#  
Configuring Network Blocking  
Note  
Connection blocks and network blocks are not supported on adaptive security appliances. Adaptive  
security appliances only support host blocks with additional connection information.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Configuring Connection Blocking  
Use the block network ip-address/netmask [timeout minutes] command in privileged EXEC mode to  
block a network. Use the no form of the command to remove a block on a network. You must have  
blocking configured before you can set up network blocks. You can also view a list of networks that are  
being blocked. If you do not configure the amount of time for the network block, it is permanent.  
The following options apply:  
ip-address/netmask—Specifies the network subnet to be blocked in X.X.X.X/nn format, where  
X.X.X.X specifies the sensor IP address as a 32-bit address written as 4 octets separated by periods  
where X = 0-255, and nn specifies the number of bits (1032) in the netmask.  
minutes—(Optional) Specifies the duration of the network block in minutes. The valid range is 0 to  
70560 minutes.  
Blocking a Network  
To block a network, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Configure the network block for 15 minutes, for example. The network block ends in 15 minutes.  
sensor# block network 192.0.2.0/24 timeout 15  
Step 3  
Step 4  
Start a network block. The network block lasts until you remove it.  
sensor# block network 192.0.2.0/24  
End the network block.  
sensor# no block network 192.0.2.0/24  
sensor#  
Configuring Connection Blocking  
Note  
Connection blocks and network blocks are not supported on adaptive security appliances. Adaptive  
security appliances only support host blocks with additional connection information.  
Use the block connection source-ip-address destination-ip-address [port port-number] [protocol type]  
[timeout minutes] command in privileged EXEC mode to block a connection between two IP addresses.  
Use the no form of the command to remove the connection block. You must have blocking configured  
before you can set up connection blocks. You can also view a list of connections that are being blocked.  
If you do not configure the amount of time for the connection block, it is permanent.  
The following options apply:  
source-ip-address—Specifies the source IP address in a connection block.  
destination-ip-address—Specifies the destination IP address in a connection block.  
port-number—(Optional) Specifies the destination port number. The valid range is 0 to 65535.  
type—(Optional) Specifies the protocol type. The valid types are tcp or udp.  
minutes—(Optional) Specifies the duration of the connection block in minutes. The valid range is 0  
to 70560 minutes.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Obtaining a List of Blocked Hosts and Connections  
Blocking a Connection  
To block a connection, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator or operator privileges.  
Configure the connection block between a source IP address and a destination IP address specifying the  
port, protocol, and time, for example. The connection block ends in 30 minutes.  
sensor# block connection 10.0.0.0 172.16.0.0 port 80 protocol tcp timeout 30  
Step 3  
Step 4  
Start a connection block. The connection block lasts until you remove it.  
sensor# block connection 10.0.0.0 172.16.0.0  
End the connection block.  
sensor# no block connection 10.0.0.0  
sensor#  
Obtaining a List of Blocked Hosts and Connections  
Use the show statistics command to obtain a list of blocked hosts and blocked connections. To obtain a  
list of blocked hosts and connections, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Check the statistics for the ARC. The Hostentry indicates which hosts are being blocked and how long  
the blocks are.  
sensor# show statistics network-access  
Current Configuration  
LogAllBlockEventsAndSensors = true  
EnableNvramWrite = false  
EnableAclLogging = false  
AllowSensorBlock = false  
BlockMaxEntries = 250  
MaxDeviceInterfaces = 250  
NetDevice  
Type = Cisco  
IP = 10.1.1.1  
NATAddr = 0.0.0.0  
Communications = telnet  
BlockInterface  
InterfaceName = fa0/0  
InterfaceDirection = in  
State  
BlockEnable = true  
NetDevice  
IP = 10.1.1.1  
AclSupport = uses Named ACLs  
Version = 12.2  
State = Active  
BlockedAddr  
Host  
IP = 192.168.1.1  
Vlan =  
ActualIp =  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 14 Configuring Attack Response Controller for Blocking and Rate Limiting  
Obtaining a List of Blocked Hosts and Connections  
BlockMinutes = 80  
MinutesRemaining = 76  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
14-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
15  
Configuring SNMP  
This chapter describes how to configure SNMP, and contains the following sections:  
SNMP Notes and Caveats  
The following notes and caveats apply to SNMP:  
To have the sensor send SNMP traps, you must also select request-snmp-trap as the event action  
when you configure signatures.  
MIB II is available on the sensor, but we do not support it. We know that some elements are not  
correct (for example, the packet counts from the IF MIB on the sensing interfaces). While you can  
use elements from MIB II, we do not guarantee that they all provide correct information. We fully  
support the other listed MIBs and their output is correct.  
CISCO-PROCESS-MIB is available on the sensor, but we do not support it. We know that some  
elements are not available. While you can use elements from CISCO-PROCESS-MIB, we do not  
guarantee that they all provide correct information. We fully support the other listed MIBs and their  
output is correct.  
Understanding SNMP  
SNMP is an application layer protocol that facilitates the exchange of management information between  
network devices. SNMP enables network administrators to manage network performance, find and solve  
network problems, and plan for network growth.  
SNMP is a simple request/response protocol. The network-management system issues a request, and  
managed devices return responses. This behavior is implemented by using one of four protocol  
operations: Get, GetNext, Set, and Trap.  
You can configure the sensor for monitoring by SNMP. SNMP defines a standard way for network  
management stations to monitor the health and status of many types of devices, including switches,  
routers, and sensors.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
15-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 15 Configuring SNMP  
Configuring SNMP  
You can configure the sensor to send SNMP traps. SNMP traps enable an agent to notify the management  
station of significant events by way of an unsolicited SNMP message.  
Trap-directed notification has the following advantage—if a manager is responsible for a large number  
of devices, and each device has a large number of objects, it is impractical to poll or request information  
from every object on every device. The solution is for each agent on the managed device to notify the  
manager without solicitation. It does this by sending a message known as a trap of the event.  
After receiving the event, the manager displays it and can take an action based on the event. For instance,  
the manager can poll the agent directly, or poll other associated device agents to get a better  
understanding of the event.  
Note  
Trap-directed notification results in substantial savings of network and agent resources by eliminating  
frivolous SNMP requests. However, it is not possible to totally eliminate SNMP polling. SNMP requests  
are required for discovery and topology changes. In addition, a managed device agent cannot send a trap  
if the device has had a catastrophic outage.  
Configuring SNMP  
Caution  
To have the sensor send SNMP traps, you must also select request-snmp-trap as the event action when  
you configure signatures.  
Configure general SNMP parameters in the service notification submode.  
The following options apply:  
default—Sets the value back to the system default setting.  
enable-set-get {true | false}—Enables the gets and sets of object identifiers (OIDs).  
no—Removes an entry or selection setting.  
read-only-community—Specifies the read-only community name for the SNMP agent. The default  
is public.  
read-write-community—Specifies the read-write community name for the SNMP agent. The  
default is private.  
snmp-agent-port—Specifies the port the SNMP agent will listen on. The default SNMP port  
number is 161.  
snmp-agent-protocol—Specifies the protocol the SNMP agent will communicate with. The default  
protocol is UDP.  
system-contact—Specifies the contact information for this sensor. The system-contact option  
modifies the SNMPv2-MIB::sysContact.0 value.  
system-location—Specifies the location of the sensor. The system-location option modifies the  
SNMPv2-MIB::sysLocation.0 value.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
15-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 15 Configuring SNMP  
Configuring SNMP  
Configuring SNMP General Parameters  
To configure SNMP general parameters, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter notification submode.  
sensor# configure terminal  
sensor(config)# service notification  
sensor(config-not)#  
Step 3  
Step 4  
Enable SNMP so that the SNMP management workstation can issue requests to the sensor SNMP agent.  
sensor(config-not)# enable-set-get true  
Specify the SNMP agent parameters. These values configure the community name on the sensor SNMP  
agent. A community name is a plain-text password mechanism that is used to weakly authenticate SNMP  
queries.  
a. Assign the read-only community string. The read-only community name specifies the password for  
queries to the SNMP agent.  
sensor(config-not)# read-only-community PUBLIC1  
b. Assign the read-write community string. The read-write community name specifies the password for  
sets to the SNMP agent.  
sensor(config-not)# read-write-community PRIVATE1  
Note  
The management workstation sends SNMP requests to the sensor SNMP agent, which  
resides on the sensor. If the management workstation issues a request and the community  
string does not match what is on the senor, the sensor rejects it.  
c. Assign the sensor contact user ID.  
sensor(config-not)# system-contact BUSINESS  
d. Enter the location of the sensor.  
sensor(config-not)# system-location AUSTIN  
e. Enter the port of the sensor SNMP agent.  
sensor(config-not)# snmp-agent-port 161  
Note  
You must reboot the sensor if you change the port or protocol.  
f. Specify the protocol the sensor SNMP agent will use.  
sensor(config-not)# snmp-agent-protocol udp  
Note  
You must reboot the sensor if you change the port or protocol.  
Step 5  
Verify the settings.  
sensor(config-not)# show settings  
trap-destinations (min: 0, max: 10, current: 0)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
15-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 15 Configuring SNMP  
Configuring SNMP Traps  
-----------------------------------------------  
-----------------------------------------------  
error-filter: error|fatal <defaulted>  
enable-detail-traps: false <defaulted>  
enable-notifications: false <defaulted>  
enable-set-get: true default: false  
snmp-agent-port: 161 default: 161  
snmp-agent-protocol: udp default: udp  
read-only-community: PUBLIC1 default: public  
read-write-community: PRIVATE1 default: private  
trap-community-name: public <defaulted>  
system-location: AUSTIN default: Unknown  
system-contact: BUSINESS default: Unknown  
sensor(config-not)#  
Step 6  
Step 7  
Exit notification submode.  
sensor(config-not)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for assigning actions to signatures, see Assigning Actions to Signatures, page 7-15.  
Configuring SNMP Traps  
Caution  
To have the sensor send SNMP traps, you must also select request-snmp-trap as the event action when  
you configure signatures.  
Configure the SNMP traps in the service notification submode.  
The following options apply:  
enable-detail-traps {true | false}—Enables the sending of detailed traps with no size limit.  
Otherwise traps are sent in sparse mode (less than 484 bytes).  
enable-health-traps {true | false} —Enables the sending of both heartbeat and health metric  
change traps.  
Note  
To receive sensor health information through SNMP traps, you must have the sensor health  
metrics enabled. Use the heartbeat-events enable command in service health monitor  
submode to enable sensor health metrics.  
enable-notifications {true | false}—Enables event notifications.  
error-filter {warning | error | fatal}—Determines which errors generate an SNMP trap. An SNMP  
trap is generated for every evError event that matches the filter. The default is error and fatal.  
trap-community-name—Specifies the community name used when sending traps if no name is  
specified when defining the trap destinations.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
15-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 15 Configuring SNMP  
Configuring SNMP Traps  
trap-destinations—Defines the destinations to send error events and alert events generated from  
signature actions:  
trap-community-name—Specifies the community name used when sending the trap. If no  
community name is specified the general trap community name is used.  
trap-port—Specifies the port number to send the SNMP trap to.  
Configuring SNMP Traps  
To configure SNMP traps, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter notification submode.  
sensor# configure terminal  
sensor(config)# service notification  
sensor(config-not)#  
Step 3  
Step 4  
Enable SNMP traps.  
sensor(config-not)# enable-notifications true  
Specify the parameters for the SNMP trap:  
a. Specify the error events you want to be notified about through SNMP traps.  
sensor(config-not)# error-filter {error | warning | fatal}  
Note  
The error-filter [error | warning | fatal] command includes error, warning, and fatal traps.  
It filters in (not filters out) the traps based on severity.  
b. Specify whether you want detailed SNMP traps.  
sensor(config-not)# enable-detail-traps true  
c. Specify whether you want health traps (heartbeat and health metric change traps).  
sensor(config-not)# enable-health-traps true  
Note  
Make sure heartbeat and sensor health metrics are enabled.  
d. Enter the community string to be included in the detailed traps.  
sensor(config-not)# trap-community-name TRAP1  
Step 5  
Specify the parameters for the SNMP trap destinations so the sensor knows which management  
workstations to send them to:  
a. Enter the IP address of the SNMP management station.  
sensor(config-not)# trap-destinations 10.0.0.0  
b. Enter the UDP port of the SNMP management station. The default is 162  
sensor(config-not-tra)# trap-port 162  
c. Enter the trap community string.  
sensor(config-not-tra)# trap-community-name AUSTIN_PUBLI  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
15-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 15 Configuring SNMP  
Supported MIBS  
Note  
The community string appears in the trap and is useful if you are receiving multiple types of  
traps from multiple agents. For example, a router or sensor could be sending the traps, and  
if you put something that identifies the router or sensor specifically in your community  
string, you can filter the traps based on the community string.  
Step 6  
Verify the settings.  
sensor(config-not-tra)# exit  
sensor(config-not)# show settings  
trap-destinations (min: 0, max: 10, current: 1)  
-----------------------------------------------  
ip-address: 10.1.1.1  
-----------------------------------------------  
trap-community-name: AUSTIN_PUBLIC default:  
trap-port: 161 default: 162  
-----------------------------------------------  
-----------------------------------------------  
error-filter: warning|error|fatal default: error|fatal  
enable-detail-traps: true default: false  
enable-health-traps: true default: false  
enable-notifications: true default: false  
enable-set-get: true default: false  
snmp-agent-port: 161 default: 161  
snmp-agent-protocol: udp default: udp  
read-only-community: PUBLIC1 default: public  
read-write-community: PRIVATE1 default: private  
trap-community-name: PUBLIC1 default: public  
system-location: AUSTIN default: Unknown  
system-contact: BUSINESS default: Unknown  
sensor(config-not)#  
Step 7  
Step 8  
Exit notification submode.  
sensor(config-not)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for assigning actions to signatures, see Assigning Actions to Signatures, page 7-15.  
Supported MIBS  
The following private MIBs are supported on the sensor:  
CISCO-CIDS-MIB  
The CISCO-CIDS-MIB has been updated to include SNMP health data.  
CISCO-ENHANCED-MEMPOOL-MIB  
CISCO-ENTITY-ALARM-MIB  
You can obtain these private Cisco MIBs under the heading SNMP v2 MIBs at this URL:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
15-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 15 Configuring SNMP  
Supported MIBS  
Note  
Note  
MIB II is available on the sensor, but we do not support it. We know that some elements are not correct  
(for example, the packet counts from the IF MIB on the sensing interfaces). While you can use elements  
from MIB II, we do not guarantee that they all provide correct information. We fully support the other  
listed MIBs and their output is correct.  
CISCO-PROCESS-MIB is available on the sensor, but we do not support it. We know that some elements  
are not available. While you can use elements from CISCO-PROCESS-MIB, we do not guarantee that  
they all provide correct information. We fully support the other listed MIBs and their output is correct.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
15-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 15 Configuring SNMP  
Supported MIBS  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
15-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
FIRST REVIEW—CISCO CONFIDENTIAL  
C H A P T E R  
16  
Working With Configuration Files  
This chapter describes how to use commands that show, copy, and erase the configuration file. It contains  
the following sections:  
Displaying the Current Configuration  
Note  
The CLI output is an example of what your configuration may look like. It will not match exactly due to  
the optional setup choices, sensor model, and IPS version you have installed.  
Use the show configuration or the more current-config command to display the contents of the current  
configuration.  
To display the contents of the current configuration, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the current configuration.  
sensor# show configuration  
! ------------------------------  
! Current configuration last modified Fri Apr 19 19:01:05 2013  
! ------------------------------  
! Version 7.2(1)  
! Host:  
!
Realm Keys  
! Signature Definition:  
Signature Update  
key1.0  
!
S697.0  
2013-02-15  
! ------------------------------  
service interface  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 16 Working With Configuration Files  
Displaying the Current Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
physical-interfaces GigabitEthernet0/0  
admin-state enabled  
exit  
physical-interfaces GigabitEthernet0/1  
admin-state enabled  
exit  
inline-interfaces pair0  
interface1 GigabitEthernet0/0  
interface2 GigabitEthernet0/1  
exit  
bypass-mode auto  
exit  
! ------------------------------  
service authentication  
exit  
! ------------------------------  
service event-action-rules rules0  
exit  
! ------------------------------  
service host  
network-settings  
host-ip 10.106.133.159/23,10.106.132.1  
host-name q4360-159  
telnet-option enabled  
access-list 0.0.0.0/0  
dns-primary-server disabled  
dns-secondary-server disabled  
dns-tertiary-server disabled  
exit  
exit  
! ------------------------------  
service logger  
exit  
! ------------------------------  
service network-access  
exit  
! ------------------------------  
service notification  
exit  
! ------------------------------  
service signature-definition sig0  
exit  
! ------------------------------  
service ssh-known-hosts  
exit  
! ------------------------------  
service trusted-certificates  
exit  
! ------------------------------  
service web-server  
websession-inactivity-timeout 3600  
exit  
! ------------------------------  
service anomaly-detection ad0  
exit  
! ------------------------------  
service external-product-interface  
exit  
! ------------------------------  
service health-monitor  
exit  
! ------------------------------  
service global-correlation  
exit  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
! ------------------------------  
service aaa  
exit  
! ------------------------------  
service analysis-engine  
virtual-sensor vs0  
logical-interface pair0  
exit  
exit  
sensor#  
Displaying the Current Submode Configuration  
Use the show settings command in a submode to display the current configuration of that submode.  
To display the current configuration of a submode, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the current configuration of the service analysis engine submode.  
sensor# configure terminal  
sensor(config)# service analysis-engine  
sensor(config-ana)# show settings  
global-parameters  
-----------------------------------------------  
ip-logging  
-----------------------------------------------  
max-open-iplog-files: 20 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
virtual-sensor (min: 1, max: 255, current: 1)  
-----------------------------------------------  
<protected entry>  
name: vs0 <defaulted>  
-----------------------------------------------  
description: default virtual sensor <defaulted>  
signature-definition: sig0 <protected>  
event-action-rules: rules0 <protected>  
physical-interface (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
logical-interface (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ana)# exit  
sensor(config)# exit  
sensor#  
Step 3  
Display the current configuration of the service anomaly detection submode.  
sensor(config)# service anomaly-detection ad0  
sensor(config-ano)# show settings  
worm-timeout: 600 seconds <defaulted>  
learning-accept-mode  
-----------------------------------------------  
auto  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
action: rotate <defaulted>  
schedule  
-----------------------------------------------  
periodic-schedule  
-----------------------------------------------  
start-time: 10:00:00 <defaulted>  
interval: 24 hours <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
internal-zone  
-----------------------------------------------  
enabled: true <defaulted>  
ip-address-range: 0.0.0.0 <defaulted>  
tcp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
udp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
other  
-----------------------------------------------  
protocol-number (min: 0, max: 255, current: 0)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
illegal-zone  
-----------------------------------------------  
enabled: true <defaulted>  
ip-address-range: 0.0.0.0 <defaulted>  
tcp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
udp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
other  
-----------------------------------------------  
protocol-number (min: 0, max: 255, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
external-zone  
-----------------------------------------------  
enabled: true <defaulted>  
tcp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
udp  
-----------------------------------------------  
dst-port (min: 0, max: 65535, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
other  
-----------------------------------------------  
protocol-number (min: 0, max: 255, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
default-thresholds  
-----------------------------------------------  
scanner-threshold: 100 <defaulted>  
threshold-histogram (min: 0, max: 3, current: 3)  
-----------------------------------------------  
<protected entry>  
dest-ip-bin: low <defaulted>  
num-source-ips: 10 <defaulted>  
<protected entry>  
dest-ip-bin: medium <defaulted>  
num-source-ips: 1 <defaulted>  
<protected entry>  
dest-ip-bin: high <defaulted>  
num-source-ips: 1 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
enabled: true <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
ignore  
-----------------------------------------------  
enabled: true <defaulted>  
source-ip-address-range: 0.0.0.0 <defaulted>  
dest-ip-address-range: 0.0.0.0 <defaulted>  
-----------------------------------------------  
sensor(config-ano)# exit  
sensor(config)# exit  
sensor# exit  
Step 4  
Display the current configuration of the service authentication submode.  
sensor# configure terminal  
sensor(config)# service authentication  
sensor(config-aut)# show settings  
attemptLimit: 0 <defaulted>  
sensor(config-aut)# exit  
sensor(config)# exit  
sensor#  
Step 5  
Display the current configuration of the service event action rules submode.  
sensor# configure terminal  
sensor(config)# service event-action-rules rules0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
sensor(config-rul)# show settings  
variables (min: 0, max: 256, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
overrides (min: 0, max: 12, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
filters (min: 0, max: 4096, current: 0 - 0 active, 0 inactive)  
-----------------------------------------------  
general  
-----------------------------------------------  
global-overrides-status: Enabled <defaulted>  
global-filters-status: Enabled <defaulted>  
global-summarization-status: Enabled <defaulted>  
global-metaevent-status: Enabled <defaulted>  
global-deny-timeout: 3600 <defaulted>  
global-block-timeout: 30 <defaulted>  
max-denied-attackers: 10000 <defaulted>  
-----------------------------------------------  
target-value (min: 0, max: 5, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-rul)# exit  
sensor(config)# exit  
sensor# exit  
Step 6  
Display the current configuration of the external product interface submode.  
sensor(config)# service external-product-interface  
sensor(config-ext)# show settings  
cisco-security-agents-mc-settings (min: 0, max: 2, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ext)# exit  
sensor(config)# exit  
sensor#  
Step 7  
Display the current configuration of the service global-correlation submode.  
sensor# configure terminal  
sensor(config)# service global-correlation  
sensor(config-glo)# show settings  
network-participation: off <defaulted>  
global-correlation-inspection: on <defaulted>  
global-correlation-inspection-influence: standard <defaulted>  
reputation-filtering: on <defaulted>  
test-global-correlation: off <defaulted>  
sensor(config-glo)# exit  
sensor(config)# exit  
sensor# exit  
Step 8  
Display the current configuration of the service health-monitor submode.  
sensor# configure terminal  
sensor(config)# service health-monitor  
sensor(config-hea)# show settings  
enable-monitoring: true <defaulted>  
persist-security-status: 5 minutes <defaulted>  
heartbeat-events  
-----------------------------------------------  
enable: 300 seconds <defaulted>  
-----------------------------------------------  
application-failure-policy  
-----------------------------------------------  
enable: true <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
status: red <defaulted>  
-----------------------------------------------  
bypass-policy  
-----------------------------------------------  
enable: true <defaulted>  
status: red <defaulted>  
-----------------------------------------------  
interface-down-policy  
-----------------------------------------------  
enable: true <defaulted>  
status: red <defaulted>  
-----------------------------------------------  
inspection-load-policy  
-----------------------------------------------  
enable: true <defaulted>  
yellow-threshold: 80 percent <defaulted>  
red-threshold: 91 percent <defaulted>  
-----------------------------------------------  
missed-packet-policy  
-----------------------------------------------  
enable: true <defaulted>  
yellow-threshold: 1 percent <defaulted>  
red-threshold: 6 percent <defaulted>  
-----------------------------------------------  
memory-usage-policy  
-----------------------------------------------  
enable: false <defaulted>  
yellow-threshold: 80 percent <defaulted>  
red-threshold: 91 percent <defaulted>  
-----------------------------------------------  
signature-update-policy  
-----------------------------------------------  
enable: true <defaulted>  
yellow-threshold: 30 days <defaulted>  
red-threshold: 60 days <defaulted>  
-----------------------------------------------  
license-expiration-policy  
-----------------------------------------------  
enable: true <defaulted>  
yellow-threshold: 30 days <defaulted>  
red-threshold: 0 days <defaulted>  
-----------------------------------------------  
event-retrieval-policy  
-----------------------------------------------  
enable: true <defaulted>  
yellow-threshold: 300 seconds <defaulted>  
red-threshold: 600 seconds <defaulted>  
-----------------------------------------------  
global-correlation-policy  
-----------------------------------------------  
enable: true <defaulted>  
yellow-threshold: 86400 seconds <protected>  
red-threshold: 259200 seconds <protected>  
-----------------------------------------------  
network-participation-policy  
-----------------------------------------------  
enable: false <defaulted>  
yellow-threshold: 1 connection failures <protected>  
red-threshold: 6 connection failures <protected>  
-----------------------------------------------  
sensor(config-hea)# exit  
sensor(config)# exit  
sensor# exit  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
Step 9  
Display the current configuration of the service host submode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.0.2.0/24,192.0.2.17 default: 192.168.1.2/24,192.168.1.1  
host-name: sensor default: sensor  
telnet-option: enabled default: disabled  
access-list (min: 0, max: 512, current: 2)  
-----------------------------------------------  
network-address: 10.0.0.0/8  
-----------------------------------------------  
network-address: 64.0.0.0/8  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
time-zone-settings  
-----------------------------------------------  
offset: 0 minutes default: 0  
standard-time-zone-name: UTC default: UTC  
-----------------------------------------------  
ntp-option  
-----------------------------------------------  
disabled  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
summertime-option  
-----------------------------------------------  
disabled  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
auto-upgrade-option  
-----------------------------------------------  
disabled  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
crypto  
-----------------------------------------------  
key (min: 0, max: 10, current: 2)  
-----------------------------------------------  
<protected entry>  
name: realm-cisco.pub <defaulted>  
type  
-----------------------------------------------  
rsa-pubkey  
-----------------------------------------------  
length: 2048 <defaulted>  
exponent: 65537 <defaulted>  
modulus: 24442189989357747083874855335232628843599968934198559648  
63019947387841151932503911172668940194754549155390407658020393330611891292508300  
85940304031186014499632568812428068058089581614196337399623060624990057049103055  
90153955935086060008679776808073640186063435723252375575293126304558068704301863  
80562114437439289069456670922074995827390284761610591515752008405140243673083189  
77822469964934598367010389389888297490802884118543730076293589703535912161993319  
47093130298688830012547215572646349623539468838641064915313947806852904082351955  
13217273138099965383039716130153270715220046567107828128924197692417332033911704  
3 <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: realm-trend.pub <defaulted>  
type  
-----------------------------------------------  
rsa-pubkey  
-----------------------------------------------  
length: 2048 <defaulted>  
exponent: 65537 <defaulted>  
modulus: 21765561422573021314159855351418723031625093380777053696  
63817289527060570932551065489818190713745672148260527030060667208366606603802679  
30439066724143390626495479300550101618179584637287052936465692146572612651375969  
20354521585644221602944203520804404212975401970895119903756769601133853673296766  
45289795777973491984056587045214514820063366950731346400044308491594626434706999  
47608668822814014830063399534204647069509052443439525363706527255224510771122235  
80181150460544783251498481432705991010069844368525754878413669427639752950801767  
99905309235232456295580086724203297914095984224328444391582223138423799100838191  
9 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-hos)# exit  
sensor(config)# exit  
sensor#  
Step 10 Display the current configuration of the service interface submode.  
sensor# configure terminal  
sensor(config)# service interface  
sensor(config-int)# show settings  
physical-interfaces (min: 0, max: 999999999, current: 4)  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/0 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet0/1 <defaulted>  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: disabled <protected>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet2/0 <defaulted>  
-----------------------------------------------  
media-type: xl <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
<protected entry>  
name: GigabitEthernet2/1 <defaulted>  
-----------------------------------------------  
media-type: xl <protected>  
description: <defaulted>  
admin-state: disabled <defaulted>  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
subinterface-type  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
command-control: GigabitEthernet0/1 <protected>  
inline-interfaces (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
bypass-mode: auto <defaulted>  
interface-notifications  
-----------------------------------------------  
missed-percentage-threshold: 0 percent <defaulted>  
notification-interval: 30 seconds <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
idle-interface-delay: 30 seconds <defaulted>  
-----------------------------------------------  
sensor(config-int)# exit  
sensor(config)# exit  
sensor#  
Step 11 Display the current configuration for the service logger submode.  
sensor# configure terminal  
sensor(config)# service logger  
sensor(config-log)# show settings  
master-control  
-----------------------------------------------  
enable-debug: false <defaulted>  
individual-zone-control: false <defaulted>  
-----------------------------------------------  
zone-control (min: 0, max: 999999999, current: 14)  
-----------------------------------------------  
<protected entry>  
zone-name: Cid  
severity: debug <defaulted>  
<protected entry>  
zone-name: AuthenticationApp  
severity: warning <defaulted>  
<protected entry>  
zone-name: Cli  
severity: warning <defaulted>  
<protected entry>  
zone-name: csi  
severity: warning <defaulted>  
<protected entry>  
zone-name: ctlTransSource  
severity: warning <defaulted>  
<protected entry>  
zone-name: IdapiCtlTrans  
severity: warning <defaulted>  
<protected entry>  
zone-name: IdsEventStore  
severity: warning <defaulted>  
<protected entry>  
zone-name: MpInstaller  
severity: warning <defaulted>  
<protected entry>  
zone-name: nac  
severity: warning <defaulted>  
<protected entry>  
zone-name: sensorApp  
severity: warning <defaulted>  
<protected entry>  
zone-name: tls  
severity: warning <defaulted>  
<protected entry>  
zone-name: intfc  
severity: warning <defaulted>  
<protected entry>  
zone-name: cmgr  
severity: warning <defaulted>  
<protected entry>  
zone-name: cplane  
severity: warning <defaulted>  
-----------------------------------------------  
sensor(config-log)# exit  
sensor(config)# exit  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
Step 12 Display the current configuration for the service network access submode.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
rate-limit-max-entries: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
block-networks (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
user-profiles (min: 0, max: 250, current: 1)  
-----------------------------------------------  
profile-name: test  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
cat6k-devices (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
router-devices (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
firewall-devices (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-net)# exit  
sensor(config)# exit  
sensor#  
Step 13 Display the current configuration for the notification submode.  
sensor# configure terminal  
sensor(config)# service notification  
sensor(config-not)# show settings  
trap-destinations (min: 0, max: 10, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
error-filter: error|fatal <defaulted>  
enable-detail-traps: false <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Displaying the Current Submode Configuration  
FIRST REVIEW—CISCO CONFIDENTIAL  
enable-notifications: false <defaulted>  
enable-set-get: false <defaulted>  
snmp-agent-port: 161 <defaulted>  
snmp-agent-protocol: udp <defaulted>  
read-only-community: public <defaulted>  
read-write-community: private <defaulted>  
trap-community-name: public <defaulted>  
system-location: Unknown <defaulted>  
system-contact: Unknown <defaulted>  
sensor(config-not)# exit  
sensor(config)# exit  
sensor#  
Step 14 Display the current configuration for the signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
sensor(config-sig)# show settings  
variables (min: 0, max: 256, current: 1)  
-----------------------------------------------  
<protected entry>  
variable-name: WEBPORTS  
-----------------------------------------------  
web-ports: 80-80,3128-3128,8000-8000,8010-8010,8080-8080,8888-8888,2432  
6-24326 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
application-policy  
-----------------------------------------------  
http-policy  
-----------------------------------------------  
http-enable: false <defaulted>  
max-outstanding-http-requests-per-connection: 10 <defaulted>  
aic-web-ports: 80-80,3128-3128,8000-8000,8010-8010,8080-8080,8888-8888,  
24326-24326 <defaulted>  
-----------------------------------------------  
ftp-enable: false <defaulted>  
-----------------------------------------------  
fragment-reassembly  
-----------------------------------------------  
ip-reassemble-mode: nt <defaulted>  
-----------------------------------------------  
stream-reassembly  
-----------------------------------------------  
--MORE--  
Step 15 Display the current configuration for the SSH known hosts submode.  
sensor# configure terminal  
sensor(config)# service ssh-known-hosts  
sensor(config-ssh)# show settings  
rsa1-keys (min: 0, max: 500, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ssh)# exit  
sensor(config)# exit  
sensor#  
Step 16 Display the current configuration for the trusted certificates submode.  
sensor# configure terminal  
sensor(config)# service trusted-certificate  
sensor(config-tru)# show settings  
trusted-certificates (min: 0, max: 500, current: 1)  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Filtering the Current Configuration Output  
FIRST REVIEW—CISCO CONFIDENTIAL  
common-name: 10.89.130.108  
certificate: MIICJDCCAY0CCPbSkgXUchJIMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTA  
lVTMRwwGgYDVQQKExNDaXNjbyBTeXN0ZW1zLCBJbmMuMRIwEAYDVQQLEwlTU00tSVBTMjAxFjAUBgNVB  
AMTDTEwLjg5LjEzMC4xMDgwHhcNMDMwMTAzMDE1MjEwWhcNMDUwMTAzMDE1MjEwWjBXMQswCQYDVQQGE  
wJVUzEcMBoGA1UEChMTQ2lzY28gU3lzdGVtcywgSW5jLjESMBAGA1UECxMJU1NNLUlQUzIwMRYwFAYDV  
QQDEw0xMC44OS4xMzAuMTA4MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCzldqLFG4MT4bfgh3mJ  
fP/DCilnnaLfzHK9FdnhmWI4FY+9MVvAI7MOhAcuV6HYfyp6n6cYvH+Eswzl9uv7H5nouID9St9GI3Yr  
SUtlIQAJ4QVL2DwWP230x6KdHrYqcj+Nmhc7AnnPypjidwGSfF+VetIJLEeRFh/mI2JcmwF2QIDAQABM  
A0GCSqGSIb3DQEBBQUAA4GBAAUI2PLANTOehxvCfwd6UAFXvy8uifbjqKMC1jrrF+f9KGkxmR+XZvUaG  
OS83FYDXlXJvB5Xyxms+Y01wGjzKKpxegBoan8OB8o193Ueszdpvz2xYmiEgywCDyVJRsw3hAFMXWMS5  
XsBUiHtw0btHH0j7ElFZxUjZv12fGz8hlnY  
-----------------------------------------------  
sensor(config-tru)# exit  
sensor(config)# exit  
sensor#  
Step 17 Display the current configuration for the web server submode.  
sensor# configure terminal  
sensor(config)# service web-server  
sensor(config-web)# show settings  
enable-tls: true <defaulted>  
port: 443 <defaulted>  
server-id: HTTP/1.1 compliant <defaulted>  
sensor(config-web)# exit  
sensor(config)# exit  
sensor#  
Filtering the Current Configuration Output  
Use the more keyword | [begin | exclude | include] regular-expression command to search the output of  
the more command.  
The following options apply:  
keyword—Specifies either the current-config or the backup-config:  
current-config—Specifies the current running configuration. This configuration becomes  
persistent as the commands are entered.  
backup-config—Specifies the storage location for the configuration backup file.  
|—The pipe symbol indicates that an output processing specification follows.  
begin—Begins unfiltered output of the more command with the first line that contains the regular  
expression specified.  
exclude—Excludes lines in the output of the more command that contain a particular regular  
expression.  
include—Includes only the lines in the output of the more command that contain the regular  
expression you specify.  
regular-expression—Specifies any regular expression found in the more command output.  
Note  
The regular-expression option is case sensitive and allows for complex matching  
requirements.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 16 Working With Configuration Files  
Filtering the Current Configuration Output  
FIRST REVIEW—CISCO CONFIDENTIAL  
Filtering Using the More Command  
To filter the more command, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Filter the current-config output beginning with the regular expression “ip,” for example.  
sensor# more current-config | begin ip  
generating current config:  
host-ip 192.0.2.0/24,192.0.2.17  
host-name sensor  
telnet-option enabled  
access-list 10.0.0.0/8  
access-list 64.0.0.0/8  
exit  
time-zone-settings  
offset 0  
standard-time-zone-name UTC  
exit  
exit  
! ------------------------------  
service interface  
exit  
! ------------------------------  
service logger  
master-control  
enable-debug true  
exit  
exit  
! ------------------------------  
service network-access  
general  
log-all-block-events-and-errors true  
--MORE--  
Note  
Press Ctrl-C to stop the output and return to the CLI prompt.  
Step 3  
Exclude the regular expression “ip” from the current-config output.  
sensor# more current-config | exclude ip  
generating current config:  
! ------------------------------  
! Version 7.0(1)  
! Current configuration last modified Fri Feb 11 15:10:57 2009  
! ------------------------------  
service analysis-engine  
virtual-sensor vs0  
physical-interface FastEthernet0/1  
exit  
exit  
! ------------------------------  
service authentication  
exit  
! ------------------------------  
service event-action-rules rules0  
exit  
! ------------------------------  
service host  
network-settings  
host-name sensor  
telnet-option enabled  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 16 Working With Configuration Files  
Filtering the Current Submode Configuration Output  
FIRST REVIEW—CISCO CONFIDENTIAL  
access-list 10.0.0.0/8  
access-list 64.0.0.0/8  
exit  
time-zone-settings  
--MORE--  
Note  
Press Ctrl-C to stop the output and return to the CLI prompt.  
Step 4  
Include the regular expression “ip” in the current-config output.  
sensor# more current-config | include ip  
generating current config:  
host-ip 192.0.2.0/24,192.0.2.17  
engine atomic-ip  
Filtering the Current Submode Configuration Output  
Use the show settings | [begin | exclude | include] regular_expression command in the submode you  
are interested in to search or filter the output of the contents of the submode configuration.  
The following options apply:  
|—The pipe symbol indicates that an output processing specification follows.  
begin—Begins unfiltered output of the show settings command with the first line that contains the  
regular expression specified.  
exclude—Excludes lines in the output of the show settings command that contain a particular  
regular expression.  
include—Includes only the lines in the output of the show settings command that contain the  
regular expression you specify.  
regular_expression—Specifies any regular expression found in the show settings command output.  
Note  
The regular_expression option is case sensitive and allows for complex matching  
requirements.  
Filtering the Submode Output  
To search or filter the output of the contents of the submode configuration, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Search the output of the event action rules settings for the regular expression, “filters,” for example.  
sensor# configure terminal  
sensor(config)# service event-action-rules  
sensor(config-rul)# show settings | begin filters  
filters (min: 0, max: 4096, current: 0 - 0 active, 0 inactive)  
-----------------------------------------------  
general  
-----------------------------------------------  
global-overrides-status: Enabled <defaulted>  
global-filters-status: Enabled <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 16 Working With Configuration Files  
Displaying the Contents of a Logical File  
FIRST REVIEW—CISCO CONFIDENTIAL  
global-summarization-status: Enabled <defaulted>  
global-metaevent-status: Enabled <defaulted>  
global-deny-timeout: 3600 <defaulted>  
global-block-timeout: 15 default: 30  
max-denied-attackers: 10000 <defaulted>  
-----------------------------------------------  
target-value (min: 0, max: 5, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-rul)#  
Step 3  
Filter the output of the network access settings to exclude the regular expression.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)# show settings | exclude false  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true default: true  
block-enable: true default: true  
block-max-entries: 11 default: 250  
max-interfaces: 13 default: 250  
master-blocking-sensors (min: 0, max: 100, current: 1)  
-----------------------------------------------  
ipaddress: 192.0.2.0  
-----------------------------------------------  
password: <hidden>  
port: 443 default: 443  
tls: true default: true  
username: cisco default:  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 10.89.146.112  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 88.88.88.0/24  
--MORE--  
Step 4  
Filter the output of the host settings to include the regular expression “ip.”  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# show settings | include ip  
host-ip: 192.0.2.0/24,192.0.2.17 default: 192.168.1.2/24,192.168.1.1  
sensor(config-hos)#  
Displaying the Contents of a Logical File  
Note  
Operators and viewers can only display the current configuration. Only administrators can view hidden  
fields such as passwords.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 16 Working With Configuration Files  
Displaying the Contents of a Logical File  
FIRST REVIEW—CISCO CONFIDENTIAL  
Use the more keyword command to display the contents of a logical file, such as the current system  
configuration or the saved backup system configuration.  
The following options apply:  
keyword—Specifies either the current-config or the backup-config:  
current-config—Specifies the current running configuration. This configuration becomes  
persistent as the commands are entered.  
backup-config—Specifies the storage location for the configuration backup file.  
You can disable the more prompt in more current-config or more backup-config by setting the terminal  
length to zero using the terminal length 0 command. The more command then displays the entire file  
content without pausing.  
Displaying the Logical File Contents  
To display the contents of a logical file, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Display the contents of the current configuration file.  
sensor# more current-config  
Generating current config:  
The current configuration is displayed.  
! ------------------------------  
! Current configuration last modified Fri Apr 19 19:01:05 2013  
! ------------------------------  
! Version 7.2(1)  
! Host:  
!
Realm Keys  
! Signature Definition:  
Signature Update  
key1.0  
S697.0  
!
2013-02-15  
! ------------------------------  
service interface  
physical-interfaces GigabitEthernet0/0  
admin-state enabled  
exit  
physical-interfaces GigabitEthernet0/1  
admin-state enabled  
exit  
inline-interfaces pair0  
interface1 GigabitEthernet0/0  
interface2 GigabitEthernet0/1  
exit  
bypass-mode auto  
exit  
! ------------------------------  
service authentication  
exit  
! ------------------------------  
service event-action-rules rules0  
exit  
! ------------------------------  
service host  
network-settings  
host-ip 10.106.133.159/23,10.106.132.1  
host-name q4360-159  
telnet-option enabled  
access-list 0.0.0.0/0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 16 Working With Configuration Files  
Displaying the Contents of a Logical File  
FIRST REVIEW—CISCO CONFIDENTIAL  
dns-primary-server disabled  
dns-secondary-server disabled  
dns-tertiary-server disabled  
exit  
exit  
! ------------------------------  
service logger  
exit  
! ------------------------------  
service network-access  
exit  
! ------------------------------  
service notification  
exit  
! ------------------------------  
service signature-definition sig0  
exit  
! ------------------------------  
service ssh-known-hosts  
exit  
! ------------------------------  
service trusted-certificates  
exit  
! ------------------------------  
service web-server  
websession-inactivity-timeout 3600  
exit  
! ------------------------------  
service anomaly-detection ad0  
exit  
! ------------------------------  
service external-product-interface  
exit  
! ------------------------------  
service health-monitor  
exit  
! ------------------------------  
service global-correlation  
exit  
! ------------------------------  
service aaa  
exit  
! ------------------------------  
service analysis-engine  
virtual-sensor vs0  
logical-interface pair0  
exit  
exit  
sensor#  
For More Information  
For the procedure for using the terminal command, see Modifying Terminal Properties, page 17-20.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Backing Up and Restoring the Configuration File Using a Remote Server  
FIRST REVIEW—CISCO CONFIDENTIAL  
Backing Up and Restoring the Configuration File Using a Remote  
Server  
Note  
We recommend copying the current configuration file to a remote server before upgrading.  
Use the copy [/erase] source_url destination_url keyword command to copy the configuration file to a  
remote server. You can then restore the current configuration from the remote server. You are prompted  
to back up the current configuration first.  
The following options apply:  
/erase—Erases the destination file before copying.  
This keyword only applies to the current-config; the backup-config is always overwritten. If this  
keyword is specified for destination current-config, the source configuration is applied to the system  
default configuration. If it is not specified for the destination current-config, the source  
configuration is merged with the current-config.  
source_url—The location of the source file to be copied. It can be a URL or keyword.  
destination_url—The location of the destination file to be copied. It can be a URL or a keyword.  
current-config—The current running configuration. The configuration becomes persistent as the  
commands are entered.  
backup-config—The storage location for the configuration backup.  
The exact format of the source and destination URLs varies according to the file. Here are the valid  
types:  
ftp:—Source or destination URL for an FTP network server. The syntax for this prefix is:  
ftp://[[username@]location][/relativeDirectory]/filename  
ftp://[[username@]location][//absoluteDirectory]/filename  
Note  
You are prompted for a password.  
scp:—Source or destination URL for the SCP network server. The syntax for this prefix is:  
scp://[[username@]location][/relativeDirectory]/filename  
scp://[[username@]location][//absoluteDirectory]/filename  
Note  
You are prompted for a password. You must add the remote host to the SSH known hosts  
list.  
http:—Source URL for the web server. The syntax for this prefix is:  
http://[[username@]location][/directory]/filename  
Note  
The directory specification should be an absolute path to the desired file.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 16 Working With Configuration Files  
Backing Up and Restoring the Configuration File Using a Remote Server  
FIRST REVIEW—CISCO CONFIDENTIAL  
https:—Source URL for the web server. The syntax for this prefix is:  
https://[[username@]location][/directory]/filename  
Note  
The directory specification should be an absolute path to the desired file. The remote  
host must be a TLS trusted host.  
Caution  
Copying a configuration file from another sensor may result in errors if the sensing interfaces and virtual  
sensors are not configured the same.  
Backing Up the Current Configuration to a Remote Server  
To back up your current configuration to a remote server, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Back up the current configuration to the remote server.  
sensor# copy current-config scp://[email protected]//configuration/cfg current-config  
Password: ********  
Warning: Copying over the current configuration may leave the box in an unstable state.  
Would you like to copy current-config to backup-config before proceeding? [yes]:  
Step 3  
Enter yesto copy the current configuration to a backup configuration.  
cfg  
100% |************************************************| 36124  
00:00  
Restoring the Current Configuration From a Backup File  
To restore your current configuration from a backup file, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Back up the current configuration to the remote server.  
sensor# copy scp://[email protected]//configuration/cfg current-config  
Password: ********  
Warning: Copying over the current configuration may leave the box in an unstable state.  
Would you like to copy current-config to backup-config before proceeding? [yes]:  
Step 3  
Enter yesto copy the current configuration to a backup configuration.  
cfg  
100% |************************************************| 36124  
00:00  
Warning: Replacing existing network-settings may leave the box in an unstable state.  
Would you like to replace existing network settings  
(host-ipaddress/netmask/gateway/access-list) on sensor before proceeding? [no]:  
sensor#  
Step 4  
Enter no to retain the currently configured hostname, IP address, subnet mask, management interface,  
and access list. We recommend you retain this information to preserve access to your sensor after the  
rest of the configuration has been restored.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 16 Working With Configuration Files  
Creating and Using a Backup Configuration File  
FIRST REVIEW—CISCO CONFIDENTIAL  
For More Information  
For the procedure for adding the remote host to the SSH known host list, see Adding Hosts to the  
For the procedure for adding the remote host to the TLS trusted hosts list, see Adding TLS Trusted  
Creating and Using a Backup Configuration File  
To protect your configuration, you can back up the current configuration and then display it to confirm  
that is the configuration you want to save. If you need to restore this configuration, you can merge the  
backup configuration file with the current configuration or overwrite the current configuration file with  
the backup configuration file.  
To back up your current configuration, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Save the current configuration. The current configuration is saved in a backup file.  
sensor# copy current-config backup-config  
Step 3  
Step 4  
Display the backup configuration file. The backup configuration file is displayed.  
sensor# more backup-config  
You can either merge the backup configuration with the current configuration, or you can overwrite the  
current configuration:  
Merge the backup configuration into the current configuration.  
sensor# copy backup-config current-config  
Overwrite the current configuration with the backup configuration.  
sensor# copy /erase backup-config current-config  
Erasing the Configuration File  
Use the erase {backup-config | current-config} command to delete a logical file. The following options  
apply:  
current-config—The current running configuration. The configuration becomes persistent as the  
commands are entered.  
backup-config—The storage location for the configuration backup.  
To erase the current configuration and return all settings back to the default, follow these steps:  
Step 1  
Log in to the CLI using an account with administrator privileges.  
sensor# erase current-config  
Warning: Removing the current-config file will result in all configuration being reset to  
default, including system information such as IP address.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 16 Working With Configuration Files  
Erasing the Configuration File  
FIRST REVIEW—CISCO CONFIDENTIAL  
User accounts will not be erased. They must be removed manually using the "no username"  
command.  
Continue? []:  
Step 2  
Press Enter to continue or enter no to stop.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 16 Working With Configuration Files  
Erasing the Configuration File  
FIRST REVIEW—CISCO CONFIDENTIAL  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
16-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Administrative Notes and Caveats  
Administrative Notes and Caveats  
The following notes and caveats apply to administrative tasks for the sensor:  
Administrators may need to disable the password recovery feature for security reasons.  
If you try to recover the password on a sensor on which password recovery is disabled, the process  
proceeds with no errors or warnings; however, the password is not reset. If you cannot log in to the  
sensor because you have forgotten the password, and password recovery is set to disabled, you must  
reimage your sensor.  
We do not recommend that you use clear database command unless under the direction of TAC or  
in some testing conditions when you need to clear accumulated state information and start with a  
clean database.  
The ASA 5500-X IPS SSP and the ASA 5585-X IPS SSP do not support bypass mode. The adaptive  
security appliance will either fail open, fail close, or fail over depending on the configuration of the  
adaptive security appliance and the type of activity being done on the IPS.  
When the sensor is first starting, it is normal for certain health metric statuses to be red until the  
sensor is fully up and running.  
You do not need to set the system clock if your sensor is synchronized by a valid outside timing  
mechanism such as an NTP clock source.  
The show inventory command does not apply to the ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP.  
Recovering the Password  
This section describes how to recover the password for the various IPS platforms. It contains the  
following topics:  
Understanding Password Recovery  
Note  
Administrators may need to disable the password recovery feature for security reasons.  
Password recovery implementations vary according to IPS platform requirements. Password recovery is  
implemented only for the cisco administrative account and is enabled by default. The IPS administrator  
can then recover user passwords for other accounts using the CLI. The cisco user password reverts to  
cisco and must be changed after the next login.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 17 Administrative Tasks for the Sensor  
Recovering the Password  
Table 17-1 lists the password recovery methods according to platform.  
Table 17-1  
Password Recovery Methods According to Platform  
Platform  
Description  
Recovery Method  
4300 series sensors  
4500 series sensors  
Standalone IPS appliances  
GRUB prompt or ROMMON  
ASA 5500-X IPS SSP  
ASA 5585-X IPS SSP  
ASA 5500 series adaptive security  
appliance IPS modules  
Adaptive security appliance CLI  
command  
Recovering the Password for the Appliance  
This section describes the two ways to recover the password for appliances. It contains the following  
topics:  
Using the GRUB Menu  
Note  
You must have a terminal server or direct serial connection to the appliance to use the GRUB menu to  
recover the password.  
For the IPS 4355, IPS 4360, IPS 4510, and IPS 4520 appliances, the password recovery is found in the  
GRUB menu, which appears during bootup. When the GRUB menu appears, press any key to pause the  
boot process.  
To recover the password on appliances, follow these steps:  
Step 1  
Reboot the appliance to see the GRUB menu.  
GNU GRUB version 0.94 (632K lower / 523264K upper memory)  
-------------------------------------------  
0: Cisco IPS  
1: Cisco IPS Recovery  
2: Cisco IPS Clear Password (cisco)  
-------------------------------------------  
Use the ^ and v keys to select which entry is highlighted.  
Press enter to boot the selected OS, 'e' to edit the  
Commands before booting, or 'c' for a command-line.  
Highlighted entry is 0:  
Step 2  
Step 3  
Press any key to pause the boot process.  
Choose 2: Cisco IPS Clear Password (cisco). The password is reset to cisco. Log in to the CLI with  
username cisco and password cisco. You can then change the password.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Chapter 17 Administrative Tasks for the Sensor  
Recovering the Password  
Using ROMMON  
For the IPS 4345, IPS 4360, IPS 4510, and IPS 4520, you can use the ROMMON to recover the  
password. To access the ROMMON CLI, reboot the sensor from a terminal server or direct connection  
and interrupt the boot process.  
To recover the password using the ROMMON CLI, follow these steps:  
Step 1  
Step 2  
Reboot the appliance.  
To interrupt the boot process, press ESC or Control-R (terminal server) or send a BREAK command  
(direct connection). The boot code either pauses for 10 seconds or displays something similar to one of  
the following:  
Evaluating boot options  
Use BREAK or ESC to interrupt boot  
Step 3  
Enter the following commands to reset the password:  
confreg 0x7  
boot  
Sample ROMMON session:  
Booting system, please wait...  
CISCO SYSTEMS  
Embedded BIOS Version 1.0(11)2 01/25/06 13:21:26.17  
...  
Evaluating BIOS Options...  
Launch BIOS Extension to setup ROMMON  
Cisco Systems ROMMON Version (1.0(11)2) #0: Thu Jan 26 10:43:08 PST 2006  
Platform IPS-4360-K9  
Use BREAK or ESC to interrupt boot.  
Use SPACE to begin boot immediately.  
Boot interrupted.  
Management0/0  
Link is UP  
MAC Address:000b.fcfa.d155  
Use ? for help.  
rommon #0> confreg 0x7  
Update Config Register (0x7) in NVRAM...  
rommon #1> boot  
Recovering the Password for the ASA 5500-X IPS SSP  
You can reset the password to the default (cisco) for the ASA 5500-X IPS SSP using the CLI or the  
ASDM. Resetting the password causes it to reboot. IPS services are not available during a reboot.  
Note  
To reset the password, you must have ASA 8.6.1 or later.  
Use the sw-module module ips password-reset command to reset the password to the default cisco. If  
the module in the specified slot has an IPS version that does not support password recovery, the  
following error message is displayed:  
ERROR: the module in slot <n> does not support password recovery.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                   
Chapter 17 Administrative Tasks for the Sensor  
Recovering the Password  
To reset the password on the ASA 5500-X IPS SSP, follow these steps:  
Step 1  
Log into the adaptive security appliance and enter the following command:  
asa# sw-module module ips password-reset  
Reset the password on module ips? [confirm]  
Step 2  
Step 3  
Press Enter to confirm.  
Password-Reset issued for module ips.  
Verify the status of the module. Once the status reads Up, you can session to the ASA 5500-X IPS SSP.  
asa# show module ips  
Mod Card Type  
Model  
Serial No.  
--- -------------------------------------------- ------------------ -----------  
ips ASA 5555-X IPS Security Services Processor  
Mod MAC Address Range Hw Version  
ASA5555-IPS  
FCH151070GR  
Fw Version  
Sw Version  
--- --------------------------------- ------------ ------------ ---------------  
ips 503d.e59c.7c4c to 503d.e59c.7c4c N/A N/A 7.2(1)E4  
Mod SSM Application Name  
Status  
SSM Application Version  
--- ------------------------------ ---------------- --------------------------  
ips IPS  
Up  
7.2(1)E4  
Compatibility  
Mod Status  
Data Plane Status  
--- ------------------ --------------------- -------------  
ips Up  
Up  
Mod License Name  
License Status Time Remaining  
--- -------------- --------------- ---------------  
ips IPS Module Enabled 210 days  
Step 4  
Step 5  
Session to the ASA 5500-X IPS SSP.  
asa# session ips  
Opening command session with module ips.  
Connected to module ips. Escape character sequence is 'CTRL-^X'.  
Enter the default username (cisco) and password (cisco) at the login prompt.  
login: cisco  
Password: cisco  
You are required to change your password immediately (password aged)  
Changing password for cisco.  
(current) password: cisco  
Step 6  
Enter your new password twice.  
New password: new password  
Retype new password: new password  
***NOTICE***  
This product contains cryptographic features and is subject to United States and local  
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic  
products does not imply third-party authority to import, export, distribute or use  
encryption. Importers, exporters, distributors and users are responsible for compliance  
with U.S. and local country laws. By using this product you agree to comply with  
applicable laws and regulations. If you are unable to comply with U.S. and local laws,  
return this product immediately.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 17 Administrative Tasks for the Sensor  
Recovering the Password  
A summary of U.S. laws governing Cisco cryptographic products may be found at:  
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html  
If you require further assistance please contact us by sending email to [email protected].  
***LICENSE NOTICE***  
There is no license key installed on this IPS platform. The system will continue to  
operate with the currently installed signature set. A valid license must be obtained in  
order to apply signature updates. Please go to http://www.cisco.com/go/license to obtain a  
new license or install a license.  
asa-ssp#  
Using the ASDM  
To reset the password in the ASDM, follow these steps:  
Step 1  
From the ASDM menu bar, choose Tools > IPS Password Reset.  
Note  
This option does not appear in the menu if there is no IPS present.  
Step 2  
Step 3  
In the IPS Password Reset confirmation dialog box, click OK to reset the password to the default (cisco).  
A dialog box displays the success or failure of the password reset. If the reset fails, make sure you have  
the correct ASA and IPS software versions.  
Click Close to close the dialog box. The sensor reboots.  
Recovering the Password for the ASA 5585-X IPS SSP  
Note  
To reset the password, you must have ASA 8.2.(4.4) or later or ASA 8.4.2 or later. The  
ASA 5585-X IPS SSP is not supported in ASA 8.3(x).  
You can reset the password to the default (cisco) for the ASA 5585-X IPS SSP using the CLI or the  
ASDM. Resetting the password causes it to reboot. IPS services are not available during a reboot.  
Use the hw-module module slot_number password-reset command to reset the password to the default  
cisco. If the module in the specified slot has an IPS version that does not support password recovery, the  
following error message is displayed:  
ERROR: the module in slot <n> does not support password recovery.  
To reset the password on the ASA 5585-X IPS SSP, follow these steps:  
Step 1  
Step 2  
Log into the adaptive security appliance and enter the following command:  
asa# hw-module module 1 password-reset  
Reset the password on module in slot 1? [confirm]  
Press Enter to confirm.  
Password-Reset issued for slot 1.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 17 Administrative Tasks for the Sensor  
Recovering the Password  
Step 3  
Verify the status of the module. Once the status reads Up, you can session to the ASA 5585-X IPS SSP.  
asa# show module 1  
Mod Card Type  
Model  
Serial No.  
--- -------------------------------------------- ------------------ -----------  
1 ASA 5585-X IPS Security Services Processor-4 ASA5585-SSP-IPS40 JAF1436ABSG  
Mod MAC Address Range  
--- --------------------------------- ------------ ------------ ---------------  
1 5475.d029.8c74 to 5475.d029.8c7f 0.1 2.0(12)3 7.2(1)E4  
Hw Version  
Fw Version  
Sw Version  
Mod SSM Application Name  
Status  
SSM Application Version  
--- ------------------------------ ---------------- --------------------------  
1 IPS  
Up  
7.2(1)E4  
Compatibility  
Mod Status  
Data Plane Status  
--- ------------------ --------------------- -------------  
1 Up Up  
Step 4  
Step 5  
Session to the ASA 5585-X IPS SSP.  
asa# session 1  
Opening command session with slot 1.  
Connected to slot 1. Escape character sequence is 'CTRL-^X'.  
Enter the default username (cisco) and password (cisco) at the login prompt.  
login: cisco  
Password: cisco  
You are required to change your password immediately (password aged)  
Changing password for cisco.  
(current) password: cisco  
Step 6  
Enter your new password twice.  
New password: new password  
Retype new password: new password  
***NOTICE***  
This product contains cryptographic features and is subject to United States and local  
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic  
products does not imply third-party authority to import, export, distribute or use  
encryption. Importers, exporters, distributors and users are responsible for compliance  
with U.S. and local country laws. By using this product you agree to comply with  
applicable laws and regulations. If you are unable to comply with U.S. and local laws,  
return this product immediately.  
A summary of U.S. laws governing Cisco cryptographic products may be found at:  
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html  
If you require further assistance please contact us by sending email to [email protected].  
***LICENSE NOTICE***  
There is no license key installed on this IPS platform. The system will continue to  
operate with the currently installed signature set. A valid license must be obtained in  
order to apply signature updates. Please go to http://www.cisco.com/go/license to obtain a  
new license or install a license.  
ips_ssp#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Recovering the Password  
Using the ASDM  
To reset the password in the ASDM, follow these steps:  
Step 1  
From the ASDM menu bar, choose Tools > IPS Password Reset.  
Note  
This option does not appear in the menu if there is no IPS present.  
Step 2  
Step 3  
In the IPS Password Reset confirmation dialog box, click OK to reset the password to the default (cisco).  
A dialog box displays the success or failure of the password reset. If the reset fails, make sure you have  
the correct ASA and IPS software versions.  
Click Close to close the dialog box. The sensor reboots.  
Disabling Password Recovery  
Caution  
If you try to recover the password on a sensor on which password recovery is disabled, the process  
proceeds with no errors or warnings; however, the password is not reset. If you cannot log in to the sensor  
because you have forgotten the password, and password recovery is set to disabled, you must reimage  
your sensor.  
Password recovery is enabled by default. You can disable password recovery through the CLI, IDM, or  
IME.  
Disabling Password Recovery Using the CLI  
To disable password recovery in the CLI, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter global configuration mode.  
sensor# configure terminal  
Step 3  
Step 4  
Enter host mode.  
sensor(config)# service host  
Disable password recovery.  
sensor(config-hos)# password-recovery disallowed  
Disabling Password Recovery Using the IDM or IME  
To disable password recovery in the IDM or IME, follow these steps:  
Step 1  
Step 2  
Log in to the IDM or IME using an account with administrator privileges.  
Choose Configuration > sensor_name > Sensor Setup > Network.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 17 Administrative Tasks for the Sensor  
Clearing the Sensor Databases  
Step 3  
To disable password recovery, uncheck the Allow Password Recovery check box.  
Verifying the State of Password Recovery  
Use the show settings | include password command to verify whether password recovery is enabled.  
To verify whether password recovery is enabled, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Enter service host submode.  
sensor# configure terminal  
sensor (config)# service host  
sensor (config-hos)#  
Step 3  
Verify the state of password recovery by using the include keyword to show settings in a filtered output.  
sensor(config-hos)# show settings | include password  
password-recovery: allowed <defaulted>  
sensor(config-hos)#  
Troubleshooting Password Recovery  
When you troubleshoot password recovery, pay attention to the following:  
You cannot determine whether password recovery has been disabled in the sensor configuration  
from the ROMMON prompt, GRUB menu, switch CLI, or router CLI. If you attempt password  
recovery, it always appears to succeed. If it has been disabled, the password is not reset to cisco. The  
only option is to reimage the sensor.  
You can disable password recovery in the host configuration. For the platforms that use external  
mechanisms, such as ROMMON, although you can run commands to clear the password, if  
password recovery is disabled in the IPS, the IPS detects that password recovery is not allowed and  
rejects the external request.  
To check the state of password recovery, use the show settings | include password command.  
Clearing the Sensor Databases  
Caution  
We do not recommend that you use clear database command unless under the direction of TAC or in  
some testing conditions when you need to clear accumulated state information and start with a clean  
database.  
Use the clear database [virtual-sensor] all | nodes | alerts | inspectors command in privileged EXEC  
mode to clear specific parts of the sensor database. The clear database command is useful for  
troubleshooting and testing.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Chapter 17 Administrative Tasks for the Sensor  
Clearing the Sensor Databases  
The following options apply:  
virtual-sensor—Specifies the name of a virtual sensor configured on the sensor.  
all— Clears all nodes, inspectors, and alerts databases.  
Caution  
This command causes summary alerts to be discarded.  
nodes—Clears the overall packet database elements, including the packet nodes, TCP session  
information, and inspector lists.  
alerts—Clears the alert database including the alerts nodes, Meta inspector information, summary  
state, and event count structures.  
inspectors—Clears the inspector lists in the nodes. Inspector lists represent the packet work and  
observations collected during the time the sensor is running.  
Clearing the Sensor Database  
To clear the sensor database, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Clear the entire sensor database.  
sensor# clear database all  
Warning: Executing this command will delete database on all virtual sensors  
Continue? [yes]:  
Step 3  
Step 4  
Enter yesto clear all the databases on the sensor.  
Clear the packet nodes.  
sensor# clear database nodes  
Warning: Executing this command will delete database on all virtual sensors  
Continue? [yes]:  
Step 5  
Step 6  
Enter yesto clear the packet nodes database.  
Clear the alerts database on a specific virtual sensor.  
sensor# clear database vs0 alerts  
Warning: Executing this command will delete database on all virtual sensors  
Continue? [yes]:  
Step 7  
Step 8  
Enter yesto clear the alerts database.  
Clear inspector lists on the sensor.  
sensor# clear database inspectors  
Warning: Executing this command will delete database on all virtual sensors  
Continue? [yes]:  
Step 9  
Enter yesto clear the inspectors database.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 17 Administrative Tasks for the Sensor  
Displaying the Inspection Load of the Sensor  
Displaying the Inspection Load of the Sensor  
Use the show inspection-load command in privileged EXEC mode to display a timestamp and the  
current inspection load of the sensor. Use the history option to display a histogram of the inspection load  
over the past 60 minutes and over the past 72 hours.  
Use this command to determine the load on the sensor instead of the CPU Usage information from the  
show statistics host command. The inspection load is a more accurate representation of the processing  
level of the sensor. The calculation of the inspection load has also been enhanced to provide a more  
accurate calculation of the sensor load at lower traffic levels.  
Note  
Note  
The Processing Load category in the show statistics virtual-sensor output has been renamed to  
Inspection Load and shows the same value seen in the show inspection load command.  
The show inspection-load command is not currently supported for the IPS 4500 series sensors.  
To display the inspection load of the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Show the current inspection load with a timestamp of the sensor.  
sensor# show inspection-load  
sensor 08:18:13 PM Friday Jan 15 2011 UTC  
Inspection Load Percentage = 1  
Step 3  
Show the histogram of the inspection load:  
sensor# show inspection-load history  
sensor 15:36:42 UTC Mon Jan 30 2012  
sensor 08:18:13 PM Friday Jan 15 2011 UTC  
Inspection Load Percentage = 65  
100  
90  
80  
70 * *  
60 * * *** * ****** ** * * * * * * ** ** *  
50 * * *** * ****** ** * * * * * * ** ** *  
40 * *** ********************* * * * * ** * * * * * ***********  
30 ********************************* ************ *************  
20 ************************************************************  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 17 Administrative Tasks for the Sensor  
Displaying the Inspection Load of the Sensor  
10 ************************************************************  
0.........1.........2.........3.........4.........5.........6  
Inspection Load Percentage (last 6 minutes at 10 second intervals)  
100  
90  
80  
70  
60 * * *** * ****** ** * * * * * * ** ** *  
50 * * *** * ****** ** * * * * * * ** ** *  
40 * *** *********####******** * * * * ** * * * * * ***********  
30 ####**###*###*######**##****#*#*# *********#*# #*##****#####  
20 ############################################################  
10 ############################################################  
0....5....1....1....2....2....3....3....4....4....5....5....6  
0
5
0
5
0
5
0
5
0
5
0
Inspection Load Percentage (last 60 minutes) *=maximum #=average  
100  
90  
80  
70  
60 * * *** * ****** ** * * * * * * ** ** * * * *** *  
50 * * *** * ****** ** * * * * * * ** ** * * * *** *  
40 * *** ********************* * * * * ** * * * * * *********** * * ***  
30 ******###**#**######**##****#*#*# *********#*# #*##****##**# #*#*###  
20 #####################################################################  
10 #####################################################################  
0....5....1....1....2....2....3....3....4....4....5....5....6....6....7.  
0
5
0
5
0
5
0
5
0
5
0
5
0
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Configuring Health Status Information  
Inspection Load Percentage (last 72 hours) *=maximum #=average  
sensor#  
Configuring Health Status Information  
Configure the health statistics for the sensor in service health monitor submode. Use the show health  
command to see the results. The health status categories are rated by red and green with red being  
critical.  
The following options apply:  
application-failure-policy {enable | disable} {true | false} status {green | yellow | red}—Lets you  
choose to have an application failure applied to the overall sensor health rating.  
bypass-policy {enable | disable} {true | false} status {green | yellow | red}—Lets you choose to  
know if bypass mode is active and have that apply to the overall sensor health rating.  
Note  
The ASA 5500-X IPS SSP and the ASA 5585-X IPS SSP do not support bypass mode. The  
adaptive security appliance will either fail open, fail close, or fail over depending on the  
configuration of the adaptive security appliance and the type of activity being done on the  
IPS.  
enable-monitoring {true | false}—Lets you choose to monitor sensor health and security.  
event-retrieval-policy {enable | disable} {true | false} red-threshold yellow-threshold  
seconds—Lets you set a threshold for when the last event was retrieved and have that apply to the  
overall sensor health rating. The health status is degraded to red or yellow when that threshold is  
met. The range for the threshold is 0 to 4294967295 seconds.  
Note  
The event retrieval metric keeps track of when the last event was retrieved by an external  
monitoring application such as the IME. Disable event retrieval policy if you are not doing  
external event monitoring.  
global-correlation-policy {enable | disable} {true | false}—Lets you apply this metric to the  
overall sensor health rating.  
heartbeat-events {enable | disable} seconds—Lets you enable heartbeat events to be emitted at the  
specified interval in seconds and have that apply to the overall sensor health rating. The range for  
the interval is 15 to 86400 seconds.  
inspection-load-policy {enable | disable} {true | false} red-threshold yellow-threshold  
seconds—Lets you set the threshold for inspection load. The health status is degraded to red or  
yellow when that threshold is met. The range is 0 to 100.  
interface-down-policy {enable | disable} {true | false} status {green | yellow | red}—Lets you  
choose to know if one or more enabled interfaces are down and have that apply to the overall sensor  
health rating.  
license-expiration-policy {enable | disable} {true | false} red-threshold yellow-threshold—Lets  
you set a threshold for when the license expires and whether this metric is applied to the overall  
sensor health rating. The range for the threshold is 0 to 4294967295 seconds.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 17 Administrative Tasks for the Sensor  
Configuring Health Status Information  
memory-usage-policy {enable | disable} {true | false} red-threshold yellow-threshold—Lets you  
set a threshold percentage for memory usage and whether this metric is applied to the overall sensor  
health rating. The range is 0 to 100. The default for red is 91% and the default for yellow is 80%.  
missed-packet-policy {enable | disable} {true | false} red-threshold yellow-threshold—Lets you  
set a threshold percentage for missed packets and whether this metric is applied to the overall sensor  
health rating.  
network-participation-policy {enable | disable} {true | false}—Lets you apply this metric to the  
overall sensor health rating.  
persist-security-status—Lets you set the number of minutes that a lower security persists following  
the occurrence of the latest event to lower the security status.  
signature-update-policy {enable | disable} {true | false} red-threshold yellow-threshold—Lets  
you set a threshold for the number of days elapsed since the last signature update and whether this  
metric is applied to the overall sensor health rating. The range for the threshold is 0 to 4294967295  
seconds  
ASA 5500-X IPS SSP and Memory Usage  
For the ASA 5500-X IPS SSP, the memory usage is 93%. The default health thresholds for the sensor  
are 80% for yellow and 91% for red, so the sensor health will be shown as red on these platforms even  
for normal operating conditions. You can tune the threshold percentage for memory usage so that it reads  
more accurately for these platforms by configuring the memory-usage-policy option in the sensor health  
metrics.  
Note  
Make sure you have the memory-usage-policy option in the sensor health metrics enabled.  
Table 17-2 lists the yellow-threshold and red-threshold health values.  
Table 17-2  
ASA 5500-X IPS SSP Memory Usage Values  
Platform  
Yellow  
85%  
88%  
88%  
93%  
95%  
Red  
Memory Used  
28%  
ASA 5512-X IPS SSP  
ASA 5515-X IPS SSP  
ASA 5525-X IPS SSP  
ASA 5545-X IPS SSP  
ASA 5555-X IPS SSP  
91%  
92%  
92%  
96%  
98%  
14%  
14%  
13%  
17%  
Configuring Health Statistics  
To configure the health statistics for the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter service health monitor submode.  
sensor# configure terminal  
sensor(config)# service health-monitor  
sensor(config-hea)#  
Step 3  
Enable the metrics for application failure status.  
sensor(config-hea)# application-failure-policy  
sensor(config-hea-app)# enable true  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 17 Administrative Tasks for the Sensor  
Configuring Health Status Information  
sensor(config-hea-app)# status red  
sensor(config-hea-app)# exit  
sensor(config-hea)#  
Step 4  
Enable the metrics for bypass policy.  
sensor(config-hea)# bypass-policy  
sensor(config-hea-byp)# enable true  
sensor(config-hea-byp)# status yellow  
sensor(config-hea-byp)# exit  
sensor(config-hea)#  
Step 5  
Step 6  
Enable the metrics for sensor health and security monitoring.  
sensor(config-hea)# enable-monitoring true  
sensor(config-hea)#  
Set the event retrieval thresholds for event retrieval metrics.  
sensor(config-hea)# event-retrieval-policy  
sensor(config-hea-eve)# enable true  
sensor(config-hea-eve)# red-threshold 100000  
sensor(config-hea-eve)# yellow-threshold 100  
sensor(config-hea-eve)# exit  
sensor(config-hea)#  
Step 7  
Enable health metrics for global correlation.  
sensor(config-hea)# global-correlation-policy  
sensor(config-hea-glo)# enable true  
sensor(config-hea-glo)# exit  
sensor(config-hea)#  
Step 8  
Step 9  
Enable the metrics for heartbeat events to be emitted at the specified interval of seconds.  
sensor(config-hea)# heartbeat-events enable 20000  
sensor(config-hea)#  
Set the inspection load threshold.  
sensor(config-hea)# inspection-load-policy  
sensor(config-hea-ins)# enable true  
sensor(config-hea-ins)# red-threshold 100  
sensor(config-hea-ins)# yellow-threshold 50  
sensor(config-hea-ins)# exit  
sensor(config-hea)#  
Step 10 Enable the interface down policy.  
sensor(config-hea)# interface-down-policy  
sensor(config-hea-int)# enable true  
sensor(config-hea-int)# status yellow  
sensor(config-hea-int)# exit  
sensor(config-hea)#  
Step 11 Set the number of days until the license expires.  
sensor(config-hea)# license-expiration-policy  
sensor(config-hea-lic)# enable true  
sensor(config-hea-lic)# red-threshold 400000  
sensor(config-hea-lic)# yellow-threshold 200000  
sensor(config-hea-lic)# exit  
sensor(config-hea)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Configuring Health Status Information  
Step 12 Set the threshold for memory usage.  
sensor(config-hea)# memory-usage-policy  
sensor(config-hea-mem)# enable true  
sensor(config-hea-mem)# red-threshold 100  
sensor(config-hea-mem)# yellow-threshold 50  
sensor(config-hea-mem)# exit  
sensor(config-hea)#  
Step 13 Set the missed packet threshold.  
sensor(config-hea)# missed-packet-policy  
sensor(config-hea-mis)# enable true  
sensor(config-hea-mis)# red-threshold 50  
sensor(config-hea-mis)# yellow-threshold 20  
sensor(config-hea-mis)# exit  
sensor(config-hea)#  
Step 14 Set the number of minutes that a lower security persists following the occurrence of the latest event to  
lower the security status.  
sensor(config-hea)# persist-security-status 10  
sensor(config-hea)#  
Step 15 Set the number of days since the last signature update.  
sensor(config-hea)# signature-update-policy  
sensor(config-hea-sig)# enable true  
sensor(config-hea-sig)# red-threshold 30000  
sensor(config-hea-sig)# yellow-threshold 10000  
sensor(config-hea-sig)# exit  
sensor(config-hea)#  
Step 16 Verify your settings.  
sensor(config-hea)# show settings  
enable-monitoring: true default: true  
persist-security-status: 10 minutes default: 5  
heartbeat-events  
-----------------------------------------------  
enable: 20000 seconds default: 300  
-----------------------------------------------  
application-failure-policy  
-----------------------------------------------  
enable: true default: true  
status: red default: red  
-----------------------------------------------  
bypass-policy  
-----------------------------------------------  
enable: true default: true  
status: yellow default: red  
-----------------------------------------------  
interface-down-policy  
-----------------------------------------------  
enable: true default: true  
status: yellow default: red  
-----------------------------------------------  
inspection-load-policy  
-----------------------------------------------  
enable: true default: true  
yellow-threshold: 50 percent default: 80  
red-threshold: 100 percent default: 91  
-----------------------------------------------  
missed-packet-policy  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Showing Sensor Overall Health Status  
enable: true default: true  
yellow-threshold: 20 percent default: 1  
red-threshold: 50 percent default: 6  
-----------------------------------------------  
memory-usage-policy  
-----------------------------------------------  
enable: true default: false  
yellow-threshold: 50 percent default: 80  
red-threshold: 100 percent default: 91  
-----------------------------------------------  
signature-update-policy  
-----------------------------------------------  
enable: true default: true  
yellow-threshold: 10000 days default: 30  
red-threshold: 30000 days default: 60  
-----------------------------------------------  
license-expiration-policy  
-----------------------------------------------  
enable: true default: true  
yellow-threshold: 200000 days default: 30  
red-threshold: 400000 days default: 0  
-----------------------------------------------  
event-retrieval-policy  
-----------------------------------------------  
enable: true <defaulted>  
yellow-threshold: 100000 seconds default: 300  
red-threshold: 100 seconds default: 600  
-----------------------------------------------  
sensor(config-hea)#  
Step 17 Exit health monitoring submode.  
sensor(config-hea)# exit  
Apply Changes:?[yes]:  
Step 18 Press Enter to apply the changes or enter no to discard them.  
Showing Sensor Overall Health Status  
Caution  
When the sensor is first starting, it is normal for certain health metric statuses to be red until the sensor  
is fully up and running.  
Note  
The ASA 5500-X IPS SSP and the ASA 5585-X IPS SSP do not support bypass mode. The adaptive  
security appliance will either fail open, fail close, or fail over depending on the configuration of the  
adaptive security appliance and the type of activity being done on the IPS.  
Use the show health command in privileged EXEC mode to display the overall health status information  
of the sensor. The health status categories are rated by red and green with red being critical.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 17 Administrative Tasks for the Sensor  
Creating a Banner Login  
To display the overall health status of the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Show the health and security status of the sensor.  
sensor# show health  
Overall Health Status  
Red  
Health Status for Failed Applications  
Health Status for Signature Updates  
Health Status for License Key Expiration  
Health Status for Running in Bypass Mode  
Health Status for Interfaces Being Down  
Health Status for the Inspection Load  
Health Status for the Time Since Last Event Retrieval  
Health Status for the Number of Missed Packets  
Health Status for the Memory Usage  
Health Status for Global Correlation  
Health Status for Network Participation  
Green  
Green  
Red  
Green  
Red  
Green  
Green  
Green  
Not Enabled  
Red  
Not Enabled  
Security Status for Virtual Sensor vs0  
sensor#  
Green  
Creating a Banner Login  
Use the banner login command to create a banner login that will be displayed before the user and  
password login prompts. The maximum message length is 2500 characters. Use the no banner login  
command to remove the banner.  
To create a banner login, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter global configuration mode.  
sensor# configure terminal  
Step 3  
Step 4  
Create the banner login.  
sensor(config)# banner login  
Banner[]:  
Enter your message.  
Banner[]: This message will be displayed on banner login. ^M Thank you  
sensor(config)#  
Note  
To use a ? or a carriage return in the message, press Ctrl-V-? or Ctrl-V-Enter. They are  
represented by ^M.  
Example  
This message will be displayed on login.  
Thank you  
login: cisco  
Password:****  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 17 Administrative Tasks for the Sensor  
Terminating CLI Sessions  
Step 5  
Remove the banner login. The banner no longer appears at login.  
sensor(config)# no banner login  
Terminating CLI Sessions  
Caution  
You can only clear CLI login sessions with the clear line command. You cannot clear service logins with  
this command.  
Use the clear line cli_id [message] command to terminate another CLI session. If you use the message  
keyword, you can send a message along with the termination request to the receiving user. The maximum  
message length is 2500 characters.  
The following options apply:  
cli_id—Specifies the CLI ID number associated with the login session. Use the show users  
command to find the CLI ID number.  
message—Specifies the message to send to the receiving user.  
If an administrator tries to log in when the maximum sessions have been reached, the following message  
appears:  
Error: The maximum allowed CLI sessions are currently open, would you like to terminate  
one of the open sessions? [no]  
If an operator or viewer tries to log in when the maximum sessions are open, the following message  
appears:  
Error: The maximum allowed CLI sessions are currently open, please try again later.  
To terminate a CLI session, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Note  
Operator and viewer can only clear lines with the same username as the current login.  
Find the CLI ID number associated with the login session.  
sensor# show users  
CLI ID  
13533  
15689  
20098  
User  
Privilege  
*
jtaylor administrator  
jsmith operator  
viewer viewer  
Step 3  
Terminate the CLI session of jsmith.  
sensor# clear line cli_id message  
Message[]:  
Example  
sensor# clear line 15689 message  
Message{}: Sorry! I need to terminate your session.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 17 Administrative Tasks for the Sensor  
Modifying Terminal Properties  
sensor#  
The user jsmith receives the following message from the administrator jtaylor.  
sensor#  
***  
***  
*** Termination request from jtaylor  
***  
Sorry! I need to terminate your session.  
Modifying Terminal Properties  
Note  
You are not required to specify the screen length for some types of terminal sessions because the  
specified screen length can be learned by some remote hosts.  
Use the terminal [length] screen _length command to modify terminal properties for a login session.  
The screen_ length option lets you set the number of lines that appear on the screen before the --more--  
prompt is displayed. A value of zero results in no pause in the output. The default value is 24 lines.  
To modify the terminal properties, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
To have no pause between multi-screen outputs, use 0 for the screen length value.  
sensor# terminal length 0  
Note  
The screen length values are not saved between login sessions.  
Step 3  
To have the CLI pause and display the --more--prompt every 10 lines, use 10 for the screen length value.  
sensor# terminal length 10  
Configuring Events  
This section describes how to display and clear events from the Event Store, and contains the following  
topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 17 Administrative Tasks for the Sensor  
Configuring Events  
Displaying Events  
Note  
The Event Store has a fixed size of 30 MB for all platforms.  
Note  
Events are displayed as a live feed. To cancel the request, press Ctrl-C.  
Use the show events [{alert [informational] [low] [medium] [high] [include-traits traits]  
[exclude-traits traits] [min-threat-rating min-rr] [max-threat-rating max-rr] | error [warning]  
[error] [fatal] | NAC | status}] [hh:mm:ss [month day [year]] | past hh:mm:ss] command to display  
events from Event Store. Events are displayed beginning at the start time. If you do not specify a start  
time, events are displayed beginning at the current time. If you do not specify an event type, all events  
are displayed.  
The following options apply:  
alert—Displays alerts. Provides notification of some suspicious activity that may indicate an attack  
is in process or has been attempted. Alert events are generated by the Analysis Engine whenever a  
signature is triggered by network activity. If no level is selected (informational, low, medium, or  
high), all alert events are displayed.  
include-traits—Displays alerts that have the specified traits.  
exclude-traits—Does not display alerts that have the specified traits.  
traits—Specifies the trait bit position in decimal (0 to 15).  
min-threat-rating—Displays events with a threat rating above or equal to this value. The default is  
0. The valid range is 0 to 100.  
max-threat-rating—Displays events with a threat rating below or equal to this value. The default  
is 100. The valid range is 0 to 100.  
error—Displays error events. Error events are generated by services when error conditions are  
encountered. If no level is selected (warning, error, or fatal), all error events are displayed.  
NAC—Displays the ARC (block) requests.  
Note  
The ARC is formerly known as NAC. This name change has not been completely  
implemented throughout the IDM, the IME, and the CLI.  
status—Displays status events.  
past—Displays events starting in the past for the specified hours, minutes, and seconds.  
hh:mm:ss—Specifies the hours, minutes, and seconds in the past to begin the display.  
Note  
The show events command continues to display events until a specified event is available. To exit, press  
Ctrl-C.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 17 Administrative Tasks for the Sensor  
Configuring Events  
Displaying Events  
To display events from the Event Store, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display all events starting now. The feed continues showing all events until you press Ctrl-C.  
sensor# show events  
evError: eventId=1041472274774840147 severity=warning vendor=Cisco  
originator:  
hostId: sensor2  
appName: cidwebserver  
appInstanceId: 12075  
time: 2011/01/07 04:41:45 2011/01/07 04:41:45 UTC  
errorMessage: name=errWarning received fatal alert: certificate_unknown  
evError: eventId=1041472274774840148 severity=error vendor=Cisco  
originator:  
hostId: sensor2  
appName: cidwebserver  
appInstanceId: 351  
time: 2011/01/07 04:41:45 2011/01/07 04:41:45 UTC  
errorMessage: name=errTransport WebSession::sessionTask(6) TLS connection exce  
ption: handshake incomplete.  
Step 3  
Display the block requests beginning at 10:00 a.m. on February 9, 2011.  
sensor# show events NAC 10:00:00 Feb 9 2011  
evShunRqst: eventId=1106837332219222281 vendor=Cisco  
originator:  
deviceName: Sensor1  
appName: NetworkAccessControllerApp  
appInstance: 654  
time: 2011/02/09 10:33:31 2011/08/09 13:13:31  
shunInfo:  
host: connectionShun=false  
srcAddr: 11.0.0.1  
destAddr:  
srcPort:  
destPort:  
protocol: numericType=0 other  
timeoutMinutes: 40  
evAlertRef: hostId=esendHost 123456789012345678  
sensor#  
Step 4  
Display errors with the warning level starting at 10:00 a.m. on February 9, 2011.  
sensor# show events error warning 10:00:00 Feb 9 2011  
evError: eventId=1041472274774840197 severity=warning vendor=Cisco  
originator:  
hostId: sensor  
appName: cidwebserver  
appInstanceId: 12160  
time: 2011/01/07 04:49:25 2011/01/07 04:49:25 UTC  
errorMessage: name=errWarning received fatal alert: certificate_unknown  
Step 5  
Display alerts from the past 45 seconds.  
sensor# show events alert past 00:00:45  
evIdsAlert: eventId=1109695939102805307 severity=medium vendor=Cisco  
originator:  
hostId: sensor  
appName: sensorApp  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 17 Administrative Tasks for the Sensor  
Configuring Events  
appInstanceId: 367  
time: 2011/03/02 14:15:59 2011/03/02 14:15:59 UTC  
signature: description=Nachi Worm ICMP Echo Request id=2156 version=S54  
subsigId: 0  
sigDetails: Nachi ICMP  
interfaceGroup:  
vlan: 0  
participants:  
attacker:  
addr: locality=OUT 10.89.228.202  
target:  
addr: locality=OUT 10.89.150.185  
riskRatingValue: 70  
interface: fe0_1  
protocol: icmp  
evIdsAlert: eventId=1109695939102805308 severity=medium vendor=Cisco  
originator:  
--MORE--  
Step 6  
Display events that began 30 seconds in the past.  
sensor# show events past 00:00:30  
evStatus: eventId=1041526834774829055 vendor=Cisco  
originator:  
hostId: sensor  
appName: mainApp  
appInstanceId: 2215  
time: 2011/01/08 02:41:00 2011/01/08 02:41:00 UTC  
controlTransaction: command=getVersion successful=true  
description: Control transaction response.  
requestor:  
user: cids  
application:  
hostId: 64.101.182.101  
appName: -cidcli  
appInstanceId: 2316  
evStatus: eventId=1041526834774829056 vendor=Cisco  
originator:  
hostId: sensor  
appName: login(pam_unix)  
appInstanceId: 2315  
time: 2011/01/08 02:41:00 2011/01/08 02:41:00 UTC  
syslogMessage:  
description: session opened for user cisco by cisco(uid=0)  
Clearing Events from the Event Store  
Use the clear events command to clear the Event Store.  
To clear events from the Event Store, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Clear the Event Store.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 17 Administrative Tasks for the Sensor  
Configuring the System Clock  
sensor# clear events  
Warning: Executing this command will remove all events currently stored in the event  
store.  
Continue with clear? []:  
Step 3  
Enter yesto clear the events.  
Configuring the System Clock  
This section explains how to display and manually set the system clock. It contains the following topics:  
Displaying the System Clock  
Use the show clock [detail] command to display the system clock. You can use the detail option to  
indicate the clock source (NTP or system) and the current summertime setting (if any). The system clock  
keeps an authoritative flag that indicates whether the time is authoritative (believed to be accurate). If  
the system clock has been set by a timing source, such as NTP, the flag is set.  
Table 17-3 lists the system clock flags.  
Table 17-3  
System Clock Flags  
Symbol  
Description  
*
Time is not authoritative.  
Time is authoritative.  
(blank)  
.
Time is authoritative, but NTP is not synchronized.  
To display the system clock, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the system clock.  
sensor# show clock  
*19:04:52 UTC Thu Apr 03 2008  
Step 3  
Display the system clock with details. The following example indicates that the sensor is getting its time  
from NTP and that is configured and synchronized.  
sensor# show clock detail  
20:09:43 UTC Thu Apr 03 2011  
Time source is NTP  
Summer time starts 03:00:00 UTC Sun Mar 09 2011  
Summer time stops 01:00:00 UTC Sun Nov 02 2011  
Step 4  
Display the system clock with details. The following example indicates that no time source is configured.  
sensor# show clock detail  
*20:09:43 UTC Thu Apr 03 2011  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 17 Administrative Tasks for the Sensor  
Clearing the Denied Attackers List  
No time source  
Summer time starts 03:00:00 UTC Sun Mar 09 2011  
Summer time stops 01:00:00 UTC Sun Nov 02 2011  
Manually Setting the System Clock  
Note  
You do not need to set the system clock if your sensor is synchronized by a valid outside timing  
mechanism such as an NTP clock source.  
Use the clock set hh:mm [:ss] month day year command to manually set the clock on the appliance. Use  
this command if no other time sources are available. The clock set command does not apply to the  
following platforms, because they get their time from the adaptive security appliance in which they are  
installed:  
ASA 5500-X IPS SSP  
ASA 5585-X IPS SSP  
To manually set the clock on the appliance, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Set the clock manually.  
sensor# clock set 13:21 Mar 29 2011  
Note  
The time format is 24-hour time.  
Clearing the Denied Attackers List  
Use the show statistics denied-attackers command to display the list of denied attackers. Use the clear  
denied-attackers [virtual_sensor] [ip-address ip_address] command to delete the denied attackers list  
and clear the virtual sensor statistics.  
If your sensor is configured to operate in inline mode, the traffic is passing through the sensor. You can  
configure signatures to deny packets, connections, and attackers while in inline mode, which means that  
single packets, connections, and specific attackers are denied, that is, not transmitted, when the sensor  
encounters them. When the signature fires, the attacker is denied and placed in a list. As part of sensor  
administration, you may want to delete the list or clear the statistics in the list.  
The following options apply:  
virtual_sensor—(Optional) Specifies the virtual sensor whose denied attackers list should be  
cleared.  
ip_address—(Optional) Specifies the IP address to clear.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 17 Administrative Tasks for the Sensor  
Clearing the Denied Attackers List  
Displaying and Deleting Denied Attackers  
To display the list of denied attackers and delete the list and clear the statistics, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Display the list of denied IP addresses. The statistics show that there are two IP addresses being denied  
at this time.  
sensor# show statistics denied-attackers  
Denied Attackers and hit count for each.  
10.20.4.2 = 9  
10.20.5.2 = 5  
Step 3  
Delete the denied attackers list.  
sensor# clear denied-attackers  
Warning: Executing this command will delete all addresses from the list of attackers  
currently being denied by the sensor.  
Continue with clear? [yes]:  
Step 4  
Step 5  
Enter yesto clear the list.  
Delete the denied attackers list for a specific virtual sensor.  
sensor# clear denied-attackers vs0  
Warning: Executing this command will delete all addresses from the list of attackers being  
denied by virtual sensor vs0.  
Continue with clear? [yes]:  
Step 6  
Step 7  
Enter yesto clear the list.  
Remove a specific IP address from the denied attackers list for a specific virtual sensor.  
sensor# clear denied-attackers vs0 ip-address 192.0.2.0  
Warning: Executing this command will delete ip address 192.0.2.0 from the list of  
attackers being denied by virtual sensor vs0.  
Continue with clear? [yes]:  
Step 8  
Step 9  
Enter yesto clear the list.  
Verify that you have cleared the list. You can use the show statistics denied-attackers or show statistics  
virtual-sensor command.  
sensor# show statistics denied-attackers  
Denied Attackers and hit count for each.  
Denied Attackers and hit count for each.  
Statistics for Virtual Sensor vs0  
Denied Attackers with percent denied and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
Statistics for Virtual Sensor vs1  
Denied Attackers with percent denied and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
sensor#  
sensor# show statistics virtual-sensor  
Virtual Sensor Statistics  
Statistics for Virtual Sensor vs0  
Name of current Signature-Definition instance = sig0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 17 Administrative Tasks for the Sensor  
Displaying Policy Lists  
Name of current Event-Action-Rules instance = rules0  
List of interfaces monitored by this virtual sensor = mypair  
Denied Address Information  
Number of Active Denied Attackers = 0  
Number of Denied Attackers Inserted = 2  
Number of Denied Attackers Total Hits = 287  
Number of times max-denied-attackers limited creation of new entry = 0  
Number of exec Clear commands during uptime = 1  
Denied Attackers and hit count for each.  
Step 10 Clear only the statistics.  
sensor# show statistics virtual-sensor clear  
Step 11 Verify that you have cleared the statistics. The statistics have all been cleared except for the Number of  
Active Denied Attackersand Number of exec Clear commands during uptimecategories. It is  
important to know if the list has been cleared.  
sensor# show statistics virtual-sensor  
Virtual Sensor Statistics  
Statistics for Virtual Sensor vs0  
Name of current Signature-Definition instance = sig0  
Name of current Event-Action-Rules instance = rules0  
List of interfaces monitored by this virtual sensor = mypair  
Denied Address Information  
Number of Active Denied Attackers = 2  
Number of Denied Attackers Inserted = 0  
Number of Denied Attackers Total Hits = 0  
Number of times max-denied-attackers limited creation of new entry = 0  
Number of exec Clear commands during uptime = 1  
Denied Attackers and hit count for each.  
10.20.2.5 = 0  
10.20.5.2 = 0  
Displaying Policy Lists  
Use the list {anomaly-detection-configurations | event-action-rules-configurations |  
signature-definition-configurations} in EXEC mode to display the list of policies for these  
components. The file size is in bytes. A virtual sensor with N/A indicates that the policy is not assigned  
to a virtual sensor.  
To display a list of policies on the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the list of policies for anomaly detection.  
sensor# list anomaly-detection-configurations  
Anomaly Detection  
Instance  
ad0  
temp  
MyAD  
ad1  
Size  
255  
707  
255  
141  
Virtual Sensor  
vs0  
N/A  
N/A  
vs1  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
Step 3  
Display the list of policies for event action rules.  
sensor# list event-action-rules-configurations  
Event Action Rules  
Instance  
rules0  
rules1  
Size  
112  
141  
Virtual Sensor  
vs0  
vs1  
sensor#  
Step 4  
Display the list of policies for signature definition.  
sensor# list signature-definition-configurations  
Signature Definition  
Instance  
sig0  
sig1  
Size  
336  
141  
141  
Virtual Sensor  
vs0  
vs1  
N/A  
sig2  
sensor#  
Displaying Statistics  
Use the show statistics [analysis-engine | anomaly-detection | authentication | denied-attackers |  
event-server | event-store | external-product-interface | global-correlation | host | logger |  
network-access | notification | os-identification | sdee-server | transaction-server | virtual-sensor |  
web-server] [clear] command to display statistics for each sensor application.  
Use the show statistics {anomaly-detection | denied-attackers | os-identification | virtual-sensor}  
[name | clear] command to display statistics for these components for all virtual sensors. If you provide  
the virtual sensor name, the statistics for that virtual sensor only are displayed.  
Note  
The clear option is not available for the analysis engine, anomaly detection, host, network access, or OS  
identification applications.  
For the IPS 4510 and IPS 4520, at the end of the command output, there are extra details for the Ethernet  
controller statistics, such as the total number of packets received at the Ethernet controller, the total  
number of packets dropped at the Ethernet controller under high load conditions, and the total packets  
transmitted including the customer traffic packets and the internal keepalive packet count.  
Note  
The Ethernet controller statistics are polled at an interval of 5 seconds from the hardware side. The  
keepalives are sent or updated at an interval of 10 ms. Because of this, there may be a disparity in the  
actual count reflected in the total packets transmitted. At times, it is even possible that the total packets  
transmitted may be less that the keepalive packets transmitted.  
To display statistics for the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the statistics for the Analysis Engine.  
sensor# show statistics analysis-engine  
Analysis Engine Statistics  
Number of seconds since service started = 431157  
Processing Load Percentage  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
Thread  
5 sec  
1 min  
5 min  
0
1
2
3
4
5
6
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Average  
The rate of TCP connections tracked per second = 0  
The rate of packets per second = 0  
The rate of bytes per second = 0  
Receiver Statistics  
Total number of packets processed since reset = 0  
Total number of IP packets processed since reset = 0  
Transmitter Statistics  
Total number of packets transmitted = 133698  
Total number of packets denied = 203  
Total number of packets reset = 3  
Fragment Reassembly Unit Statistics  
Number of fragments currently in FRU = 0  
Number of datagrams currently in FRU = 0  
TCP Stream Reassembly Unit Statistics  
TCP streams currently in the embryonic state = 0  
TCP streams currently in the established state = 0  
TCP streams currently in the closing state = 0  
TCP streams currently in the system = 0  
TCP Packets currently queued for reassembly = 0  
The Signature Database Statistics.  
Total nodes active = 0  
TCP nodes keyed on both IP addresses and both ports = 0  
UDP nodes keyed on both IP addresses and both ports = 0  
IP nodes keyed on both IP addresses = 0  
Statistics for Signature Events  
Number of SigEvents since reset = 0  
Statistics for Actions executed on a SigEvent  
Number of Alerts written to the IdsEventStore = 0  
Inspection Stats  
Inspector  
AtomicAdvanced  
Fixed  
MSRPC_TCP  
MSRPC_UDP  
MultiString  
ServiceDnsUdp  
ServiceGeneric  
ServiceHttp  
ServiceNtp  
ServiceP2PTCP  
ServiceRpcUDP  
ServiceRpcTCP  
ServiceSMBAdvanced  
ServiceSnmp  
ServiceTNS  
String  
active  
call  
2312  
1659  
20  
1808  
145  
1841  
2016  
2
create  
4
delete  
4
loadPct  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
33  
1
0
0
2
0
1
51  
0
0
0
0
0
0
0
0
6
0
0
0
0
1606  
4
1575  
10  
3
14  
2
3176  
9
3
9
3
3
1606  
4
1575  
10  
3
14  
2
3176  
9
3
9
3
3
3682  
21  
1841  
130  
139  
1841  
18  
225  
1808  
576  
288  
261  
1808  
14  
16  
1555  
17  
6
14  
16  
1555  
17  
6
SweepUDP  
SweepTCP  
SweepOtherTcp  
TrojanBO2K  
TrojanUdp  
11  
1555  
11  
1555  
GlobalCorrelationStats  
SwVersion = 7.2(1)E4  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
SigVersion = 645.0  
DatabaseRecordCount = 0  
DatabaseVersion = 0  
RuleVersion = 0  
ReputationFilterVersion = 0  
AlertsWithHit = 0  
AlertsWithMiss = 0  
AlertsWithModifiedRiskRating = 0  
AlertsWithGlobalCorrelationDenyAttacker = 0  
AlertsWithGlobalCorrelationDenyPacket = 0  
AlertsWithGlobalCorrelationOtherAction = 0  
AlertsWithAuditRepDenies = 0  
ReputationForcedAlerts = 0  
EventStoreInsertTotal = 0  
EventStoreInsertWithHit = 0  
EventStoreInsertWithMiss = 0  
EventStoreDenyFromGlobalCorrelation = 0  
EventStoreDenyFromOverride = 0  
EventStoreDenyFromOverlap = 0  
EventStoreDenyFromOther = 0  
ReputationFilterDataSize = 0  
ReputationFilterPacketsInput = 0  
ReputationFilterRuleMatch = 0  
DenyFilterHitsNormal = 0  
DenyFilterHitsGlobalCorrelation = 0  
SimulatedReputationFilterPacketsInput = 0  
SimulatedReputationFilterRuleMatch = 0  
SimulatedDenyFilterInsert = 0  
SimulatedDenyFilterPacketsInput = 0  
SimulatedDenyFilterRuleMatch = 0  
TcpDeniesDueToGlobalCorrelation = 0  
TcpDeniesDueToOverride = 0  
TcpDeniesDueToOverlap = 0  
TcpDeniesDueToOther = 0  
SimulatedTcpDeniesDueToGlobalCorrelation = 0  
SimulatedTcpDeniesDueToOverride = 0  
SimulatedTcpDeniesDueToOverlap = 0  
SimulatedTcpDeniesDueToOther = 0  
LateStageDenyDueToGlobalCorrelation = 0  
LateStageDenyDueToOverride = 0  
LateStageDenyDueToOverlap = 0  
LateStageDenyDueToOther = 0  
SimulatedLateStageDenyDueToGlobalCorrelation = 0  
SimulatedLateStageDenyDueToOverride = 0  
SimulatedLateStageDenyDueToOverlap = 0  
SimulatedLateStageDenyDueToOther = 0  
AlertHistogram  
RiskHistogramEarlyStage  
RiskHistogramLateStage  
ConfigAggressiveMode = 0  
ConfigAuditMode = 0  
RegexAccelerationStats  
Status = Enabled  
DriverVersion = 6.2.1  
Devices = 1  
Agents = 12  
Flows = 7  
Channels = 0  
SubmittedJobs = 4968  
CompletedJobs = 4968  
SubmittedBytes = 72258005  
CompletedBytes = 168  
TCPFlowsWithoutLCB = 0  
UDPFlowsWithoutLCB = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
TCPMissedPacketsDueToUpdate = 0  
UDPMissedPacketsDueToUpdate = 0  
MemorySize = 1073741824  
HostDirectMemSize = 0  
MaliciousSiteDenyHitCounts  
MaliciousSiteDenyHitCountsAUDIT  
Ethernet Controller Statistics  
Total Packets Received = 0  
Total Received Packets Dropped = 0  
Total Packets Transmitted = 13643"  
sensor#  
Step 3  
Display the statistics for anomaly detection.  
sensor# show statistics anomaly-detection  
Statistics for Virtual Sensor vs0  
No attack  
Detection - ON  
Learning - ON  
Next KB rotation at 10:00:01 UTC Sat Jan 18 2008  
Internal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
External Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Illegal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Statistics for Virtual Sensor vs1  
No attack  
Detection - ON  
Learning - ON  
Next KB rotation at 10:00:00 UTC Sat Jan 18 2008  
Internal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
External Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Illegal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
sensor#  
Step 4  
Step 5  
Display the statistics for authentication.  
sensor# show statistics authentication  
General  
totalAuthenticationAttempts = 128  
failedAuthenticationAttempts = 0  
sensor#  
Display the statistics for the denied attackers in the system.  
sensor# show statistics denied-attackers  
Denied Attackers and hit count for each.  
Denied Attackers and hit count for each.  
Statistics for Virtual Sensor vs0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
Denied Attackers with percent denied and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
Statistics for Virtual Sensor vs1  
Denied Attackers with percent denied and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
sensor#  
Step 6  
Display the statistics for the Event Server.  
sensor# show statistics event-server  
General  
openSubscriptions = 0  
blockedSubscriptions = 0  
Subscriptions  
sensor#  
Step 7  
Display the statistics for the Event Store.  
sensor# show statistics event-store  
EEvent store statistics  
General information about the event store  
The current number of open subscriptions = 2  
The number of events lost by subscriptions and queries = 0  
The number of filtered events not written to the event store = 850763  
The number of queries issued = 0  
The number of times the event store circular buffer has wrapped = 0  
Number of events of each type currently stored  
Status events = 4257  
Shun request events = 0  
Error events, warning = 669  
Error events, error = 8  
Error events, fatal = 0  
Alert events, informational = 0  
Alert events, low = 0  
Alert events, medium = 0  
Alert events, high = 0  
Alert events, threat rating 0-20 = 0  
Alert events, threat rating 21-40 = 0  
Alert events, threat rating 41-60 = 0  
Alert events, threat rating 61-80 = 0  
Alert events, threat rating 81-100 = 0  
Cumulative number of each type of event  
Status events = 4257  
Shun request events = 0  
Error events, warning = 669  
Error events, error = 8  
Error events, fatal = 0  
Alert events, informational = 0  
Alert events, low = 0  
Alert events, medium = 0  
Alert events, high = 0  
Alert events, threat rating 0-20 = 0  
Alert events, threat rating 21-40 = 0  
Alert events, threat rating 41-60 = 0  
Alert events, threat rating 61-80 = 0  
Alert events, threat rating 81-100 = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
sensor#  
Step 8  
Display the statistics for global correlation.  
sensor# show statistics global-correlation  
Network Participation:  
Counters:  
Total Connection Attempts = 0  
Total Connection Failures = 0  
Connection Failures Since Last Success = 0  
Connection History:  
Updates:  
Status Of Last Update Attempt = Disabled  
Time Since Last Successful Update = never  
Counters:  
Update Failures Since Last Success = 0  
Total Update Attempts = 0  
Total Update Failures = 0  
Update Interval In Seconds = 300  
Update Server = update-manifests.ironport.com  
Update Server Address = Unknown  
Current Versions:  
Warnings:  
Unlicensed = Global correlation inspection and reputation filtering have been  
disabled because the sensor is unlicensed.  
Action Required = Obtain a new license from http://www.cisco.com/go/license.  
sensor#  
Step 9  
Display the statistics for the host.  
sensor# show statistics host  
General Statistics  
Last Change To Host Config (UTC) = 25-Jan-2012 02:59:18  
Command Control Port Device = Management0/0  
Network Statistics  
= ma0_0  
Link encap:Ethernet HWaddr 00:04:23:D5:A1:8D  
=
=
=
=
inet addr:10.89.130.98 Bcast:10.89.131.255 Mask:255.255.254.0  
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1  
RX packets:1688325 errors:0 dropped:0 overruns:0 frame:0  
TX packets:38546 errors:0 dropped:0 overruns:0 carrier:0  
collisions:0 txqueuelen:1000  
=
=
=
RX bytes:133194316 (127.0 MiB) TX bytes:5515034 (5.2 MiB)  
Base address:0xcc80 Memory:fcee0000-fcf00000  
NTP Statistics  
status = Not applicable  
Memory Usage  
usedBytes = 1889357824  
freeBytes = 2210988032  
totalBytes = 4100345856  
CPU Statistics  
Note: CPU Usage statistics are not a good indication of the sensor processin load. The  
Inspection Load Percentage in the output of 'show inspection-load' should be used instead.  
Usage over last 5 seconds = 0  
Usage over last minute = 2  
Usage over last 5 minutes = 2  
Usage over last 5 seconds = 0  
Usage over last minute = 1  
Usage over last 5 minutes = 1  
Memory Statistics  
Memory usage (bytes) = 1889357824  
Memory free (bytes) = 2210988032  
Auto Update Statistics  
lastDirectoryReadAttempt = N/A  
lastDownloadAttempt = N/A  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
lastInstallAttempt = N/A  
nextAttempt = N/A  
Auxilliary Processors Installed  
sensor#  
Step 10 Display the statistics for the logging application.  
sensor# show statistics logger  
The number of Log interprocessor FIFO overruns = 0  
The number of syslog messages received = 11  
The number of <evError> events written to the event store by severity  
Fatal Severity = 0  
Error Severity = 64  
Warning Severity = 35  
TOTAL = 99  
The number of log messages written to the message log by severity  
Fatal Severity = 0  
Error Severity = 64  
Warning Severity = 24  
Timing Severity = 311  
Debug Severity = 31522  
Unknown Severity = 7  
TOTAL = 31928  
sensor#  
Step 11 Display the statistics for the ARC.  
sensor# show statistics network-access  
Current Configuration  
LogAllBlockEventsAndSensors = true  
EnableNvramWrite = false  
EnableAclLogging = false  
AllowSensorBlock = false  
BlockMaxEntries = 11  
MaxDeviceInterfaces = 250  
NetDevice  
Type = PIX  
IP = 10.89.150.171  
NATAddr = 0.0.0.0  
Communications = ssh-3des  
NetDevice  
Type = PIX  
IP = 192.0.2.4  
NATAddr = 0.0.0.0  
Communications = ssh-3des  
NetDevice  
Type = PIX  
IP = 192.0.2.5  
NATAddr = 0.0.0.0  
Communications = telnet  
NetDevice  
Type = Cisco  
IP = 192.0.2.6  
NATAddr = 0.0.0.0  
Communications = telnet  
BlockInterface  
InterfaceName = ethernet0/1  
InterfaceDirection = out  
InterfacePostBlock = Post_Acl_Test  
BlockInterface  
InterfaceName = ethernet0/1  
InterfaceDirection = in  
InterfacePreBlock = Pre_Acl_Test  
InterfacePostBlock = Post_Acl_Test  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
NetDevice  
Type = CAT6000_VACL  
IP = 192.0.2.1  
NATAddr = 0.0.0.0  
Communications = telnet  
BlockInterface  
InterfaceName = 502  
InterfacePreBlock = Pre_Acl_Test  
BlockInterface  
InterfaceName = 507  
InterfacePostBlock = Post_Acl_Test  
State  
BlockEnable = true  
NetDevice  
IP = 192.0.2.3  
AclSupport = Does not use ACLs  
Version = 6.3  
State = Active  
Firewall-type = PIX  
NetDevice  
IP = 192.0.2.7  
AclSupport = Does not use ACLs  
Version = 7.0  
State = Active  
Firewall-type = ASA  
NetDevice  
IP = 102.0.2.8  
AclSupport = Does not use ACLs  
Version = 2.2  
State = Active  
Firewall-type = FWSM  
NetDevice  
IP = 192.0.2.9  
AclSupport = uses Named ACLs  
Version = 12.2  
State = Active  
NetDevice  
IP = 192.0.2.10  
AclSupport = Uses VACLs  
Version = 8.4  
State = Active  
BlockedAddr  
Host  
IP = 203.0.113.1  
Vlan =  
ActualIp =  
BlockMinutes =  
Host  
IP = 203.0.113.2  
Vlan =  
ActualIp =  
BlockMinutes =  
Host  
IP = 203.0.113.4  
Vlan =  
ActualIp =  
BlockMinutes = 60  
MinutesRemaining = 24  
Network  
IP = 203.0.113.9  
Mask = 255.255.0.0  
BlockMinutes =  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
Step 12 Display the statistics for the notification application.  
sensor# show statistics notification  
General  
Number of SNMP set requests = 0  
Number of SNMP get requests = 0  
Number of error traps sent = 0  
Number of alert traps sent = 0  
sensor#  
Step 13 Display the statistics for OS identification.  
sensor# show statistics os-identification  
Statistics for Virtual Sensor vs0  
OS Identification  
Configured  
Imported  
Learned  
sensor#  
Step 14 Display the statistics for the SDEE server.  
sensor# show statistics sdee-server  
General  
Open Subscriptions = 1  
Blocked Subscriptions = 1  
Maximum Available Subscriptions = 5  
Maximum Events Per Retrieval = 500  
Subscriptions  
sub-4-d074914f  
State = Read Pending  
Last Read Time = 23:54:16 UTC Wed Nov 30 2011  
Last Read Time (nanoseconds) = 1322697256078549000  
sensor#  
Step 15 Display the statistics for the transaction server.  
sensor# show statistics transaction-server  
General  
totalControlTransactions = 35  
failedControlTransactions = 0  
sensor#  
Step 16 Display the statistics for a virtual sensor.  
sensor# show statistics virtual-sensor vs0  
Statistics for Virtual Sensor vs0  
Name of current Signature-Defintion instance = sig0  
Name of current Event-Action-Rules instance = rules0  
List of interfaces monitored by this virtual sensor =  
General Statistics for this Virtual Sensor  
Number of seconds since a reset of the statistics = 1151770  
MemoryAlloPercent = 23  
MemoryUsedPercent = 22  
MemoryMaxCapacity = 3500000  
MemoryMaxHighUsed = 4193330  
MemoryCurrentAllo = 805452  
MemoryCurrentUsed = 789047  
Processing Load Percentage = 1  
Total packets processed since reset = 0  
Total IP packets processed since reset = 0  
Total IPv4 packets processed since reset = 0  
Total IPv6 packets processed since reset = 0  
Total IPv6 AH packets processed since reset = 0  
Total IPv6 ESP packets processed since reset = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
Total IPv6 Fragment packets processed since reset = 0  
Total IPv6 Routing Header packets processed since reset = 0  
Total IPv6 ICMP packets processed since reset = 0  
Total packets that were not IP processed since reset = 0  
Total TCP packets processed since reset = 0  
Total UDP packets processed since reset = 0  
Total ICMP packets processed since reset = 0  
Total packets that were not TCP, UDP, or ICMP processed since reset = 0  
Total ARP packets processed since reset = 0  
Total ISL encapsulated packets processed since reset = 0  
Total 802.1q encapsulated packets processed since reset = 0  
Total GRE Packets processed since reset = 0  
Total GRE Fragment Packets processed since reset = 0  
Total GRE Packets skipped since reset = 0  
Total GRE Packets with Bad Header skipped since reset = 0  
Total IpIp Packets with Bad Header skipped since reset = 0  
Total Encapsulated Tunnel Packets with Bad Header skipped since reset = 0  
Total packets with bad IP checksums processed since reset = 0  
Total packets with bad layer 4 checksums processed since reset = 0  
Total cross queue TCP packets processed since reset = 0  
Total cross queue UDP packets processed since reset = 0  
Packets dropped due to regex resources unavailable since reset = 0  
Total number of bytes processed since reset = 0  
The rate of packets per second since reset = 0  
The rate of bytes per second since reset = 0  
The average bytes per packet since reset = 0  
Denied Address Information  
Number of Active Denied Attackers = 0  
Number of Denied Attackers Inserted = 0  
Number of Denied Attacker Victim Pairs Inserted = 0  
Number of Denied Attacker Service Pairs Inserted = 0  
Number of Denied Attackers Total Hits = 0  
Number of times max-denied-attackers limited creation of new entry = 0  
Number of exec Clear commands during uptime = 0  
Denied Attackers and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
The Signature Database Statistics.  
The Number of each type of node active in the system  
Total nodes active = 0  
TCP nodes keyed on both IP addresses and both ports = 0  
UDP nodes keyed on both IP addresses and both ports = 0  
IP nodes keyed on both IP addresses = 0  
The number of each type of node inserted since reset  
Total nodes inserted = 0  
TCP nodes keyed on both IP addresses and both ports = 0  
UDP nodes keyed on both IP addresses and both ports = 0  
IP nodes keyed on both IP addresses = 0  
The rate of nodes per second for each time since reset  
Nodes per second = 0  
TCP nodes keyed on both IP addresses and both ports per second = 0  
UDP nodes keyed on both IP addresses and both ports per second = 0  
IP nodes keyed on both IP addresses per second = 0  
The number of root nodes forced to expire because of memory constraints  
TCP nodes keyed on both IP addresses and both ports = 0  
Packets dropped because they would exceed Database insertion rate limits = 0  
Fragment Reassembly Unit Statistics for this Virtual Sensor  
Number of fragments currently in FRU = 0  
Number of datagrams currently in FRU = 0  
Number of fragments received since reset = 0  
Number of fragments forwarded since reset = 0  
Number of fragments dropped since last reset = 0  
Number of fragments modified since last reset = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
Number of complete datagrams reassembled since last reset = 0  
Fragments hitting too many fragments condition since last reset = 0  
Number of overlapping fragments since last reset = 0  
Number of Datagrams too big since last reset = 0  
Number of overwriting fragments since last reset = 0  
Number of Inital fragment missing since last reset = 0  
Fragments hitting the max partial dgrams limit since last reset = 0  
Fragments too small since last reset = 0  
Too many fragments per dgram limit since last reset = 0  
Number of datagram reassembly timeout since last reset = 0  
Too many fragments claiming to be the last since last reset = 0  
Fragments with bad fragment flags since last reset = 0  
TCP Normalizer stage statistics  
Packets Input = 0  
Packets Modified = 0  
Dropped packets from queue = 0  
Dropped packets due to deny-connection = 0  
Duplicate Packets = 0  
Current Streams = 0  
Current Streams Closed = 0  
Current Streams Closing = 0  
Current Streams Embryonic = 0  
Current Streams Established = 0  
Current Streams Denied = 0  
Total SendAck Limited Packets = 0  
Total SendAck Limited Streams = 0  
Total SendAck Packets Sent = 0  
Statistics for the TCP Stream Reassembly Unit  
Current Statistics for the TCP Stream Reassembly Unit  
TCP streams currently in the embryonic state = 0  
TCP streams currently in the established state = 0  
TCP streams currently in the closing state = 0  
TCP streams currently in the system = 0  
TCP Packets currently queued for reassembly = 0  
Cumulative Statistics for the TCP Stream Reassembly Unit since reset  
TCP streams that have been tracked since last reset = 0  
TCP streams that had a gap in the sequence jumped = 0  
TCP streams that was abandoned due to a gap in the sequence = 0  
TCP packets that arrived out of sequence order for their stream = 0  
TCP packets that arrived out of state order for their stream = 0  
The rate of TCP connections tracked per second since reset = 0  
SigEvent Preliminary Stage Statistics  
Number of Alerts received = 0  
Number of Alerts Consumed by AlertInterval = 0  
Number of Alerts Consumed by Event Count = 0  
Number of FireOnce First Alerts = 0  
Number of FireOnce Intermediate Alerts = 0  
Number of Summary First Alerts = 0  
Number of Summary Intermediate Alerts = 0  
Number of Regular Summary Final Alerts = 0  
Number of Global Summary Final Alerts = 0  
Number of Active SigEventDataNodes = 0  
Number of Alerts Output for further processing = 0  
--MORE--  
Step 17 Display the statistics for the web server.  
sensor# show statistics web-server  
listener-443  
session-11  
remote host = 64.101.182.167  
session is persistent = no  
number of requests serviced on current connection = 1  
last status code = 200  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Statistics  
last request method = GET  
last request URI = cgi-bin/sdee-server  
last protocol version = HTTP/1.1  
session state = processingGetServlet  
number of server session requests handled = 957134  
number of server session requests rejected = 0  
total HTTP requests handled = 365871  
maximum number of session objects allowed = 40  
number of idle allocated session objects = 12  
number of busy allocated session objects = 1  
summarized log messages  
number of TCP socket failure messages logged = 0  
number of TLS socket failure messages logged = 0  
number of TLS protocol failure messages logged = 0  
number of TLS connection failure messages logged = 595015  
number of TLS crypto warning messages logged = 0  
number of TLS expired certificate warning messages logged = 0  
number of receipt of TLS fatal alert message messages logged = 594969  
crypto library version = 6.2.1.0  
sensor#  
Step 18 Clear the statistics for an application, for example, the logging application. The statistics are retrieved  
and cleared.  
sensor# show statistics logger clear  
The number of Log interprocessor FIFO overruns = 0  
The number of syslog messages received = 141  
The number of <evError> events written to the event store by severity  
Fatal Severity = 0  
Error Severity = 14  
Warning Severity = 142  
TOTAL = 156  
The number of log messages written to the message log by severity  
Fatal Severity = 0  
Error Severity = 14  
Warning Severity = 1  
Timing Severity = 0  
Debug Severity = 0  
Unknown Severity = 28  
TOTAL = 43  
Step 19 Verify that the statistics have been cleared. The statistics now all begin from 0.  
sensor# show statistics logger  
The number of Log interprocessor FIFO overruns = 0  
The number of syslog messages received = 0  
The number of <evError> events written to the event store by severity  
Fatal Severity = 0  
Error Severity = 0  
Warning Severity = 0  
TOTAL = 0  
The number of log messages written to the message log by severity  
Fatal Severity = 0  
Error Severity = 0  
Warning Severity = 0  
Timing Severity = 0  
Debug Severity = 0  
Unknown Severity = 0  
TOTAL = 0  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Tech Support Information  
Displaying Tech Support Information  
Note  
The show tech-support command now displays historical interface data for each interface for the past  
72 hours.  
Use the show tech-support [page] [destination-url destination_url] command to display system  
information on the screen or have it sent to a specific URL. You can use the information as a  
troubleshooting tool with TAC.  
The following parameters are optional:  
page—Displays the output, one page of information at a time. Press Enter to display the next line  
of output or use the spacebar to display the next page of information.  
destination-url—Indicates the information should be formatted as HTML and sent to the  
destination that follows this command. If you use this keyword, the output is not displayed on the  
screen.  
destination_url—Indicates the information should be formatted as HTML.The URL specifies where  
the information should be sent. If you do not use this keyword, the information is displayed on the  
screen.  
You can specify the following destination types:  
ftp:—Destination URL for FTP network server. The syntax for this prefix is:  
ftp:[[//username@location]/relativeDirectory]/filename or  
ftp:[[//username@location]//absoluteDirectory]/filename.  
scp:—Destination URL for the SCP network server. The syntax for this prefix is:  
scp:[[//username@]location]/relativeDirectory]/filename or  
scp:[[//username@]location]//absoluteDirectory]/filename.  
Varlog Files  
The /var/log/messages file has the latest logs. A new softlink called varlog has been created under the  
/usr/cids/idsRoot/log folder that points to the /var/log/messages file. Old logs are stored in varlog.1 and  
varlog.2 files. The maximum size of these varlog files is 200 KB. Once they cross the size limit the  
content is rotated. The content of varlog, varlog.1, and varlog.2 is displayed in the output of the show  
tech-support command. The log messages (/usr/cids/idsRoot/varlog files) persist only across sensor  
reboots. The old logs are lost during software upgrades.  
Displaying Tech Support Information  
To display tech support information, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
View the output on the screen. The system information appears on the screen, one page at a time. Press  
the spacebar to view the next page or press Ctrl-C to return to the prompt  
sensor# show tech-support page  
Step 3  
To send the output (in HTML format) to a file:  
a. Enter the following command, followed by a valid destination. The password: prompt appears.  
sensor# show tech-support destination-url destination_url  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 17 Administrative Tasks for the Sensor  
Displaying Version Information  
Example  
To send the tech support output to the file /absolute/reports/sensor1Report.html:  
sensor# show tech support dest  
ftp://[email protected]//absolute/reports/sensor1Report.html  
b. Enter the password for this user account. The Generating report: message is displayed.  
Displaying Version Information  
Use the show version command to display version information for all installed operating system  
packages, signature packages, and IPS processes running on the system. To view the configuration for  
the entire system, use the more current-config command.  
Note  
Note  
The CLI output is an example of what your configuration may look like. It will not match exactly due to  
the optional setup choices, sensor model, and IPS version you have installed.  
For the IPS 4500 series sensors, the show version command output contains an extra application called  
the SwitchApp.  
To display the version and configuration, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
View version information.  
sensor# show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Realm Keys  
Signature Definition:  
Signature Update  
OS Version:  
key1.0  
S697.0  
2.6.29.1  
IPS4360  
2013-02-15  
Platform:  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24%  
usage)  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96%  
usage)  
MainApp  
Running  
AnalysisEngine  
Running  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 17 Administrative Tasks for the Sensor  
Displaying Version Information  
CollaborationApp  
Running  
CLI  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
Upgrade History:  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Recovery Partition Version 1.1 - 7.2(1)E4  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
sensor#  
Note  
If the —-MORE-prompt is displayed, press the spacebar to see more information or Ctrl-C to  
cancel the output and get back to the CLI prompt.  
Step 3  
View configuration information.  
Note  
You can use the more current-config or show configuration commands.  
sensor# more current-config  
! ------------------------------  
! Current configuration last modified Fri Apr 19 19:01:05 2013  
! ------------------------------  
! Version 7.2(1)  
! Host:  
!
Realm Keys  
! Signature Definition:  
Signature Update  
key1.0  
!
S697.0  
2013-02-15  
! ------------------------------  
service interface  
physical-interfaces GigabitEthernet0/0  
admin-state enabled  
exit  
physical-interfaces GigabitEthernet0/1  
admin-state enabled  
exit  
inline-interfaces pair0  
interface1 GigabitEthernet0/0  
interface2 GigabitEthernet0/1  
exit  
bypass-mode auto  
exit  
! ------------------------------  
service authentication  
exit  
! ------------------------------  
service event-action-rules rules0  
exit  
! ------------------------------  
service host  
network-settings  
host-ip 10.106.133.159/23,10.106.132.1  
host-name q4360-159  
telnet-option enabled  
access-list 0.0.0.0/0  
dns-primary-server disabled  
dns-secondary-server disabled  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Diagnosing Network Connectivity  
dns-tertiary-server disabled  
exit  
exit  
! ------------------------------  
service logger  
exit  
! ------------------------------  
service network-access  
exit  
! ------------------------------  
service notification  
exit  
! ------------------------------  
service signature-definition sig0  
exit  
! ------------------------------  
service ssh-known-hosts  
exit  
! ------------------------------  
service trusted-certificates  
exit  
! ------------------------------  
service web-server  
websession-inactivity-timeout 3600  
exit  
! ------------------------------  
service anomaly-detection ad0  
exit  
! ------------------------------  
service external-product-interface  
exit  
! ------------------------------  
service health-monitor  
exit  
! ------------------------------  
service global-correlation  
exit  
! ------------------------------  
service aaa  
exit  
! ------------------------------  
service analysis-engine  
virtual-sensor vs0  
logical-interface pair0  
exit  
exit  
sensor#  
Diagnosing Network Connectivity  
Caution  
No command interrupt is available for this command. It must run to completion.  
Use the ping ip_address [count] command to diagnose basic network connectivity.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 17 Administrative Tasks for the Sensor  
Resetting the Appliance  
To diagnose basic network connectivity, follow these steps:  
Log in to the CLI.  
Step 1  
Step 2  
Ping the address you are interested in. The count is the number of echo requests to send. If you do not  
specify a number, 4 requests are sent. The range is 1 to 10,000.  
sensor# ping ip_address count  
The following example shows a successful ping:  
sensor# ping 192.0.2.1 6  
PING 192.0.2.1 (192.0.2.1): 56 data bytes  
64 bytes from 192.0.2.1: icmp_seq=0 ttl=61 time=0.3 ms  
64 bytes from 192.0.2.1: icmp_seq=1 ttl=61 time=0.1 ms  
64 bytes from 192.0.2.1: icmp_seq=2 ttl=61 time=0.1 ms  
64 bytes from 192.0.2.1: icmp_seq=3 ttl=61 time=0.2 ms  
64 bytes from 192.0.2.1: icmp_seq=4 ttl=61 time=0.2 ms  
64 bytes from 192.0.2.1: icmp_seq=5 ttl=61 time=0.2 ms  
--- 192.0.2.1 ping statistics ---  
6 packets transmitted, 6 packets received, 0% packet loss  
round-trip min/avg/max = 0.1/0.1/0.3 ms  
The following example shows an unsuccessful ping:  
sensor# ping 172.16.0.0 3  
PING 172.16.0.0 (172.16.0.0): 56 data bytes  
--- 172.16.0.0 ping statistics ---  
3 packets transmitted, 0 packets received, 100% packet loss  
sensor#  
Resetting the Appliance  
Use the reset [powerdown] command to shut down the applications running on the appliance and to  
reboot the appliance. You can include the powerdown option to power off the appliance, if possible, or  
to have the appliance left in a state where the power can be turned off.  
Shutdown (stopping the applications) begins immediately after you execute the command. Shutdown can  
take a while, and you can still access CLI commands while it is taking place, but the session is terminated  
without warning.  
To reset the appliance, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
To stop all applications and reboot the appliance, follow these Steps 2 and 3. Otherwise, to power down  
the appliance, go to Steps 4 and 5.  
sensor# reset  
Warning: Executing this command will stop all applications and reboot the node.  
Continue with reset? []:  
Step 3  
Enter yes to continue the reset.  
sensor# yes  
Request Succeeded.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 17 Administrative Tasks for the Sensor  
Displaying Command History  
sensor#  
Step 4  
Step 5  
Stop all applications and power down the appliance.  
sensor# reset powerdown  
Warning: Executing this command will stop all applications and power off the node if  
possible. If the node can not be powered off it will be left in a state that is safe to  
manually power down.  
Continue with reset? []:  
Enter yes to continue with the reset and power down.  
sensor# yes  
Request Succeeded.  
sensor#  
For More Information  
To reset the ASA IPS modules, see the following individual procedures:  
Displaying Command History  
Use the show history command to obtain a list of the commands you have entered in the current menu.  
The maximum number of commands in the list is 50.  
To obtain a list of the commands you have used recently, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Show the history of the commands you have used in EXEC mode, for example.  
sensor# show history  
clear line  
configure terminal  
show history  
Step 3  
Show the history of the commands you have used in network access mode, for example.  
sensor# configure terminal  
sensor (config)# service network-access  
sensor (config-net)# show history  
show settings  
show settings terse  
show settings | include profile-name|ip-address  
exit  
show history  
sensor (config-net)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 17 Administrative Tasks for the Sensor  
Displaying Hardware Inventory  
Displaying Hardware Inventory  
Use the show inventory command to display PEP information. This command displays the UDI  
information that consists of the PID, the VID, and the SN of your sensor. If your sensor supports  
SFP/SFP+ modules and Regex accelerator cards, they are also displayed. PEP information provides an  
easy way to obtain the hardware version and serial number through the CLI.  
Note  
The show inventory command now displays the FRUable components of the 4300 series sensors.  
To display PEP information, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the PEP information. You can use this information when dealing with TAC.  
sensor# show inventory  
Name: "Chassis", DESCR: "IPS 4360 with SW, 8 GE data + 1 GE mgmt"  
PID: IPS-4360  
, VID: V00, SN: FCH1504V04T  
Name: "RegexAccelerator/0", DESCR: "LCPX8640 (humphrey)"  
PID: PREAKNESS 2G  
sensor#  
, VID: 335, SN: LXXXXXYYYY  
sensor# show inventory  
Name: "Chassis", DESCR: "IPS 4255 Intrusion Prevention Sensor"  
PID: IPS-4255-K9, VID: V01 , SN: JAB0815R017  
Name: "Power Supply", DESCR: ""  
PID: ASA-180W-PWR-AC, VID: V01 , SN: 123456789AB  
sensor#  
sensor# show inventory  
Name: "Module", DESCR: "ASA 5500 Series Security Services Module-20"  
PID: ASA-SSM-20, VID: V01 , SN: JAB0815R036  
sensor#  
sensor# show inventory  
Name: "Chassis", DESCR: "IPS 4240 Appliance Sensor"  
PID: IPS-4240-K9, VID: V01 , SN: P3000000653  
sensor#  
sensor# show inventory  
Name: "Chassis", DESCR: "IPS 4345 Intrusion Protection System"  
PID: IPS4345  
, VID: V00, SN: FCH1445V00N  
Name: "RegexAccelerator/0", DESCR: "LCPX8640 (humphrey)"  
PID: FCH1442705J  
sensor#  
, VID: 335, SN: LXXXXXYYYY  
sensor# show inventory  
Name: "Module", DESCR: "IPS 4520- 6 Gig E, 4 10 Gig E SFP+"  
PID: IPS-4520-INC-K9 , VID: V01, SN: JAF1547BJTJ  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 17 Administrative Tasks for the Sensor  
Displaying Hardware Inventory  
Name: "Chassis", DESCR: "ASA 5585-X"  
PID: ASA5585 , VID: V02, SN: JMX1552705O  
Name: "power supply 0", DESCR: "ASA 5585-X AC Power Supply"  
PID: ASA5585-PWR-AC , VID: V03, SN: POG153700UC  
Name: "power supply 1", DESCR: "ASA 5585-X AC Power Supply"  
PID: ASA5585-PWR-AC , VID: V03, SN: POG153700SY  
Name: "RegexAccelerator/0", DESCR: "LCPX5110 (LCPX5110)"  
PID: LCPX5110 , VID: 335, SN: SL14200225  
Name: "RegexAccelerator/1", DESCR: "LCPX5110 (LCPX5110)"  
PID: LCPX5110 , VID: 335, SN: SL14200242  
Name: "TenGigabitEthernet0/0", DESCR: "10G Based-SR"  
PID: SFP-10G-SR , VID: V03, SN: AGD152740NV  
Name: "TenGigabitEthernet0/1", DESCR: "10G Based-SR"  
PID: SFP-10G-SR , VID: V03, SN: AGD152741JT  
Name: "TenGigabitEthernet0/2", DESCR: "10G Based-CX-1-5 Passive"  
PID: SFP-H10GB-CU5M , VID: V02, SN: MOC15210458  
Name: "TenGigabitEthernet0/3", DESCR: "10G Based-CX-1-5 Passive"  
PID: SFP-H10GB-CU5M  
, VID: V02, SN: MOC15210458  
sensor# show inventory  
Name: "Module", DESCR: "IPS 4510- 6 Gig E, 4 10 Gig E SFP+"  
PID: IPS-4510-INC-K9 , VID: V01, SN: JAF1546CECE  
Name: "Chassis", DESCR: "ASA 5585-X"  
PID: ASA5585  
, VID: V02, SN: JMX1552705F  
Name: "power supply 0", DESCR: "ASA 5585-X AC Power Supply"  
PID: ASA5585-PWR-AC  
, VID: V03, SN: POG1540001Z  
Name: "power supply 1", DESCR: "ASA 5585-X AC Power Supply"  
PID: ASA5585-PWR-AC , VID: V03, SN: POG1540000B  
Name: "RegexAccelerator/0", DESCR: "LCPX5110 (LCPX5110)"  
PID: LCPX5110 , VID: 335, SN: SL14200223  
Name: "TenGigabitEthernet0/0", DESCR: "10G Based-SR"  
PID: SFP-10G-SR , VID: V03, SN: AGD152740KZ  
Name: "TenGigabitEthernet0/1", DESCR: "10G Based-SR"  
PID: SFP-10G-SR , VID: V03, SN: AGD15264272  
Name: "TenGigabitEthernet0/2", DESCR: "1000Based-SX"  
PID: FTLF8519P2BCL-CS , VID: 000, SN: FNS110210C1  
sensor# show inventory  
Name: "Chassis", DESCR: "IPS 4360 with SW, 8 GE Data + 1 GE Mgmt"  
PID: IPS-4360  
, VID: V01 , SN: FGL162740J6  
Name: "RegexAccelerator/0", DESCR: "LCPX8640 (humphrey)"  
PID: FCH162077NK , VID: 33554537, SN: LXXXXXYYYY  
Name: "power supply 1", DESCR: "IPS4360 AC Power Supply "  
PID: IPS-4360-PWR-AC , VID: 0700A, SN: 25Y1Y8  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Tracing the Route of an IP Packet  
Name: "power supply 2", DESCR: "IPS4360 AC Power Supply "  
PID: IPS-4360-PWR-AC , VID: 0700A, SN: 25Y1Y9  
sensor# show inventory  
Name: "power supply 1", DESCR: "IPS-4345-K9 AC Power Supply "  
PID: IPS-4345-PWR-AC , VID: A1, SN: 000783  
Tracing the Route of an IP Packet  
Caution  
There is no command interrupt available for this command. It must run to completion.  
Use the trace ip_address count command to display the route an IP packet takes to a destination. The  
ip_address option is the address of the system to trace the route to. The count option lets you define how  
many hops you want to take. The default is 4. The valid values are 1 to 256.  
To trace the route of an IP packet, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the route of IP packet you are interested in.  
sensor# trace 10.0.0.1  
traceroute to 10.0.0.1 (10.0.0.1), 4 hops max, 40 byte packets  
1 192.0.2.2 (192.0.2.2) 0.267 ms 0.262 ms 0.236 ms  
2 192.0.2.12 (192.0.2.12) 0.24 ms * 0.399 ms  
3 * 192.0.2.12 (192.0.2.12) 0.424 ms *  
4 192.0.2.12 (192.0.2.12) 0.408 ms * 0.406 ms  
sensor#  
Step 3  
To configure the route to take more hops than the default of 4, use the count option.  
sensor# trace 10.0.0.1 8  
traceroute to 10.0.0.1 (10.0.0.1), 8 hops max, 40 byte packets  
1 192.0.2.2 (192.0.2.2) 0.35 ms 0.261 ms 0.238 ms  
2 192.0.2.12 (192.0.2.12) 0.36 ms * 0.344 ms  
3 * 192.0.2.12 (192.0.2.12) 0.465 ms *  
4 192.0.2.12 (192.0.2.12) 0.319 ms * 0.442 ms  
5 * 192.0.2.12 (192.0.2.12) 0.304 ms *  
6 192.0.2.12 (192.0.2.12) 0.527 ms * 0.402 ms  
7 * 192.0.2.12 (192.0.2.12) 0.39 ms *  
8 192.0.2.12 (192.0.2.12) 0.37 ms * 0.486 ms  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 17 Administrative Tasks for the Sensor  
Displaying Submode Settings  
Displaying Submode Settings  
Use the show settings [terse] command in any submode to view the contents of the current  
configuration.  
To display the current configuration settings for a submode, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Show the current configuration for ARC submode.  
sensor# configure terminal  
sensor (config)# service network-access  
sensor (config-net)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 default: 250  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
block-networks (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
user-profiles (min: 0, max: 250, current: 11)  
-----------------------------------------------  
profile-name: 2admin  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: pix default:  
-----------------------------------------------  
profile-name: r7200  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: netrangr default:  
-----------------------------------------------  
profile-name: insidePix  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: <defaulted>  
-----------------------------------------------  
profile-name: qatest  
-----------------------------------------------  
enable-password: <hidden>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 17 Administrative Tasks for the Sensor  
Displaying Submode Settings  
password: <hidden>  
username: <defaulted>  
-----------------------------------------------  
profile-name: fwsm  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: pix default:  
-----------------------------------------------  
profile-name: outsidePix  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: pix default:  
-----------------------------------------------  
profile-name: cat  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: <defaulted>  
-----------------------------------------------  
profile-name: rcat  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: cisco default:  
-----------------------------------------------  
profile-name: nopass  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: <defaulted>  
-----------------------------------------------  
profile-name: test  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: pix default:  
-----------------------------------------------  
profile-name: sshswitch  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: cisco default:  
-----------------------------------------------  
-----------------------------------------------  
cat6k-devices (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 192.0.2.12  
-----------------------------------------------  
communication: telnet default: ssh-3des  
nat-address: 0.0.0.0 <defaulted>  
profile-name: cat  
block-vlans (min: 0, max: 100, current: 1)  
-----------------------------------------------  
vlan: 1  
-----------------------------------------------  
pre-vacl-name: <defaulted>  
post-vacl-name: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
router-devices (min: 0, max: 250, current: 1)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Submode Settings  
-----------------------------------------------  
ip-address: 192.0.2.25  
-----------------------------------------------  
communication: telnet default: ssh-3des  
nat-address: 0.0.0.0 <defaulted>  
profile-name: r7200  
block-interfaces (min: 0, max: 100, current: 1)  
-----------------------------------------------  
interface-name: fa0/0  
direction: in  
-----------------------------------------------  
pre-acl-name: <defaulted>  
post-acl-name: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
firewall-devices (min: 0, max: 250, current: 2)  
-----------------------------------------------  
ip-address: 192.0.2.30  
-----------------------------------------------  
communication: telnet default: ssh-3des  
nat-address: 0.0.0.0 <defaulted>  
profile-name: insidePix  
-----------------------------------------------  
ip-address: 192.0.2.3  
-----------------------------------------------  
communication: ssh-3des <defaulted>  
nat-address: 0.0.0.0 <defaulted>  
profile-name: f1  
-----------------------------------------------  
-----------------------------------------------  
sensor (config-net)#  
Step 3  
Show the ARC settings in terse mode.  
sensor(config-net)# show settings terse  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 default: 250  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
block-networks (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
user-profiles (min: 0, max: 250, current: 11)  
-----------------------------------------------  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 17 Administrative Tasks for the Sensor  
Displaying Submode Settings  
profile-name: 2admin  
profile-name: r7200  
profile-name: insidePix  
profile-name: qatest  
profile-name: fwsm  
profile-name: outsidePix  
profile-name: cat  
profile-name: rcat  
profile-name: nopass  
profile-name: test  
profile-name: sshswitch  
-----------------------------------------------  
cat6k-devices (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 192.0.2.12  
-----------------------------------------------  
router-devices (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 192.0.2.25  
-----------------------------------------------  
firewall-devices (min: 0, max: 250, current: 2)  
-----------------------------------------------  
ip-address: 192.0.2.30  
ip-address: 192.0.2.3  
-----------------------------------------------  
sensor(config-net)#  
Step 4  
You can use the include keyword to show settings in a filtered output, for example, to show only profile  
names and IP addresses in the ARC configuration.  
sensor(config-net)# show settings | include profile-name|ip-address  
profile-name: 2admin  
profile-name: r7200  
profile-name: insidePix  
profile-name: qatest  
profile-name: fwsm  
profile-name: outsidePix  
profile-name: cat  
profile-name: rcat  
profile-name: nopass  
profile-name: test  
profile-name: sshswitch  
ip-address: 192.0.2.12  
profile-name: cat  
ip-address: 192.0.2.25  
profile-name: r7200  
ip-address: 192.0.2.30  
profile-name: insidePix  
ip-address: 192.0.2.3  
profile-name: test  
sensor(config-net)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
17-52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
18  
Configuring the ASA 5500-X IPS SSP  
This chapter contains procedures that are specific to configuring the ASA 5500-X IPS SSP. It contains  
the following sections:  
Notes and Caveats for ASA 5500-X IPS SSP  
The following notes and caveats apply to configuring the ASA 5500-X IPS SSP:  
The ASA 5500-X IPS SSP is supported in ASA 8.6.1 and later.  
For the ASA 5500-X IPS SSP, normalization is performed by the adaptive security appliance and  
not the IPS.  
The ASA 5500-X IPS SSP does not support the inline TCP session tracking mode.  
The ASA 5500-X IPS SSP does not support CDP mode.  
Anomaly detection is disabled by default.  
All IPS platforms allow ten concurrent CLI sessions.  
The ASA 5500-X IPS SSP does not support bypass mode. The adaptive security appliance will  
either fail open, fail close, or fail over depending on the configuration of the adaptive security  
appliance and the type of activity being done on the IPS.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Configuration Sequence for the ASA 5500-X IPS SSP  
The ASA 5500-X IPS SSP (except the ASA 5512-X IPS SSP and the ASA 5515-X IPS SSP)  
supports the String ICMP XL, String TCP XL, and String UDP XL engines. These engines provide  
optimized operation for these platforms.  
TCP Reset Differences Between IPS Appliances and ASA IPS Modules  
The IPS appliance sends TCP reset packets to both the attacker and victim when reset-tcp-connection is  
selected. The IPS appliance sends a TCP reset packet only to the victim under the following  
circumstances:  
When a deny-packet-inline or deny-connection-inline is selected  
When TCP-based signatures and reset-tcp-connection have NOT been selected  
In the case of the ASA IPS modules, the TCP reset request is sent to the ASA, and then the ASA sends  
the TCP reset packets. The ASA sends TCP reset packets to both the attacker and victim when the  
reset-tcp-connection is selected. When deny-packet-inline or deny-connection-inline is selected, the  
ASA sends the TCP reset packet to either the attacker or victim depending on the configuration of the  
signature. Signatures configured to swap the attacker and victim when reporting the alert can cause the  
ASA to send the TCP reset packet to the attacker.  
Configuration Sequence for the ASA 5500-X IPS SSP  
Perform the following tasks to configure the ASA 5500-X IPS SSP:  
1. Obtain and install the current IPS software if your software is not up to date.  
2. Obtain and install the license key.  
3. Log (session) in to the ASA 5500-X IPS SSP.  
4. Run the setup command to initialize the ASA 5500-X IPS SSP.  
5. Verify initialization for the ASA 5500-X IPS SSP.  
6. Configure the adaptive security appliance to send IPS traffic to the ASA 5500-X IPS SSP.  
7. Perform other initial tasks, such as adding users, trusted hosts, and so forth.  
8. Configure intrusion prevention.  
9. Configure global correlation.  
10. Perform miscellaneous tasks to keep your ASA 5500-X IPS SSP running smoothly.  
11. Upgrade the IPS software with new signature updates and service packs as they become available.  
12. Reimage the ASA 5500-X IPS SSP when needed.  
For More Information  
For the procedure for logging in to the ASA 5500-X IPS SSP, see Chapter ii, “Logging In to the  
For the procedure for running the setup command, see Advanced Setup for the ASA 5500-X IPS  
For the procedure for verifying initialization for the ASA 5500-X IPS SSP, see Verifying  
For the procedure for creating virtual sensors, see Creating Virtual Sensors for the ASA 5500-X IPS  
For the procedures for setting up the ASA 5500-X IPS SSP, see Chapter 3, “Setting Up the Sensor.”  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Verifying Initialization for the ASA 5500-X IPS SSP  
For the procedures for configuring intrusion prevention, see Chapter 8, “Configuring Event Action  
For the procedures for configuring global correlation, see Chapter 10, “Configuring Global  
For the procedures for keeping your ASA 5500-X IPS SSP running smoothly, see Chapter 17,  
For more information on how to obtain Cisco IPS software, see Chapter 20, “Obtaining Software.”  
For the procedure for reimaging the ASA 5500-X IPS SSP, see Installing the System Image for the  
Verifying Initialization for the ASA 5500-X IPS SSP  
You can use the show module slot details command to verify that you have initialized the  
ASA 5500-X IPS SSP and to verify that you have the correct software version.  
To verify initialization, follow these steps:  
Step 1  
Step 2  
Log in to the adaptive security appliance.  
Obtain the details about the ASA 5500-X IPS SSPS.  
asa# show module ips details  
Getting details from the Service Module, please wait...  
Card Type:  
ASA 5555-X IPS Security Services Processor  
Model:  
ASA5555-IPS  
N/A  
FCH151070GW  
N/A  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 503d.e59c.7ca0 to 503d.e59c.7ca0  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data Plane Status: Up  
Status:  
Up  
License:  
Mgmt IP addr:  
IPS Module Enabled perpetual  
192.0.2.2  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled:  
asa#  
192.0.2.254  
0.0.0.0/0  
443  
true  
Step 3  
Confirm the information.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Creating Virtual Sensors for the ASA 5500-X IPS SSP  
Creating Virtual Sensors for the ASA 5500-X IPS SSP  
This section describes how to create virtual sensors on the ASA 5500-X IPS SSP, and contains the  
following topics:  
The ASA 5500-X IPS SSP and Virtualization  
The ASA 5500-X IPS SSP has one sensing interface, PortChannel 0/0. When you create multiple virtual  
sensors, you must assign this interface to only one virtual sensor. For the other virtual sensors you do  
not need to designate an interface.  
After you create virtual sensors, you must map them to a security context on the adaptive security  
appliance using the allocate-ips command. You can map many security contexts to many virtual sensors.  
Note  
The allocate-ips command does not apply to single mode. In this mode, the adaptive security appliance  
accepts any virtual sensor named in a policy-map command.  
The allocate-ips command adds a new entry to the security context database. A warning is issued if the  
specified virtual sensor does not exist; however, the configuration is allowed. The configuration is  
checked again when the service-policy command is processed. If the virtual sensor is not valid, the  
fail-open policy is enforced.  
Virtual Sensor Configuration Sequence for ASA 5500-X IPS SSP  
Follow this sequence to create virtual sensors on the ASA 5500-X IPS SSP, and to assign them to  
adaptive security appliance contexts:  
1. Configure up to four virtual sensors.  
2. Assign the ASA 5500-X IPS SSP sensing interface (PortChannel 0/0) to one of the virtual sensors.  
3. (Optional) Assign virtual sensors to different contexts on the adaptive security appliance.  
4. Use MPF to direct traffic to the targeted virtual sensor.  
Creating Virtual Sensors  
Note  
You can create four virtual sensors.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Creating Virtual Sensors for the ASA 5500-X IPS SSP  
Use the virtual-sensor name command in service analysis engine submode to create virtual sensors on  
the ASA 5500-X IPS SSP. You assign policies (anomaly detection, event action rules, and signature  
definition) to the virtual sensor. You can use the default policies, ad0, rules0, or sig0, or you can create  
new policies.Then you assign the sensing interface, PortChannel 0/0 for the ASA 5500-X IPS SSP to  
one virtual sensor.  
The following options apply:  
anomaly-detection—Specifies the anomaly detection parameters:  
anomaly-detection-name name—Specifies the name of the anomaly detection policy.  
operational-mode—Specifies the anomaly detection mode (inactive, learn, detect).  
Note  
Anomaly detection is disabled by default. You must enable it to configure or apply an  
anomaly detection policy. Enabling anomaly detection results in a decrease in  
performance.  
description—Provides a description of the virtual sensor.  
event-action-rules—Specifies the name of the event action rules policy.  
signature-definition—Specifies the name of the signature definition policy.  
physical-interfaces—Specifies the name of the physical interface.  
no—Removes an entry or selection.  
Creating Virtual Sensors  
To create a virtual sensor on the ASA 5500-X IPS SSP, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter service analysis mode.  
sensor# configure terminal  
sensor(config)# service analysis-engine  
sensor(config-ana)#  
Step 3  
Add a virtual sensor.  
sensor(config-ana)# virtual-sensor vs1  
sensor(config-ana-vir)#  
Step 4  
Step 5  
Add a description for this virtual sensor.  
sensor(config-ana-vir)# description virtual sensor 1  
Assign an anomaly detection policy and operational mode to this virtual sensor if you have enabled  
anomaly detection. If you do not want to use the default anomaly detection policy, ad0, you must create  
a new one using the service anomaly-detection name command, for example, ad1.  
sensor(config-ana-vir)# anomaly-detection  
sensor(config-ana-vir-ano)# anomaly-detection-name ad0  
sensor(config-ana-vir-ano)# operational-mode learn  
Step 6  
Assign an event action rules policy to this virtual sensor. If you do not want to use the default event action  
rules policy, rules0, you must create a new one using the service event-action-rules name command, for  
example, rules1  
sensor(config-ana-vir-ano)# exit  
sensor(config-ana-vir)# event-action-rules rules0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Creating Virtual Sensors for the ASA 5500-X IPS SSP  
Step 7  
Step 8  
Step 9  
Assign a signature definition policy to this virtual sensor. If you do not want to use the default signature  
definition policy, sig0, you must create a new one using the service signature-definition name  
command, for example sig1.  
sensor(config-ana-vir)# signature-definition sig0  
Assign the interface to one virtual sensor. By default the sensing interface is already assigned to the  
default virtual sensor, vs0. You must remove it from the default virtual sensor to assign it to another  
virtual sensor that you create.  
sensor(config-ana-vir)# physical-interface PortChannel0/0  
Verify the virtual sensor settings.  
sensor(config-ana-vir)# show settings  
<protected entry>  
name: vs1  
-----------------------------------------------  
description: virtual sensor 1 default:  
signature-definition: sig0 <protected>  
event-action-rules: rules0 <protected>  
anomaly-detection  
-----------------------------------------------  
anomaly-detection-name: ad0 <protected>  
operational-mode: inactive <defaulted>  
-----------------------------------------------  
physical-interface (min: 0, max: 999999999, current: 1)  
-----------------------------------------------  
name: PortChannel0/0  
-----------------------------------------------  
-----------------------------------------------  
inline-TCP-evasion-protection-mode: strict <defaulted>  
-----------------------------------------------  
sensor(config-ana-vir)#  
Step 10 Exit analysis engine mode.  
sensor(config-ana-vir)# exit  
sensor(config-ana)# exit  
Apply Changes:?[yes]:  
sensor(config)#  
Step 11 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedure for enabling anomaly detection, see Enabling Anomaly Detection, page 9-8.  
For the procedures for creating and configuring anomaly detection policies, see Working With  
For the procedure for creating and configuring event action rules policies, see Working With Event  
For the procedure for creating and configuring signature definitions, Working With Signature  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Creating Virtual Sensors for the ASA 5500-X IPS SSP  
Assigning Virtual Sensors to Adaptive Security Appliance Contexts  
After you create virtual sensors on the ASA 5500-X IPS SSP, you must assign the virtual sensors to a  
security context on the adaptive security appliance.  
The following options apply:  
[no] allocate-ips sensor_name [mapped_name] [default]—Allocates a virtual sensor to a security  
context. Supported modes are multiple mode, system context, and context submode.  
Note  
You cannot allocate the same virtual sensor twice in a context.  
sensor_name—Specifies the name of the virtual sensor configured on the  
ASA 5500-X IPS SSP. You receive a warning message if the name is not valid.  
mapped_name—Specifies the name by which the security context knows the virtual sensor.  
Note  
The mapped name is used to hide the real name of the virtual sensor from the context,  
usually done for reasons of security or convenience to make the context configuration  
more generic. If no mapped name is used, the real virtual sensor name is used. You  
cannot reuse a mapped name for two different virtual sensors in a context.  
no—De-allocates the sensor, looks through the policy map configurations, and deletes any IPS  
subcommand that refers to it.  
default—Specifies this virtual sensor as the default. All legacy IPS configurations that do not  
specify a virtual sensor are mapped to this virtual sensor.  
Caution  
You can only configure one default virtual sensor per context. You must turn off the default flag of an  
existing default virtual sensor before you can designate another virtual sensor as the default.  
clear configure allocate-ips—Removes the configuration.  
allocate-ips?—Displays the list of configured virtual sensors.  
show context [detail]—Updated to display information about virtual sensors. In user context mode,  
a new line is added to show the mapped names of all virtual sensors that have been allocated to this  
context. In system mode, two new lines are added to show the real and mapped names of virtual  
sensors allocated to this context.  
You can assign multiple virtual sensors to a context. Multiple contexts can share one virtual sensor, and  
when sharing, the contexts can have different mapped names (aliases) for the same virtual sensor. The  
following procedure demonstrates how to add three security contexts in multiple mode and how to assign  
virtual sensors to these security contexts.  
Assigning Virtual Sensors to Contexts  
To assign virtual sensors to adaptive security appliance contexts in multiple mode for the  
ASA 5500-X IPS SSP, follow these steps:  
Step 1  
Step 2  
Log in to the adaptive security appliance.  
Display the list of available virtual sensors.  
asa# show ips  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Creating Virtual Sensors for the ASA 5500-X IPS SSP  
Sensor Name  
-----------  
vs0  
Sensor ID  
---------  
1
2
vs1  
asa#  
Step 3  
Step 4  
Enter configuration mode.  
asa# configure terminal  
asa(config)#  
Enter multiple mode.  
asa(config)# mode multiple  
WARNING: This command will change the behavior of the device  
WARNING: This command will initiate a Reboot  
Proceed with change mode? [confirm] yes  
asa(config)#  
Step 5  
Add three context modes to multiple mode.  
asa(config)# admin-context admin  
Creating context 'admin'... Done. (13)  
asa(config)# context admin  
asa(config-ctx)#  
asa(config-ctx)#  
asa(config-ctx)#  
asa(config-ctx)#  
allocate-interface GigabitEthernet0/0.101  
allocate-interface GigabitEthernet0/1.102  
allocate-interface Management0/0  
config-url disk0:/admin.cfg  
Cryptochecksum (changed): 0c34dc67 f413ad74 e297464a db211681  
INFO: Context admin was created with URL disk0:/admin.cfg  
INFO: Admin context will take some time to come up .... please wait.  
asa(config-ctx)#  
asa(config-ctx)# context c2  
Creating context 'c2'... Done. (14)  
asa(config-ctx)#  
asa(config-ctx)#  
asa(config-ctx)#  
allocate-interface GigabitEthernet0/0.103  
allocate-interface GigabitEthernet0/1.104  
config-url disk0:/c2.cfg  
WARNING: Could not fetch the URL disk0:/c2.cfg  
INFO: Creating context with default config  
asa(config-ctx)#  
asa(config-ctx)# context c3  
Creating context 'c3'... Done. (15)  
asa(config-ctx)# all  
asa(config-ctx)# allocate-in  
asa(config-ctx)# allocate-interface g0/2  
asa(config-ctx)# allocate-interface g0/3  
asa(config-ctx)#  
config-url disk0:/c3.cfg  
WARNING: Could not fetch the URL disk0:/c3.cfg  
INFO: Creating context with default config  
asa(config-ctx)#  
Step 6  
Assign virtual sensors to the security contexts.  
asa(config)# context admin  
asa(config-ctx)#  
allocate-ips vs0 adminvs0  
asa(config-ctx)# exit  
asa(config)# context c2  
asa(config-ctx)#  
allocate-ips vs1 c2vs1  
asa(config)# context c3  
asa(config-ctx)# allocate-ips vs0 c3vs0  
asa(config-ctx)# allocate-ips vs1 c3vs1  
asa(config-ctx)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
The ASA 5500-X IPS SSP and Bypass Mode  
Step 7  
Configure MPF for each context.  
Note  
The following example shows context 3 (c3).  
asa(config)# context c3  
asa/c3(config)# class-map any  
asa/c3(config-cmap)# match access-list any  
asa/c3(config-cmap)# exit  
asa/c3(config)# policy-map ips_out  
asa/c3(config-pmap)# class any  
asa/c3(config-pmap-c)# ips promiscuous fail-close sensor c3vs1  
asa/c3(config-pmap-c)# policy-map ips_in  
asa/c3(config-pmap)# class any  
asa/c3(config-pmap-c)# ips inline fail-open sensor c3vs0  
asa/c3(config-pmap-c)# service-policy ips_out interface outside  
asa/c3(config)# service-policy ips_in interface inside  
asa/c3(config)#  
Step 8  
Confirm the configuration.  
asa/c3(config)# exit  
asa(config)# show ips detail  
Sensor Name  
-----------  
vs0  
Sensor ID  
---------  
1
Allocated To  
------------  
admin  
c3  
Mapped Name  
-----------  
adminvs0  
c3vs0  
vs1  
2
c2  
c2vs1  
c3  
c3vs1  
asa(config)#  
The ASA 5500-X IPS SSP and Bypass Mode  
The ASA 5500-X IPS SSP does not support bypass mode. The adaptive security appliance will either  
fail open, fail close, or fail over depending on the configuration of the adaptive security appliance and  
the type of activity being done on the ASA 5500-X IPS SSP.  
The SensorApp Fails  
The following occurs when the SensorApp fails:  
If the adaptive security appliance is configured for failover, then the adaptive security appliance fails  
over.  
If the adaptive security appliance is not configured for failover or failover is not possible:  
If set to fail-open, the adaptive security appliance passes traffic without sending it to the  
ASA IPS module.  
If set to fail-close, the adaptive security appliance stops passing traffic until the ASA IPS  
module is restarted.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 18 Configuring the ASA 5500-X IPS SSP  
The ASA 5500-X IPS SSP and the Normalizer Engine  
The SensorApp is Reconfigured  
The following occurs when the SensorApp is reconfigured:  
If set to fail-open, the adaptive security appliance passes traffic without sending it to the ASA IPS  
module.  
If set to fail-close, the adaptive security appliance stops passing traffic until the ASA IPS module is  
restarted.  
Note  
The adaptive security appliance does not fail over unless the reconfiguration is not completed.  
The ASA 5500-X IPS SSP and the Normalizer Engine  
The majority of the features in the Normalizer engine are not used on the ASA 5500-X IPS SSP, because  
the ASA itself handles the normalization. Packets on the ASA IPS modules go through a special path in  
the Normalizer that only reassembles fragments and puts packets in the right order for the TCP stream.  
The Normalizer does not do any of the normalization that is done on an inline IPS appliance, because  
that causes problems in the way the ASA handles the packets.  
The following Normalizer engine signatures are not supported:  
1300.0  
1304.0  
1305.0  
1307.0  
1308.0  
1309.0  
1311.0  
1315.0  
1316.0  
1317.0  
1330.0  
1330.1  
1330.2  
1330.9  
1330.10  
1330.12  
1330.14  
1330.15  
1330.16  
1330.17  
1330.18  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 18 Configuring the ASA 5500-X IPS SSP  
The ASA 5500-X IPS SSP and Jumbo Packets  
For More Information  
For detailed information about the Normalizer engine, see Normalizer Engine, page B-36.  
The ASA 5500-X IPS SSP and Jumbo Packets  
The jumbo packet count in the show interface command output from the lines Total Jumbo Packets  
Received and Total Jumbo Packets Transmitted for ASA IPS modules may be larger than expected  
due to some packets that were almost jumbo size on the wire being counted as jumbo size by the IPS.  
This miscount is a result of header bytes added to the packet by the ASA before the packet is transmitted  
to the IPS. For IPv4, 58 bytes of header data are added. For IPv6, 78 bytes of header data are added. The  
ASA removes the added IPS header before the packet leaves the ASA.  
The ASA 5500-X IPS SSP and Memory Usage  
For the ASA 5500-X IPS SSP, the memory usage is 93%. The default health thresholds for the sensor  
are 80% for yellow and 91% for red, so the sensor health will be shown as red on these platforms even  
for normal operating conditions. You can tune the threshold percentage for memory usage so that it reads  
more accurately for these platforms by configuring the memory-usage-policy option in the sensor health  
metrics.  
Note  
Make sure you have the memory-usage-policy option in the sensor health metrics enabled.  
Table 18-1 lists the yellow-threshold and the red-threshold health values.  
Table 18-1  
ASA 5500-X IPS SSP Memory Usage Values  
Platform  
Yellow  
85%  
88%  
88%  
93%  
95%  
Red  
Memory Used  
28%  
ASA 5512-X IPS SSP  
ASA 5515-X IPS SSP  
ASA 5525-X IPS SSP  
ASA 5545-X IPS SSP  
ASA 5555-X IPS SSP  
91%  
92%  
92%  
96%  
98%  
14%  
14%  
13%  
17%  
Reloading, Shutting Down, Resetting, and Recovering the  
ASA 5500-X IPS SSP  
Note  
You can enter the sw-module commands from privileged EXEC mode or from global configuration  
mode. You can enter the commands in single routed mode and single transparent mode. For adaptive  
security appliances operating in multi-mode (routed or transparent multi-mode) you can only execute the  
sw-module commands from the system context (not from administrator or user contexts).  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Health and Status Information  
Use the following commands to reload, shut down, reset, recover the password, and recover the  
ASA 5500-X IPS SSP directly from the adaptive security appliance:  
sw-module module ips reload—This command reloads the software on the ASA 5500-X IPS SSP  
without doing a hardware reset. It is effective only when the module is in the Up state.  
sw-module module ips shutdown—This command shuts down the software on the  
ASA 5500-X IPS SSP. It is effective only when the module is in Up state.  
sw-module module ips reset—This command performs a hardware reset of the  
ASA 5500-X IPS SSP. It is applicable when the module is in the Up/Down/Unresponsive/Recover  
states.  
sw-module module ips password-reset—This command restores the cisco CLI account password  
on the ASA 5500-X IPS SSP to the default cisco.  
sw-module module ips recover image disk0:/image name—This command starts the reimage  
process by setting the image location and name. You must first copy the IPS image to the ASA to  
disk0:/.  
sw-module module ips recover boot—This command reimages the ASA 5500-X IPS SSP. It is  
applicable only when the module is in the Up state.  
sw-module module ips recover stop—This command stops the reimage of the ASA 5500-X IPS  
SSP. It is applicable only when the module is in the Recover state.  
Caution  
If the ASA 5500-X IPS SSP recovery needs to be stopped, you must issue the sw-module module ips  
recover stop command within 30 to 45 seconds after starting the recovery. Waiting any longer can lead  
to unexpected consequences. For example, the module may come up in the Unresponsive state.  
sw-module module ips recover configure—Use this command to configure parameters for the  
ASA 5500-X IPS SSP recovery. The essential parameters are the IP address and recovery image  
TFTP URL location.  
Example  
asa-ips# sw-module module ips recover configure image  
disk0:/IPS-SSP_5555-K9-sys-1.1-a-7.2-1-E4.aip  
Image URL [tftp://192.0.2.1/IPS-5545-K9-sys-1.1-a-7.2-1-E4.aip]:  
Port IP Address [192.0.2.226]:  
VLAN ID [0]:  
Gateway IP Address [192.0.2.254]:  
For More Information  
For the procedure for recovering the ASA 5500-X IPS SSP system image, see Installing the System  
Health and Status Information  
To see the general health of the ASA 5500-X IPS SSP, use the show module ips details command.  
asa# show module ips details  
Getting details from the Service Module, please wait...  
Card Type:  
IPS 5555 Intrusion Prevention System  
Model:  
Hardware version:  
Serial Number:  
IPS5555  
N/A  
FCH1504V0CW  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Health and Status Information  
Firmware version:  
Software version:  
N/A  
7.2(1)E4  
MAC Address Range: 503d.e59c.7ca0 to 503d.e59c.7ca0  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data Plane Status: Up  
Status:  
Up  
License:  
Mgmt IP addr:  
IPS Module Enabled perpetual  
192.168.1.2  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt web ports:  
Mgmt TLS enabled:  
asa#  
192.168.1.1  
443  
true  
The output shows that the ASA 5500-X IPS SSP is up. If the status reads Down, you can reset it using the  
sw-module module 1 reset command.  
If you have problems with reimaging the ASA 5500-X IPS SSP, use the debug module-boot command  
to see the output as it boots. Make sure you have the correct IP address for the TFTP server and you have  
the correct file on the TFTP server. Then use the sw-module module ips recover command again to  
reimage the module.  
asa-ips# sw-module module ips recover configure image  
disk0:/IPS-SSP_5555-K9-sys-1.1-a-7.2-1-E4.aip  
Image URL [tftp://192.0.2.1/IPS-5545-K9-sys-1.1-a-7.2-1-E4.aip]:  
Port IP Address [192.0.2.226]:  
VLAN ID [0]:  
Gateway IP Address [192.0.2.254]:  
asa-ips# debug module-boot  
debug module-boot enabled at level 1  
asa-ips# sw-module module ips reload  
Reload module ips? [confirm]  
Reload issued for module ips.  
asa-ips# Mod-ips 228> ***  
Mod-ips 229> *** EVENT: The module is reloading.  
Mod-ips 230> *** TIME: 08:07:36 CST Jan 17 2012  
Mod-ips 231> ***  
Mod-ips 232> Mod-ips 233> The system is going down NOW!  
Mod-ips 234> Sending SIGTERM to all processes  
Mod-ips 235> Sending SIGKILL to all processes  
Mod-ips 236> Requesting system reboot  
Mod-ips 237> e1000 0000:00:07.0: PCI INT A disabled  
Mod-ips 238> e1000 0000:00:06.0: PCI INT A disabled  
Mod-ips 239> e1000 0000:00:05.0: PCI INT A disabled  
Mod-ips 240> Restarting system.  
Mod-ips 241> machine restart  
Mod-ips 242> IVSHMEM: addr = 4093640704 size = 67108864  
Mod-ips 243>  
Booting 'Cisco IPS'  
Mod-ips 244> root (hd0,0)  
Mod-ips 245> Filesystem type is ext2fs, partition type 0x83  
Mod-ips 246> kernel /ips-2.6.ld ro initfsDev=/dev/hda1 init=loader.run rootrw=/dev/hda2  
init  
Mod-ips 247> fs=runtime-image.cpio.bz2 hda=nodma console=ttyS0 plat=saleen htlblow=1  
hugepag  
Mod-ips 248> es=3223  
Mod-ips 249>  
[Linux-bzImage, setup=0x2c00, size=0x2bad80]  
Mod-ips 250> Linux version 2.6.29.1 (ipsbuild@seti-teambuilder-a) (gcc version 4.3.2  
(crosstool  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Health and Status Information  
Mod-ips 251> -NG-1.4.1) ) #56 SMP Tue Dec 6 00:46:11 CST 2011  
Mod-ips 252> Command line: ro initfsDev=/dev/hda1 init=loader.run rootrw=/dev/hda2  
initfs=runti  
Mod-ips 253> me-image.cpio.bz2 hda=nodma console=ttyS0 plat=saleen htlblow=1  
hugepages=3223  
Mod-ips 254> KERNEL supported cpus:  
Mod-ips 255>  
Mod-ips 256>  
Mod-ips 257>  
Intel GenuineIntel  
AMD AuthenticAMD  
Centaur CentaurHauls  
Mod-ips 258> BIOS-provided physical RAM map:  
Mod-ips 259> BIOS-e820: 0000000000000000 - 000000000009f400 (usable)  
Mod-ips 260> BIOS-e820: 000000000009f400 - 00000000000a0000 (reserved)  
Mod-ips 261> BIOS-e820: 00000000000f0000 - 0000000000100000 (reserved)  
Mod-ips 262> BIOS-e820: 0000000000100000 - 00000000dfffd000 (usable)  
Mod-ips 263> BIOS-e820: 00000000dfffd000 - 00000000e0000000 (reserved)  
Mod-ips 264> BIOS-e820: 00000000fffbc000 - 0000000100000000 (reserved)  
Mod-ips 265> BIOS-e820: 0000000100000000 - 0000000201400000 (usable)  
Mod-ips 266> DMI 2.4 present.  
Mod-ips 267> last_pfn = 0x201400 max_arch_pfn = 0x100000000  
Mod-ips 268> last_pfn = 0xdfffd max_arch_pfn = 0x100000000  
Mod-ips 269> init_memory_mapping: 0000000000000000-00000000dfffd000  
Mod-ips 270> last_map_addr: dfffd000 end: dfffd000  
Mod-ips 271> init_memory_mapping: 0000000100000000-0000000201400000  
Mod-ips 272> last_map_addr: 201400000 end: 201400000  
Mod-ips 273> ACPI: RSDP 000F88D0, 0014 (r0 BOCHS )  
Mod-ips 274> ACPI: RSDT DFFFDD00, 0034 (r1 BOCHS BXPCRSDT  
Mod-ips 275> ACPI: FACP DFFFFD90, 0074 (r1 BOCHS BXPCFACP  
1 BXPC  
1 BXPC  
1)  
1)  
Mod-ips 276> FADT: X_PM1a_EVT_BLK.bit_width (16) does not match PM1_EVT_LEN (4)  
Mod-ips 277> ACPI: DSDT DFFFDF10, 1E22 (r1  
Mod-ips 278> ACPI: FACS DFFFFD40, 0040  
BXPC  
BXDSDT  
1 INTL 20090123)  
Mod-ips 279> ACPI: SSDT DFFFDE90, 0079 (r1 BOCHS BXPCSSDT  
Mod-ips 280> ACPI: APIC DFFFDD80, 0090 (r1 BOCHS BXPCAPIC  
Mod-ips 281> ACPI: HPET DFFFDD40, 0038 (r1 BOCHS BXPCHPET  
Mod-ips 282> No NUMA configuration found  
1 BXPC  
1 BXPC  
1 BXPC  
1)  
1)  
1)  
Mod-ips 283> Faking a node at 0000000000000000-0000000201400000  
Mod-ips 284> Bootmem setup node 0 0000000000000000-0000000201400000  
Mod-ips 285>  
Mod-ips 286>  
NODE_DATA [0000000000011000 - 000000000001ffff]  
bootmap [0000000000020000 - 000000000006027f] pages 41  
Mod-ips 287> (6 early reservations) ==> bootmem [0000000000 - 0201400000]  
Mod-ips 288>  
Mod-ips 289>  
Mod-ips 290>  
Mod-ips 291>  
Mod-ips 292>  
Mod-ips 293>  
#0 [0000000000 - 0000001000]  
#1 [0000006000 - 0000008000]  
#2 [0000200000 - 0000d55754]  
#3 [000009f400 - 0000100000]  
#4 [0000008000 - 000000c000]  
#5 [000000c000 - 0000011000]  
BIOS data page ==> [0000000000 - 0000001000]  
TRAMPOLINE ==> [0000006000 - 0000008000]  
TEXT DATA BSS ==> [0000200000 - 0000d55754]  
BIOS reserved ==> [000009f400 - 0000100000]  
PGTABLE ==> [0000008000 - 000000c000]  
PGTABLE ==> [000000c000 - 0000011000]  
Mod-ips 294> found SMP MP-table at [ffff8800000f8920] 000f8920  
Mod-ips 295> Zone PFN ranges:  
Mod-ips 296>  
Mod-ips 297>  
Mod-ips 298>  
DMA  
DMA32  
Normal  
0x00000000 -> 0x00001000  
0x00001000 -> 0x00100000  
0x00100000 -> 0x00201400  
Mod-ips 299> Movable zone start PFN for each node  
Mod-ips 300> early_node_map[3] active PFN ranges  
Mod-ips 301>  
Mod-ips 302>  
Mod-ips 303>  
0: 0x00000000 -> 0x0000009f  
0: 0x00000100 -> 0x000dfffd  
0: 0x00100000 -> 0x00201400  
Mod-ips 304> ACPI: PM-Timer IO Port: 0xb008  
Mod-ips 305> ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled)  
Mod-ips 306> ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled)  
Mod-ips 307> ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)  
Mod-ips 308> ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled)  
Mod-ips 309> ACPI: LAPIC (acpi_id[0x04] lapic_id[0x04] enabled)  
Mod-ips 310> ACPI: LAPIC (acpi_id[0x05] lapic_id[0x05] enabled)  
Mod-ips 311> ACPI: IOAPIC (id[0x06] address[0xfec00000] gsi_base[0])  
Mod-ips 312> IOAPIC[0]: apic_id 6, version 0, address 0xfec00000, GSI 0-23  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Health and Status Information  
Mod-ips 313> ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)  
Mod-ips 314> ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)  
Mod-ips 315> ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)  
Mod-ips 316> ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)  
Mod-ips 317> Using ACPI (MADT) for SMP configuration information  
Mod-ips 318> ACPI: HPET id: 0x8086a201 base: 0xfed00000  
Mod-ips 319> SMP: Allowing 6 CPUs, 0 hotplug CPUs  
Mod-ips 320> Allocating PCI resources starting at e2000000 (gap: e0000000:1ffbc000)  
Mod-ips 321> NR_CPUS:32 nr_cpumask_bits:32 nr_cpu_ids:6 nr_node_ids:1  
Mod-ips 322> PERCPU: Allocating 49152 bytes of per cpu data  
Mod-ips 323> Built 1 zonelists in Zone order, mobility grouping on. Total pages: 1939347  
Mod-ips 324> Policy zone: Normal  
Mod-ips 325> Kernel command line: ro initfsDev=/dev/hda1 init=loader.run rootrw=/dev/hda2  
initf  
Mod-ips 326> s=runtime-image.cpio.bz2 hda=nodma console=ttyS0 plat=saleen htlblow=1  
hugepages=3  
Mod-ips 327> 223  
Mod-ips 328> hugetlb_lowmem_setup: Allocated 2097152 huge pages (size=0x200000) from  
lowmem are  
Mod-ips 329> a at 0xffff88002ee00000 phys addr 0x000000002ee00000  
Mod-ips 330> Initializing CPU#0  
Mod-ips 331> PID hash table entries: 4096 (order: 12, 32768 bytes)  
Mod-ips 332> Fast TSC calibration using PIT  
Mod-ips 333> Detected 2792.965 MHz processor.  
Mod-ips 334> Console: colour VGA+ 80x25  
Mod-ips 335> console [ttyS0] enabled  
Mod-ips 336> Checking aperture...  
Mod-ips 337> No AGP bridge found  
Mod-ips 338> PCI-DMA: Using software bounce buffering for IO (SWIOTLB)  
Mod-ips 339> Placing 64MB software IO TLB between ffff880020000000 - ffff880024000000  
Mod-ips 340> software IO TLB at phys 0x20000000 - 0x24000000  
Mod-ips 341> Memory: 7693472k/8409088k available (3164k kernel code, 524688k absent,  
190928k re  
Mod-ips 342> served, 1511k data, 1032k init)  
Mod-ips 343> Calibrating delay loop (skipped), value calculated using timer frequency..  
5585.93  
Mod-ips 344> BogoMIPS (lpj=2792965)  
Mod-ips 345> Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes)  
Mod-ips 346> Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes)  
Mod-ips 347> Mount-cache hash table entries: 256  
Mod-ips 348> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 349> CPU: L2 cache: 4096K  
Mod-ips 350> CPU 0/0x0 -> Node 0  
Mod-ips 351> Freeing SMP alternatives: 29k freed  
Mod-ips 352> ACPI: Core revision 20081204  
Mod-ips 353> Setting APIC routing to flat  
Mod-ips 354> ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1  
Mod-ips 355> CPU0: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 356> Booting processor 1 APIC 0x1 ip 0x6000  
Mod-ips 357> Initializing CPU#1  
Mod-ips 358> Calibrating delay using timer specific routine.. 5585.16 BogoMIPS  
(lpj=2792581)  
Mod-ips 359> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 360> CPU: L2 cache: 4096K  
Mod-ips 361> CPU 1/0x1 -> Node 0  
Mod-ips 362> CPU1: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 363> checking TSC synchronization [CPU#0 -> CPU#1]:  
Mod-ips 364> Measured 1453783140569731 cycles TSC warp between CPUs, turning off TSC  
clock.  
Mod-ips 365> Marking TSC unstable due to check_tsc_sync_source failed  
Mod-ips 366> Booting processor 2 APIC 0x2 ip 0x6000  
Mod-ips 367> Initializing CPU#2  
Mod-ips 368> Calibrating delay using timer specific routine.. 5580.51 BogoMIPS  
(lpj=2790259)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Health and Status Information  
Mod-ips 369> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 370> CPU: L2 cache: 4096K  
Mod-ips 371> CPU 2/0x2 -> Node 0  
Mod-ips 372> CPU2: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 373> Booting processor 3 APIC 0x3 ip 0x6000  
Mod-ips 374> Initializing CPU#3  
Mod-ips 375> Calibrating delay using timer specific routine.. 5585.18 BogoMIPS  
(lpj=2792594)  
Mod-ips 376> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 377> CPU: L2 cache: 4096K  
Mod-ips 378> CPU 3/0x3 -> Node 0  
Mod-ips 379> CPU3: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 380> Booting processor 4 APIC 0x4 ip 0x6000  
Mod-ips 381> Initializing CPU#4  
Mod-ips 382> Calibrating delay using timer specific routine.. 5585.15 BogoMIPS  
(lpj=2792579)  
Mod-ips 383> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 384> CPU: L2 cache: 4096K  
Mod-ips 385> CPU 4/0x4 -> Node 0  
Mod-ips 386> CPU4: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 387> Booting processor 5 APIC 0x5 ip 0x6000  
Mod-ips 388> Initializing CPU#5  
Mod-ips 389> Calibrating delay using timer specific routine.. 5585.21 BogoMIPS  
(lpj=2792609)  
Mod-ips 390> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 391> CPU: L2 cache: 4096K  
Mod-ips 392> CPU 5/0x5 -> Node 0  
Mod-ips 393> CPU5: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 394> Brought up 6 CPUs  
Mod-ips 395> Total of 6 processors activated (33507.17 BogoMIPS).  
Mod-ips 396> net_namespace: 1312 bytes  
Mod-ips 397> Booting paravirtualized kernel on bare hardware  
Mod-ips 398> NET: Registered protocol family 16  
Mod-ips 399> ACPI: bus type pci registered  
Mod-ips 400> dca service started, version 1.8  
Mod-ips 401> PCI: Using configuration type 1 for base access  
Mod-ips 402> mtrr: your CPUs had inconsistent variable MTRR settings  
Mod-ips 403> mtrr: your CPUs had inconsistent MTRRdefType settings  
Mod-ips 404> mtrr: probably your BIOS does not setup all CPUs.  
Mod-ips 405> mtrr: corrected configuration.  
Mod-ips 406> bio: create slab <bio-0> at 0  
Mod-ips 407> ACPI: Interpreter enabled  
Mod-ips 408> ACPI: (supports S0 S5)  
Mod-ips 409> ACPI: Using IOAPIC for interrupt routing  
Mod-ips 410> ACPI: No dock devices found.  
Mod-ips 411> ACPI: PCI Root Bridge [PCI0] (0000:00)  
Mod-ips 412> pci 0000:00:01.3: quirk: region b000-b03f claimed by PIIX4 ACPI  
Mod-ips 413> pci 0000:00:01.3: quirk: region b100-b10f claimed by PIIX4 SMB  
Mod-ips 414> IVSHMEM: addr = 4093640704 size = 67108864  
Mod-ips 415> ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11)  
Mod-ips 416> ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11)  
Mod-ips 417> ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11)  
Mod-ips 418> ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11)  
Mod-ips 419> SCSI subsystem initialized  
Mod-ips 420> usbcore: registered new interface driver usbfs  
Mod-ips 421> usbcore: registered new interface driver hub  
Mod-ips 422> usbcore: registered new device driver usb  
Mod-ips 423> PCI: Using ACPI for IRQ routing  
Mod-ips 424> pnp: PnP ACPI init  
Mod-ips 425> ACPI: bus type pnp registered  
Mod-ips 426> pnp: PnP ACPI: found 9 devices  
Mod-ips 427> ACPI: ACPI bus type pnp unregistered  
Mod-ips 428> NET: Registered protocol family 2  
Mod-ips 429> IP route cache hash table entries: 262144 (order: 9, 2097152 bytes)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Health and Status Information  
Mod-ips 430> TCP established hash table entries: 524288 (order: 11, 8388608 bytes)  
Mod-ips 431> TCP bind hash table entries: 65536 (order: 8, 1048576 bytes)  
Mod-ips 432> TCP: Hash tables configured (established 524288 bind 65536)  
Mod-ips 433> TCP reno registered  
Mod-ips 434> NET: Registered protocol family 1  
Mod-ips 435> Adding htlb page ffff88002ee00000 phys 000000002ee00000 page ffffe20000a41000  
Mod-ips 436> HugeTLB registered 2 MB page size, pre-allocated 3223 pages  
Mod-ips 437> report_hugepages: Using 1 pages from low memory at ffff88002ee00000 HugeTLB  
FS  
Mod-ips 438> msgmni has been set to 15026  
Mod-ips 439> alg: No test for stdrng (krng)  
Mod-ips 440> io scheduler noop registered  
Mod-ips 441> io scheduler anticipatory registered  
Mod-ips 442> io scheduler deadline registered  
Mod-ips 443> io scheduler cfq registered (default)  
Mod-ips 444> pci 0000:00:00.0: Limiting direct PCI/PCI transfers  
Mod-ips 445> pci 0000:00:01.0: PIIX3: Enabling Passive Release  
Mod-ips 446> pci 0000:00:01.0: Activating ISA DMA hang workarounds  
Mod-ips 447> pci_hotplug: PCI Hot Plug PCI Core version: 0.5  
Mod-ips 448> pciehp: PCI Express Hot Plug Controller Driver version: 0.4  
Mod-ips 449> acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5  
Mod-ips 450> acpiphp_glue: can't get bus number, assuming 0  
Mod-ips 451> decode_hpp: Could not get hotplug parameters. Use defaults  
Mod-ips 452> acpiphp: Slot [1] registered  
Mod-ips 453> acpiphp: Slot [2] registered  
Mod-ips 454> acpiphp: Slot [3] registered  
Mod-ips 455> acpiphp: Slot [4] registered  
Mod-ips 456> acpiphp: Slot [5] registered  
Mod-ips 457> acpiphp: Slot [6] registered  
Mod-ips 458> acpiphp: Slot [7] registered  
Mod-ips 459> acpiphp: Slot [8] registered  
Mod-ips 460> acpiphp: Slot [9] registered  
Mod-ips 461> acpiphp: Slot [10] registered  
Mod-ips 462> acpiphp: Slot [11] registered  
Mod-ips 463> acpiphp: Slot [12] registered  
Mod-ips 464> acpiphp: Slot [13] registered  
Mod-ips 465> acpiphp: Slot [14] registered  
Mod-ips 466> acpiphp: Slot [15] registered  
Mod-ips 467> acpiphp: Slot [16] registered  
Mod-ips 468> acpiphp: Slot [17] registered  
Mod-ips 469> acpiphp: Slot [18] registered  
Mod-ips 470> acpiphp: Slot [19] registered  
Mod-ips 471> acpiphp: Slot [20] registered  
Mod-ips 472> acpiphp: Slot [21] registered  
Mod-ips 473> acpiphp: Slot [22] registered  
Mod-ips 474> acpiphp: Slot [23] registered  
Mod-ips 475> acpiphp: Slot [24] registered  
Mod-ips 476> acpiphp: Slot [25] registered  
Mod-ips 477> acpiphp: Slot [26] registered  
Mod-ips 478> acpiphp: Slot [27] registered  
Mod-ips 479> acpiphp: Slot [28] registered  
Mod-ips 480> acpiphp: Slot [29] registered  
Mod-ips 481> acpiphp: Slot [30] registered  
Mod-ips 482> acpiphp: Slot [31] registered  
Mod-ips 483> shpchp: Standard Hot Plug PCI Controller Driver version: 0.4  
Mod-ips 484> fakephp: Fake PCI Hot Plug Controller Driver  
Mod-ips 485> fakephp: pci_hp_register failed with error -16  
Mod-ips 486> fakephp: pci_hp_register failed with error -16  
Mod-ips 487> fakephp: pci_hp_register failed with error -16  
Mod-ips 488> fakephp: pci_hp_register failed with error -16  
Mod-ips 489> fakephp: pci_hp_register failed with error -16  
Mod-ips 490> fakephp: pci_hp_register failed with error -16  
Mod-ips 491> fakephp: pci_hp_register failed with error -16  
Mod-ips 492> processor ACPI_CPU:00: registered as cooling_device0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Health and Status Information  
Mod-ips 493> processor ACPI_CPU:01: registered as cooling_device1  
Mod-ips 494> processor ACPI_CPU:02: registered as cooling_device2  
Mod-ips 495> processor ACPI_CPU:03: registered as cooling_device3  
Mod-ips 496> processor ACPI_CPU:04: registered as cooling_device4  
Mod-ips 497> processor ACPI_CPU:05: registered as cooling_device5  
Mod-ips 498> hpet_acpi_add: no address or irqs in _CRS  
Mod-ips 499> Non-volatile memory driver v1.3  
Mod-ips 500> Linux agpgart interface v0.103  
Mod-ips 501> ipmi message handler version 39.2  
Mod-ips 502> ipmi device interface  
Mod-ips 503> IPMI System Interface driver.  
Mod-ips 504> ipmi_si: Unable to find any System Interface(s)  
Mod-ips 505> IPMI SMB Interface driver  
Mod-ips 506> IPMI Watchdog: driver initialized  
Mod-ips 507> Copyright (C) 2004 MontaVista Software - IPMI Powerdown via sys_reboot.  
Mod-ips 508> Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled  
Mod-ips 509> ?serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A  
Mod-ips 510> serial8250: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A  
Mod-ips 511> 00:06: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A  
Mod-ips 512> 00:07: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A  
Mod-ips 513> brd: module loaded  
Mod-ips 514> loop: module loaded  
Mod-ips 515> lpc: version 0.1 (Nov 10 2011)  
Mod-ips 516> tun: Universal TUN/TAP device driver, 1.6  
Mod-ips 517> tun: (C) 1999-2004 Max Krasnyansky <[email protected]>  
Mod-ips 518> Uniform Multi-Platform E-IDE driver  
Mod-ips 519> piix 0000:00:01.1: IDE controller (0x8086:0x7010 rev 0x00)  
Mod-ips 520> piix 0000:00:01.1: not 100native mode: will probe irqs later  
Mod-ips 521>  
Mod-ips 522>  
ide0: BM-DMA at 0xc000-0xc007  
ide1: BM-DMA at 0xc008-0xc00f  
Mod-ips 523> hda: QEMU HARDDISK, ATA DISK drive  
Mod-ips 524> Clocksource tsc unstable (delta = 2851415955127 ns)  
Mod-ips 525> hda: MWDMA2 mode selected  
Mod-ips 526> hdc: QEMU DVD-ROM, ATAPI CD/DVD-ROM drive  
Mod-ips 527> hdc: MWDMA2 mode selected  
Mod-ips 528> ide0 at 0x1f0-0x1f7,0x3f6 on irq 14  
Mod-ips 529> ide1 at 0x170-0x177,0x376 on irq 15  
Mod-ips 530> ide_generic: please use "probe_mask=0x3f" module parameter for probing all  
legacy  
Mod-ips 531> ISA IDE ports  
Mod-ips 532> ide-gd driver 1.18  
Mod-ips 533> hda: max request size: 512KiB  
Mod-ips 534> hda: 7815168 sectors (4001 MB) w/256KiB Cache, CHS=7753/255/63  
Mod-ips 535> hda: cache flushes supported  
Mod-ips 536> hda: hda1 hda2 hda3 hda4  
Mod-ips 537> Driver 'sd' needs updating - please use bus_type methods  
Mod-ips 538> Driver 'sr' needs updating - please use bus_type methods  
Mod-ips 539> ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver  
Mod-ips 540> ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver  
Mod-ips 541> uhci_hcd: USB Universal Host Controller Interface driver  
Mod-ips 542> Initializing USB Mass Storage driver...  
Mod-ips 543> usbcore: registered new interface driver usb-storage  
Mod-ips 544> USB Mass Storage support registered.  
Mod-ips 545> PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12  
Mod-ips 546> serio: i8042 KBD port at 0x60,0x64 irq 1  
Mod-ips 547> serio: i8042 AUX port at 0x60,0x64 irq 12  
Mod-ips 548> mice: PS/2 mouse device common for all mice  
Mod-ips 549> rtc_cmos 00:01: rtc core: registered rtc_cmos as rtc0  
Mod-ips 550> rtc0: alarms up to one day, 114 bytes nvram  
Mod-ips 551> input: AT Translated Set 2 keyboard as /class/input/input0  
Mod-ips 552> i2c /dev entries driver  
Mod-ips 553> piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0  
Mod-ips 554> device-mapper: ioctl: 4.14.0-ioctl (2008-04-23) initialised:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
Health and Status Information  
Mod-ips 555> cpuidle: using governor ladder  
Mod-ips 556> usbcore: registered new interface driver usbhid  
Mod-ips 557> usbhid: v2.6:USB HID core driver  
Mod-ips 558> TCP cubic registered  
Mod-ips 559> IPv6: Loaded, but is disabled by default. IPv6 may be enabled on individual  
interf  
Mod-ips 560> aces.  
Mod-ips 561> NET: Registered protocol family 10  
Mod-ips 562> NET: Registered protocol family 17  
Mod-ips 563> NET: Registered protocol family 5  
Mod-ips 564> rtc_cmos 00:01: setting system clock to 2012-01-17 14:06:34 UTC (1326809194)  
Mod-ips 565> Freeing unused kernel memory: 1032k freed  
Mod-ips 566> Write protecting the kernel read-only data: 4272k  
Mod-ips 567> Loader init started...  
Mod-ips 568> kjournald starting. Commit interval 5 seconds  
Mod-ips 569> EXT3-fs: mounted filesystem with ordered data mode.  
Mod-ips 570> input: ImExPS/2 Generic Explorer Mouse as /class/input/input1  
Mod-ips 571> 51216 blocks  
Mod-ips 572> Checking rootrw fs: corrected filesystem  
Mod-ips 573> kjournald starting. Commit interval 5 seconds  
Mod-ips 574> EXT3 FS on hda2, internal journal  
Mod-ips 575> EXT3-fs: mounted filesystem with ordered data mode.  
Mod-ips 576> mkdir: cannot create directory '/lib/modules': File exists  
Mod-ips 577> init started: BusyBox v1.13.1 (2011-11-01 07:21:34 CDT)  
Mod-ips 578> starting pid 678, tty '': '/etc/init.d/rc.init'  
Mod-ips 579> Checking system fs: no errors  
Mod-ips 580> kjournald starting. Commit interval 5 seconds  
Mod-ips 581> EXT3-fs: mounted filesystem with ordered data mode.  
Mod-ips 582> /etc/init.d/rc.init: line 102: /proc/sys/vm/bdflush: No such file or  
directory  
Mod-ips 583> starting pid 728, tty '': '/etc/init.d/rcS'  
Mod-ips 584> Initializing random number generator... done.  
Mod-ips 585> Starting network... ifconfig lo 127.0.0.1 netmask 255.255.255.255 up  
Mod-ips 586> starting inetd  
Mod-ips 587> done  
Mod-ips 588> Starting sshd:  
Mod-ips 589> Starting nscd:  
Mod-ips 590> Set Irq Affinity ... cpus:  
Mod-ips 591> Checking kernel allocated memory: EXT3 FS on hda1, internal journal  
Mod-ips 592> [ OK ]  
Mod-ips 593> Unloading REGEX-CP drivers ...  
Mod-ips 594> Loading REGEX-CP drivers ...  
Mod-ips 595> ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 11  
Mod-ips 596> cpp_user_kvm 0000:00:04.0: PCI INT A -> Link[LNKD] -> GSI 11 (level, high) ->  
IRQ  
Mod-ips 597> 11  
Mod-ips 598> Detected cpp_user_kvm device with 33554432 bytes of shared memory  
Mod-ips 599> Device 0: model=LCPX8640, cpc=T2005, cpe0=None, cpe1=None  
Mod-ips 600> Load cidmodcap:  
Mod-ips 601> Create node:  
Mod-ips 602> ln: /etc/modprobe.conf: File exists  
Mod-ips 603> Shutting down network... ifconfig lo down  
Mod-ips 604> ifconfig lo down  
Mod-ips 605> done  
Mod-ips 606> Load ihm:  
Mod-ips 607> Create node:  
Mod-ips 608> Load kvm_ivshmem: IVSHMEM: writing 0x0 to 0xc86cf8  
Mod-ips 609> IVSHMEM: IntrMask write(w) val = 0xffff  
Mod-ips 610> Create node:  
Mod-ips 611> Create node:  
Mod-ips 612> Create node:  
Mod-ips 613> Set Irq Affinity ... cpus: 6  
Mod-ips 614> Starting network... ifconfig lo 127.0.0.1 netmask 255.255.255.255 up  
Mod-ips 615> done  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
ASA 5500-X IPS SSP Failover Scenarios  
Mod-ips 616> Creating boot.info[ OK ]  
Mod-ips 617> Checking for system modifications since last boot[ OK ]  
Mod-ips 618> Checking model identification[ OK ]  
Mod-ips 619> Model: ASA-5555  
Mod-ips 620> Model=ASA-5555  
Mod-ips 621> Unable to set speed and duplex for user mode interfaces  
Mod-ips 622> interface type 0x8086:0x100e at pci address 0:6.0(0) is currently named eth1  
Mod-ips 623> Renaming eth1 --> ma0_0  
Mod-ips 624> interface type 0x8086:0x100e at pci address 0:7.0(0) is currently named po0_0  
Mod-ips 625> interface type 0x8086:0x100e at pci address 0:5.0(0) is currently named eth0  
Mod-ips 626> Renaming eth0 --> sy0_0  
Mod-ips 627> Initializing access list  
Mod-ips 628> MGMT_INTFC_CIDS_NAME Management0/0  
Mod-ips 629> MGMT_INTFC_OS_NAME ma0_0  
Mod-ips 630> SYSTEM_PCI_IDS 0x0030,0x0028  
Mod-ips 631> Load rebootkom:  
Mod-ips 632> root: Starting SSM controlplane  
Mod-ips 633> Starting CIDS:  
Mod-ips 634> starting pid 1718, tty '/dev/ttyS0': '/sbin/getty -L ttyS0 9600 vt100'  
ASA 5500-X IPS SSP Failover Scenarios  
The following failover scenarios apply to the ASA 5500-X series in the event of configuration changes,  
signature/signature engine updates, service packs, and SensorApp crashes on the ASA 5500-X IPS SSP.  
Single ASA in Fail-Open Mode  
If the ASA is configured in fail-open mode for the ASA 5500-X IPS SSP, and the  
ASA 5500-X IPS SSP experiences a configuration change or signature/signature engine update,  
traffic is passed through the ASA without being inspected.  
If the ASA is configured in fail-open mode for the ASA 5500-X IPS SSP, and the  
ASA 5500-X IPS SSP experiences a SensorApp crash or a service pack upgrade, traffic is passed  
through the ASA without being inspected.  
Single ASA in Fail-Close Mode  
If the ASA is configured in fail-close mode for the ASA 5500-X IPS SSP, and the  
ASA 5500-X IPS SSP experiences a configuration change or a signature/signature engine update,  
traffic is stopped from passing through the ASA.  
If the ASA is configured in fail-close mode for the ASA 5500-X IPS SSP, and the  
ASA 5500-X IPS SSP experiences a SensorApp crash or a service pack upgrade, traffic is stopped  
from passing through the ASA.  
Two ASAs in Fail-Open Mode  
If the ASAs are configured in fail-open mode and if the ASA 5500-X IPS SSP on the active ASA  
experiences a configuration change or a signature/signature engine update, traffic is still passed  
through the active ASA without being inspected. Failover is not triggered.  
If the ASAs are configured in fail-open mode, and if the ASA 5500-X IPS SSP on the active ASA  
experiences a SensorApp crash or a service pack upgrade, failover is triggered and traffic passes  
through the ASA 5500-X IPS SSP that was previously the standby ASA 5500-X IPS SSP.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 18 Configuring the ASA 5500-X IPS SSP  
New and Modified Commands  
Two ASAs in Fail-Close Mode  
If the ASAs are configured in fail-close mode, and if the ASA 5500-X IPS SSP on the active ASA  
experiences a configuration change or a signature/signature engine update, traffic is stopped from  
passing through the active ASA. No failover is triggered.  
If the ASAs are configured in fail-close mode, and if the ASA 5500-X IPS SSP on the active ASA  
experiences a SensorApp crash or a service pack upgrade, failover is triggered and traffic passes  
through the ASA 5500-X IPS SSP that was previously the standby for the ASA 5500-X IPS SSP.  
Configuration Examples  
Use the following configuration for the primary ASA:  
interface GigabitEthernet0/7  
description LAN Failover Interface  
failover  
failover lan unit primary  
failover lan interface folink GigabitEthernet0/7  
failover interface ip folink 172.27.48.1 255.255.255.0 standby 172.27.48.2  
Use the following configuration for the secondary ASA:  
interface GigabitEthernet0/7  
description LAN Failover Interface  
failover  
failover lan unit secondary  
failover lan interface folink GigabitEthernet0/7  
failover interface ip folink 172.27.48.1 255.255.255.0 standby 172.27.48.2  
New and Modified Commands  
This section describes the new and modified Cisco ASA commands that support the  
ASA 5500-X IPS SSP and are used to configure the ASA 5500-X IPS SSP.  
Note  
All other Cisco ASA CLI commands are documented in the Cisco Security Appliance Command  
Reference on Cisco.com at  
This section contains the following topic:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 18 Configuring the ASA 5500-X IPS SSP  
allocate-ips  
allocate-ips  
To allocate an IPS virtual sensor to a security context if you have the ASA 5500-X IPS SSP installed,  
use the allocate-ips command in context configuration mode. To remove a virtual sensor from a context,  
use the no form of this command.  
allocate-ips sensor_name [mapped_name] [default]  
no allocate-ips sensor_name [mapped_name] [default]  
Syntax Description  
default  
(Optional) Sets one sensor per context as the default sensor; if the context  
configuration does not specify a sensor name, the context uses this default  
sensor. You can only configure one default sensor per context. If you want to  
change the default sensor, enter the no allocate-ips sensor_name command  
to remove the current default sensor before you allocate a new default sensor.  
If you do not specify a sensor as the default, and the context configuration  
does not include a sensor name, then traffic uses the default sensor on the  
ASA 5500-X IPS SSP.  
mapped_name  
(Optional) Sets a mapped name as an alias for the sensor name that can be  
used within the context instead of the actual sensor name. If you do not  
specify a mapped name, the sensor name is used within the context. For  
security purposes, you might not want the context administrator to know  
which sensors are being used by the context. Or you might want to genericize  
the context configuration. For example, if you want all contexts to use  
sensors called “sensor1” and “sensor2,” then you can map the “highsec” and  
“lowsec” senors to sensor1 and sensor2 in context A, but map the “medsec”  
and “lowsec” sensors to sensor1 and sensor2 in context B.  
sensor_name  
Sets the sensor name configured on the ASA 5500-X IPS SSP. To view the  
sensors that are configured on the ASA 5500-X IPS SSP, enter allocate-ips  
?. All available sensors are listed. You can also enter the show ips command.  
In the system execution space, the show ips command lists all available  
sensors; if you enter it in the context, it shows the sensors you already  
assigned to the context. If you specify a sensor name that does not yet exist  
on the ASA 5500-X IPS SSP, you get an error, but the allocate-ips command  
is entered as is. Until you create a sensor of that name on the  
ASA 5500-X IPS SSP, the context assumes the sensor is down.  
Defaults  
No default behavior or values.  
Command Modes  
The following table shows the modes in which you can enter the command:  
Firewall Mode  
Security Context  
Multiple  
Command Mode  
Routed  
Transparent Single  
Context  
System  
Context configuration  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 18 Configuring the ASA 5500-X IPS SSP  
allocate-ips  
Command History  
Usage Guidelines  
Release  
Modification  
8.0(2)  
This command was introduced.  
You can assign one or more IPS virtual sensors to each context. Then, when you configure the context  
to send traffic to the ASA 5500-X IPS SSP using the ips command, you can specify a sensor that is  
assigned to the context; you cannot specify a sensor that you did not assign to the context. If you do not  
assign any sensors to a context, then the default sensor configured on the ASA 5500-X IPS SSP is used.  
You can assign the same sensor to multiple contexts.  
Note  
You do not need to be in multiple context mode to use virtual sensors; you can be in single mode and use  
different sensors for different traffic flows.  
Examples  
The following example assigns sensor1 and sensor2 to context A, and sensor1 and sensor3 to context B.  
Both contexts map the sensor names to “ips1” and “ips2.” In context A, sensor1 is set as the default  
sensor, but in context B, no default is set so the default that is configured on the ASA 5500-X IPS SSP  
is used.  
hostname(config-ctx)# context A  
hostname(config-ctx)# allocate-interface gigabitethernet0/0.100 int1  
hostname(config-ctx)# allocate-interface gigabitethernet0/0.102 int2  
hostname(config-ctx)# allocate-interface gigabitethernet0/0.110-gigabitethernet0/0.115  
int3-int8  
hostname(config-ctx)# allocate-ips sensor1 ips1 default  
hostname(config-ctx)# allocate-ips sensor2 ips2  
hostname(config-ctx)# config-url ftp://user1:[email protected]/configlets/test.cfg  
hostname(config-ctx)# member gold  
hostname(config-ctx)# context sample  
hostname(config-ctx)# allocate-interface gigabitethernet0/1.200 int1  
hostname(config-ctx)# allocate-interface gigabitethernet0/1.212 int2  
hostname(config-ctx)# allocate-interface gigabitethernet0/1.230-gigabitethernet0/1.235  
int3-int8  
hostname(config-ctx)# allocate-ips sensor1 ips1  
hostname(config-ctx)# allocate-ips sensor3 ips2  
hostname(config-ctx)# config-url ftp://user1:[email protected]/configlets/sample.cfg  
hostname(config-ctx)# member silver  
Related Commands  
Command  
Description  
context  
Creates a security context in the system configuration and enters context  
configuration mode.  
ips  
Diverts traffic to the ASA 5500-X IPS SSP for inspection.  
show context  
Shows a list of contexts (system execution space) or information about the  
current context.  
show ips  
Shows the virtual sensors configured on the ASA 5500-X IPS SSP.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 18 Configuring the ASA 5500-X IPS SSP  
allocate-ips  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
18-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
19  
Configuring the ASA 5585-X IPS SSP  
This chapter contains procedures that are specific to configuring the ASA 5585-X IPS SSP. It contains  
the following sections:  
ASA 5585-X IPS SSP Notes and Caveats  
The following notes and caveats apply to configuring the ASA 5585-X IPS SSP:  
The ASA 5585-X IPS SSP is supported in ASA 8.2(4.4) and later as well as ASA 8.4(2) and later.  
It is not supported in ASA 8.3(x).  
All IPS platforms allow ten concurrent CLI sessions.  
Anomaly detection is disabled by default.  
The ASA 5585-X IPS SSP does not support CDP mode.  
The ASA 5585-X IPS SSP does not support the inline TCP session tracking mode.  
For the ASA 5585-X IPS SSP, normalization is performed by the adaptive security appliance and  
not the IPS.  
The ASA 5585-X IPS SSP does not support bypass mode. The adaptive security appliance will  
either fail open, fail close, or fail over depending on the configuration of the adaptive security  
appliance and the type of activity being done on the IPS.  
The ASA 5585-X IPS SSP supports the String ICMP XL, String TCP XL, and String UDP XL  
engines. These engines provide optimized operation for these platforms.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Configuration Sequence for the ASA 5585-X IPS SSP  
The ASA 5585-X IPS SSP has four types of ports (console, management, GigabitEthernet, and  
10GE). The console and management ports (on the right front panel of the ASA 5585-X IPS SSP)  
are configured and controlled by IPS software. The GigabitEthernet and 10GE ports (on the left  
front panel of the ASA 5585-X IPS SSP) are configured and controlled by ASA software rather than  
IPS software. However, when you reset or shut down the ASA 5585-X IPS SSP, the GigabitEthernet  
and 10GE ports will also link down. You should reset or shut down the ASA 5585-X IPS SSP during  
scheduled maintenance windows to minimize the effect of the link down on these ports.  
TCP Reset Differences Between IPS Appliances and ASA IPS Modules  
The IPS appliance sends TCP reset packets to both the attacker and victim when reset-tcp-connection is  
selected. The IPS appliance sends a TCP reset packet only to the victim under the following  
circumstances:  
When a deny-packet-inline or deny-connection-inline is selected  
When TCP-based signatures and reset-tcp-connection have NOT been selected  
In the case of the ASA IPS modules, the TCP reset request is sent to the ASA, and then the ASA sends  
the TCP reset packets. The ASA sends TCP reset packets to both the attacker and victim when the  
reset-tcp-connection is selected. When deny-packet-inline or deny-connection-inline is selected, the  
ASA sends the TCP reset packet to either the attacker or victim depending on the configuration of the  
signature. Signatures configured to swap the attacker and victim when reporting the alert can cause the  
ASA to send the TCP reset packet to the attacker.  
Configuration Sequence for the ASA 5585-X IPS SSP  
Perform the following tasks to configure the ASA 5585-X IPS SSP:  
1. Obtain and install the current IPS software if your software is not up to date.  
2. Obtain and install the license key.  
3. Log (session) in to the ASA 5585-X IPS SSP.  
4. Run the setup command to initialize the ASA 5585-X IPS SSP.  
5. Verify initialization for the ASA 5585-X IPS SSP.  
6. Configure the adaptive security appliance to send IPS traffic to the ASA 5585-X IPS SSP.  
7. Perform other initial tasks, such as adding users, trusted hosts, and so forth.  
8. Configure intrusion prevention.  
9. Configure global correlation.  
10. Perform miscellaneous tasks to keep your ASA 5585-X IPS SSP running smoothly.  
11. Upgrade the IPS software with new signature updates and service packs as they become available.  
12. Reimage the ASA 5585-X IPS SSP when needed.  
For More Information  
For the procedure for logging in to the ASA 5585-X IPS SSP, see Chapter ii, “Logging In to the  
For the procedure for running the setup command, see Advanced Setup for the ASA 5585-X IPS  
For the procedure for verifying ASA 5585-X IPS SSP initialization, see Verifying Initialization for  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Verifying Initialization for the ASA 5585-X IPS SSP  
For the procedure for creating virtual sensors, see Creating Virtual Sensors for the ASA 5585-X IPS  
For the procedures for setting up the ASA 5585-X IPS SSP, see Chapter 3, “Setting Up the Sensor.”  
For the procedures for configuring intrusion prevention, see Chapter 8, “Configuring Event Action  
For the procedures for configuring global correlation, see Chapter 10, “Configuring Global  
For the procedures for keeping your ASA 5585-X IPS SSP running smoothly, see Chapter 17,  
For more information on how to obtain Cisco IPS software, see Chapter 20, “Obtaining Software.”  
For the procedure for reimaging the ASA 5585-X IPS SSP, see Installing the System Image for the  
Verifying Initialization for the ASA 5585-X IPS SSP  
You can use the show module slot details command to verify that you have initialized the  
ASA 5585-X IPS SSP and to verify that you have the correct software version.  
To verify initialization, follow these steps:  
Step 1  
Step 2  
Log in to the adaptive security appliance.  
Obtain the details about the ASA 5585-X IPS SSP.  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
ASA 5585-X IPS Security Services Processor-10 with 8GE  
Model:  
ASA5585-SSP-IPS10  
1.0  
JAF1350ABSL  
2.0(1)3  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 8843.e12f.5414 to 8843.e12f.541f  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data plane Status: Up  
Status:  
Up  
Mgmt IP addr:  
192.0.2.3  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt Access List:  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled  
asa  
192.0.2.254  
10.0.0.0/8  
64.0.0.0/8  
443  
true  
Step 3  
Confirm the information.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Creating Virtual Sensors for the ASA 5585-X IPS SSP  
Creating Virtual Sensors for the ASA 5585-X IPS SSP  
This section describes how to create virtual sensors on the ASA 5585-X IPS SSP, and contains the  
following topics:  
The ASA 5585-X IPS SSP and Virtualization  
The ASA 5585-X IPS SSP has two interfaces, the management interface (command and control) and the  
sensing interface. The command and control interface has an IP address and is used for configuring the  
ASA 5585-X IPS SSP. It is used by the ASA 5585-X IPS SSP to transmit security and status events to  
the IDM or IME. The ASA 5585-X IPS SSP command and control interface is named Management 0/0.  
Caution  
The ASA 5585-X IPS SSP has four types of ports (console, management, GigabitEthernet, and 10GE).  
The console and management ports (on the right front panel of the ASA 5585-X IPS SSP) are configured  
and controlled by IPS software. The GigabitEthernet and 10GE ports (on the left front panel of the  
ASA 5585-X IPS SSP) are configured and controlled by ASA software rather than IPS software.  
However, when you reset or shut down the ASA 5585-X IPS SSP, the GigabitEthernet and 10GE ports  
will also link down. You should reset or shut down the ASA 5585-X IPS SSP during scheduled  
maintenance windows to minimize the effect of the link down on these ports.  
The command and control interface is permanently enabled. It is permanently mapped to a specific  
physical interface. You cannot use the command and control interface as either a sensing or alternate  
TCP reset interface.  
Sensing interfaces are used to analyze traffic for security violations. There is only one sensing interface  
on the ASA 5585-X IPS SSP. It is named PortChannel 0/0 and is a backplane interface. All backplane  
interfaces have fixed speed, duplex, and state settings. These settings are protected in the default  
configuration on all backplane interfaces. You configure the ASA 5585-X IPS SSP interface by security  
context on the adaptive security appliance. The sensing interface is permanently enabled. When you  
create multiple virtual sensors, you must assign the sensing interface to only one virtual sensor. For the  
other virtual sensors you do not need to designate an interface.  
After you create virtual sensors, you must map them to a security context on the adaptive security  
appliance using the allocate-ips command. You can map many security contexts to many virtual sensors.  
Note  
The allocate-ips command does not apply to single mode. In this mode, the adaptive security appliance  
accepts any virtual sensor named in a policy-map command.  
The allocate-ips command adds a new entry to the security context database. A warning is issued if the  
specified virtual sensor does not exist; however, the configuration is allowed. The configuration is  
checked again when the service-policy command is processed. If the virtual sensor is not valid, the  
fail-open policy is enforced.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Creating Virtual Sensors for the ASA 5585-X IPS SSP  
The ASA 5585-X IPS SSP Virtual Sensor Configuration Sequence  
Follow this sequence to create virtual sensors on the ASA 5585-X IPS SSP, and to assign them to  
adaptive security appliance contexts:  
1. Configure up to four virtual sensors.  
2. Assign the ASA 5585-X IPS SSP sensing interface (PortChannel 0/0), to one of the virtual sensors.  
3. (Optional) Assign virtual sensors to different contexts on the adaptive security appliance.  
4. Use MPF to direct traffic to the targeted virtual sensor.  
Creating Virtual Sensors  
Note  
You can create four virtual sensors.  
Use the virtual-sensor name command in service analysis engine submode to create virtual sensors on  
the ASA 5585-X IPS SSP. You assign policies (anomaly detection, event action rules, and signature  
definition) to the virtual sensor. You can use the default policies, ad0, rules0, or sig0, or you can create  
new policies.Then you assign the sensing interface, PortChannel 0/0 for the ASA 5500-X IPS SSP, to  
one virtual sensor.  
The following options apply:  
anomaly-detection—Specifies the anomaly detection parameters:  
anomaly-detection-name name—Specifies the name of the anomaly detection policy.  
operational-mode—Specifies the anomaly detection mode (inactive, learn, detect).  
Note  
Anomaly detection is disabled by default. You must enable it to configure or apply an  
anomaly detection policy. Enabling anomaly detection results in a decrease in  
performance.  
description—Provides a description of the virtual sensor.  
event-action-rules—Specifies the name of the event action rules policy.  
signature-definition—Specifies the name of the signature definition policy.  
physical-interfaces—Specifies the name of the physical interface.  
no—Removes an entry or selection.  
Creating Virtual Sensors  
To create a virtual sensor on the ASA 5585-X IPS SSP, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter service analysis mode.  
sensor# configure terminal  
sensor(config)# service analysis-engine  
sensor(config-ana)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                   
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Creating Virtual Sensors for the ASA 5585-X IPS SSP  
Step 3  
Add a virtual sensor.  
sensor(config-ana)# virtual-sensor vs1  
sensor(config-ana-vir)#  
Step 4  
Step 5  
Add a description for this virtual sensor.  
sensor(config-ana-vir)# description virtual sensor 1  
Assign an anomaly detection policy and operational mode to this virtual sensor if you have enabled  
anomaly detection. If you do not want to use the default anomaly detection policy, ad0, you must create  
a new one using the service anomaly-detection name command, for example, ad1.  
sensor(config-ana-vir)# anomaly-detection  
sensor(config-ana-vir-ano)# anomaly-detection-name ad0  
sensor(config-ana-vir-ano)# operational-mode learn  
Step 6  
Assign an event action rules policy to this virtual sensor. If you do not want to use the default event action  
rules policy, rules0, you must create a new one using the service event-action-rules name command, for  
example, rules1  
sensor(config-ana-vir-ano)# exit  
sensor(config-ana-vir)# event-action-rules rules0  
Step 7  
Step 8  
Step 9  
Assign a signature definition policy to this virtual sensor. If you do not want to use the default signature  
definition policy, sig0, you must create a new one using the service signature-definition name  
command, for example sig1.  
sensor(config-ana-vir)# signature-definition sig0  
Assign the interface to one virtual sensor. By default the sensing interface is already assigned to the  
default virtual sensor, vs0. You must remove it from the default virtual sensor to assign it to another  
virtual sensor that you create.  
sensor(config-ana-vir)# physical-interface PortChannel0/0  
Verify the virtual sensor settings.  
sensor(config-ana-vir)# show settings  
name: vs1  
-----------------------------------------------  
description: virtual sensor 1 default:  
signature-definition: sig1 default: sig0  
event-action-rules: rules1 default: rules0  
anomaly-detection  
-----------------------------------------------  
anomaly-detection-name: ad1 default: ad0  
operational-mode: learn default: detect  
-----------------------------------------------  
physical-interface (min: 0, max: 999999999, current: 2)  
-----------------------------------------------  
name: PortChannel0/0  
subinterface-number: 0 <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
logical-interface (min: 0, max: 999999999, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-ana-vir)#  
Step 10 Exit analysis engine mode.  
sensor(config-ana-vir)# exit  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Creating Virtual Sensors for the ASA 5585-X IPS SSP  
sensor(config-ana)# exit  
Apply Changes:?[yes]:  
sensor(config)#  
Step 11 Press Enter to apply the changes or enter no to discard them.  
For More Information  
For the procedures for creating and configuring anomaly detection policies, see Working With  
For the procedure for creating and configuring event action rules policies, see Working With Event  
For the procedure for creating and configuring signature definitions, Working With Signature  
For the procedure for enabling anomaly detection, see Enabling Anomaly Detection, page 9-8.  
Assigning Virtual Sensors to Adaptive Security Appliance Contexts  
After you create virtual sensors on the ASA 5585-X IPS SSP, you must assign the virtual sensors to a  
security context on the adaptive security appliance.  
The following options apply:  
[no] allocate-ips sensor_name [mapped_name] [default]—Allocates a virtual sensor to a security  
context. Supported modes are multiple mode, system context, and context submode.  
Note  
You cannot allocate the same virtual sensor twice in a context.  
sensor_name—Specifies the name of the virtual sensor configured on the  
ASA 5585-X IPS SSP. You receive a warning message if the name is not valid.  
mapped_name—Specifies the name by which the security context knows the virtual sensor.  
Note  
The mapped name is used to hide the real name of the virtual sensor from the context,  
usually done for reasons of security or convenience to make the context configuration  
more generic. If no mapped name is used, the real virtual sensor name is used. You  
cannot reuse a mapped name for two different virtual sensors in a context.  
no—De-allocates the sensor, looks through the policy map configurations, and deletes any IPS  
subcommand that refers to it.  
default—Specifies this virtual sensor as the default. All legacy IPS configurations that do not  
specify a virtual sensor are mapped to this virtual sensor.  
Caution  
You can only configure one default virtual sensor per context. You must turn off the default flag of an  
existing default virtual sensor before you can designate another virtual sensor as the default.  
clear configure allocate-ips—Removes the configuration.  
allocate-ips?—Displays the list of configured virtual sensors.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Creating Virtual Sensors for the ASA 5585-X IPS SSP  
show context [detail]—Updated to display information about virtual sensors. In user context mode,  
a new line is added to show the mapped names of all virtual sensors that have been allocated to this  
context. In system mode, two new lines are added to show the real and mapped names of virtual  
sensors allocated to this context.  
You can assign multiple virtual sensors to a context. Multiple contexts can share one virtual sensor, and  
when sharing, the contexts can have different mapped names (aliases) for the same virtual sensor. The  
following procedure demonstrates how to add three security contexts in multiple mode and how to assign  
virtual sensors to these security contexts.  
Assigning Virtual Sensors to Contexts  
To assign virtual sensors to adaptive security appliance contexts in multiple mode for the  
ASA 5585-X IPS SSP, follow these steps:  
Step 1  
Step 2  
Log in to the adaptive security appliance.  
Display the list of available virtual sensors.  
asa# show ips  
Sensor Name  
-----------  
vs0  
Sensor ID  
---------  
1
2
vs1  
asa#  
Step 3  
Step 4  
Enter configuration mode.  
asa# configure terminal  
asa(config)#  
Enter multiple mode.  
asa(config)# mode multiple  
WARNING: This command will change the behavior of the device  
WARNING: This command will initiate a Reboot  
Proceed with change mode? [confirm] yes  
asa(config)#  
Step 5  
Add three context modes to multiple mode.  
asa(config)# admin-context admin  
Creating context 'admin'... Done. (13)  
asa(config)# context admin  
asa(config-ctx)#  
asa(config-ctx)#  
asa(config-ctx)#  
asa(config-ctx)#  
allocate-interface GigabitEthernet0/0.101  
allocate-interface GigabitEthernet0/1.102  
allocate-interface Management0/0  
config-url disk0:/admin.cfg  
Cryptochecksum (changed): 0c34dc67 f413ad74 e297464a db211681  
INFO: Context admin was created with URL disk0:/admin.cfg  
INFO: Admin context will take some time to come up .... please wait.  
asa(config-ctx)#  
asa(config-ctx)# context c2  
Creating context 'c2'... Done. (14)  
asa(config-ctx)#  
asa(config-ctx)#  
asa(config-ctx)#  
allocate-interface GigabitEthernet0/0.103  
allocate-interface GigabitEthernet0/1.104  
config-url disk0:/c2.cfg  
WARNING: Could not fetch the URL disk0:/c2.cfg  
INFO: Creating context with default config  
asa(config-ctx)#  
asa(config-ctx)# context c3  
Creating context 'c3'... Done. (15)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Creating Virtual Sensors for the ASA 5585-X IPS SSP  
asa(config-ctx)# all  
asa(config-ctx)# allocate-in  
asa(config-ctx)# allocate-interface g0/2  
asa(config-ctx)# allocate-interface g0/3  
asa(config-ctx)#  
config-url disk0:/c3.cfg  
WARNING: Could not fetch the URL disk0:/c3.cfg  
INFO: Creating context with default config  
asa(config-ctx)#  
Step 6  
Assign virtual sensors to the security contexts.  
asa(config)# context admin  
asa(config-ctx)#  
allocate-ips vs0 adminvs0  
asa(config-ctx)# exit  
asa(config)# context c2  
asa(config-ctx)#  
allocate-ips vs1 c2vs1  
asa(config)# context c3  
asa(config-ctx)# allocate-ips vs0 c3vs0  
asa(config-ctx)# allocate-ips vs1 c3vs1  
asa(config-ctx)#  
Step 7  
Configure MPF for each context.  
Note  
The following example shows context 3 (c3).  
asa(config)# context c3  
asa/c3(config)# class-map any  
asa/c3(config-cmap)# match access-list any  
asa/c3(config-cmap)# exit  
asa/c3(config)# policy-map ips_out  
asa/c3(config-pmap)# class any  
asa/c3(config-pmap-c)# ips promiscuous fail-close sensor c3vs1  
asa/c3(config-pmap-c)# policy-map ips_in  
asa/c3(config-pmap)# class any  
asa/c3(config-pmap-c)# ips inline fail-open sensor c3vs0  
asa/c3(config-pmap-c)# service-policy ips_out interface outside  
asa/c3(config)# service-policy ips_in interface inside  
asa/c3(config)#  
Step 8  
Confirm the configuration.  
asa/c3(config)# exit  
asa(config)# show ips detail  
Sensor Name  
-----------  
vs0  
Sensor ID  
---------  
1
Allocated To  
------------  
admin  
c3  
Mapped Name  
-----------  
adminvs0  
c3vs0  
vs1  
2
c2  
c2vs1  
c3  
c3vs1  
asa(config)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 19 Configuring the ASA 5585-X IPS SSP  
The ASA 5585-X IPS SSP and the Normalizer Engine  
The ASA 5585-X IPS SSP and the Normalizer Engine  
The majority of the features in the Normalizer engine are not used on the ASA 5585-X IPS SSP, because  
the ASA itself handles the normalization. Packets on the ASA IPS modules go through a special path in  
the Normalizer that only reassembles fragments and puts packets in the right order for the TCP stream.  
The Normalizer does not do any of the normalization that is done on an inline IPS appliance, because  
that causes problems in the way the ASA handles the packets.  
The following Normalizer engine signatures are not supported:  
1300.0  
1304.0  
1305.0  
1307.0  
1308.0  
1309.0  
1311.0  
1315.0  
1316.0  
1317.0  
1330.0  
1330.1  
1330.2  
1330.9  
1330.10  
1330.12  
1330.14  
1330.15  
1330.16  
1330.17  
1330.18  
For More Information  
For detailed information about the Normalizer engine, see Normalizer Engine, page B-36.  
The ASA 5585-X IPS SSP and Bypass Mode  
The ASA 5585-X IPS SSP does not support bypass mode. The adaptive security appliance will either  
fail open, fail close, or fail over depending on the configuration of the adaptive security appliance and  
the type of activity being done on the ASA 5585-X IPS SSP.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 19 Configuring the ASA 5585-X IPS SSP  
ASA 5585-X IPS SSP and Jumbo Packets  
The SensorApp Fails  
The following occurs when the SensorApp fails:  
If the adaptive security appliance is configured for failover, then the adaptive security appliance fails  
over.  
If the adaptive security appliance is not configured for failover or failover is not possible:  
If set to fail-open, the adaptive security appliance passes traffic without sending it to the  
ASA IPS module.  
If set to fail-close, the adaptive security appliance stops passing traffic until the ASA IPS  
module is restarted.  
The SensorApp is Reconfigured  
The following occurs when the SensorApp is reconfigured:  
If set to fail-open, the adaptive security appliance passes traffic without sending it to the ASA IPS  
module.  
If set to fail-close, the adaptive security appliance stops passing traffic until the ASA IPS module is  
restarted.  
Note  
The adaptive security appliance does not failover unless the reconfiguration is not completed.  
ASA 5585-X IPS SSP and Jumbo Packets  
The jumbo packet count in the show interface command output from the lines Total Jumbo Packets  
Received and Total Jumbo Packets Transmitted for ASA IPS modules may be larger than expected  
due to some packets that were almost jumbo size on the wire being counted as jumbo size by the IPS.  
This miscount is a result of header bytes added to the packet by the ASA before the packet is transmitted  
to the IPS. For IPv4, 58 bytes of header data are added. For IPv6, 78 bytes of header data are added. The  
ASA removes the added IPS header before the packet leaves the ASA.  
Reloading, Shutting Down, Resetting, and Recovering the  
ASA 5585-X IPS SSP  
Note  
You can enter the hw-module commands from privileged EXEC mode or from global configuration  
mode. You can enter the commands in single routed mode and single transparent mode. For adaptive  
security appliances operating in multi-mode (routed or transparent multi-mode) you can only execute the  
hw-module commands from the system context (not from administrator or user contexts).  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Health and Status Information  
Use the following commands to reload, shut down, reset, recover the password, and recover the  
ASA 5585-X IPS SSP directly from the adaptive security appliance:  
hw-module module slot_number reload—This command reloads the software on the  
ASA 5585-X IPS SSP without doing a hardware reset. It is effective only when the module is in the  
Up state.  
hw-module module slot_number shutdown—This command shuts down the software on the  
ASA 5585-X IPS SSP. It is effective only when the module is in Up state.  
hw-module module slot_number reset—This command performs a hardware reset of the  
ASA 5585-X IPS SSP. It is applicable when the module is in the Up/Down/Unresponsive/Recover  
states.  
hw-module module slot_number password-reset—This command restores the cisco CLI account  
password on the ASA 5585-X IPS SSP to the default cisco.  
hw-module module slot_number recover [boot | stop | configure]—The recover command  
displays a set of interactive options for setting or changing the recovery parameters. To change the  
parameter or keep the existing setting, press Enter.  
hw-module module slot_number recover boot—This command initiates recovery of the  
ASA 5585-X IPS SSP. It is applicable only when the module is in the Up state.  
hw-module module slot_number recover stop—This command stops recovery of the  
ASA 5585-X IPS SSP. It is applicable only when the module is in the Recover state.  
Caution  
If the ASA 5585-X IPS SSP recovery needs to be stopped, you must issue the hw-module module 1  
recover stop command within 30 to 45 seconds after starting the recovery. Waiting any longer can lead  
to unexpected consequences. For example, the module may come up in the Unresponsive state.  
hw-module module 1 recover configure—Use this command to configure parameters for the  
ASA 5585-X IPS SSP recovery. The essential parameters are the IP address and recovery image  
TFTP URL location.  
Example  
ips-ssp# hardware-module module 1 recover configure  
Image URL [tftp://10.89.146.1/IPS-SSP_10-K9-sys-1.1-a-7.2-1-E4.img]:  
Port IP Address [10.89.149.226]:  
VLAN ID [0]:  
Gateway IP Address [10.89.149.254]:  
For More Information  
For the procedure for recovering the ASA 5585-X IPS SSP system image, see Installing the System  
Health and Status Information  
To see the general health of the ASA 5585-X IPS SSP, use the show module 1 details command.  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(1)3  
Hardware version:  
Serial Number:  
Firmware version:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Health and Status Information  
Software version:  
7.2(1)E4  
MAC Address Range: 8843.e12f.5414 to 8843.e12f.541f  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data plane Status: Up  
Status:  
Up  
Mgmt IP addr:  
192.0.2.3  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt Access List:  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled  
asa  
192.0.2.254  
10.0.0.0/8  
64.0.0.0/8  
443  
true  
The output shows that the ASA 5585-X IPS SSP is up. If the status reads Down, you can reset it using the  
hw-module module 1 reset command.  
asa# hw-module module 1 reset  
The module in slot 1 should be shut down before  
resetting it or loss of configuration may occur.  
Reset module in slot 1? [confirm]  
Reset issued for module in slot 1  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
Unable to read details from slot 1  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Not Applicable  
Not Applicable  
7.2(1)E4  
Data plane Status: Not Applicable  
Status: Shutting Down  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
Unable to read details from slot 1  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Not Applicable  
Not Applicable  
7.2(1)E4  
Data plane Status: Not Applicable  
Status: Down  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
Unable to read details from slot 1  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
Hardware version:  
Serial Number:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Health and Status Information  
Firmware version:  
Software version:  
2.0(7)0  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Not Applicable  
Not Applicable  
7.2(1)E4  
Data plane Status: Not Applicable  
Status: Init  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Reload  
Starting up  
7.2(1)E4  
Data plane Status: Down  
Status:  
Up  
Mgmt IP addr:  
192.0.2.3  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
192.0.2.254  
0.0.0.0/0  
443  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled:  
true  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data plane Status: Up  
Status:  
Up  
Mgmt IP addr:  
192.0.2.3  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled:  
asa#  
192.0.2.254  
0.0.0.0/0  
443  
true  
If you have problems with reimaging the ASA 5585-X IPS SSP, use the debug module-boot command  
to see the output as it boots. Make sure you have the correct IP address for the TFTP server and you have  
the correct file on the TFTP server. Then use the hw-module module 1 recover command again to  
reimage the module.  
ips-ssp# hw-module module 1 recover configure  
Image URL [tftp://0.0.0.0/]: tftp://10.10.10.10//IPS-SSP_20-K9-sys-1.1-a-7.2-1-E4.img  
Port IP Address [0.0.0.0]: 10.10.10.11  
VLAN ID [0]:  
Gateway IP Address [0.0.0.0]: 10.10.10.254  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Traffic Flow Stopped on IPS Switchports  
asa(config)# debug module-boot  
debug module-boot enabled at level 1  
asa(config)# hw-module module 1 recover boot  
The module in slot 1 will be recovered. This may erase all configuration and all data on  
that device and attempt to download a new image for it.  
Recover module in slot 1? [confirm]  
Recover issued for module in slot 1  
asa(config)# Slot-1 140> Cisco Systems ROMMON Version (1.0(10)0) #0: Fri Mar 25 23:02:10  
PST 2010  
Slot-1 141> Platform ASA5585-SSP-IPS20  
Slot-1 142> GigabitEthernet0/0  
Slot-1 143> Link is UP  
Slot-1 144> MAC Address: 000b.fcf8.0176  
Slot-1 145> ROMMON Variable Settings:  
Slot-1 146>  
Slot-1 147>  
Slot-1 148>  
Slot-1 149>  
Slot-1 150>  
Slot-1 151>  
Slot-1 152>  
Slot-1 153>  
Slot-1 154>  
Slot-1 155>  
ADDRESS=192.0.2.3  
SERVER=192.0.2.15  
GATEWAY=192.0.2.254  
PORT=GigabitEthernet0/0  
VLAN=untagged  
IMAGE=IPS-SSP-K9-sys-1.1-a-7.2-1.img  
CONFIG=  
LINKTIMEOUT=20  
PKTTIMEOUT=4  
RETRY=20  
Slot-1 156> tftp [email protected] via 192.0.2.254  
Slot-1 157> TFTP failure: Packet verify failed after 20 retries  
Slot-1 158> Rebooting due to Autoboot error ...  
Slot-1 159> Rebooting....  
Slot-1 160> Cisco Systems ROMMON Version (1.0(10)0) #0: Fri Mar 25 23:02:10 PST 2010  
Slot-1 161> Platform ASA5585-SSP-IPS20  
Slot-1 162> GigabitEthernet0/0  
Slot-1 163> Link is UP  
Slot-1 164> MAC Address: 000b.fcf8.0176  
Slot-1 165> ROMMON Variable Settings:  
Slot-1 166>  
Slot-1 167>  
Slot-1 168>  
Slot-1 169>  
Slot-1 170>  
Slot-1 171>  
Slot-1 172>  
Slot-1 173>  
Slot-1 174>  
Slot-1 175>  
ADDRESS=192.0.2.3  
SERVER=192.0.2.15  
GATEWAY=192.0.2.254  
PORT=GigabitEthernet0/0  
VLAN=untagged  
IMAGE=IPS-SSP_10-K9-sys-1.1-a-7.2-1.img  
CONFIG=  
LINKTIMEOUT=20  
PKTTIMEOUT=4  
RETRY=20  
Slot-1 176> tftp [email protected] via 192.0.2.254  
Traffic Flow Stopped on IPS Switchports  
Problem Traffic on any port located on the ASA 5585-X IPS SSP (1/x) no longer passes through the  
adaptive security appliance when the ASA 5585-X IPS SSP is reset or shut down. This affects all traffic  
through these ports regardless of whether or not the traffic would have been monitored by the IPS. The  
link on the ports will link down when the ASA 5585-X IPS SSP is reset or shut down.  
Possible Cause Using the ports located on the ASA 5585-X IPS SSP (1/x), and resetting or shutting  
it down via any mechanism.  
Solution Use the ports on the adaptive security appliance (0/x) instead because those ports do not lose  
their link when the ASA 5585-X IPS SSP is reset or shut down.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Failover Scenarios  
Failover Scenarios  
The following failover scenarios apply to the ASA 5585-X in the event of configuration changes,  
signature/signature engine updates, service packs, and SensorApp crashes on the ASA 5585-X IPS SSP.  
Single ASA 5585-X in Fail-Open Mode  
If the ASA is configured in fail-open mode for the ASA 5585-X IPS SSP, and the  
ASA 5585-X IPS SSP experiences a configuration change or signature/signature engine update,  
traffic is passed through the ASA without being inspected.  
If the ASA is configured in fail-open mode for the ASA 5585-X IPS SSP, and the  
ASA 5585-X IPS SSP experiences a SensorApp crash or a service pack upgrade, traffic is passed  
through the ASA without being inspected.  
Single ASA 5585-X in Fail-Close Mode  
If the ASA is configured in fail-close mode for the ASA 5585-X IPS SSP, and the  
ASA 5585-X IPS SSP experiences a configuration change or a signature/signature engine update,  
traffic is stopped from passing through the ASA.  
If the ASA is configured in fail-close mode for the ASA 5585-X IPS SSP, and the  
ASA 5585-X IPS SSP experiences a SensorApp crash or a service pack upgrade, traffic is stopped  
from passing through the ASA.  
Two ASA 5585-Xs in Fail-Open Mode  
If the ASAs are configured in fail-open mode and if the ASA 5585-X IPS SSP on the active ASA  
experiences a configuration change or a signature/signature engine update, traffic is still passed  
through the active ASA without being inspected. Failover is not triggered.  
If the ASAs are configured in fail-open mode, and if the ASA 5585-X IPS SSP on the active ASA  
experiences a SensorApp crash or a service pack upgrade, failover is triggered and traffic passes  
through the ASA 5585-X IPS SSP that was previously the standby ASA 5585-X IPS SSP.  
Two ASA 5585-Xs in Fail-Close Mode  
If the ASAs are configured in fail-close mode, and if the ASA 5585-X IPS SSP on the active ASA  
experiences a configuration change or a signature/signature engine update, traffic is stopped from  
passing through the active ASA. No failover is triggered.  
If the ASAs are configured in fail-close mode, and if the ASA 5585-X IPS SSP on the active ASA  
experiences a SensorApp crash or a service pack upgrade, failover is triggered and traffic passes  
through the ASA 5585-X IPS SSP that was previously the standby for the ASA 5585-X IPS SSP.  
Configuration Examples  
Use the following configuration for the primary ASA:  
interface GigabitEthernet0/7  
description LAN Failover Interface  
failover  
failover lan unit primary  
failover lan interface folink GigabitEthernet0/7  
failover interface ip folink 172.27.48.1 255.255.255.0 standby 172.27.48.2  
Use the following configuration for the secondary ASA:  
interface GigabitEthernet0/7  
description LAN Failover Interface  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Failover Scenarios  
failover  
failover lan unit secondary  
failover lan interface folink GigabitEthernet0/7  
failover interface ip folink 172.27.48.1 255.255.255.0 standby 172.27.48.2  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 19 Configuring the ASA 5585-X IPS SSP  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
19-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C H A P T E R  
20  
Obtaining Software  
This chapter provides information on obtaining the latest Cisco IPS software. It contains the following  
sections:  
IPS 7.2 File List  
The currently supported IPS 7.2(x) version is 7.2(1)E4. For a list of the specific IPS filenames and the  
IPS versions that each sensor supports, refer to the Release Notes for your IPS version found at this URL:  
Obtaining Cisco IPS Software  
You can find major and minor updates, service packs, signature and signature engine updates, system  
and recovery files, firmware upgrades, and Readmes on the Download Software site on Cisco.com.  
Signature updates are posted to Cisco.com approximately every week, more often if needed. Service  
packs are posted to Cisco.com in a release train format, a new release every three months. Major and  
minor updates are also posted periodically. Check Cisco.com regularly for the latest IPS software.  
You must have an account with cryptographic access before you can download software. You set this  
account up the first time you download IPS software from the Download Software site.  
Note  
You must be logged in to Cisco.com to download software. You must have an active IPS maintenance  
contract and a Cisco.com password to download software. You must have a sensor license to apply  
signature updates.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
20-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Chapter 20 Obtaining Software  
IPS Software Versioning  
Downloading Cisco IPS Software  
To download software on Cisco.com, follow these steps:  
Step 1  
Step 2  
Step 3  
Step 4  
Step 5  
Step 6  
Log in to Cisco.com.  
From the Support drop-down menu, choose Download Software.  
Under Select a Software Product Category, choose Security Software.  
Choose Intrusion Prevention System (IPS).  
Enter your username and password.  
In the Download Software window, choose IPS Appliances > Cisco Intrusion Prevention System and  
then click the version you want to download.  
Note  
You must have an IPS subscription service license to download software.  
Step 7  
Click the type of software file you need. The available files appear in a list in the right side of the  
window. You can sort by file name, file size, memory, and release date. And you can access the Release  
Notes and other product documentation.  
Step 8  
Step 9  
Click the file you want to download. The file details appear.  
Verify that it is the correct file, and click Download.  
Step 10 Click Agree to accept the software download rules. The File Download dialog box appears. The first  
time you download a file from Cisco.com, you must fill in the Encryption Software Export Distribution  
Authorization form before you can download the software.  
a. Fill out the form and click Submit. The Cisco Systems Inc. Encryption Software Usage Handling  
and Distribution Policy appears.  
b. Read the policy and click I Accept. The Encryption Software Export/Distribution Form appears.  
If you previously filled out the Encryption Software Export Distribution Authorization form, and read  
and accepted the Cisco Systems Inc. Encryption Software Usage Handling and Distribution Policy, these  
forms are not displayed again.  
Step 11 Open the file or save it to your computer.  
Step 12 Follow the instructions in the Readme or the Release Notes to install the update.  
For More Information  
For an explanation of the IPS file versioning scheme, see IPS Software Versioning, page 20-2.  
IPS Software Versioning  
When you download IPS software images from Cisco.com, you should understand the versioning  
scheme so that you know which files are base files, which are cumulative, and which are incremental.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
20-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 20 Obtaining Software  
IPS Software Versioning  
Major Update  
A major update contains new functionality or an architectural change in the product. For example, the  
Cisco IPS 7.2 base version includes everything (except deprecated features) since the previous major  
release (the minor update features, service pack fixes, and signature updates) plus any new changes.  
Major update 7.2(1) requires 5.1(6) and later. With each major update there are corresponding system  
and recovery packages.  
Note  
The 7.2(1) major update is used to upgrade 5.1(6) and later sensors to 7.2(1) If you are reinstalling 7.2(1)  
on a sensor that already has 7.2(1) installed, use the system image or recovery procedures rather than the  
major update.  
Minor Update  
A minor update is incremental to the major version. Minor updates are also base versions for service  
packs. The first minor update for 7.2 is 7.3. Minor updates are released for minor enhancements to the  
product. Minor updates contain all previous minor features (except deprecated features), service pack  
fixes, signature updates since the last major version, and the new minor features being released. You can  
install the minor updates on the previous major or minor version (and often even on earlier versions).  
The minimum supported version needed to upgrade to the newest minor version is listed in the Readme  
that accompanies the minor update. With each minor update there are corresponding system and  
recovery packages.  
Service Pack  
A service packs is cumulative following a base version release (minor or major). Service packs are  
released in a train release format with several new features per train. Service packs contain all service  
pack fixes since the last base version (minor or major) and the new features and defect fixes being  
released. Service packs require the minor version. The minimum supported version needed to upgrade  
to the newest service pack is listed in the Readme that accompanies the service pack. Service packs also  
include the latest engine update. For example, if service pack 7.2(3) is released, and E4 is the latest  
engine level, the service pack is released as 7.2(3)E4.  
Patch Release  
A patch release is used to address defects that are identified in the upgrade binaries after a software  
release. Rather than waiting until the next major or minor update, or service pack to address these  
defects, a patch can be posted. Patches include all prior patch releases within the associated service pack  
level. The patches roll into the next official major or minor update, or service pack.  
Before you can install a patch release, the most recent major or minor update, or service pack must be  
installed. For example, patch release 7.2(1p1) requires 7.2(1).  
Note  
Upgrading to a newer patch does not require you to uninstall the old patch. For example, you can upgrade  
from patch 7.2(1p1) to 7.2(1p2) without first uninstalling 7.2(1p1).  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
20-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 20 Obtaining Software  
IPS Software Versioning  
Figure 20-1 illustrates what each part of the IPS software file represents for major and minor updates,  
service packs, and patch releases.  
Figure 20-1  
IPS Software File Name for Major and Minor Updates, Service Packs, and Patch  
Releases  
IPS-identifier-K9-x.y-z[a or p1]-E1.pkg  
Product line  
Platform identifier  
Strong crypto designator  
Major version level  
Minor version level  
Service pack level  
Repackage level  
Patch level  
Signature engine level  
File extension  
Signature Update  
A signature update is a package file containing a set of rules designed to recognize malicious network  
activities. Signature updates are released independently from other software updates. Each time a major  
or minor update is released, you can install signature updates on the new version and the next oldest  
version for a period of at least six months. Signature updates are dependent on a required signature  
engine version. Because of this, a req designator lists the signature engine required to support a  
particular signature update.  
Figure 20-3 illustrates what each part of the IPS software file represents for signature updates.  
Figure 20-2  
IPS Software File Name for Signature Updates  
IPS-identifier-[sig]-[S]-req-E1.pkg  
Product line  
Platform identifier  
Package type  
Signature update  
Software version requirement designator  
Required engine version  
File extension  
Signature Engine Update  
A signature engine update is an executable file containing binary code to support new signature updates.  
Signature engine files require a specific service pack, which is also identified by the req designator.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
20-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 20 Obtaining Software  
IPS Software Versioning  
Figure 20-3 illustrates what each part of the IPS software file represents for signature engine updates.  
Figure 20-3  
IPS Software File Name for Signature Engine Updates  
IPS-identifier-[engine]-[E]-req-x.y-z.pkg  
Product line  
Platform identifier  
Package type  
Signature engine level  
Software version requirement designator  
Required software version  
File extension  
Recovery and System Image Files  
Recovery and system image files contain separate versions for the installer and the underlying  
application. The installer version contains a major and minor version field. The major version is  
incremented by one of any major changes to the image installer, for example, switching from .tar to rpm  
or changing kernels. The minor version can be incremented by any one of the following:  
Minor change to the installer, for example, a user prompt added.  
Repackages require the installer minor version to be incremented by one if the image file must be  
repackaged to address a defect or problem with the installer.  
Figure 20-4 illustrates what each part of the IPS software file represents for recovery and system image  
filenames.  
Figure 20-4  
IPS Software File Name for Recovery and System Image Files  
IPS-identifier-K9-[mfq,sys,r,]-x.y-a-*.img, pkg, or  
Product line  
Platform identifier  
Strong cypto designator  
Package type  
Installer major version  
Installer minor version  
Application version designator  
Application version  
File extension  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
20-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 20 Obtaining Software  
IPS Software Versioning  
IPS Software Release Examples  
Table 20-1 lists platform-independent Cisco IPS software release examples.  
Table 20-1  
Platform-Independent Release Examples  
Target  
Example  
Release  
Frequency Identifier Version Example Filename  
Signature update1  
Weekly  
sig  
S552  
E4  
IPS-identifier-sig-S552-req-E4.pkg  
Signature engine  
update2  
As needed engine  
IPS-identifier-engine-E4-req-7.2-2.pkg  
Service packs3  
Every  
three  
7.2(2)  
IPS-identifier-K9-7.2-2-E4.pkg  
months  
Minor version update4 Annually  
Major version update5 Annually  
7.2(1)  
8.0(1)  
IPS-identifier-K9-7.2-2-E4.pkg  
IPS-identifier-K9-8.0-1-E4.pkg  
Patch release6  
As needed patch  
7.2(1p1) IPS-identifier-K9-patch-7.2-1pl-E4.pkg  
Recovery package7  
Annually  
or as  
r
1.1-7.2( IPS-identifier-K9-r-1.1-a-7.2-1-E4.pkg  
1)  
needed  
System image8  
Annually sys  
Separate IPS-SSP_60-K9-sys-1.1-a-7.2-2-E4.img  
file per IPS-4345-K9-sys-1.1-a-7.2-2-E4.img  
sensor  
IPS-SSP_5545-K9-sys-1.1-a-7.2-2-E4.aip  
platform IPS-4510-K9-sys-1.1-a-7.2-4-E4.img  
1. Signature updates include the latest cumulative IPS signatures.  
2. Signature engine updates add new engines or engine parameters that are used by new signatures in later signature updates.  
3. Service packs include new features and defect fixes.  
4. Minor versions include new minor version features and/or minor version functionality.  
5. Major versions include new major version functionality or new architecture.  
6. Patch releases are for interim fixes.  
7. The r 1.1 can be revised to r 1.2 if it is necessary to release a new recovery package that contains the same underlying  
application image. If there are defect fixes for the installer, for example, the underlying application version may still be  
7.2(3), but the recovery partition image will be r 1.2.  
8. The system image includes the combined recovery and application image used to reimage an entire sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
20-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 20 Obtaining Software  
Accessing IPS Documentation  
Table 20-1 describes the platform identifiers used in platform-specific names.  
Table 20-2 Platform Identifiers  
Sensor Family  
Identifier  
ASA 5500-X series  
SSP_5512  
SSP_5515  
SSP_5525  
SSP_5545  
SSP_5555  
ASA 5585-X series  
SSP_10  
SSP_20  
SSP_40  
SSP_60  
IPS 4345 series  
IPS 4360 series  
IPS 4510 series  
IPS 4520 series  
4345  
4360  
4510  
4520  
For More Information  
For instructions on how to access these files on Cisco.com, see Obtaining Cisco IPS Software, page 20-1.  
Accessing IPS Documentation  
You can find IPS documentation at this URL:  
Or to access IPS documentation from Cisco.com, follow these steps:  
Step 1  
Step 2  
Step 3  
Step 4  
Log in to Cisco.com.  
Click Support.  
Under Support at the bottom of the page, click Documentation.  
Choose Products > Security > Intrusion Prevention System (IPS) > IPS Appliances > Cisco IPS  
4200 Series Sensors. The Cisco IPS 4200 Series Sensors page appears. All of the most up-to-date IPS  
documentation is on this page.  
Note  
Although you will see references to other IPS documentation sites on Cisco.com, this is the site  
with the most complete and up-to-date IPS documentation.  
Step 5  
Click one of the following categories to access Cisco IPS documentation:  
Download Software—Takes you to the Download Software site.  
Note  
You must be logged into Cisco.com to access the software download site.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
20-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 20 Obtaining Software  
Cisco Security Intelligence Operations  
Release and General Information—Contains documentation roadmaps and release notes.  
Reference Guides—Contains command references and technical references.  
Design—Contains design guide and design tech notes.  
Install and Upgrade—Contains hardware installation and regulatory guides.  
Configure—Contains configuration guides for IPS CLI, IDM, and IME.  
Troubleshoot and Alerts—Contains TAC tech notes and field notices.  
Cisco Security Intelligence Operations  
The Cisco Security Intelligence Operations site on Cisco.com provides intelligence reports about current  
vulnerabilities and security threats. It also has reports on other security topics that help you protect your  
network and deploy your security systems to reduce organizational risk.  
You should be aware of the most recent security threats so that you can most effectively secure and  
manage your network. Cisco Security Intelligence Operations contains the top ten intelligence reports  
listed by date, severity, urgency, and whether there is a new signature available to deal with the threat.  
Cisco Security Intelligence Operations contains a Security News section that lists security articles of  
interest. There are related security tools and links.  
You can access Cisco Security Intelligence Operations at this URL:  
Cisco Security Intelligence Operations is also a repository of information for individual signatures,  
including signature ID, type, structure, and description.  
You can search for security alerts and signatures at this URL:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
20-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
C H A P T E R  
21  
Upgrading, Downgrading, and Installing System  
Images  
This chapter describes how to upgrade, downgrade, and install system images. It contains the following  
sections:  
Upgrade Notes and Caveats  
Pay attention to the following upgrade notes and caveats when upgrading your sensor:  
Anomaly detection has been disabled by default. If you did not configure the operation mode  
manually before the upgrade, it defaults to inactive after you upgrade. If you configured the  
operation mode to detect, learn, or inactive, the tuned value is preserved after the upgrade.  
You must have a valid maintenance contract per sensor to download software upgrades from  
Cisco.com.  
You must be running IPS 7.1(1)E4 to upgrade to IPS 7.2(1)E4 or later.  
This service pack automatically reboots the sensor to apply the changes. During reboot, inline  
network traffic is disrupted.  
You cannot uninstall IPS 7.2(1)E4. To revert to a previous version, you must reimage the sensor  
using the appropriate system image file.  
You cannot use the downgrade command to revert to a previous major or minor version, for  
example, from Cisco IPS 7.2 to 7.1. You can only use the downgrade command to downgrade from  
the latest signature update or signature engine update. To revert to 7.1, you must reimage the sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Upgrades, Downgrades, and System Images  
All user configuration settings are lost when you install the system image. Before trying to recover  
the sensor by installing the system image, try to recover by using the recover application-partition  
command or by selecting the recovery partition during sensor bootup.  
For More Information  
For the procedure for accessing downloads on Cisco.com, see Obtaining Cisco IPS Software,  
For the procedure for using the upgrade command to upgrade the sensor, see Upgrading the Sensor,  
For the procedure for configuring automatic upgrades on the sensor, see Configuring Automatic  
For the procedure for using the recover command, see Recovering the Application Partition,  
For the procedure for installing the IPS 4345 and IPS 4360 system image, see Installing the System  
For the procedure for installing the IPS 4510 and IPS 4520 system image, see Installing the System  
For the procedure for installing the ASA 5500-X IPS SSP system image, see Installing the System  
For the procedure for installing the ASA 5585-X IPS SSP system image, see Installing the System  
Upgrades, Downgrades, and System Images  
Caution  
You cannot use the downgrade command to revert to a previous major or minor version, for example,  
from Cisco IPS 7.2 to 7.1. You can only use the downgrade command to downgrade from the latest  
signature update or signature engine update. To revert to 7.1, you must reimage the sensor.  
Note  
After you upgrade any IPS software on your sensor, you must restart the IDM to see the latest software  
features.  
You can upgrade and downgrade the software on the sensor. Upgrading applies a service pack, signature  
update, signature engine update, minor version, major version, or recovery partition file. Downgrading  
removes the last applied service pack or signature update from the sensor.  
You can recover the application partition image on your sensor if it becomes unusable. Using the recover  
command lets you retain your host settings while other settings revert to the factory defaults.  
To install a new system image on the sensor, use ROMMON, the bootloader file, or the maintenance  
partition depending on which platform you have. When you install a new system image on your sensor,  
all accounts are removed and the default cisco account is reset to use the default password cisco. After  
installing the system image, you must initialize the sensor again.  
After you reimage and initialize your sensor, upgrade your sensor with the most recent service pack,  
signature update, signature engine update, minor update, major update, and recovery partition files.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Supported FTP and HTTP/HTTPS Servers  
For More Information  
For the procedure for initializing the sensor, see Basic Sensor Setup, page 2-4.  
For the procedure for locating software on Cisco.com, see Obtaining Cisco IPS Software, page 20-1.  
Supported FTP and HTTP/HTTPS Servers  
The following FTP servers are supported for IPS software updates:  
WU-FTPD 2.6.2 (Linux)  
Solaris 2.8  
Sambar 6.0 (Windows 2000)  
Serv-U 5.0 (Windows 2000)  
MS IIS 5.0 (Windows 2000)  
The following HTTP/HTTPS servers are supported for IPS software updates:  
CSM - Apache Server (Tomcat)  
CSM - Apache Server (JRun)  
For More Information  
For the procedure for downloading IPS software updates from Cisco.com, see Obtaining Cisco IPS  
For the procedure for configuring automatic updates, see Configuring Automatic Upgrades,  
Upgrading the Sensor  
This section explains how to use the upgrade command to upgrade the software on the sensor. It contains  
the following topics:  
IPS 7.2(1)E4 Files  
The currently supported IPS 7.2(x) version is 7.2(1)E4. For a list of the specific IPS filenames and the  
IPS versions that each sensor supports, refer to the Release Notes for your IPS version found at this URL:  
For More Information  
For the procedure for obtaining these files on Cisco.com, see Obtaining Cisco IPS Software, page 20-1.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Upgrading the Sensor  
Upgrade Notes and Caveats  
For a list of the upgrade notes and caveats for each IPS version, refer to the Release Notes for your IPS  
version found at this URL:  
Manually Upgrading the Sensor  
Caution  
You must log in to Cisco.com using an account with cryptographic privileges to download software. The  
first time you download software on Cisco.com, you receive instructions for setting up an account with  
cryptographic privileges.  
Note  
Do not change the filename. You must preserve the original filename for the sensor to accept the update.  
Use the upgrade source-url command to apply service pack, signature update, engine update, minor  
version, major version, or recovery partition file upgrades. The following options apply:  
source-url—Specifies the location of the source file to be copied:  
ftp:—Source URL for an FTP network server. The syntax for this prefix is:  
ftp://[[username@]location][/relativeDirectory]/filename  
ftp://[[username@]location][//absoluteDirectory]/filename  
Note  
You are prompted for a password.  
scp:—Source URL for the SCP network server. The syntax for this prefix is:  
scp://[[username@]location][/relativeDirectory]/filename  
scp://[[username@]location][//absoluteDirectory]/filename  
Note  
You are prompted for a password. You must add the remote host to the SSH known hosts  
list.  
http:—Source URL for the web server. The syntax for this prefix is:  
http://[[username@]location][/directory]/filename  
Note  
The directory specification should be an absolute path to the desired file.  
https:—Source URL for the web server. The syntax for this prefix is:  
https://[[username@]location][/directory]/filename  
Note  
The directory specification should be an absolute path to the desired file. The remote  
host must be a TLS trusted host.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Upgrading the Sensor  
Upgrading the Sensor  
Note  
The CLI output is an example of what your configuration may look like. It will not match exactly due to  
the optional setup choices, sensor model, and IPS version you have installed.  
To upgrade the sensor, follow these steps:  
Step 1  
Download the appropriate file to an FTP, SCP, HTTP, or HTTPS server that is accessible from your  
sensor.  
Step 2  
Step 3  
Log in to the CLI using an account with administrator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 4  
Upgrade the sensor.  
sensor(config)# upgrade url/IPS-SSP_10-K9-7.2-1-E4.pkg  
The URL points to where the update file is located, for example, to retrieve the update using FTP, enter  
the following:  
sensor(config)# upgrade ftp://username@ip_address//directory/IPS-SSP_10-K9-7.2-1-E4.pkg  
Step 5  
Step 6  
Enter the password when prompted.  
Enter password: ********  
Enter yesto complete the upgrade.  
Note  
Note  
Major updates, minor updates, and service packs may force a restart of the IPS processes or even  
force a reboot of the sensor to complete installation.  
The operating system is reimaged and all files that have been placed on the sensor through the  
service account are removed.  
Step 7  
Verify your new sensor version.  
sensor# show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Realm Keys  
Signature Definition:  
Signature Update  
OS Version:  
key1.0  
S697.0  
2.6.29.1  
IPS4360  
2013-02-15  
Platform:  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24%  
usage)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Upgrading the Sensor  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96%  
usage)  
MainApp  
Running  
AnalysisEngine  
Running  
CollaborationApp  
Running  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
CLI  
Upgrade History:  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Recovery Partition Version 1.1 - 7.2(1)E4  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
sensor#  
For More Information  
For a list of supported FTP and HTTP/HTTPS servers, see Supported FTP and HTTP/HTTPS  
For a list of the specific upgrade files, see IPS 7.2(1)E4 Files, page 21-3.  
For the procedure for locating software on Cisco and obtaining an account with cryptographic  
For the IDM procedure for upgrading the sensor, refer to Manually Updating the Sensor. For the IME  
procedure, refer to Manually Updating the Sensor.  
Working With Upgrade Files  
You can use a published SHA hash to copy, verify, and delete software updates.  
The following options apply:  
copy source_url upgrade-file—Lets you copy an upgrade file to the sensor. Make sure you are  
coping only the upgrade file, because the sensor does not know whether the file is an upgrade file  
or not. However, copying the wrong file does not have a negative effect on the sensor. Delete the  
upgrade file after verifying the hash so that you avoid any disk space related issues.  
show upgrade-files—Lists the upgrade files present in the /usr/cids/idsRoot/var directory.  
show digest [md5 | sha2-512] file—Shows the MD5 or SHA512 hash of the file.  
erase upgrade-file file—Lets you delete the file from the sensor. You can only delete .pkg and .img  
files.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Upgrading the Sensor  
To work with upgrade files, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Copy the upgrade file.  
sensor# copy  
scp://[email protected]//tftpboot/jsmith/IPS-4520-K9-sys-1.1-a-7.2-1-E4.img  
upgrade-file  
Password: *********  
IPS-4520-K9-sys-1.1-a-7.2-1-E4.img  
100%  
43MB  
1.1MB/s  
00:38  
Step 3  
Step 4  
Display the list of upgrade files.  
sensor# show upgrade-files  
IPS-4520-K9-sys-1.1-a-7.2-1-E4.img  
42.7M  
Display the MD5 or SHA512 hash of the upgrade file.  
sensor# show digest md5 IPS-4520-K9-sys-1.1-a-7.2-1-E4.img  
4fef5e368757bd8d5ccc665486552bcf  
4520_22# show digest sha2-512 IPS-4520-K9-sys-1.1-a-7.2-0.16-E4.img  
55d18f0bcec0ec7ce659b7862a4c8a0341be09530f6fdbcfbe61919461c262dca27be75115c8306da6211519bf  
6476ff44771b3b798631c31f17e884f4f2c721  
Step 5  
Erase an upgrade file.  
sensor# erase upgrade-file IPS-4520-K9-sys-1.1-a-7.2-1-E4.img  
sensor#  
Upgrading the Recovery Partition  
Use the upgrade command to upgrade the recovery partition with the most recent version so that it is  
ready if you need to recover the application partition on your sensor. Recovery partition images are  
generated for major and minor updates and only in rare situations for service packs or signature updates.  
To upgrade the recovery partition on your sensor, follow these steps:  
Step 1  
Download the appropriate recovery partition image file to an FTP, SCP, HTTP, or HTTPS server that is  
accessible from your sensor.  
Caution  
Some browsers add an extension to the filename. The filename of the saved file must match what is  
displayed on the download page or you cannot use it to upgrade the recovery partition.  
Step 2  
Step 3  
Log in to the CLI using an account with administrator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 4  
Upgrade the recovery partition.  
sensor(config)#  
upgrade scp://user@server_ipaddress//upgrade_path/IPS-SSP_10-K9-r-1.1-a-7.2-1-E4.pkg  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Configuring Automatic Upgrades  
sensor(config)#  
upgrade ftp://user@server_ipaddress//upgrade_path/IPS-SSP_10-K9-r-1.1-a-7.2-1-E4.pkg  
Step 5  
Enter the server password. The upgrade process begins.  
Note  
This procedure only reimages the recovery partition. The application partition is not modified  
by this upgrade. To reimage the application partition after the recovery partition, use the recover  
application-partition command.  
For More Information  
For a list of supported FTP and HTTP/HTTPS servers, see Supported FTP and HTTP/HTTPS  
For a list of the specific recovery filenames, see IPS 7.2(1)E4 Files, page 21-3.  
For the procedure for locating software on Cisco.com, see Obtaining Cisco IPS Software, page 20-1.  
For the procedure for using the recover command, see Recovering the Application Partition Image,  
Configuring Automatic Upgrades  
This section describes how to configure automatic updates and how to perform an immediate update, and  
contains the following topics:  
Configuring Automatic Updates  
Note  
For the IDM procedure for automatically upgrading the sensor, refer to Configuring Automatic Update.  
For the IME procedure, refer to Configuring Automatic Update.  
Caution  
The IPS address has been changed to cisco.com in the URL configuration. If you have automatic update  
configured on your sensor, you may need to update firewall rules to allow the sensor to connect to this  
new address.  
Note  
Support for either a proxy or DNS server to resolve the host name and download updates from Cisco.com  
has been added. You configure these servers in service host network-settings mode.  
You can configure the sensor to look for new upgrade files in your upgrade directory automatically. For  
example, several sensors can point to the same remote FTP server directory with different update  
schedules, such as every 24 hours, or Monday, Wednesday, and Friday at 11:00 pm.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Configuring Automatic Upgrades  
You specify the following information to schedule automatic upgrades:  
Server IP address  
Path of the directory on the file server where the sensor checks for upgrade files  
File copy protocol (SCP or FTP)  
Username and password  
Upgrade schedule  
You must download the software upgrade from Cisco.com and copy it to the upgrade directory before  
the sensor can poll for automatic upgrades.  
Use the auto-upgrade-option enabled command in the service host submode to configure automatic  
upgrades.  
The following options apply:  
cisco-server {disabled | enabled}—Enables automatic signature and engine updates from  
Cisco.com.  
cisco-url cisco_url—Specifies the Cisco server locator service. You do not need to change this  
unless the www.cisco.com IP address changes.  
default— Sets the value back to the system default setting.  
directory directory— Specifies the directory where upgrade files are located on the file server. A  
leading ‘/’ indicates an absolute path.  
file-copy-protocol {ftp | scp}— Specifies the file copy protocol used to download files from the file  
server.  
Note  
If you use SCP, you must use the ssh host-key command to add the server to the SSH known  
hosts list so the sensor can communicate with it through SSH.  
ip-address ip_address—Specifies the IP address of the file server.  
password password—Specifies the user password for Cisco server authentication.  
schedule-option—Specifies the schedules for when Cisco server automatic upgrades occur.  
Calendar scheduling starts upgrades at specific times on specific days. Periodic scheduling starts  
upgrades at specific periodic intervals.  
calendar-schedule—Configures the days of the week and times of day that automatic upgrades  
will be performed.  
days-of-week—Specifies the days of the week on which auto-upgrades will be performed. You  
can select multiple days: sunday through saturday are the valid values.  
no—Removes an entry or selection setting.  
times-of-day—Specifies the times of day at which auto-upgrades will begin. You can select  
multiple times. The valid value is hh:mm[:ss].  
periodic-schedule—Specifies the time that the first automatic upgrade should occur, and how  
long to wait between automatic upgrades.  
interval—Specifies the number of hours to wait between automatic upgrades. Valid values are  
1 to 8760. The default value is 24.  
start-time—Specifies the time of day to start the first automatic upgrade. The valid value is  
hh:mm[:ss]. The default is 00:00:00.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Configuring Automatic Upgrades  
user-name user_name—Specifies the username for server authentication.  
user-server {disabled | enabled}—Enables automatic upgrades from a user-defined server.  
Configuring Automatic Upgrades  
If you get an unauthorized error message while configuring an automatic update, make sure you have the  
correct ports open on any firewalls between the sensor and Cisco.com. For example, you need port 443  
for the initial automatic update connection to www.cisco.com, and you need port 80 to download the  
chosen package from a Cisco file server. The IP address may change for the Cisco file server, but you  
can find it in the lastDownloadAttempt section in the output of the show statistics host command.  
Caution  
Note  
The IPS address has been changed to cisco.com in the URL configuration. If you have automatic update  
configured on your sensor, you may need to update firewall rules to allow the sensor to connect to this  
new address.  
To check the status of the last automatic update or the next scheduled automatic update, run the show  
statistics host command and check the Auto Update Statistics section.  
To schedule automatic upgrades, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter automatic upgrade submode.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# auto-upgrade  
sensor(config-hos-aut)#  
Step 3  
Configure the sensor to automatically look for new upgrades either on Cisco.com or on your file server:  
a. On Cisco.com. Continue with Step 4.  
sensor(config-hos-aut)# cisco-server enabled  
b. From your server.  
sensor(config-hos-aut)# user-server enabled  
c. Specify the IP address of the file server.  
sensor(config-hos-ena)# ip-address 10.1.1.1  
d. Specify the directory where the upgrade files are located on the file server.  
sensor(config-hos-ena)# directory /tftpboot/sensor_updates  
e. Specify the file server protocol.  
sensor(config-hos-ena)# file-copy-protocol ftp  
Note  
If you use SCP, you must use the ssh host-key command to add the server to the SSH known  
hosts list so the sensor can communicate with it through SSH.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Configuring Automatic Upgrades  
Step 4  
Step 5  
Specify the username for authentication.  
sensor(config-hos-ena)# user-name tester  
Specify the password of the user.  
sensor(config-hos-ena)# password  
Enter password[]: ******  
Re-enter password: ******  
Step 6  
Specify the scheduling:  
a. For calendar scheduling (starts upgrades at specific times on specific day):  
sensor(config-hos-ena)# schedule-option calendar-schedule  
sensor(config-hos-ena-cal)# days-of-week sunday  
sensor(config-hos-ena-cal)# times-of-day 12:00:00  
b. For periodic scheduling (starts upgrades at specific periodic intervals):  
sensor(config-hos-ena)# schedule-option periodic-schedule  
sensor(config-hos-ena-per)# interval 24  
sensor(config-hos-ena-per)# start-time 13:00:00  
Step 7  
Verify the settings.  
sensor(config-hos-ena)# show settings  
enabled  
-----------------------------------------------  
schedule-option  
-----------------------------------------------  
periodic-schedule  
-----------------------------------------------  
start-time: 13:00:00 00:00:00 <defaulted>  
interval: 24 hours <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
ip-address: 10.1.1.1  
directory: /tftpboot/update/6.1_dummy_updates  
user-name: tester  
password: <hidden>  
cisco-url: https://www.cisco.com//cgi-bin/front.x/ida/locator/locator.pl <defaulted>  
file-copy-protocol: ftp default: scp  
-----------------------------------------------  
sensor(config-hos-ena)#  
Step 8  
Step 9  
Exit automatic upgrade submode.  
sensor(config-hos-ena)# exit  
sensor(config-hos)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or type no to discard them.  
For More Information  
For a list of supported FTP and HTTP/HTTPS servers, see Supported FTP and HTTP/HTTPS  
For the CLI procedure for adding the SCP server to the SSH known hosts list, see Adding Hosts to  
For the procedure for configuring proxy and DNS servers, see Configuring the DNS and Proxy  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Configuring Automatic Upgrades  
For the output of the show statistics host command, see Displaying Statistics, page 17-28.  
For the IDM procedure for automatically upgrading the sensor, refer to Configuring Automatic  
Update. For the IME procedure, refer to Configuring Automatic Update.  
For more information about copying, displaying, and erasing upgrade files, see Working With  
Applying an Immediate Update  
Caution  
While executing the autoupdatenow command, you cannot use the CLI, or start any new sessions until  
the upgrade is complete. Do not execute any commands while automatic update is in progress. Wait at  
least five minutes before checking results and executing other commands.  
Use the autoupdatenow command to perform an immediate update on the sensor. You receive a warning  
that this command performs an update on the sensor immediately. After executing this command, disable  
the user-server/cisco-server options in the auto-upgrade settings in the service host submode, if you do  
not want scheduled automatic updates.  
Note  
Note  
You must have either a DNS or HTTP proxy server configured to download automatic updates from  
cisco.com.  
You must have automatic update configured and a valid license to apply updates.  
To perform an immediate update on the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Start immediate automatic update.  
sensor# autoupdatenow  
Warning: Executing this command will perform an auto-upgrade on the sensor immediately.  
Before executing this command, you must have a valid license to apply the Signature  
AutoUpdates and auto-upgrade settings configured.After executing this command please  
disable user-server/cisco-server inside 'auto-upgrade' settings, if you don't want  
scheduled auto-updates  
Continue? []:  
Step 3  
Step 4  
Enter yesto continue. The update is applied.  
Check to see if the update was applied.  
sensor# show statistics host  
Auto Update Statistics  
lastDirectoryReadAttempt = N/A  
lastDownloadAttempt = N/A  
lastInstallAttempt = N/A  
nextAttempt = N/A  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Downgrading the Sensor  
For More Information  
For the procedure for configuring automatic update, see Configuring Automatic Updates, page 21-8.  
For the procedure for configuring DNS and HTTP proxy servers, see Configuring the DNS and  
Downgrading the Sensor  
Caution  
You cannot use the downgrade command to revert to a previous major or minor version, for example,  
from Cisco IPS 7.2 to 7.1. You can only use the downgrade command to downgrade from the latest  
signature update or signature engine update. To revert to 7.1, you must reimage the sensor.  
Use the downgrade command to remove the last applied signature upgrade or signature engine upgrade  
from the sensor.  
To remove the last applied signature update or signature engine update from the sensor, follow these  
steps:  
Step 1  
Step 2  
Log in to the sensor using an account with administrator privileges.  
Enter global configuration mode.  
sensor# configure terminal  
Step 3  
If there is no recently applied service pack or signature update, the downgrade command is not  
available.  
sensor(config)# downgrade  
No downgrade available.  
sensor(config)#  
Recovering the Application Partition  
You can recover the application partition image for the sensor if it becomes unusable. Some network  
configuration information is retained when you use this method, which lets you have network access  
after the recovery is performed. Use the recover application-partition command to boot to the recovery  
partition, which automatically recovers the application partition on your sensor. If you have upgraded  
your recovery partition to the most recent version before you recover the application partition image,  
you can install the most up-to-date software image.  
Because you can execute the recover application-partition command through a Telnet or SSH  
connection, we recommend using this command to recover sensors that are installed at remote locations.  
Note  
When you reconnect to the sensor after recovery, you must log in with the default username and  
password cisco.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Recovering the Application Partition Image  
To recover the application partition image, follow these steps:  
Step 1  
Download the recovery partition image file to an FTP, HTTP, or HTTPS server that is accessible from  
your sensor.  
Step 2  
Step 3  
Log in to the CLI using an account with administrator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 4  
Recover the application partition image.  
sensor(config)# recover application-partition  
Warning: Executing this command will stop all applications and re-image the node to  
version 7.1(x)E4. All configuration changes except for network settings will be reset to  
default.  
Continue with recovery? []:  
Step 5  
Enter yes to continue. Shutdown begins immediately after you execute the recover command. Shutdown  
can take a while, and you will still have access to the CLI, but access will be terminated without warning.  
The application partition is reimaged using the image stored on the recovery partition. You must now  
initialize the sensor with the setup command.The IP address, netmask, access lists, time zone, and offset  
are saved and applied to the reimaged application partition. If you executed the recover  
application-partition command remotely, you can SSH to the sensor with the default username and  
password (cisco/cisco) and then initialize the sensor again with the setup command. You cannot use  
Telnet until you initialize the sensor because Telnet is disabled by default.  
For More Information  
For more information about TFTP servers, see TFTP Servers, page 21-15.  
For the procedure for locating software on Cisco.com, see Obtaining Cisco IPS Software, page 20-1.  
For the procedure for using the setup command to initialize the sensor, see Basic Sensor Setup,  
For the procedure for upgrading the recovery partition to the most recent version, see Upgrading the  
Installing System Images  
Caution  
All user configuration settings are lost when you install the system image. Before trying to recover the  
sensor by installing the system image, try to recover by using the recover application-partition  
command or by selecting the recovery partition during sensor bootup.  
This section contains the procedures for installing system images on the appliances and modules. It  
contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
ROMMON  
Some Cisco sensors include a preboot CLI called ROMMON, which lets you boot images on sensors  
where the image on the primary device is missing, corrupt, or otherwise unable to boot the normal  
application. ROMMON is particularly useful for recovering remote sensors as long as the serial console  
port is available.  
Access to ROMMON is available only through the serial console port, a Cisco-standard asynchronous  
RS-232C DTE available in an RJ-45F connector on the sensor chassis. The serial port is configured for  
9600 baud, 8 data bits, 1 stop bit, no parity, and no flow control.  
For More Information  
For the procedure for using a terminal server, see Connecting an Appliance to a Terminal Server,  
TFTP Servers  
ROMMON uses TFTP to download an image and launch it. TFTP does not address network issues such  
as latency or error recovery. It does implement a limited packet integrity check so that packets arriving  
in sequence with the correct integrity value have an extremely low probability of error. But TFTP does  
not offer pipelining so the total transfer time is equal to the number of packets to be transferred times  
the network average RTT. Because of this limitation, we recommend that the TFTP server be located on  
the same LAN segment as the sensor. Any network with an RTT less than a 100 milliseconds should  
provide reliable delivery of the image. Be aware that some TFTP servers limit the maximum file size that  
can be transferred to ~32 MB.  
Connecting an Appliance to a Terminal Server  
A terminal server is a router with multiple, low speed, asynchronous ports that are connected to other  
serial devices. You can use terminal servers to remotely manage network equipment, including  
appliances. To set up a Cisco terminal server with RJ-45 or hydra cable assembly connections, follow  
these steps:  
Step 1  
Connect to a terminal server using one of the following methods:  
For terminal servers with RJ-45 connections, connect a rollover cable from the console port on the  
appliance to a port on the terminal server.  
For hydra cable assemblies, connect a straight-through patch cable from the console port on the  
appliance to a port on the terminal server.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                   
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Step 2  
Configure the line and port on the terminal server. In enable mode, enter the following configuration,  
where # is the line number of the port to be configured.  
config t  
line #  
login  
transport input all  
stopbits 1  
flowcontrol hardware  
speed 9600  
exit  
exit  
wr mem  
Step 3  
Be sure to properly close a terminal session to avoid unauthorized access to the appliance. If a terminal  
session is not stopped properly, that is, if it does not receive an exit(0) signal from the application that  
initiated the session, the terminal session can remain open. When terminal sessions are not stopped  
properly, authentication is not performed on the next session that is opened on the serial port.  
Caution  
Caution  
Always exit your session and return to a login prompt before terminating the application used to establish  
the connection.  
If a connection is dropped or terminated by accident, you should reestablish the connection and exit  
normally to prevent unauthorized access to the appliance.  
Installing the System Image for the IPS 4345 and IPS 4360  
Note  
This procedure is for IPS 4345, but is also applicable to IPS 4360. The system image for IPS 4360 has  
“4360” in the filename.  
You can install the IPS 4345 and IPS 4360 system image by using the ROMMON on the appliance to  
TFTP the system image on to the compact flash device.  
To install the IPS 4345 and IPS 4360 system image, follow these steps:  
Step 1  
Step 2  
Download the IPS 4345 system image file to the tftp root directory of a TFTP server that is accessible  
from your IPS 4345.  
Note  
Make sure you can access the TFTP server location from the network connected to the Ethernet  
port of your IPS 4345.  
Boot the IPS 4345.  
Booting system, please wait...  
CISCO SYSTEMS  
Embedded BIOS Version 1.0(5)0 09/14/04 12:23:35.90  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Low Memory: 631 KB  
High Memory: 2048 MB  
PCI Device Table.  
Bus Dev Func VendID DevID Class  
Irq  
00 00 00  
00 01 00  
00 03 00  
00 1C 00  
00 1D 00  
00 1D 01  
00 1D 04  
00 1D 05  
00 1D 07  
00 1E 00  
00 1F 00  
00 1F 02  
00 1F 03  
00 1F 05  
02 01 00  
03 01 00  
03 02 00  
03 02 01  
03 03 00  
03 03 01  
04 02 00  
04 03 00  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
8086  
177D  
8086  
8086  
8086  
8086  
8086  
8086  
2578 Host Bridge  
2579 PCI-to-PCI Bridge  
257B PCI-to-PCI Bridge  
25AE PCI-to-PCI Bridge  
25A9 Serial Bus  
25AA Serial Bus  
25AB System  
25AC IRQ Controller  
25AD Serial Bus  
244E PCI-to-PCI Bridge  
25A1 ISA Bridge  
25A3 IDE Controller  
25A4 Serial Bus  
25A6 Audio  
1075 Ethernet  
0003 Encrypt/Decrypt  
1079 Ethernet  
1079 Ethernet  
1079 Ethernet  
1079 Ethernet  
1209 Ethernet  
1209 Ethernet  
11  
10  
9
11  
5
5
11  
9
9
9
9
9
11  
5
Evaluating BIOS Options ...  
Launch BIOS Extension to setup ROMMON  
Cisco Systems ROMMON Version (1.0(5)0) #1: Tue Sep 14 12:20:30 PDT 2004  
Platform IPS-4345-K9  
Management0/0  
MAC Address: 0000.c0ff.ee01  
Step 3  
Press Break or Esc at the following prompt while the system is booting to interrupt boot. Press the  
spacebar to begin boot immediately.  
Note  
You have ten seconds to press Break or Esc.  
Use BREAK or ESC to interrupt boot.  
Use SPACE to begin boot immediately.  
The system enters ROMMON mode. The rommon> prompt appears.  
Step 4  
Check the current network settings.  
rommon> set  
ROMMON Variable Settings:  
ADDRESS=0.0.0.0  
SERVER=0.0.0.0  
GATEWAY=0.0.0.0  
PORT=Management0/0  
VLAN=untagged  
IMAGE=  
CONFIG=  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
The variables have the following definitions:  
Address—Local IP address of the IPS 4345.  
Server—TFTP server IP address where the application image is stored.  
Gateway—Gateway IP address used by the IPS 4345.  
Port—Ethernet interface used for the IPS 4345 management.  
VLAN—VLAN ID number (leave as untagged).  
Image—System image file/path name.  
Config—Unused by these platforms.  
Note  
Not all values are required to establish network connectivity. The address, server, gateway,  
and image values are required. If you are not sure of the settings needed for your local  
environment, contact your system administrator.  
Step 5  
If necessary, change the interface used for the TFTP download.  
Note  
The default interface used for TFTP downloads is Management 0/0, which corresponds to the  
MGMT interface of the IPS 4345.  
rommon> PORT=interface_name  
Step 6  
If necessary, assign an IP address for the local port on the IPS 4345.  
rommon> ADDRESS=ip_address  
Note  
Use the same IP address that is assigned to the IPS 4345.  
Step 7  
Step 8  
Step 9  
Assign the TFTP server IP address.  
rommon> SERVER=ip_address  
If necessary, assign the gateway IP address.  
rommon> GATEWAY=ip_address  
Verify that you have access to the TFTP server by pinging it from your local Ethernet port with one of  
the following commands:  
rommon> ping server_ip_address  
rommon> ping server  
Step 10 If necessary define the path and filename on the TFTP file server from which you are downloading the  
image.  
rommon> IMAGE=path file_name  
Caution  
Make sure that you enter the IMAGE command in all uppercase. You can enter the other ROMMON  
commands in either lower case or upper case, but the IMAGE command specifically must be all  
uppercase.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
UNIX Example  
rommon> IMAGE=system_images/IPS-4345-K9-sys-1.1-a-7.2-1-E4.img  
Note  
The path is relative to the default tftpboot directory of the UNIX TFTP server. Images located  
in the default tftpboot directory do not have any directory names or slashes in the IMAGE  
specification.  
Windows Example  
rommon> IMAGE=system_images/IPS-4345-K9-sys-1.1-a-7.2-1-E4.img  
Step 11 Enter set and press Enter to verify the network settings.  
Note  
You can use the sync command to store these settings in NVRAM so they are maintained across  
boots. Otherwise, you must enter this information each time you want to boot an image from  
ROMMON.  
Step 12 Download and install the system image.  
rommon> tftp  
Caution  
To avoid corrupting the system image, do not remove power from the IPS 4345 while the system image  
is being installed.  
Note  
If the network settings are correct, the system downloads and boots the specified image on the  
IPS 4345. Be sure to use the IPS 4345 image.  
For More Information  
For more information about TFTP servers, see TFTP Servers, page 21-15.  
For a list of the specific system image files, see IPS 7.2(1)E4 Files, page 21-3.  
For the procedure for locating software on Cisco.com, see Obtaining Cisco IPS Software, page 20-1  
Installing the System Image for the IPS 4510 and IPS 4520  
Note  
The following procedure references the IPS 4510 but it also refers to the IPS 4520.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
You can install the IPS 4510 and IPS 4520 system image by using the ROMMON on the appliance to  
TFTP the system image onto the compact flash device.  
To install the IPS 4510 system image, follow these steps:  
Step 1  
Download the IPS 4510 system image file to the tftp root directory of a TFTP server that is accessible  
from your IPS 4510.  
Note  
Make sure you can access the TFTP server location from the network connected to the  
Management port of your IPS 4510.  
Step 2  
Step 3  
Boot the IPS 4510.  
Press Break or Esc at the following prompt while the system is booting to interrupt boot. Press the  
spacebar to begin boot immediately.  
Note  
You have ten seconds to press Break or Esc.  
Use BREAK or ESC to interrupt boot.  
Use SPACE to begin boot immediately.  
The system enters ROMMON mode. The rommon> prompt appears.  
Check the current network settings.  
rommon> set  
Step 4  
ROMMON Variable Settings:  
ADDRESS=0.0.0.0  
SERVER=0.0.0.0  
GATEWAY=0.0.0.0  
PORT=Management0/0  
VLAN=untagged  
IMAGE=  
CONFIG=  
LINKTIMEOUT=20  
PKTTIMEOUT=2  
RETRY=20  
The variables have the following definitions:  
Address—Specifies the local IP address of the IPS 4510.  
Server—Specifies the TFTP server IP address where the application image is stored.  
Gateway—Specifies the gateway IP address used by the IPS 4510.  
Port—Specifies the Ethernet interface used for IPS 4510 management.  
VLAN—Specifies the VLAN ID number (leave as untagged).  
Image—Specifies the system image file/path name.  
Config—Unused by these platforms.  
Note  
Not all values are required to establish network connectivity. The address, server, gateway,  
and image values are required. If you are not sure of the settings needed for your local  
environment, contact your system administrator.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Step 5  
If necessary, assign an IP address for the Managment port on the IPS 4510.  
rommon> ADDRESS=ip_address  
Note  
Use the same IP address that is assigned to the IPS 4510.  
Step 6  
Step 7  
Step 8  
If necessary, assign the TFTP server IP address.  
rommon> SERVER=ip_address  
If necessary, assign the gateway IP address.  
rommon> GATEWAY=ip_address  
Verify that you have access to the TFTP server by pinging it from your local Ethernet port with one of  
the following commands:  
rommon> ping server_ip_address  
rommon> ping server  
Step 9  
If necessary define the path and filename on the TFTP file server from which you are downloading the  
image.  
rommon> IMAGE=path/file_name  
UNIX Example  
rommon> IMAGE=/system_images/IPS-4510-K9-sys-1.1-a-7.2-1-E4.img  
Note  
The path is relative to the UNIX TFTP server default tftpboot directory. Images located in the  
default tftpboot directory do not have any directory names or slashes in the IMAGE  
specification.  
Windows Example  
rommon> IMAGE=\system_images\IPS-4510-K9-sys-1.1-a-7.2-1-E4.img  
Step 10 Enter set and press Enter to verify the network settings.  
Note  
You can use the sync command to store these settings in NVRAM so they are maintained across  
boots. Otherwise, you must enter this information each time you want to boot an image from  
ROMMON.  
Step 11 Download and install the system image.  
rommon> tftp  
Caution  
To avoid corrupting the system image, do not remove power from the IPS 4510 while the system image  
is being installed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Note  
If the network settings are correct, the system downloads and boots the specified image on the IPS 4510.  
Be sure to use the IPS 4510 image.  
For More Information  
For more information about TFTP servers, see TFTP Servers, page 21-15.  
For a list of the specific system image files, see IPS 7.2(1)E4 Files, page 21-3.  
For the procedure for locating software on Cisco.com, see Obtaining Cisco IPS Software, page 20-1  
Installing the System Image for the ASA 5500-X IPS SSP  
Note  
Be sure the TFTP server that you specify can transfer files up to 60 MB in size.  
Note  
The CLI output is an example of what your configuration may look like. It will not match exactly due to  
the optional setup choices, sensor model, and IPS version you have installed.  
To install the system image on the ASA 5500-X IPS SSP, follow these steps:  
Step 1  
Download the IPS system image file corresponding to your ASA platform to the tftp root directory of a  
TFTP server that is accessible from your adaptive security appliance.  
Note  
Make sure you can access the TFTP server location from the network connected to the Ethernet  
port of the adaptive security appliance.  
Step 2  
Step 3  
Log in to the adaptive security appliance.  
Enter enable mode.  
asa> enable  
Step 4  
Step 5  
Copy the IPS image to the disk0 flash of the adaptive security appliance.  
asa# copy tftp://192.0.2.0/directory/IPS-5545-K9-sys-1.1-a-7.2-1-E4.aip disk0:  
Image the ASA 5500-X IPS SSP.  
asa# sw-module module ips recover configure image  
disk0:/IPS-SSP_5545-K9-sys-1.1-a-7.2-1-E4.aip  
Step 6  
Step 7  
Execute the recovery. This transfers the image from the TFTP server to the ASA 5500-X IPS SSP and  
restarts it.  
asa# sw-module module ips recover boot  
Periodically check the recovery until it is complete.  
asa# show module  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Mod Card Type  
Model  
Serial No.  
--- -------------------------------------------- ------------------ -----------  
0 Cisco ASA 5545 Appliance with 8 GE ports, 1 ASA5545  
1 IPS 5545 Intrusion Protection System IPS5545  
ABC1234D56E  
ABC1234D56E  
Mod MAC Address Range  
Hw Version  
Fw Version  
Sw Version  
--- --------------------------------- ------------ ------------ -------------  
0
503d.e59c.6dc1 to 503d.e59c.6dca 1.0  
8.6.1  
ips 503d.e59c.6dcb to 503d.e59c.6dcb N/A  
N/A  
7.2(1)E4  
Mod SSM Application Name  
Status  
SSM Application Version  
--- ------------------------------ ---------------- --------------------------  
1 IPS  
Up  
7.2(1)E4  
Mod Status  
Data Plane Status  
Compatibility  
--- ------------------ --------------------- -------------  
0 Up Sys  
1 Up  
Not Applicable  
Up  
asa#  
Note  
The Status field in the output indicates the operational status of the ASA 5500-X IPS SSP. An  
ASA 5500-X IPS SSP operating normally shows a status of “Up.” While the adaptive security  
appliance transfers an application image to the ASA 5500-X IPS SSP, the Status field in the  
output reads “Recover.” When the adaptive security appliance completes the image transfer and  
restarts the ASA 5500-X IPS SSP, the newly transferred image is running.  
Note  
To debug any errors that may happen in the recovery process, use the debug module-boot  
command to enable debugging of the system reimaging process.  
Step 8  
Session to the ASA 5500-X IPS SSP and initialize it with the setup command.  
For More Information  
For more information about TFTP servers, see TFTP Servers, page 21-15.  
For a list of the specific system image files, see IPS 7.2(1)E4 Files, page 21-3.  
For the procedure for initializing the ASA 5500-X IPS SSP, see Advanced Setup for the ASA  
Installing the System Image for the ASA 5585-X IPS SSP  
This section describes how to install the ASA 5585-X IPS SSP system image using the hw-module  
command or ROMMON, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Installing the ASA 5585-X IPS SSP System Image Using the hw-module Command  
Note  
Note  
Be sure the TFTP server that you specify can transfer files up to 60 MB in size.  
This process can take approximately 15 minutes to complete, depending on your network and the size  
of the image.  
Note  
The CLI output is an example of what your configuration may look like. It will not match exactly due to  
the optional setup choices, sensor model, and IPS version you have installed.  
To install the system image, transfer the software image from a TFTP server to the ASA 5585-X IPS SSP  
using the adaptive security appliance CLI. The adaptive security appliance can communicate with the  
ROMMON application of the ASA 5585-X IPS SSP to transfer the image.  
To install the ASA 5585-X IPS SSP software image, follow these steps:  
Step 1  
Download the ASA 5585-X IPS SSP system image file to the tftp root directory of a TFTP server that is  
accessible from your adaptive security appliance.  
Note  
Make sure you can access the TFTP server location from the network connected to the Ethernet  
port of your adaptive security appliance.  
Step 2  
Step 3  
Log in to the adaptive security appliance.  
Enter enable mode.  
asa# enable  
Step 4  
Configure the recovery settings for the ASA 5585-X IPS SSP.  
asa (enable)# hw-module module 1 recover configure  
Note  
If you make an error in the recovery configuration, use the hw-module module 1 recover stop  
command to stop the system reimaging and then you can correct the configuration.  
Step 5  
Step 6  
Specify the TFTP URL for the software image.  
Image URL [tftp://0.0.0.0/]:  
Example  
Image URL [tftp://0.0.0.0/]: tftp://192.0.2.0/IPS-SSP_40-K9-sys-1.1-a-7.2-1-E4.img  
Specify the command and control interface of the ASA 5585-X IPS SSP.  
Note  
The port IP address is the management IP address of the ASA 5585-X IPS SSP.  
Port IP Address [0.0.0.0]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Example  
Port IP Address [0.0.0.0]: 10.89.149.231  
Step 7  
Step 8  
Leave the VLAN ID at 0.  
VLAN ID [0]:  
Specify the default gateway of the ASA 5585-X IPS SSP.  
Gateway IP Address [0.0.0.0]:  
Example  
Gateway IP Address [0.0.0.0]: 10.89.149.254  
Step 9  
Execute the recovery. This transfers the software image from the TFTP server to the  
ASA 5585-X IPS SSP and restarts it.  
asa# hw-module module 1 recover boot  
Step 10 Periodically check the recovery until it is complete.  
Note  
The status reads Recovery during recovery and reads Up when installation is complete.  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
ASA 5585-X IPS Security Services Processor-10 with 8GE  
Model:  
ASA5585-SSP-IPS40  
1.0  
JAF1350ABSL  
2.0(1)3  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 8843.e12f.5414 to 8843.e12f.541f  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data plane Status: Up  
Status:  
Up  
Mgmt IP addr:  
192.0.2.0  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt Access List:  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled  
asa#  
10.89.148.254  
10.0.0.0/8  
64.0.0.0/8  
443  
true  
Note  
The Status field in the output indicates the operational status of the ASA 5585-X IPS SSP. An  
ASA 5585-X IPS SSP operating normally shows a status of “Up.” While the adaptive security  
appliance transfers the software image to the ASA 5585-X IPS SSP, the Status field in the output  
reads “Recover.” When the adaptive security appliance completes the software image transfer  
and restarts the ASA 5585-X IPS SSP, the newly transferred image is running.  
Note  
To debug any errors that may happen during this process, use the debug module-boot command  
to enable debugging of the software installation process.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Step 11 Session to the ASA 5585-X IPS SSP.  
Step 12 Enter cisco three times and your new password twice.  
Step 13 Initialize the ASA 5585-X IPS SSP with the setup command.  
For More Information  
For more information about TFTP servers, see TFTP Servers, page 21-15.  
For a list of the specific system image files, see IPS 7.2(1)E4 Files, page 21-3.  
For the procedure for initializing the ASA 5585-X IPS SSP, see Advanced Setup for the ASA  
Installing the ASA 5585-X IPS SSP System Image Using ROMMON  
You can install the ASA 5585-X IPS SSP system image by using the ROMMON on the adaptive security  
appliance to TFTP the system image onto the ASA 5585-X IPS SSP.  
To install the ASA 5585-X IPS SSP system image, follow these steps:  
Step 1  
Step 2  
Download the ASA 5585-X IPS SSP system image file to the tftp root directory of a TFTP server that is  
accessible from your adaptive security appliance.  
Note  
Make sure you can access the TFTP server location from the network connected to the Ethernet  
port of your adaptive security appliance.  
Boot the ASA 5585-X IPS SSP.  
Booting system, please wait...  
CISCO SYSTEMS  
Embedded BIOS Version 0.0(2)10 11:16:38 04/15/10  
Com KbdBuf SMM UsbHid Msg0 Prompt Pmrt Cache1 LowM ExtM HugeM Cache2 Flg Siz0 Amrt PMM  
PnpDsp Smbios Lpt0 Npx1 Apm Lp1 Acpi Typ Dbg Enb Mp MemReduce MemSync1 CallRoms MemSync2  
DriveInit  
Total memory : 12 GB  
Total number of CPU cores : 8  
Com Lp1 Admgr2 Brd10 Plx2 OEM0=7EFF5C74  
Cisco Systems ROMMON Version (1.0(12)10) #0: Thu Apr 8 00:12:33 CDT 2010  
Use BREAK or ESC to interrupt boot.  
Use SPACE to begin boot immediately.  
Boot interrupted.  
Management0/0  
Link is UP  
MAC Address: 5475.d029.7fa9  
Step 3  
Press Break or Esc at the following prompt while the system is booting to interrupt boot. Press the  
spacebar to begin boot immediately.  
Note  
You have ten seconds to press Break or Esc.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Use BREAK or ESC to interrupt boot.  
Use SPACE to begin boot immediately.  
The system enters ROMMON mode. The rommon> prompt appears.  
Check the current network settings.  
Step 4  
rommon #0> set  
ROMMON Variable Settings:  
ADDRESS=0.0.0.0  
SERVER=0.0.0.0  
GATEWAY=0.0.0.0  
PORT=Management0/0  
VLAN=untagged  
IMAGE=  
CONFIG=  
LINKTIMEOUT=20  
PKTTIMEOUT=4  
RETRY=20  
The variables have the following definitions:  
Address—Specifies the local IP address of the ASA 5585-X IPS SSP.  
Server—Specifies the TFTP server IP address where the application image is stored.  
Gateway—Specifies the gateway IP address used by the ASA 5585-X IPS SSP.  
Port—Specifies the ethernet interface used for the ASA 5585-X IPS SSP management.  
VLAN—Specifies the VLAN ID number (leave as untagged).  
Image—Specifies the system image file/path name.  
Config—Specifies the unused by these platforms.  
Note  
Not all values are required to establish network connectivity. The address, server, gateway,  
and image values are required. If you are not sure of the settings needed for your local  
environment, contact your system administrator.  
Step 5  
If necessary, change the interface used for the TFTP download.  
Note  
The default interface used for TFTP downloads is Management 0/0, which corresponds to the  
management interface of the ASA 5585-X IPS SSP.  
rommon> PORT=interface_name  
Step 6  
If necessary, assign an IP address for the local port on the ASA 5585-X IPS SSP.  
rommon> ADDRESS=ip_address  
Note  
Use the same IP address that is assigned to the ASA 5585-X IPS SSP.  
Step 7  
Step 8  
If necessary, assign the TFTP server IP address.  
rommon> SERVER=ip_address  
If necessary, assign the gateway IP address.  
rommon> GATEWAY=ip_address  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Step 9  
Verify that you have access to the TFTP server by pinging it from your local Ethernet port with one of  
the following commands.  
rommon> ping server_ip_address  
rommon> ping server  
Step 10 If necessary define the path and filename on the TFTP file server from which you are downloading the  
image.  
rommon> IMAGE=path/file_name  
Caution  
Make sure that you enter the IMAGE command in all uppercase. You can enter the other ROMMON  
commands in either lower case or upper case, but the IMAGE command specifically must be all  
uppercase.  
UNIX Example  
rommon> IMAGE=/system_images/IPS-SSP_10-K9-sys-1.1-a-7.2-1-E4.img  
Note  
The path is relative to the default tftpboot directory of the UNIX TFTP server. Images located  
in the default tftpboot directory do not have any directory names or slashes in the IMAGE  
specification.  
Windows Example  
rommon> IMAGE=\system_images\IPS-SSP_10-K9-sys-1.1-a-7.2-1-E4.img  
Step 11 Enter set and press Enter to verify the network settings.  
Note  
You can use the sync command to store these settings in NVRAM so they are maintained across  
boots. Otherwise, you must enter this information each time you want to boot an image from  
ROMMON.  
Step 12 Download and install the system image.  
rommon> tftp  
Note  
If the network settings are correct, the system downloads and boots the specified image on the  
ASA 5585-X IPS SSP. Be sure to use the ASA 5585-X IPS SSP image.  
Caution  
To avoid corrupting the system image, do not remove power from the ASA 5585-X IPS SSP while the  
system image is being installed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
For More Information  
For more information about TFTP servers, see TFTP Servers, page 21-15.  
For a list of the specific system image files, see IPS 7.2(1)E4 Files, page 21-3.  
For the procedure for initializing ASA 5585-X IPS SSP, see Advanced Setup for the ASA 5585-X  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 21 Upgrading, Downgrading, and Installing System Images  
Installing System Images  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
21-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
A P P E N D I X  
A
System Architecture  
This appendix describes the IPS system architecture, and contains the following sections:  
Understanding the IPS System Architecture  
The purpose of the Cisco IPS is to detect and prevent malicious network activity. You can install the  
Cisco IPS software on two platforms: appliances and the modules. The Cisco IPS contains a management  
application and a monitoring application. The IDM is a network management JAVA application that you  
can use to manage and monitor the IPS. The IME is an IPS network monitoring JAVA application that  
you can use to view IPS events. The IME also contains the IDM configuration component. The IDM and  
the IME communicate with the IPS using HTTP or HTTPS and are hosted on your computer.  
IPS System Design  
The Cisco IPS software runs on the Linux operating system. We have hardened the Linux OS by  
removing unnecessary packages from the OS, disabling unused services, restricting network access, and  
removing access to the shell.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Appendix A System Architecture  
IPS System Design  
Figure A-1 illustrates the system design for IPS software.  
System Design for the IPS  
Figure A-1  
FTP  
SCP  
NTP  
Event Store  
MainApp  
SNMP  
SNMP  
NotificationApp  
AuthenticationApp  
Attack Response Controller  
InterfaceApp  
Telnet  
SSH  
CLI  
Logger  
IDM  
IME  
HTTPS  
Web Server  
CtlTransSource  
SensorApp  
Collaboration  
Manifest Server  
Master  
Blocking  
Sensor  
IDAPI  
Network  
Participation  
Server  
CollaborationApp  
Monitored  
Network  
CIDS  
Ethernet  
Collaboration  
Update Server(s)  
- Signature Definition  
- Event Action Rules  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix A System Architecture  
System Applications  
Figure A-2 illustrates the system design for IPS software for the IPS 4500 series sensors.  
System Design for IPS 4500 Series Sensors  
Figure A-2  
FTP  
SCP  
NTP  
Event Store  
MainApp  
SNMP  
SNMP  
NotificationApp  
AuthenticationApp  
Attack Response Controller  
InterfaceApp  
Telnet  
SSH  
CLI  
Logger  
IDM  
IME  
HTTPS  
Web Server  
Master  
Blocking  
Sensor  
Collaboration  
Manifest Server  
CtlTransSource  
IDAPI  
Network  
Participation  
Server  
CollaborationApp  
SwitchApp  
Collaboration  
Update Server(s)  
SensorApp  
CIDS  
Ethernet  
- Signature Definition  
- Event Action Rules  
Switch  
Monitored Networks  
For More Information  
For detailed information about the MainApp, see MainApp, page A-6.  
For detailed information about the SensorApp, see SensorApp, page A-22.  
For detailed information about the CollaborationApp, see CollaborationApp, page A-27.  
For detailed information about the CLI, see CLI, page A-30.  
For detailed information about the SwitchApp, see SwitchApp, page A-29.  
System Applications  
Note  
Each application has its own configuration file in XML format.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix A System Architecture  
System Applications  
The Cisco IPS software includes the following applications:  
MainApp—Initializes the system, starts and stops the other applications, configures the OS, and  
performs upgrades. It contains the following components:  
ctlTransSource (Control Transaction server)—Allows sensors to send control transactions. This  
is used to enable the master blocking sensor capability of Attack Response Controller (formerly  
known as Network Access Controller).  
Event Store—An indexed store used to store IPS events (error, status, and alert system  
messages) that is accessible through the CLI, IDM, IME, ASDM, or SDEE.  
Note  
The Event Store has a fixed size of 30 MB for all platforms.  
InterfaceApp—Handles bypass and physical settings and defines paired interfaces. Physical  
settings are speed, duplex, and administrative state.  
Logger—Writes all the log messages of the application to the log file and the error messages of  
the application to the Event Store.  
Attack Response Controller (formerly known as Network Access Controller) —Manages  
remote network devices (firewalls, routers, and switches) to provide blocking capabilities when  
an alert event has occurred. The ARC creates and applies ACLs on the controlled network  
device or uses the shun command (firewalls).  
NotificationApp—Sends SNMP traps when triggered by alert, status, and error events. The  
NotificationApp uses the public domain SNMP agent. SNMP GETs provide information about  
the general health of the sensor.  
Web server (HTTP SDEE server)—Provides a web interface and communication with the other  
IPS devices through the SDEE protocol using several servlets to provide the IPS services.  
AuthenticationApp—Verifies that users are authorized to perform CLI, IDM, IME, ASDM, or  
SDEE actions.  
SensorApp (Analysis Engine)—Performs packet capture and analysis.  
CollaborationApp—Interfaces with the MainApp and the SensorApp using various interprocess  
communication technologies including IDAPI control transactions, semaphores, shared memory,  
and file exchange.  
CLI—The interface that is run when you successfully log in to the sensor through Telnet or SSH.  
All accounts created through the CLI will use the CLI as their shell (except the service  
account—only one service account is allowed). Allowed CLI commands depend on the privilege of  
the user.  
All Cisco IPS applications communicate with each other through a common API called the IDAPI.  
Remote applications (other sensors, management applications, and third-party software) communicate  
with sensors through the SDEE protocol.  
The sensor has the following partitions:  
Application partition—A full IPS system image.  
Recovery partition—A special purpose image used for recovery of the sensor. Booting into the  
recovery partition enables you to completely reimage the application partition. Network settings are  
preserved, but all other configuration is lost.User Interaction  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                                   
Appendix A System Architecture  
Security Features  
You interact with the Cisco IPS in the following ways:  
Configure device parameters  
You generate the initial configuration for the system and its features. This is an infrequent task,  
usually done only once. The system has reasonable default values to minimize the number of  
modifications you must make. You can configure Cisco IPS through the CLI, IDM, IME, CSM,  
ASDM, or through another application using SDEE.  
Tune  
You make minor modifications to the configuration, primarily to Analysis Engine, which is the  
portion of the application that monitors network traffic. You can tune the system frequently after  
initially installing it on the network until it is operating efficiently and only producing information  
you find useful. You can create custom signatures, enable features, or apply a service pack or  
signature update. You can tune Cisco IPS through the CLI, IDM, IME, CSM, ASDM, or through  
another application using SDEE.  
Update  
You can schedule automatic updates or apply updates immediately to the applications and signature  
data files. You can update Cisco IPS through the CLI, IDM, IME, CSM, ASDM, or through another  
application using SDEE.  
Retrieve information  
You can retrieve data (status messages, errors, and alerts) from the system through the CLI, IDM,  
IME, CSM, ASDM, CS MARS or another application using SDEE.  
For More Information  
For detailed information about SDEE, see SDEE, page A-33.  
Security Features  
Cisco IPS has the following security features:  
Network access is restricted to hosts who are specifically allowed access.  
All remote hosts who attempt to connect through the web server, SSH and SCP or Telnet will be  
authenticated.  
By default Telnet access is disabled. You can choose to enable Telnet.  
By default SSH access is enabled.  
An FTP server does not run on the sensor. You can use SCP to remotely copy files.  
By default the web server uses TLS or SSL. You can choose to disable TLS and SSL.  
Unnecessary services are disabled.  
Only the SNMP set required by the Cisco MIB Police is allowed within the CISCO-CIDS-MIB.  
OIDs implemented by the public domain SNMP agent will be writeable when specified by the MIB.  
For More Information  
For detailed information about SNMP and Cisco MIBs, see Chapter 15, “Configuring SNMP.”  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Appendix A System Architecture  
MainApp  
MainApp  
This section describes the MainApp, and contains the following topics:  
Understanding the MainApp  
The MainApp includes all IPS components except SensorApp and the CLI. It is loaded by the operating  
system at startup and loads SensorApp. The MainApp then brings the following subsystem components  
up:  
Authentication  
Logger  
ARC  
Web Server  
Notification (SNMP)  
External Product Interface  
Interface manager  
Event Store  
Health and security monitoring  
MainApp Responsibilities  
The MainApp has the following responsibilities:  
Validate the Cisco-supported hardware platform  
Report software version and PEP information  
Start, stop, and report the version of the IPS components  
Configure the host system settings  
Manage the system clock  
Manage the Event Store  
Install and uninstall software upgrades  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
MainApp  
Note  
In the Cisco IPS, the MainApp can automatically download signature and signature engine  
updates from Cisco.com.  
Shut down or reboot the operating system  
The MainApp responds to the show version command by displaying the following information:  
Sensor build version  
MainApp version  
Version of each running application  
Version and timestamp of each installed upgrade  
Next downgrade version of each installed upgrade  
Platform version  
Version of sensor build on the other partition  
The MainApp also gathers the host statistics and reports the health and security monitoring status.  
Event Store  
This section describes the Event Store, and contains the following topics:  
Understanding the Event Store  
Note  
The Event Store has a fixed size of 30 MB for all platforms.  
Each IPS event is stored in the Event Store with a time stamp and a unique, monotonic, ascending ID.  
This time stamp is the primary key used to index the event into the fixed-size, indexed Event Store. When  
the circular Event Store has reached its configured size, the oldest event or events are overwritten by the  
new event being stored. The SensorApp is the only application that writes alert events into the Event  
Store. All applications write log, status, and error events into the Event Store.  
The fixed-sized, indexed Event Store allows simple event queries based on the time, type, priority, and  
a limited number of user-defined attributes. If each event is assigned a priority of low, medium, or high,  
a single event query can specify a list of desired event types, intrusion event priorities, and a time range.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix A System Architecture  
MainApp  
Table A-1 shows some examples:  
Table A-1  
IPS Event Examples  
IPS Event  
Type  
Intrusion  
Start Time  
Stop Time  
Event Priority Stamp Value Stamp Value  
Meaning  
status  
0
Maximum value Get all status events that are  
stored.  
error  
status  
0
65743  
Get all error and status events that  
were stored before time 65743.  
status  
65743  
0
Maximum value Get status events that were stored  
at or after time 65743.  
intrusion  
attack response  
low  
Maximum value Get all intrusion and attack  
response events with low priority  
that are stored.  
attack response medium  
4123000000 4123987256  
Get attack response, error, status,  
and intrusion events with medium  
or high priority that were stored  
between time 4123000000 and  
4123987256.  
error  
high  
status  
intrusion  
The size of the Event Store allows sufficient buffering of the IPS events when the sensor is not connected  
to an IPS event consumer. Sufficient buffering depends on your requirements and the capabilities of the  
nodes in use. The oldest events in the circular buffer are replaced by the newest events.  
Event Data Structures  
The various functional units communicate the following seven types of data:  
Intrusion events—Produced by the SensorApp. The sensor detects intrusion events.  
Error events—Caused by hardware or software malfunctions.  
Status events—Reports of a change in the status of the application, for example, that its  
configuration has been updated.  
Control transaction log events—The sensor logs the result of a control transaction.  
Attack response events—Actions for the ARC, for example, a block request.  
Debug events—Highly detailed reports of a change in the status of the application used for  
debugging.  
Control transaction data—Data associated with control transactions, for example, diagnostic data  
from an application, session logs, and configuration data to or from an application.  
All seven types of data are referred to collectively as IPS data. The six event types—intrusion, error,  
status, control transaction log, network access, and debug—have similar characteristics and are referred  
to collectively as IPS events. IPS events are produced by the several different applications that make up  
the IPS and are subscribed to by other IPS applications. IPS events have the following characteristics:  
They are spontaneously generated by the application instances configured to do so. There is no  
request from another application instance to generate a particular event.  
They have no specific destination. They are stored and then retrieved by one or more application  
instances.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
MainApp  
Control transactions involve the following types of requests:  
Request to update the configuration data of an application instance  
Request for the diagnostic data of an application instance  
Request to reset the diagnostic data of an application instance  
Request to restart an application instance  
Request for ARC, such as a block request  
Control transactions have the following characteristics:  
They always consist of a request followed by a response.  
The request and response may have an arbitrary amount of data associated with them. The response  
always includes at least a positive or negative acknowledgment.  
They are point-to-point transactions.  
Control transactions are sent by one application instance (the initiator) to another application  
instance (the responder).  
IPS data is represented in XML format as an XML document. The system stores user-configurable  
parameters in several XML files.  
IPS Events  
IPS applications generate IPS events to report the occurrence of some stimulus. The events are the data,  
such as the alerts generated by SensorApp or errors generated by any application. Events are stored in a  
local database known as the Event Store.  
There are five types of events:  
evAlert—Alert event messages that report when a signature is triggered by network activity.  
evStatus—Status event messages that report the status and actions of the IPS applications.  
evError— Error event messages that report errors that occurred while attempting response actions.  
evLogTransaction—Log transaction messages that report the control transactions processed by each  
sensor application.  
evShunRqst—Block request messages that report when ARC issues a block request.  
You can view the status and error messages using the CLI, IME, and ASDM. The SensorApp and ARC  
log response actions (TCP resets, IP logging start and stop, blocking start and stop, trigger packet) as  
status messages.  
NotificationApp  
The NotificationApp allows the sensor to send alerts and system error messages as SNMP traps. It  
subscribes to events in the Event Store and translates them into SNMP MIBs and sends them to  
destinations through a public-domain SNMP agent. The NotificationApp supports sending sets and gets.  
The SNMP GETs provide information about basic sensor health.  
The NotificationApp sends the following information from the evAlert event in sparse mode:  
Originator information  
Event ID  
Event severity  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                       
Appendix A System Architecture  
MainApp  
Time (UTC and local time)  
Signature name  
Signature ID  
Subsignature ID  
Participant information  
Alarm traits  
The NotificationApp sends the following information from the evAlert event in detail mode:  
Originator information  
Event ID  
Event severity  
Time (UTC and local time)  
Signature name  
Signature ID  
Subsignature ID  
Version  
Summary  
Interface group  
VLAN  
Participant information  
Actions  
Alarm traits  
Signature  
IP log IDs  
The NotificationApp determines which evError events to send as a trap according to the filter that you  
define. You can filter based on error severity (error, fatal, and warning). The NotificationApp sends the  
following information from the evError event:  
Originator information  
Event ID  
Event severity  
Time (UTC and local time)  
Error message  
The NotificationApp supports GETs for the following general health and system information from the  
sensor:  
Packet loss  
Packet denies  
Alarms generated  
Fragments in FRP  
Datagrams in FRP  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix A System Architecture  
MainApp  
TCP streams in embryonic state  
TCP streams in established state  
TCP streams in closing state  
TCP streams in system  
TCP packets queued for reassembly  
Total nodes active  
TCP nodes keyed on both IP addresses and both ports  
UDP nodes keyed on both IP addresses and both ports  
IP nodes keyed on both IP addresses  
Sensor memory critical stage  
Interface status  
Command and control packet statistics  
Fail-over state  
System uptime  
CPU usage  
Memory usage for the system  
PEP  
Note  
Not all IPS platforms support PEP.  
The NotificationApp provides the following statistics:  
Number of error traps  
Number of event action traps  
Number of SNMP GET requests  
Number of SNMP SET requests  
CtlTransSource  
The CtlTransSource is an application that forwards locally initiated remote control transactions to their  
remote destinations using HTTP protocol. The CtlTransSource initiates either TLS or non-TLS  
connections and communicates remote control transactions to HTTP servers over these connections.  
The CtlTransSource must establish sufficient credentials on the remote HTTP server to execute a remote  
control transaction. It establishes its credentials by presenting an identity to the HTTP server on the  
remote node in the form of a username and password (basic authentication). When the authentication is  
successful, the requestor is assigned a cookie containing a user authentication that must be presented  
with each request on that connection.  
The transactionHandlerLoop method in the CtlTransSource serves as a proxy for remote control  
transaction. When a local application initiates a remote control transaction, IDAPI initially directs the  
transaction to the CtlTransSource. The transactionHandlerLoop method is a loop that waits on remote  
control transactions that are directed to the CtlTransSource.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix A System Architecture  
MainApp  
Figure A-3 shows the transactionHandlerLoop method in the CtlTransSource.  
Figure A-3 CtlTransSource  
CtlTransSource  
+CtlTransSource0  
+transaction HandlerLoop  
HTTP Client  
IDAPI  
When the transactionHandlerLoop receives a remotely addressed transaction, it tries to forward the  
remote control transaction to its remote destination. The transactionHandlerLoop formats the transaction  
into a control transaction message. The transactionHandlerLoop uses the HttpClient classes to issue the  
control transaction request to the HTTP server on the remote node. The remote HTTP server handles the  
remote control transaction and returns the appropriate response message in an HTTP response. If the  
remote HTTP server is an IPS web server, the web server uses the CtlTransSource servlet to process the  
remote control transactions.  
The transactionHandlerLoop returns either the response or a failure response as the response of the  
control transaction to the initiator of the remote control transaction. If the HTTP server returns an  
unauthorized status response (indicating the HTTP client has insufficient credentials on the HTTP  
server), the transactionHandlerLoop reissues the transaction request using the designated username and  
password of the CtlTransSource to authenticate the identity of the requestor. The  
transactionHandlerLoop continues to loop until it receives a control transaction that directs it to exit or  
until its exit event is signaled.  
Attack Response Controller  
This section describes the ARC, which is the IPS application that starts and stops blocking on routers,  
switches, and firewalls, and rate limits traffic on routers running Cisco IOS 12.3. A block is an entry in  
the configuration or ACL of a device to block incoming and outgoing traffic for a specific host IP address  
or network address. This section contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
MainApp  
Understanding the ARC  
The main responsibility of the ARC is to block events. When it responds to a block, it either interacts  
with the devices it is managing directly to enable the block or it sends a block request through the Control  
Transaction Server to a master blocking sensor. The web server on the master blocking sensor receives  
the control transaction and passes it to the Control Transaction Server, which passes it to the ARC. The  
ARC on the master blocking sensor then interacts with the devices it is managing to enable the block.  
Figure A-4 illustrates the ARC.  
Figure A-4  
ARC  
Sensor  
Routers and Firewalls  
Block  
Block  
Subscription  
Subscription  
Block Event  
Block CT  
Event Store  
CT Source  
Attack  
Response  
Controller  
Block Event  
Block CT  
IDAPI  
Block CT  
Block CT  
Response  
Response  
Master Blocking Sensor  
Routers and Firewalls  
Block CT  
Response  
Block CT  
Web Server  
CT Server  
Attack  
Response  
Controller  
Block CT  
Block CT  
IDAPI  
Block CT  
Block CT  
Response  
Response  
Note  
An ARC instance can control 0, 1, or many network devices. The ARC does not share control of any  
network device with other ARC applications, IPS management software, other network management  
software, or system administrators. Only one ARC instance is allowed to run on a given sensor.  
The ARC initiates a block in response to one of the following:  
An alert event generated from a signature that is configured with a block action  
A block configured manually through the CLI, IDM, IME, or ASDM  
A block configured permanently against a host or network address  
When you configure the ARC to block a device, it initiates either a Telnet or SSH connection with the  
device. The ARC maintains the connection with each device. After the block is initiated, the ARC pushes  
a new set of configurations or ACLs (one for each interface direction) to each controlled device. When  
a block is completed, all configurations or ACLs are updated to remove the block.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
MainApp  
ARC Features  
The ARC has the following features:  
Communication through Telnet and SSH 1.5 with 3DES (the default) or DES encryption  
Only the protocol specified in the ARC configuration for that device is attempted. If the connection  
fails for any reason, the ARC attempts to reestablish it.  
Preexisting ACLs on routers and VACLs on switches  
If a preexisting ACL exists on a router interface or direction that is controlled by the ARC, you can  
specify that this ACL be merged into the ARC-generated configuration, either before any blocks by  
specifying a preblock ACL or after any blocks by specifying a postblock ACL. The Catalyst 6000  
VACL device types can have a preblock and postblock VACL specified for each interface that the  
ARC controls. The firewall device types use a different API to perform blocks and the ARC does  
not have any effect on preexisting ACLs on the firewalls.  
Note  
Catalyst 5000 RSM and Catalyst 6000 MSFC2 network devices are supported in the same  
way as Cisco routers.  
Forwarding blocks to a list of remote sensors  
The ARC can forward blocks to a list of remote sensors, so that multiple sensors can in effect  
collectively control a single network device. Such remote sensors are referred to as master blocking  
sensors.  
Specifying blocking interfaces on a network device  
You can specify the interface and direction where blocking is performed in the ARC configuration  
for routers. You can specify the interface where blocking is performed in the VACL configuration.  
The ARC can simultaneously control up to 250 interfaces.  
Note  
Cisco firewalls do not block based on interface or direction, so this configuration is never  
specified for them.  
Blocking hosts or networks for a specified time  
The ARC can block a host or network for a specified number of minutes or indefinitely. The ARC  
determines when a block has expired and unblocks the host or network at that time.  
Logging important events  
The ARC writes a confirmation event when block or unblock actions are completed successfully or  
if any errors occur. The ARC also logs important events such as loss and recovery of a network  
device communication session, configuration errors, and errors reported by the network device.  
Maintaining the blocking state across ARC restarts  
The ARC reapplies blocks that have not expired when a shutdown or restart occurs. The ARC  
removes blocks that have expired while it was shut down.  
Note  
The ARC can only maintain the blocking state successfully if no one changes the system  
time while the application is shut down.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix A System Architecture  
MainApp  
Maintaining blocking state across network device restarts  
The ARC reapplies blocks and removes expired blocks as needed whenever a network device is shut  
down and restarted. The ARC is not affected by simultaneous or overlapping shutdowns and restarts  
of the ARC.  
Authentication and authorization  
The ARC can establish a communications session with a network device that uses AAA  
authentication and authorization including the use of remote TACACS+ servers.  
Two types of blocking  
The ARC supports host blocks and network blocks. Host blocks are connection based or  
unconditional. Network blocks are always unconditional.  
NAT addressing  
The ARC can control network devices that use a NAT address for the sensor. If you specify a NAT  
address when you configure a network device, that address is used instead of the local IP address  
when the sensor address is filtered from blocks on that device.  
Single point of control  
The ARC does not share control of network devices with administrators or other software. If you  
must update a configuration, shut down ARC until the change is complete. You can enable or disable  
the ARC through the CLI or any Cisco IPS manager. When the ARC is reenabled, it completely  
reinitializes itself, including rereading the current configuration for each controlled network device.  
Note  
We recommend that you disable the ARC from blocking when you are configuring any  
network device, including firewalls.  
Maintains up to 250 active blocks at any given time  
The ARC can maintain up to 250 active blocks at a time. Although the ARC can support up to 65535  
blocks, we recommend that you allow no more than 250 at a time.  
Note  
The number of blocks is not the same as the number of interface and directions.  
Supported Blocking Devices  
The ARC can control the following devices:  
Cisco routers running Cisco IOS 11.2 or later  
Note  
To perform rate limiting, the routers must be running Cisco IOS 12.3 or later.  
Catalyst 5000 series switches with Supervisor Engine software 5.3(1) or later running on the  
supervisor engine, and IOS 11.2(9)P or later running on the RSM.  
Note  
You must have the RSM because blocking is performed on the RSM.  
Catalyst 6000 series switches with PFC installed running Catalyst software 5.3 or later  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix A System Architecture  
MainApp  
Catalyst 6000 MSFC2 with Catalyst software 5.4(3) or later and Cisco IOS 12.1(2)E or later on the  
MSFC2  
Cisco ASA 5500 series models: ASA 5510, ASA 5520, and ASA 5540  
FWSM  
Note  
The FWSM cannot block in multi-mode admin context.  
ACLs and VACLs  
If you want to filter packets on an interface or direction that the ARC controls, you can configure the  
ARC to apply an ACL before any blocks (preblock ACL) and to apply an ACL after any blocks  
(postblock ACL). These ACLs are configured on the network device as inactive ACLs. You can define  
preblock and postblock ACLs for each interface and direction. The ARC retrieves and caches the lists  
and merges them with the blocking ACEs whenever it updates the active ACL on the network device. In  
most cases, you will want to specify a preexisting ACL as the postblock ACL so that it does not prevent  
any blocks from taking effect. ACLs work by matching a packet to the first ACE found. If this first ACE  
permits the packet, a subsequent deny statement will not be found.  
You can specify different preblock and postblock ACLs for each interface and direction, or you can reuse  
the same ACLs for multiple interfaces and directions. If you do not want to maintain a preblock list, you  
can use the never block option and always block hosts and networks by using existing configuration  
statements. A forever block is a normal block with a timeout value of -1.  
The ARC only modifies ACLs that it owns. It does not modify ACLs that you have defined. The ACLs  
maintained by ARC have a specific format that should not be used for user-defined ACLs. The naming  
convention is IPS_<interface_name>_[in | out]_[0 | 1]. <interface_name> corresponds to the name of  
the blocking interface as given in the ARC configuration.  
For Catalyst switches, it is a blocking interface VLAN number. Do not use these names for preblock and  
postblock ACLs. For Catalyst 6000 VACLs, you can specify a preblock and postblock VACL and only  
the interface is specified (direction is not used in VLANs). For firewalls, you cannot use preblock or  
postblock ACLs because the firewall uses a different API for blocking. Instead you must create ACLs  
directly on the firewalls.  
Maintaining State Across Restarts  
When the sensor shuts down, the ARC writes all blocks and rate limits (with starting timestamps) to a  
local file (nac.shun.txt) that is maintained by the ARC. When the ARC starts, this file is used to  
determine if any block updates should occur at the controlled network devices. Any unexpired blocks  
found in the file are applied to the network devices at startup. When the ARC shuts down, no special  
actions on the ACLs are taken even if outstanding blocks are in effect. The nac.shun.txt file is accurate  
only if the system time is not changed while the ARC is not running.  
Caution  
Do not make manual changes to the nac.shun.txt file.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Appendix A System Architecture  
MainApp  
The following scenarios demonstrate how the ARC maintains state across restarts.  
Scenario 1  
There are two blocks in effect when the ARC stops and one of them expires before the ARC restarts.  
When the ARC restarts, it first reads the nac.shun.txt file. It then reads the preblock and postblock ACLs  
or VACLs. The active ACL or VACL is built in the following order:  
1. The allow sensor_ ip_address command (unless the allow sensor shun command has been  
configured)  
2. Preblock ACL  
3. The always block command entries from the configuration  
4. Unexpired blocks from nac.shun.txt  
5. Postblock ACL  
When a host is specified as never block in the ARC configuration, it does not get translated into permit  
statements in the ACL. Instead, it is cached by the ARC and used to filter incoming addShunEvent events  
and addShunEntry control transactions.  
Scenario 2  
There are no preblock or postblock ACLs specified, but there is an existing active ACL. The new ACL  
is built in the following order:  
1. The allow sensor_ ip_address command (unless the allow sensor shun command has been  
configured)  
2. The always block command entries from the configuration  
3. Unexpired blocks from nac.shun.txt  
4. The permit IP any any command  
Connection-Based and Unconditional Blocking  
The ARC supports two types of blocking for hosts and one type of blocking for networks. Host blocks  
are connection-based or unconditional. Network blocks are always unconditional.  
When a host block is received, the ARC checks for the connectionShun attribute on the host block. If  
connectionShun is set to true, the ARC performs connection blocking. Any host block can contain  
optional parameters, such as destination IP address, source port, destination port, and protocol. For a  
connection block to take place, at least the source and destination IP address must be present. If the  
source port is present on a connection block, it is ignored and not included in the block.  
Under the following conditions, the ARC forces the block to be unconditional, converting the block from  
connection type if necessary:  
A block of any type is active for a specified source IP address  
A new block of any type is received for that source IP address  
The new block differs in any of its optional parameters (except the source port) from the old block  
When a block is updated (for example, when a new block arrives while an existing block for that source  
IP address or network is already in effect), the remaining minutes of the existing block are determined.  
If the time for the new block is less than or equal to the remaining minutes, no action is taken. Otherwise,  
the new block timeout replaces the existing block timeout.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix A System Architecture  
MainApp  
Caution  
Cisco firewalls do not support connection blocking of hosts. When a connection block is applied, the  
firewall treats it like an unconditional block. Cisco firewalls also do not support network blocking. ARC  
never tries to apply a network block to a Cisco firewall.  
Blocking with Cisco Firewalls  
The ARC performs blocks on firewalls using the shun command. The shun command has the following  
formats:  
To block an IP address:  
shun srcip [destination_ip_address source_port destination_port [port]]  
To unblock an IP address:  
no shun ip  
To clear all blocks:  
clear shun  
To show active blocks or to show the global address that was actually blocked:  
show shun [ip_address]  
The ARC uses the response to the show shun command to determine whether the block was performed.  
The shun command does not replace existing ACLs, conduits, or outbound commands, so there is no  
need to cache the existing firewall configuration, nor to merge blocks into the firewall configuration.  
Caution  
Do not perform manual blocks or modify the existing firewall configuration while ARC is running.  
If the block command specifies only the source IP address, existing active TCP connections are not  
broken, but all incoming packets from the blocked host are dropped.  
When the ARC first starts up, the active blocks in the firewall are compared to an internal blocking list.  
Any blocks that do not have a corresponding internal list entry are removed.  
The ARC supports authentication on a firewall using local usernames or a TACACS+ server. If you  
configure the firewall to authenticate using AAA but without the TACACS+ server, the ARC uses the  
reserved username pix for communications with the firewall.  
If the firewall uses a TACACS+ server for authentication, you use a TACACS+ username. In some  
firewall configurations that use AAA logins, you are presented with three password prompts: the initial  
firewall password, the AAA password, and the enable password. The ARC requires that the initial  
firewall password and the AAA password be the same.  
When you configure a firewall to use NAT or PAT and the sensor is checking packets on the firewall  
outside network, if you detect a host attack that originates on the firewall inside network, the sensor tries  
to block the translated address provided by the firewall. If you are using dynamic NAT addressing, the  
block can be ineffective or cause innocent hosts to be blocked. If you are using PAT addressing, the  
firewall could block the entire inside network. To avoid these situations, position your sensor on the  
inside interface or do not configure the sensor to block.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix A System Architecture  
MainApp  
Blocking with Catalyst Switches  
Catalyst switches with a PFC filter packets using VACLs. VACLs filter all packets between VLANs and  
within a VLAN. MSFC router ACLs are supported when WAN cards are installed and you want the  
sensor to control the interfaces through the MSFC2.  
Note  
An MSFC2 card is not a required part of a Catalyst switch configuration for blocking with VACLs.  
Caution  
When you configure the ARC for the Catalyst switch, do not specify a direction with the controlled  
interface. The interface name is a VLAN number. Preblock and postblock lists should be VACLs.  
The following commands apply to the Catalyst VACLs:  
To view an existing VACL:  
show security acl info acl_name  
To block an address (address_spec is the same as used by router ACLs):  
set security acl ip acl_name deny address_spec  
To activate VACLs after building the lists:  
commit security acl all  
To clear a single VACL:  
clear security acl map acl_name  
To clear all VACLs:  
clear security acl map all  
To map a VACL to a VLAN:  
set sec acl acl_name vlans  
Logger  
The sensor logs all events (alert, error, status, and debug messages) in a persistent, circular buffer. The  
sensor also generates IP logs. The messages and IP logs are accessible through the CLI, IDM, and  
ASDM.  
The IPS applications use the Logger to log messages. The Logger sends log messages at any of five levels  
of severity: debug, timing, warning, error, and fatal. The Logger writes the log messages to  
/usr/cids/idsRoot/log/main.log, which is a circular text file. New messages overwrite older messages  
when the file reaches its maximum size; therefore the last message written may not appear at the end of  
the main.log. Search for the string “= END OF FILE =” to locate the last line written to the main.log.  
The main.log is included in the show tech-support command output. If the message is logged at warning  
level or above (error or fatal), the Logger converts the message to an evError event (with the  
corresponding error severity) and inserts it in the Event Store.  
The Logger receives all syslog messages, except cron messages, that are at the level of informational and  
above (*.info;cron.none), and inserts them in to the Event Store as evErrors with the error severity set to  
Warning. The Logger and application logging are controlled through the service logger commands.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Appendix A System Architecture  
MainApp  
The Logger can control what log messages are generated by each application by controlling the logging  
severity for different logging zones. You would only access the individual-zone-control of the logger  
service at the request and supervision of a TAC engineer or developer. For troubleshooting purposes,  
TAC might request that you turn on debug logging.  
AuthenticationApp  
This section describes the AuthenticationApp, and contains the following topics:  
Understanding the AuthenticationApp  
The AuthenticationApp has the following responsibilities:  
To authenticate the identity of a user  
To administer the accounts, privileges, keys, and certificates of the user  
To configure which authentication methods are used by the AuthenticationApp and other access  
services on the sensor  
Authenticating Users  
You must configure authentication on the sensor to establish appropriate security for user access. When  
you install a sensor, an initial cisco account with an expired password is created. A user with  
administrative access to the sensor accesses the sensor through the CLI or an IPS manager, such as the  
IDM or the ASDM, by logging in to the sensor using the default administrative account (cisco). In the  
CLI, the administrator is prompted to change the password. IPS managers initiate a  
setEnableAuthenticationTokenStatus control transaction to change the password of an account.  
Through the CLI or an IPS manager, the administrator configures which authentication method is used,  
such as username and password or an SSH authorized key. The application servicing the administrator  
initiates a setAuthenticationConfig control transaction to establish the authentication configuration.  
The authentication configuration includes a login attempt limit value that is used to specify how account  
locking is handled. Account locking is invoked when the number of consecutive failed login attempts for  
a given account exceeds the login attempt limit value. After an account is locked, all further attempts to  
log in to that account are rejected. The account is unlocked by resetting the authentication token of the  
account using the setEnableAuthenticationTokenStatus control transaction. The account locking feature  
is disabled when the login attempt limit value is set to zero.  
The administrator can add additional user accounts either through the CLI or an IPS manager.  
Configuring Authentication on the Sensor  
When a user tries to access the sensor through a service such as web server or the CLI, the identity of  
the user must be authenticated and the privileges of the user must be established. The service that is  
providing access to the user initiates an execAuthenticateUser control transaction request to the  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Appendix A System Architecture  
MainApp  
AuthenticationApp to authenticate the identity of the user. The control transaction request typically  
includes the username and a password, or the identity of the user can be authenticated using an SSH  
authorized key.  
The AuthenticationApp responds to the execAuthenticateUser control transaction request by attempting  
to authenticate the identity of the user. The AuthenticationApp returns a control transaction response that  
contains the authentication status and privileges of the user. If the identity of the user cannot be  
authenticated, the AuthenticationApp returns an unauthenticated status and anonymous user privileges  
in the control transaction response. The control transaction response also indicates if the account  
password has expired. User interface applications that authenticate users by initiating an  
execAuthenticateUser control transaction prompt the user to change the password.  
The AuthenticationApp uses the underlying operating system to confirm the identity of a user. All the  
IPS applications send control transactions to the AuthenticationApp, which then uses the operating  
system to form its responses.  
Remote shell services, Telnet and SSH, are not IPS applications. They call the operating system directly.  
If the user is authenticated, it launches the IPS CLI. In this case, the CLI sends a special form of the  
execAuthenticateUser control transaction to determine the privilege level of the logged-in user. The CLI  
then tailors the commands it makes available based on this privilege level.  
Managing TLS and SSH Trust Relationships  
Encrypted communications over IP networks provide data privacy by making it impossible for a passive  
attacker to discover from the packets exchanged alone the secret key needed to decrypt the data in the  
packets.  
However, an equally dangerous attack vector is for an imposter to pretend to be the server end of the  
connection. All encryption protocols provide a means for clients to defend themselves from these  
attacks. IPS supports two encryption protocols, SSH and TLS, and the AuthenticationApp helps manage  
trust when the sensor plays either the client or server role in encrypted communications.  
The IPS web server and SSH server are server endpoints of encrypted communications. They protect  
their identities with a private key and offer a public key to clients that connect to them. For TLS this  
public key is included inside an X.509 certificate, which includes other information. Remote systems  
that connect to the sensor should verify that the public key received during connection establishment is  
the key they expect.  
Clients must maintain a list of trusted public keys to protect themselves from man-in-the-middle attacks.  
The exact procedure by which this trust is established varies depending on the protocol and client  
software. In general, the client displays a fingerprint of 16 or 20 bytes. The human operator who is  
configuring the client to establish trust should use an out-of-band method to learn the key fingerprints  
of the server before attempting to establish trust. If the fingerprints match, the trust relationship is  
established and henceforth the client can automatically connect with that server and be confident that the  
remote server is not an imposter.  
You can use the show ssh server-key and show tls fingerprint to display the key fingerprints of the  
sensor. By recording the output of these commands when directly connected to the sensor console, you  
can reliably use this information to confirm the identity of the sensor over the network later when  
establishing trust relationships.  
For example, when you initially connect to a sensor through the Microsoft Internet Explorer web  
browser, a security warning dialog box indicates that the certificate is not trusted. Using the user  
interface of Internet Explorer, you can inspect the certificate thumbprint, a value that should exactly  
match the SHA1 fingerprint displayed by the show tls fingerprint command. After verifying this, add  
this certificate to the list of trusted CAs of the browser to establish permanent trust.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix A System Architecture  
SensorApp  
Each TLS client has different procedures for establishing this trust. The sensor itself includes a TLS  
client that is used to send control transactions to other sensors and download upgrades and configuration  
files from other TLS web servers. Use the tls trusted-host command to establish trust of the TLS servers  
with which the sensor communicates.  
Similarly, the sensor includes an SSH client that is used to communicate with managed network devices,  
download upgrades, and copy configurations and support files to remote hosts. Use the ssh host-key  
command to establish trust relationships with the SSH servers the sensor will contact.  
You can manage the list of TLS trusted certificates and SSH known hosts through the commands service  
trusted-certificates and service ssh-known-hosts.  
X.509 certificates include additional information that can increase the security of the trust relationship;  
however, these can lead to confusion. For example, an X.509 certificate includes a validity period during  
which the certificate can be trusted. Typically this period is a number of years starting at the moment the  
certificate is created. To ensure that an X.509 certificate is valid at the moment it is being used requires  
that the client system maintain an accurate clock.  
X.509 certificates are also tied to a particular network address. Sensors fill this field with the IP address  
of the command and control interface of the sensor. Consequently, if you change the command and  
control IP address of the sensor, the X.509 certificate of the server is regenerated. You must reconfigure  
all clients on the network that trusted the old certificate to locate the sensor at its new IP address and  
trust the new certificate.  
By using the SSH known hosts and TLS trusted certificates services in the AuthenticationApp, you can  
operate sensors at a high level of security.  
Web Server  
The web server provides SDEE support, which enables the sensor to report security events, receive  
IDIOM transactions, and serve IP logs. The web server supports HTTP 1.0 and 1.1. Communications  
with the web server often include sensitive information, such as passwords, that would severely  
compromise the security of the system if an attacker were able to eavesdrop. For this reason, sensors ship  
with TLS enabled. The TLS protocol is an encryption protocol that is compatible with SSL.  
Note  
We deprecated the RDEP event sever service in IPS 6.1, and deleted it from the IPS 7.0(1) system  
architecture. The web server now uses the SDEE event server.  
SensorApp  
This section describes the SensorApp, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix A System Architecture  
SensorApp  
Understanding the SensorApp  
The SensorApp performs packet capture and analysis. Policy violations are detected through signatures  
in the SensorApp and the information about the violations is forwarded to the Event Store in the form of  
an alert. Packets flow through a pipeline of processors fed by a producer designed to collect packets from  
the network interfaces on the sensor. Event actions can be associated with an event risk rating threshold  
that must be surpassed for the actions to take place. Some of the processors call inspectors to perform  
signature analysis. All inspectors can call the alarm channel to produce alerts as needed.  
The SensorApp supports the following processors:  
Time Processor—This processor processes events stored in a time-slice calendar. Its primary task is  
to make stale database entries expire and to calculate time-dependent statistics.  
Deny Filters Processor—This processor handles the deny attacker functions. It maintains a list of  
denied source IP addresses. Each entry in the list expires based on the global deny timer, which you  
can configure in the virtual sensor configuration.  
Signature Event Action Processor—This processor processes event actions. Event actions can be  
associated with an event risk rating threshold that must be surpassed for the actions to take place. It  
supports the following event actions:  
Reset TCP flow  
IP log  
Deny packets  
Deny flow  
Deny attacker  
Alert  
Block host  
Block connection  
Generate SNMP trap  
Capture trigger packet  
Statistics Processor—This processor keeps track of system statistics such as packet counts and  
packet arrival rates.  
Layer 2 Processor—This processor processes layer 2-related events. It also identifies malformed  
packets and removes them from the processing path. You can configure actionable events for  
detecting malformed packets such as alert, capture packet, and deny packet. The layer 2 processor  
updates statistics about packets that have been denied because of the policy you have configured.  
Database Processor—This processor maintains the signature state and flow databases.  
Fragment Reassembly Processor—This processor reassembles fragmented IP datagrams. It is also  
responsible for normalization of IP fragments when the sensor is in inline mode.  
Stream Reassembly Processor—This processor reorders TCP streams to ensure the arrival order of  
the packets at the various stream-based inspectors. It is also responsible for normalization of the  
TCP stream. The normalizer engine lets you enable or disable alert and deny actions.  
The TCP Stream Reassembly Processor normalizer has a hold-down timer, which lets the stream  
state rebuild after a reconfiguration event. You cannot configure the timer. During the hold-down  
interval, the system synchronizes stream state on the first packet in a stream that passes through the  
system. When the hold down has expired, sensorApp enforces your configured policy. If this policy  
calls for a denial of streams that have not been opened with a 3-way handshake, established streams  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
SensorApp  
that were quiescent during the hold-down period will not be forwarded and will be allowed to  
timeout. Those streams that were synchronized during the hold-down period are allowed to  
continue.  
Signature Analysis Processor—This processor dispatches packets to the inspectors that are not  
stream-based and that are configured for interest in the packet in process.  
Slave Dispatch Processor—A process found only on dual CPU systems.  
The SensorApp also supports the following units:  
Analysis Engine—The Analysis Engine handles sensor configuration. It maps the interfaces and  
also the signature and alarm channel policy to the configured interfaces.  
Alarm Channel—The Alarm Channel processes all signature events generated by the inspectors. Its  
primary function is to generate alerts for each event it is passed.  
Inline, Normalization, and Event Risk Rating Features  
The SensorApp contains the following inline, normalization, and event risk rating features:  
Processing packets inline  
When the sensor is processing packets in the data path, all packets are forwarded without any  
modifications unless explicitly denied by policy configuration. Because of TCP normalization it is  
possible that some packets will be delayed to ensure proper coverage. When policy violations are  
encountered, the SensorApp allows for the configuration of actions. Additional actions are available  
in inline mode, such as deny packet, deny flow, and deny attacker.  
All packets that are unknown or of no interest to the IPS are forwarded to the paired interface with  
no analysis. All bridging and routing protocols are forwarded with no participation other than a  
possible deny due to policy violations. There is no IP stack associated with any interface used for  
inline (or promiscuous) data processing. The current support for 802.1q packets in promiscuous  
mode is extended to inline mode.  
IP normalization  
Intentional or unintentional fragmentation of IP datagrams can serve to hide exploits making them  
difficult or impossible to detect. Fragmentation can also be used to circumvent access control  
policies like those found on firewalls and routers. And different operating systems use different  
methods to queue and dispatch fragmented datagrams. If the sensor has to check for all possible  
ways that the end host will reassemble the datagrams, it makes the sensor vulnerable to denial of  
service attacks. Reassembling all fragmented datagrams inline and only forwarding completed  
datagrams, refragmenting the datagram if necessary, is the solution to this problem. The IP  
Fragmentation Normalization unit performs this function.  
TCP normalization  
Through intentional or natural TCP session segmentation, some classes of attacks can be hidden. To  
make sure policy enforcement can occur with no false positives and false negatives, the state of the  
two TCP endpoints must be tracked and only the data that is actually processed by the real host  
endpoints should be passed on. Overlaps in a TCP stream can occur, but are extremely rare except  
for TCP segment retransmits. Overwrites in the TCP session should not occur. If overwrites do  
occur, someone is intentionally trying to elude the security policy or the TCP stack implementation  
is broken. Maintaining full information about the state of both endpoints is not possible unless the  
sensor acts as a TCP proxy. Instead of the sensor acting as a TCP proxy, the segments will be ordered  
properly and the normalizer will look for any abnormal packets associated with evasion and attacks.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
SensorApp  
Event risk rating  
Event risk rating helps reduce false positives from the system and gives you more control over what  
causes an alarm. The event risk rating incorporates the following additional information beyond the  
detection of a potentially malicious action:  
Severity of the attack if it were to succeed  
Fidelity of the signature  
Relevance of the potential attack with respect to the target host  
Overall value of the target host  
SensorApp New Features  
The SensorApp contains the following new features:  
Policy table—Provides a list of risk category settings (high, medium, and low).  
Evasion protection—Lets an inline interface mode sensor switch from strict mode to asymmetric  
mode for the Normalizer.  
Sensor health meter—Provides sensor-wide health statistics.  
Top services—Provides the top ten instances of the TCP, UDP, ICMP, and IP protocols.  
Security meter—Profiles alerts into threat categories and reports this information in red, yellow, and  
green buckets. You can configure the transition points for these buckets.  
Clear Flow state—Lets you clear the database, which causes the sensor to start fresh just as in a  
restart.  
Restart status—Reports periodically the current start and restart stages of the sensor.  
Packet Flow  
Packets are received by the NIC and placed in the kernel user-mapped memory space by the IPS-shared  
driver. The packet is prepended by the IPS header. Each packet also has a field that indicates whether to  
pass or deny the packet when it reaches Signature Event Action Processor.  
The producer pulls packets from the shared-kernel user-mapped packet buffer and calls the process  
function that implements the processor appropriate to the sensor model. The following orders occur:  
Single processor execution  
Time Processor --> Layer 2 Processor --> Deny Filters Processor --> Fragment Reassembly  
Processor --> Statistics Processor --> Database Processor --> Signature Analysis Processor -->  
Stream Reassembly Processor --> Signature Event Action Processor  
Dual processor execution  
Execution Thread 1 Time Processor --> Layer 2 Processor --> Deny Filters Processor --> Fragment  
Reassembly Processor --> Statistics Processor --> Database Processor --> Signature Analysis  
Processor --> Slave Dispatch Processor --> | Execution Thread 2 Database Processor --> Stream  
Reassembly Processor --> Signature Event Action Processor  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
SensorApp  
Signature Event Action Processor  
The Signature Event Action Processor coordinates the data flow from the signature event in the Alarm  
Channel to processing through the Signature Event Action Override, the Signature Event Action Filter,  
and the Signature Event Action Handler. It consists of the following components:  
Alarm Channel—The unit that represents the area to communicate signature events from the  
SensorApp inspection path to signature event handling.  
Signature Event Action Override—Adds actions based on the risk rating value. Signature Event  
Action Override applies to all signatures that fall in the range of the configured risk rating threshold.  
Each Signature Event Action Override is independent and has a separate configuration value for  
each action type.  
Signature Event Action Filter—Subtracts actions based on the signature ID, addresses, and risk  
rating of the signature event. The input to the Signature Event Action Filter is the signature event  
with actions possibly added by the Signature Event Action Override.  
Note  
The Signature Event Action Filter can only subtract actions, it cannot add new actions.  
The following parameters apply to the Signature Event Action Filter:  
Signature ID  
Subsignature ID  
Attacker address  
Attacker port  
Victim address  
Victim port  
Risk rating threshold range  
Actions to subtract  
Sequence identifier (optional)  
Stop-or-continue bit  
Enable action filter line bit  
Victim OS relevance or OS relevance  
Signature Event Action Handler—Performs the requested actions. The output from the Signature  
Event Action Handler is the actions being performed and possibly an evIdsAlert written to the Event  
Store.  
Figure A-5 on page A-27 illustrates the logical flow of the signature event through the Signature Event  
Action Processor and the operations performed on the action for this event. It starts with the signature  
event with configured action received in the Alarm Channel and flows top to bottom as the signature  
event passes through the functional components of the Signature Event Action Processor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Appendix A System Architecture  
CollaborationApp  
Figure A-5  
Signature Event Through Signature Event Action Processor  
Signature event with  
configured action  
Signature event  
Event count  
Consumed  
signature event  
Signature event  
action override  
Add action based on RR  
Signature event  
action filter  
Subtract action based on  
signature, address, port, RR, etc.  
Signature event  
summary filter  
Subtract action based on  
current summary mode  
Signature event  
action handler  
Perform action  
CollaborationApp  
This section describes the CollaborationApp, and contains the following sections:  
Understanding the CollaborationApp  
The CollaborationApp is a peer of the MainApp and the SensorApp. It interfaces with them using various  
interprocess communication technologies, such as IDAPI control transactions, semaphores, shared  
memory, and file exchange.  
Reputation updates are exchanged between the Global Correlation server and the CollaborationApp. The  
CollaborationApp communicates with the sensors using four update components:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
CollaborationApp  
Set of rules score weight values  
Set of IP addresses and address ranges, which together with the rules and alerts provide the  
information needed to calculate reputation scores  
List of IP addresses and address ranges for which traffic should always be denied  
Network participation configuration, which allows the server to control the rate at which sensors  
send telemetry date to the server  
The sensor sends collaboration information to the Network Participation server. The sensor queries the  
Global Correlation server for a list of what collaboration updates are available and from which Global  
Correlation server to download the update files.  
Note  
The SensorApp starts before the CollaborationApp, but they initialize asynchronously. Therefore, it is  
possible that the Reputation Update server may download and attempt to apply one or more global  
correlation updates before the SensorApp is ready to accept the update. The update server may download  
and partially process the update, but it must wait until the SensorApp is ready before it can commit the  
update.  
For More Information  
For detailed information on global correlation and how to configure it, see Chapter 10, “Configuring  
Update Components  
The Global Correlation Update client exchanges manifests with the Global Correlation Update server. It  
parses the server manifest to determine what new updates are available for download and where they  
reside, and then builds a list of updates to be installed. If all updates are applied successfully, then the  
Global Correlation Update client commits the applied updates for each component, notifies SensorApp  
that new updates are available, and updates the client manifest to reflect the latest committed updates for  
each component.  
The client manifest contains the UDI of the sensor, which includes the serial number of the sensor, and  
an encrypted shared secret that the server uses to verify the sensor is an authentic Cisco IPS sensor. The  
server manifest contains a list of update files available for each component. For each update file in the  
list, the server manifest contains data, such as the update version, type, order, location, file transfer  
protocol, and so forth.  
There are two types of updates files: a full update file that replaces any existing data in the database of  
the component, and an incremental update that modifies the existing reputation data by adding, deleting,  
or replacing information. When all update files have been applied for all components, the temporary  
databases are committed by replacing the working databases.  
Authentication and authorization are achieved though the secret encryption mechanism and decryption  
key management. The Global Correlation Update server authenticates the sensor using the shared secret  
encryption mechanism contained in the client manifest. The Global Correlation Update client authorizes  
sensors using decryption key management. Sensors that have been authenticated by the Global  
Correlation Update server are sent valid keys in the server manifest so that they can decrypt the update  
files.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
SwitchApp  
Caution  
You receive a warning message if you have enabled global correlation, but you have not configured a  
DNS or HTTP proxy server. This warning is a reminder to either disable global correlation or add a DNS  
or HTTP proxy server.  
For More Information  
For the procedure for adding a DNS or proxy server to support global correlation, see Changing Network  
Error Events  
Whenever a global correlation update fails, an evError event is generated. The error message is included  
in sensor statistics. The following conditions result in a status message with the severity of Error:  
The sensor is unlicensed  
No DNS or HTTP proxy server is configured  
The manifest exchange failed  
An update file download failed  
Applying or committing the update failed  
An evError event is generated with the severity level of Warning if you edit and save either the host or  
global correlation configurations so that global correlation is enabled, but no DNS or HTTP proxy  
servers are configured.  
For More Information  
For the procedure for displaying sensor statistics, see Displaying Statistics, page 17-28.  
SwitchApp  
The 4500 series sensors have a built in switch that provides the external monitoring interfaces of the  
sensor. The SwitchApp is part of the IPS 4500 series design that enables the InterfaceApp and sensor  
initialization scripts to communicate with and control the switch. Any application that needs to get or  
set information on the switch must communicate with the SwitchApp. Additionally the SwitchApp  
implements the following:  
Detects bypass—When the SensorApp is not monitoring, the SwitchApp places the switch in bypass  
mode and then back to inspection mode once the SensorApp is up and running normally.  
Collects port statistics—The SwitchApp monitors the switch and collects statistics on the external  
interfaces of the switch for reporting by InterfaceApp.  
Handles the external interface configuration—When you update the interface configuration, the  
configuration is sent to the InterfaceApp, which updates the interface configuration for SwitchApp,  
which then forwards that configuration on to the switch.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
CLI  
CLI  
The CLI provides the sensor user interface for all direct node access such as Telnet, SSH, and serial  
interface. You configure the sensor applications with the CLI. Direct access to the underlying OS is  
allowed through the service role. This section describes the IPS CLI, and contains the following topics:  
User Roles  
Caution  
You should carefully consider whether you want to create a service account. The service account  
provides shell access to the system, which makes the system vulnerable. However, you can use the  
service account to create a password if the administrator password is lost. Analyze your situation to  
decide if you want a service account existing on the system.  
There are four user roles:  
Viewer—Can view configuration and events, but cannot modify any configuration data except their  
user passwords.  
Operator—Can view everything and can modify the following options:  
Signature tuning (priority, disable or enable)  
Virtual sensor definition  
Managed routers  
Their user passwords  
Administrator—Can view everything and can modify all options that operators can modify in  
addition to the following:  
Sensor addressing configuration  
List of hosts allowed to connect as configuration or viewing agents  
Assignment of physical sensing interfaces  
Enable or disable control of physical interfaces  
Add and delete users and passwords  
Generate new SSH host keys and server certificates  
Service—Only one user with service privileges can exist on a sensor. The service user cannot log in  
to the IDM or the IME. The service user logs in to a bash shell rather than the CLI.  
The service role is a special role that allows you to bypass the CLI if needed. Only one service  
account is allowed. You should only create an account with the service role for troubleshooting  
purposes. Only a user with administrator privileges can edit the service account.  
When you log in to the service account, you receive the following warning:  
************************ WARNING *************************************************  
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED.  
This account is intended to be used for support and troubleshooting purposes only.  
Unauthorized modifications are not supported and will require this device to be  
re-imaged to guarantee proper operation.  
**********************************************************************************  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix A System Architecture  
Communications  
Note  
For IPS 5.0 and later, you can no longer remove the cisco account. You can disable it using the no  
password cisco command, but you cannot remove it. To use the no password cisco command, there  
must be another administrator account on the sensor. Removing the cisco account through the service  
account is not supported. If you remove the cisco account through the service account, the sensor most  
likely will not boot up, so to recover the sensor you must reinstall the sensor system image.  
Service Account  
The service account is a support and troubleshooting tool that enables TAC to log in to a native operating  
system shell rather than the CLI shell. It does not exist on the sensor by default. You must create it so  
that it is available for TAC to use for troubleshooting your sensor.  
Only one service account is allowed per sensor and only one account is allowed a service role. When the  
password of the service account is set or reset, the password of the root account is set to the same  
password. This allows the service account user to su to root using the same password. When the service  
account is removed, the password of the root account is locked.  
The service account is not intended to be used for configuration purposes. Only modifications made to  
the sensor through the service account under the direction of TAC are supported. Cisco Systems does not  
support the addition and/or running of an additional service to the operating system through the service  
account, because it affects proper performance and proper functioning of the other IPS services. TAC  
does not support a sensor on which additional services have been added.  
You can track logins to the service account by checking the log file /var/log/.tac, which is updated with  
a record of service account logins.  
Note  
The Cisco IPS incorporates several troubleshooting features that are available through the CLI, IDM, or  
IME. The service account is not necessary for most troubleshooting situations. You may need to create  
the service account at the direction of TAC to troubleshoot a very unique problem. The service account  
lets you bypass the protections built into the CLI and allows root privilege access to the sensor, which is  
otherwise disabled. We recommend that you do not create a service account unless it is needed for a  
specific reason. You should remove the service account when it is no longer needed.  
Communications  
This section describes the communications protocols used by the Cisco IPS. It contains the following  
topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix A System Architecture  
Communications  
IDAPI  
IPS applications use an interprocess communication API called the IDAPI to handle internal  
communications. The IDAPI reads and writes event data and provides a mechanism for control  
transactions. The IDAPI is the interface through which all the applications communicate.  
The SensorApp captures and analyzes the network traffic on its interfaces. When a signature is matched,  
the SensorApp generates an alert, which is stored in the Event Store. If the signature is configured to  
perform the blocking response action, the SensorApp generates a block event, which is also stored in the  
Event Store.  
Figure A-6 illustrates the IDAPI interface.  
Figure A-6  
IDAPI  
Alert  
Alert  
SensorApp  
IDAPI  
Event Store  
Block  
Block  
request  
request  
Each application registers to the IDAPI to send and receive events and control transactions. The IDAPI  
provides the following services:  
Control transactions  
Initiates the control transaction.  
Waits for the inbound control transaction.  
Responds to the control transaction.  
IPS events  
Subscribes to remote IPS events, which are stored in the Event Store when received.  
Reads IPS events from the Event Store.  
Writes IPS events to the Event Store.  
The IDAPI provides the necessary synchronization mechanisms to guarantee atomic data accesses.  
IDIOM  
IDIOM is a data format standard that defines the event messages that are reported by the IPS as well as  
the operational messages that are used to configure and control intrusion detection systems. These  
messages consist of XML documents that conform to the IDIOM XML schema.  
IDIOM supports two types of interactions: event and control transaction. Event interactions are used to  
exchange IPS events such as alerts. IDIOM uses two types of messages for event interactions: event and  
error messages. Control transactions provide a means for one host to initiate an action in, change the  
state of, or read the state of another host. Control transactions utilize four types of IDIOM messages:  
request, response, configuration, and error messages. Events and control transactions that are  
communicated between application instances within a host are known as local events or local control  
transactions, or collectively, local IDIOM messages. Events and control transactions that are  
communicated between different hosts are known as remote events and remote control transactions, or  
collectively, remote IDIOM messages.  
Note  
IDIOM for the most part has been superseded by IDCONF, SDEE, and CIDEE.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                       
Appendix A System Architecture  
Communications  
IDCONF  
The Cisco IPS manages its configuration using XML documents. IDCONF specifies the XML schema  
including the Cisco IPS control transactions. The IDCONF schema does not specify the contents of the  
configuration documents, but rather the framework and building blocks from which the configuration  
documents are developed. It provides mechanisms that let the IPS managers and CLI ignore features that  
are not configurable by certain platforms or functions through the use of the feature-supported attribute.  
IDCONF messages are wrapped inside IDIOM request and response messages.  
The following is an IDCONF example:  
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>  
<request xmlns="http://www.cisco.com/cids/idiom" schemaVersion="2.00">  
<editConfigDelta xmlns="http://www.cisco.com/cids/idconf">  
<component name="userAccount">  
<config typedefsVersion="2004-03-01" xmlns="http://www.cisco.com/cids/idconf">  
<struct>  
<map name="user-accounts“ editOp=“merge”>  
<mapEntry>  
<key>  
<var name="name">cisco</var>  
</key>  
<struct>  
<struct name="credentials">  
<var name="role">administrator</var>  
</struct>  
</struct>  
</mapEntry>  
</map>  
</struct>  
</config>  
</component>  
</editDefaultConfig>  
</request>  
SDEE  
The Cisco IPS produces various types of events including intrusion alerts and status events. The IPS  
communicates events to clients such as management applications using the proprietary IPS-industry  
leading protocol, SDEE, which is a product-independent standard for communicating security device  
events. SDEE adds extensibility features that are needed for communicating events generated by various  
types of security devices.  
Systems that use SDEE to communicate events to clients are referred to as SDEE providers. SDEE  
specifies that events can be transported using the HTTP or HTTP over SSL and TLS protocols. When  
HTTP or HTTPS is used, SDEE providers act as HTTP servers, while SDEE clients are the initiators of  
HTTP requests.  
The IPS includes the web server, which processes HTTP or HTTPS requests. The web server uses  
run-time loadable servlets to process the different types of HTTP requests. Each servlet handles HTTP  
requests that are directed to the URL associated with the servlet. The SDEE server is implemented as a  
web server servlet.  
The SDEE server only processes authorized requests. A request is authorized if is originates from a web  
server to authenticate the identity of the client and determine the privilege level of the client.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                     
Appendix A System Architecture  
Cisco IPS File Structure  
CIDEE  
CIDEE specifies the extensions to SDEE that are used by the Cisco IPS. The CIDEE standard specifies  
all possible extensions that are supported by the Cisco IPS. Specific systems may implement a subset of  
CIDEE extensions. However, any extension that is designated as being required MUST be supported by  
all systems. CIDEE specifies the Cisco IPS-specific security device events and the IPS extensions to the  
SDEE evIdsAlert element.  
CIDEE supports the following events:  
evError—Error event  
Generated by the CIDEE provider when the provider detects an error or warning condition. The  
evError event contains error code and textual description of the error.  
evStatus—Status message event  
Generated by CIDEE providers to indicate that something of potential interest occurred on the host.  
Different types of status messages can be reported in the status event—one message per event. Each  
type of status message contains a set of data elements that are specific to the type of occurrence that  
the status message is describing. The information in many of the status messages are useful for audit  
purposes. Errors and warnings are not considered status information and are reported using evError  
rather than evStatus.  
evShunRqst—Block request event  
Generated to indicate that a block action is to be initiated by the service that handles network  
blocking.  
The following is a CDIEE extended event example:  
<sd:events xmlns:cid="http://www.cisco.com/cids/2004/04/cidee"  
xmlns:sd=“http://example.org/2003/08/sdee”>  
<sd:evIdsAlert eventId="1042648730045587005" vendor="Cisco“ severity="medium">  
<sd:originator>  
<sd:hostId>Beta4Sensor1</sd:hostId>  
<cid:appName>sensorApp</cid:appName>  
<cid:appInstanceId>8971</cid:appInstanceId>  
</sd:originator>  
<sd:time offset="0" timeZone="UTC">1043238671706378000</sd:time>  
<sd:signature description="IOS Udp Bomb" id="4600" cid:version="S37">  
<cid:subsigId>0</cid:subsigId>  
</sd:signature> …  
Cisco IPS File Structure  
The Cisco IPS has the following directory structure:  
/usr/cids/idsRoot—Main installation directory.  
/usr/cids/idsRoot/shared—Stores files used during system recovery.  
/usr/cids/idsRoot/var—Stores files created dynamically while the sensor is running.  
/usr/cids/idsRoot/var/updates—Stores files and logs for update installations.  
/usr/cids/idsRoot/var/virtualSensor—Stores files used by SensorApp to analyze regular expressions.  
/usr/cids/idsRoot/var/eventStore—Contains the Event Store application.  
/usr/cids/idsRoot/var/core—Stores core files that are created during system crashes.  
/usr/cids/idsRoot/var/iplogs—Stores IP log file data.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix A System Architecture  
Summary of Cisco IPS Applications  
/usr/cids/idsRoot/bin—Contains the binary executables.  
/usr/cids/idsRoot/bin/authentication—Contains the authentication application.  
/usr/cids/idsRoot/bin/cidDump—Contains the script that gathers data for tech support.  
/usr/cids/idsRoot/bin/cidwebserver—Contains the web server application.  
/usr/cids/idsRoot/bin/cidcli—Contains the CLI application.  
/usr/cids/idsRoot/bin/nac—Contains the ARC application.  
/usr/cids/idsRoot/bin/logApp—Contains the logger application.  
/usr/cids/idsRoot/bin/mainApp—Contains the main application.  
/usr/cids/idsRoot/bin/sensorApp—Contains the sensor application.  
/usr/cids/idsRoot/bin/collaborationApp—Contains the collaboration application.  
/usr/cids/idsRoot/bin/switchApp—Contains the switch application.  
/usr/cids/idsRoot/etc—Stores sensor configuration files.  
/usr/cids/idsRoot/htdocs—Contains the IDM files for the web server.  
/usr/cids/idsRoot/lib—Contains the library files for the sensor applications.  
/usr/cids/idsRoot/log—Contains the log files for debugging.  
/usr/cids/idsRoot/tmp—Stores the temporary files created during run time of the sensor.  
Summary of Cisco IPS Applications  
Table A-2 gives a summary of the applications that make up the IPS.  
Table A-2 Summary of Applications  
Application  
Description  
AuthenticationApp  
Authorizes and authenticates users based on IP address, password,  
and digital certificates.  
Attack Response Controller  
An ARC is run on every sensor. Each ARC subscribes to network  
access events from its local Event Store. The ARC configuration  
contains a list of sensors and the network access devices that its local  
ARC controls. If an ARC is configured to send network access events  
to a master blocking sensor, it initiates a network access control  
transaction to the remote ARC that controls the device. These  
network access action control transactions are also used by IPS  
managers to issue occasional network access actions.  
CLI  
Accepts command line input and modifies the local configuration  
using the IDAPI.  
CollaborationApp  
Control Transaction Server1  
Control Transaction Source2  
Shares information with other devices through a global correlation  
database to improve the combined efficacy of all the devices.  
Accepts control transactions from a remote client, initiates a local  
control transaction, and returns the response to the remote client.  
Waits for control transactions directed to remote applications,  
forwards the control transactions to the remote node, and returns the  
response to the initiator.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix A System Architecture  
Summary of Cisco IPS Applications  
Table A-2  
Summary of Applications (continued)  
Application  
IDM  
Description  
The Java applet that provides an HTML IPS management interface.  
IME  
The Java applet that provides an interface for viewing and archiving  
events.  
InterfaceApp  
Logger  
Handles bypass and physical settings and defines paired interfaces.  
Physical settings are speed, duplex, and administrative state.  
Writes all the log messages of the application to the log file and the  
error messages of the application to the Event Store.  
MainApp  
Reads the configuration and starts applications, handles starting and  
stopping of applications and node reboots, handles software  
upgrades.  
NotificationApp  
Sends SNMP traps when triggered by alert, status, and error events.  
NotificationApp uses the public domain SNMP agent. SNMP GETs  
provide information about the general health of the sensor.  
SDEE Server3  
SensorApp  
Accepts requests for events from remote clients.  
Captures and analyzes traffic on the monitored network and generates  
intrusion and network access events. Responds to IP logging control  
transactions that turn logging on and off and that send and delete IP  
log files.  
SwitchApp  
Web Server  
Part of the IPS 4500 series design that enables the InterfaceApp and  
sensor initialization scripts to communicate with and control the  
built-in switch. Any application that needs to get or set information  
on the switch must communicate with the SwitchApp.  
Waits for remote HTTP client requests and calls the appropriate  
servlet application.  
1. This is a web server servlet.  
2. This is a remote control transaction proxy.  
3. This is a web server servlet.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
A-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
A P P E N D I X  
B
Signature Engines  
This appendix describes the IPS signature engines, and contains the following sections:  
Understanding Signature Engines  
A signature engine is a component of the Cisco IPS that is designed to support many signatures in a  
certain category. An engine is composed of a parser and an inspector. Each engine has a set of parameters  
that have allowable ranges or sets of values.  
Note  
The Cisco IPS engines support a standardized Regex.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix B Signature Engines  
Understanding Signature Engines  
Cisco IPS contains the following signature engines:  
AIC—Provides thorough analysis of web traffic. The AIC engine provides granular control over  
HTTP sessions to prevent abuse of the HTTP protocol. It allows administrative control over  
applications, such as instant messaging and gotomypc, that try to tunnel over specified ports. You  
can also use AIC to inspect FTP traffic and control the commands being issued. There are two AIC  
engines: AIC FTP and AIC HTTP.  
Atomic—The Atomic engines are combined into four engines with multi-level selections. You can  
combine Layer 3 and Layer 4 attributes within one signature, for example IP + TCP. The Atomic  
engine uses the standardized Regex support. The Atomic engines consist of the following types:  
Atomic ARP—Inspects Layer 2 ARP protocol. The Atomic ARP engine is different because  
most engines are based on Layer 3 IP protocol.  
Atomic IP Advanced—Inspects IPv6 Layer 3 and ICMPv6 Layer 4 traffic.  
Atomic IP—Inspects IP protocol packets and associated Layer 4 transport protocols. This  
engine lets you specify values to match for fields in the IP and Layer 4 headers, and lets you use  
Regex to inspect Layer 4 payloads.  
Note  
All IP packets are inspected by the Atomic IP engine. This engine replaces the 4.x  
Atomic ICMP, Atomic IP Options, Atomic L3 IP, Atomic TCP, and Atomic UDP  
engines.  
Atomic IPv6—Detects two IOS vulnerabilities that are stimulated by malformed IPv6 traffic.  
Fixed—Performs parallel regular expression matches up to a fixed depth, then stops inspection using  
a single regular expression table. There are three Fixed engines: ICMP, TCP, and UDP.  
Flood—Detects ICMP and UDP floods directed at hosts and networks. There are two Flood engines:  
Flood Host and Flood Net.  
Meta—Defines events that occur in a related manner within a sliding time interval. This engine  
processes events rather than packets.  
Multi String—Inspects Layer 4 transport protocols and payloads by matching several strings for one  
signature. This engine inspects stream-based TCP and single UDP and ICMP packets.  
Normalizer—Configures how the IP and TCP Normalizer functions and provides configuration for  
signature events related to the IP and TCP Normalizer. Allows you to enforce RFC compliance.  
Service—Deals with specific protocols. The Service engines are divided in to the following protocol  
types:  
DNS—Inspects DNS (TCP and UDP) traffic.  
FTP—Inspects FTP traffic.  
FTP V2—Supports IOS IPS. This signature engine provides a protocol decode engine tuned for  
IOS IPS. If you try to use this engine, you receive an error message.  
Generic—Decodes custom service and payload, and generically analyzes network protocols.  
H225—Inspects VoIP traffic. Helps the network administrator make sure the SETUP message  
coming in to the VoIP network is valid and within the bounds that the policies describe. Is also  
helps make sure the addresses and Q.931 string fields such as url-ids, email-ids, and display  
information adhere to specific lengths and do not contain possible attack patterns.  
HTTP—Inspects HTTP traffic. The WEBPORTS variable defines inspection port for HTTP  
traffic.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix B Signature Engines  
Understanding Signature Engines  
HTTP V2—Supports IOS IPS. This signature engine provides a protocol decode engine tuned  
for IOS IPS. If you try to use this engine, you receive an error message.  
IDENT—Inspects IDENT (client and server) traffic.  
MSRPC—Inspects MSRPC traffic.  
MSSQL—Inspects Microsoft SQL traffic.  
NTP—Inspects NTP traffic.  
P2P—Inspects P2P traffic.  
RPC—Inspects RPC traffic.  
SMB Advanced—Processes Microsoft SMB and Microsoft DCE/RPC (MSRPC) over SMB  
packets.  
Note  
The SMB engine has been replaced by the SMB Advanced engine. Even though the  
SMB engine is still visible in IDM, IME, and the CLI, its signatures have been  
obsoleted; that is, the new signatures have the obsoletes parameter set with the IDs of  
their corresponding old signatures. Use the new SMB Advanced engine to rewrite any  
custom signature that were in the SMB engine.  
SMPT V1—Supports IOS IPS.  
This signature engine provides a protocol decode engine tuned for IOS IPS. If you try to use  
this engine, you receive an error message.  
SNMP—Inspects SNMP traffic.  
SSH—Inspects SSH traffic.  
TNS—Inspects TNS traffic.  
State—Conducts stateful searches of strings in protocols such as SMTP. The state engine has a  
hidden configuration file that is used to define the state transitions so new state definitions can be  
delivered in a signature update.  
String—Searches on Regex strings based on ICMP, TCP, or UDP protocol. There are three String  
engines: String ICMP, String TCP, and String UDP.  
String XL—Searches on Regex strings based on ICMP, TCP, or UDP protocol.The String XL  
engines provide optimized operation for the Regex accelerator card. There are three String engines:  
String ICMP XL, String TCP XL, and String UDP XL.  
Note  
The IPS 4345, IPS 4360, IPS 4510, IPS 4520, ASA 5525-X IPS SSP,  
ASA 5545-X IPS SSP, ASA 5555-X IPS SSP, and ASA 5585-X IPS SSP support the  
String XL engines and the Regex accelerator card.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix B Signature Engines  
Master Engine  
Note  
The Regex accelerator card is used for both the standard String engines and the String XL  
engines. Most standard String engine signatures can be compiled and analyzed by the Regex  
accelerator card without modification. However, there are special circumstances in which  
the standard String engine signatures cannot be compiled for the Regex accelerator card. In  
these situations a new signature is written in a String XL engine using the specific  
parameters in the String XL engine that do compile on the Regex accelerator card. The new  
signature in the String XL engine obsoletes the original signature in the standard String  
engine.  
Sweep—Analyzes sweeps from a single host (ICMP and TCP), from destination ports (TCP and  
UDP), and multiple ports with RPC requests between two nodes. There are two Sweep engines:  
Sweep and Sweep Other TCP.  
Traffic Anomaly—Inspects TCP, UDP, and other traffic for worms.  
Traffic ICMP—Analyzes nonstandard protocols, such as TFN2K, LOKI, and DDOS. There are only  
two signatures with configurable parameters.  
Trojan—Analyzes traffic from nonstandard protocols, such as BO2K andTFN2K. There are three  
Trojan engines: Bo2k, Tfn2k, and UDP. There are no user-configurable parameters in these engines.  
For More Information  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Master Engine  
The Master engine provides structures and methods to the other engines and handles input from  
configuration and alert output. This section describes the Master engine, and contains the following  
topics:  
General Parameters  
The following parameters are part of the Master engine and apply to all signatures (if it makes sense for  
that signature engine). Table B-1 lists the general master engine parameters.  
Table B-1  
Master Engine Parameters  
Parameter  
Description  
Value  
signature-id  
sub-signature-id  
Specifies the ID of this signature.  
Specifies the sub ID of this signature  
number  
number  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Appendix B Signature Engines  
Master Engine  
Table B-1  
Master Engine Parameters (continued)  
Parameter  
Description  
Value  
high  
alert-severity  
Specifies the severity of the alert:  
Dangerous alert  
Medium-level alert  
Low-level alert  
medium  
low  
informational (default)  
Informational alert  
sig-fidelity-rating  
promisc-delta  
Specifies the rating of the fidelity of this signature. 0 to 100  
(default = 100)  
Specifies the delta value used to determine the  
seriousness of the alert.  
0 to 30  
(default = 5)  
sig-name  
Specifies the name of the signature.  
sig-name  
alert-notes  
Provides additional information about this signature alert-notes  
that will be included in the alert message.  
user-comments  
alert-traits  
Provides comments about this signature.  
comments  
Specifies traits you want to document about this  
signature.  
0 to 65335  
release  
Provides the release in which the signature was most release  
recently updated.  
signature-creation-d Specifies the date the signature was created.  
ate  
signature-type  
Specifies the signature category.  
anomaly  
component  
exploit  
other  
vulnerability  
engine  
Specifies the engine to which the signature belongs.  
Note  
The engine-specific parameters appear under  
the engine category.  
event-count  
Specifies the number of times an event must occur  
before an alert is generated.  
1 to 65535  
(default = 1)  
event-count-key  
Specifies the storage type on which to count events Axxx  
for this signature:  
AxBx  
Attacker address  
Axxb  
xxBx  
AaBb  
Attacker and victim addresses  
Attacker address and victim port  
Victim address  
Attacker and victim addresses and ports  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Master Engine  
Table B-1  
Master Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-alert-interval Enables the alert interval:  
{yes | no}  
2 to 1000  
alert-interval—Specifies the time in seconds  
before the event count is reset.  
status  
Specifies whether the signature is enabled or  
disabled, active or retired.  
enabled | retired {yes |  
no}  
obsoletes  
Indicates that a newer signature has disabled an older  
signature.  
vulnerable-os-list  
When combined with passive OS fingerprinting, it  
allows the IPS to determine if it is likely a given  
attack is relevant to the target system.  
aix  
bsd  
general-os  
hp-ux  
ios  
irix  
linus  
mac-os  
netware  
other  
solaris  
unix  
windows  
windows-ut  
windows-nt-2k-xp  
mars-category {yes | Maps signatures to a MARS attack category.1  
no}  
1. This is a static information category that you can set in the configuration and view in the alerts.Refer to the MARS  
documentation for more information.  
Promiscuous Delta  
The promiscuous delta lowers the risk rating of certain alerts in promiscuous mode. Because the sensor  
does not know the attributes of the target system and in promiscuous mode cannot deny packets, it is  
useful to lower the prioritization of promiscuous alerts (based on the lower risk rating) so the  
administrator can focus on investigating higher risk rating alerts. In inline mode, the sensor can deny the  
offending packets so that they never reach the target host, so it does not matter if the target was  
vulnerable. Because the attack was not allowed on the network, the IPS does not subtract from the risk  
rating value. Signatures that are not service, OS, or application-specific have 0 for the promiscuous delta.  
If the signature is specific to an OS, service, or application, it has a promiscuous delta of 5, 10, or 15  
calculated from 5 points for each category.  
Caution  
We recommend that you do NOT change the promisc-delta setting for a signature.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix B Signature Engines  
Master Engine  
Obsoletes  
The Cisco signature team uses the obsoletes field to indicate obsoleted, older signatures that have been  
replaced by newer, better signatures, and to indicate disabled signatures in an engine when a better  
instance of that engine is available. For example, some String XL hardware-accelerated signatures now  
replace equivalent signatures that were defined in the String engine.  
Vulnerable OS List  
When you combine the vulnerable OS setting of a signature with passive OS fingerprinting, the IPS can  
determine if it is likely that a given attack is relevant to the target system. If the attack is found to be  
relevant, the risk rating value of the resulting alert receives a boost. If the relevancy is unknown, usually  
because there is no entry in the passive OS fingerprinting list, then no change is made to the risk rating.  
If there is a passive OS fingerprinting entry and it does not match the vulnerable OS setting of a  
signature, the risk rating value is decreased. The default value by which to increase or decrease the risk  
rating is +/- 10 points.  
For More Information  
For more information about promiscuous mode, see Understanding Promiscuous Mode, page 4-14.  
For more information about passive OS fingerprinting, see Configuring OS Identifications,  
Alert Frequency  
The purpose of the alert frequency parameter is to reduce the volume of the alerts written to the Event  
Store to counter IDS DoS tools, such as stick. There are four modes: fire-all, fire-once, summarize, and  
global-summarize. The summary mode is changed dynamically to adapt to the current alert volume. For  
example, you can configure the signature to fire-all, but after a certain threshold is reached, it starts  
summarizing.  
Table B-2 lists the alert frequency parameters.  
Table B-2  
Master Engine Alert Frequency Parameters  
Parameter  
Description  
Value  
summary-mode  
Specifies the mode used for summarization:  
fire-all  
fire-all—Fires an alert on all events.  
fire-once—Fires an alert only once.  
fire-once  
global-summarize  
global-summarize—Summarizes an alert so summarize  
that it only fires once regardless of how  
many attackers or victims.  
summarize—Summarizes alerts.  
specify-summary-threshold  
{yes |no}  
Enables summary threshold mode:  
0 to 65535  
1 to 1000  
summary-threshold—Specifies the  
threshold number of alerts to send a  
signature into summary mode.  
summary-interval—Specifies the time in  
seconds used in each summary alert.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Appendix B Signature Engines  
Master Engine  
Table B-2  
Master Engine Alert Frequency Parameters (continued)  
Parameter  
Description  
Value  
specify-global-summary-thres Enables global summary threshold mode:  
hold {yes |no}  
1 to 65535  
global-summary-threshold—Specifies the  
threshold number of events to take alerts  
into global summary.  
summary-key  
Specifies the storage type on which to  
summarize this signature:  
Axxx  
AxBx  
Axxb  
xxBx  
AaBb  
Attacker address  
Attacker and victim addresses  
Attacker address and victim port  
Victim address  
Attacker and victim addresses and ports  
Event Actions  
The Cisco IPS supports the following event actions. Most of the event actions belong to each signature  
engine unless they are not appropriate for that particular engine.  
Alert and Log Actions  
produce-alert—Writes an evIdsAlert to Event Store.  
produce-verbose-alert—Includes an encoded dump (possibly truncated) of the offending packet in  
the evIdsAlert.  
log-attacker-packets—Starts IP logging of packets containing the attacker address and sends an  
alert.  
log-victim-packets—Starts IP logging of packets containing the victim address and sends an alert.  
log-pair-packets (inline mode only)—Starts IP logging of packets containing the attacker/victim  
address pair.  
request-snmp-trap—Sends request to the NotificationApp to perform SNMP notification.  
Deny Actions  
deny-packet-inline (inline mode only)—Does not transmit this packet.  
Note  
You cannot delete the event action override for deny-packet-inline because it is protected. If  
you do not want to use that override, set the override-item-status to disabled for that entry.  
deny-connection-inline (inline mode only)—Does not transmit this packet and future packets on the  
TCP Flow.  
deny-attacker-victim-pair-inline (inline mode only)—Does not transmit this packet and future  
packets on the attacker/victim address pair for a specified period of time.  
deny-attacker-service-pair-inline (inline mode only)—Does not transmit this packet and future  
packets on the attacker address victim port pair for a specified period of time.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Regular Expression Syntax  
deny-attacker-inline (inline mode only)—Does not transmit this packet and future packets from the  
attacker address for a specified period of time.  
Note  
This is the most severe of the deny actions. It denies the current and future packets from a  
single attacker address. Each deny address times out for X seconds from the first event that  
caused the deny to start, where X is the amount of seconds that you configured. You can clear  
all denied attacker entries with the clear denied-attackers command, which permits the  
addresses back on the network.  
modify-packet-inline (inline mode only)—Modifies packet data to remove ambiguity about what the  
end point might do with the packet.  
Note  
The event action modify-packet-inline is part of the Normalizer engine. It scrubs the packet  
and corrects irregular issues such as bad checksum, out of range values, and other RFC  
violations.  
Other Actions  
Note  
IPv6 does not support the following event actions: request-block-host,  
request-block-connection, or request-rate-limit.  
request-block-connection—Requests the ARC to block this connection.  
request-block-host—Requests the ARC to block this attacker host.  
request-rate-limit—Requests the ARC to perform rate limiting.  
reset-tcp-connection—Sends TCP resets to hijack and terminate the TCP flow.  
Regular Expression Syntax  
Regular expressions (Regex) are a powerful and flexible notational language that allow you to describe  
text. In the context of pattern matching, regular expressions allow a succinct description of any arbitrary  
pattern.  
Table B-3 lists the IPS signature Regex syntax.  
Table B-3  
Signature Regular Expression Syntax  
Metacharacter  
Name  
Description  
?
Question mark  
Star, asterisk  
Plus  
Repeat 0 or 1 times.  
*
Repeat 0 or more times.  
Repeat 1 or more times.  
Repeat exactly X times.  
Repeat at least X times.  
Any one character except new line (0x0A).  
Any character listed.  
+
{x}  
{x,}  
.
Quantifier  
Minimum quantifier  
Dot  
[abc]  
Character class  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix B Signature Engines  
AIC Engine  
Table B-3  
Signature Regular Expression Syntax (continued)  
Metacharacter  
Name  
Description  
[^abc]  
[a-z]  
( )  
Negated character class  
Character range class  
Parenthesis  
Any character not listed.  
Any character listed inclusively in the range.  
Used to limit the scope of other metacharacters.  
Matches either expression it separates.  
The beginning of the line.  
|
Alternation, or  
caret  
^
\char  
Escaped character  
When char is a metacharacter or not, matches the literal  
char.  
char  
Character  
When char is not a metacharacter, matches the literal  
char.  
\r  
Carriage return  
New line  
Tab  
Matches the carriage return character (0x0D).  
Matches the new line character (0x0A).  
Matches the tab character (0x09).  
\n  
\t  
\f  
Form feed  
Matches the form feed character (0x0C).  
\xNN  
Escaped hexadecimal  
character  
Matches character with the hexadecimal code 0xNN  
(0<=N<=F).  
\NNN  
Escaped octal character  
Matches the character with the octal code NNN  
(0<=N<=8).  
All repetition operators will match the shortest possible string as opposed to other operators that  
consume as much of the string as possible thus giving the longest string match.  
Table B-4 lists examples of Regex patterns.  
Table B-4  
Regex Patterns  
To Match  
Regular Expression  
Hacker  
Hacker  
Hacker or hacker  
[Hh]acker  
Variations of bananas, banananas, banananananas  
ba(na)+s  
foo and bar on the same line with anything except a new line between them foo.*bar  
Either foo or bar  
foo|bar  
Either moon or soon  
(m|s)oon  
AIC Engine  
The Application Inspection and Control (AIC) engine inspects HTTP web traffic and enforces FTP  
commands. This section describes the AIC engine and its parameters, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix B Signature Engines  
AIC Engine  
Understanding the AIC Engine  
AIC provides thorough analysis of web traffic. It provides granular control over HTTP sessions to  
prevent abuse of the HTTP protocol. It allows administrative control over applications, such as instant  
messaging and gotomypc, that try to tunnel over specified ports. Inspection and policy checks for P2P  
and instant messaging are possible if these applications are running over HTTP. AIC also provides a way  
to inspect FTP traffic and control the commands being issued. You can enable or disable the predefined  
signatures or you can create policies through custom signatures.  
Note  
The AIC engines run when HTTP traffic is received on AIC web ports. If traffic is web traffic, but not  
received on the AIC web ports, the Service HTTP engine is executed. AIC inspection can be on any port  
if it is configured as an AIC web port and the traffic to be inspected is HTTP traffic.  
AIC Engine and Sensor Performance  
Application policy enforcement is a unique sensor feature. Rather than being based on traditional IPS  
technologies that inspect for exploits, vulnerabilities, and anomalies, AIC policy enforcement is  
designed to enforce HTTP and FTP service policies. The inspection work required for this policy  
enforcement is extreme compared with traditional IPS inspection work. A large performance penalty is  
associated with using this feature. When AIC is enabled, the overall bandwidth capacity of the sensor is  
reduced.  
AIC policy enforcement is disabled in the IPS default configuration. If you want to activate AIC policy  
enforcement, we highly recommend that you carefully choose the exact policies of interest and disable  
those you do not need. Also, if your sensor is near its maximum inspection load capacity, we recommend  
that you not use this feature since it can oversubscribe the sensor. We recommend that you use the  
adaptive security appliance firewall to handle this type of policy enforcement.  
AIC Engine Parameters  
The AIC engines define signatures for deep inspection of web traffic. They also define signatures that  
authorize and enforce FTP commands. There are two AIC engines: AIC HTTP and AIC FTP. The AIC  
engines have the following features:  
Web traffic:  
RFC compliance enforcement  
HTTP request method authorization and enforcement  
Response message validation  
MIME type enforcement  
Transfer encoding type validation  
Content control based on message content and type of data being transferred  
URI length enforcement  
Message size enforcement according to policy configured and the header  
Tunneling, P2P and instant messaging enforcement.  
This enforcement is done using regular expressions. There are predefined signature but you can  
expand the list.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                         
Appendix B Signature Engines  
AIC Engine  
FTP traffic:  
FTP command authorization and enforcement  
Table B-5 lists the parameters that are specific to the AIC HTTP engine.  
Table B-5  
AIC HTTP Engine Parameters  
Parameter  
Description  
signature-type  
Specifies the type of AIC signature.  
content-types  
define-web-traffic-policy  
max-outstanding-requests-overrun  
max-outstanding-requests-overrun  
msg-body-pattern  
request-methods  
transfer-encodings  
content-types  
Specifies the AIC signature that  
deals with MIME types:  
define-content-type—Associates  
actions such as denying a  
specific MIME type  
(image/gif), defining a  
message-size violation, and  
determining that the  
MIME-type mentioned in the  
header and body do not match.  
define-recognized-content-types  
—Lists the content types  
recognized by the sensor.  
define-web-traffic-policy Specifies the action to take when  
noncompliant HTTP traffic is seen.  
The alarm-on-non-http-traffic  
{true | false} command enables the  
signature. This signature is disabled  
by default.  
max-outstanding-requests Specifies the maximum allowed  
1 - 16  
-overrun  
HTTP requests per connection.  
msg-body-pattern  
Uses Regex to define signatures  
that look for specific patterns in the  
message body:  
regex-list—  
regex-list-in-order—  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
AIC Engine  
Table B-5  
AIC HTTP Engine Parameters (continued)  
Parameter  
Description  
request-methods  
Specifies an AIC signature that  
allows actions to be associated with  
HTTP request methods:  
define-request-method—Specifie  
s get, put, and so forth.  
recognized-request-methods—Li  
sts methods recognized by the  
sensor.  
transfer-encodings  
Specifies an AIC signature that  
deals with transfer encodings:  
define-transfer-encoding—Assoc  
iates an action with each  
method, such as compress,  
chunked, and so forth.  
recognized-transfer-encodings—  
Lists methods recognized by  
the sensor.  
chunked-transfer-encoding—Err  
or specifies actions to be taken  
when a chunked encoding error  
is seen.  
Table B-6 lists the parameters that are specific to the AIC FTP engine.  
Table B-6  
AIC FTP Engine Parameters  
Parameter  
Description  
Value  
signature-type  
Specifies the type of  
AIC signature.  
ftp-commands  
unrecognized-ftp-command  
ftp-commands  
Associates an action  
with an FTP command:  
help, noop, stat, syst, user, abort,  
acct, allo, appe, cdup, cwd, dele, list,  
mkd, mode, nlst, pass, pasv, port,  
pass, quit, rein, rest, retr, rmd, rnfr,  
rnto, site, smnt, stor, stou, stru, type  
ftp-command—Lets  
you choose the FTP  
command you want  
to inspect.  
unrecognized-ftp-command  
Inspects unrecognized  
FTP commands.  
For More Information  
For the procedures for configuring AIC engine signatures, see Configuring AIC Signatures,  
For an example of a custom AIC signature, see Creating an AIC Signature, page 7-26.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Atomic Engine  
For more information on the parameters common to all signature engines, see Master Engine,  
Atomic Engine  
The Atomic engine contains signatures for simple, single packet conditions that cause alerts to be fired.  
This section describes the Atomic engine, and contains the following topics:  
Atomic ARP Engine  
The Atomic ARP engine defines basic Layer 2 ARP signatures and provides more advanced detection  
of the ARP spoof tools dsniff and ettercap.  
Table B-7 lists the parameters that are specific to the Atomic ARP engine.  
Table B-7  
Atomic ARP Engine Parameters  
Parameter  
Description  
Value  
specify-arp-operation {yes | no}  
specify-mac-flip {yes | no}  
(Optional) Enables ARP operation:  
0 to 65535  
arp-operation—Specifies the type of ARP  
operation to inspect.  
(Optional) Enables MAC address flip times:  
0 to 65535  
0 to 65535  
mac-flip—Specifies how many times to flip  
the MAC address in the alert.  
specify-request-inbalance {yes |  
no}  
(Optional) Enables request inbalance:  
request-inbalance—Specifies the value for  
firing an alert when there are this many more  
requests than replies on the IP address.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                     
Appendix B Signature Engines  
Atomic Engine  
Table B-7  
Parameter  
Atomic ARP Engine Parameters (continued)  
Description  
Value  
specify-type-of-arp-sig {yes | no} (Optional) Enables the ARP signature type:  
dst-broadcast  
type-of-arp-sig—Specifies the type of ARP same-src-dst  
signatures you want to fire on:  
src-broadcast  
Destination Broadcast—Fires an alert  
for this signature when it sees an ARP  
destination address of 255.255.255.255.  
src-multicast  
Same Source and Destination—Fires an  
alert for this signature when it sees an  
ARP destination address with the same  
source and destination MAC address  
Source Broadcast (default)—Fires an  
alert for this signature when it sees an  
ARP source address of 255.255.255.255.  
Source Multicast—Fires an alert for this  
signature when it sees an ARP source  
MAC address of 01:00:5e:(00-7f).  
storage-key  
Specifies the type of address key used to store  
persistent data:  
Axxx  
AxBx  
xxBx  
xxxx  
Attacker address  
Attacker and victim addresses  
Victim address  
Global  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Atomic IP Advanced Engine  
The Atomic IP Advanced engine parses and interprets the IPv6 header and its extensions, the  
IPv4 header and its options, ICMP, ICMPv6, TCP, and UDP, and seeks out anomalies that indicate  
unusual activity.  
Atomic IP Advanced engine signatures do the following:  
Inspect for anomalies in IP addresses, for example, spoofed addresses.  
Inspect for bad information in the length fields of the packet.  
Fire informational alerts about the packet.  
Fire higher severity alerts for the limited set of known vulnerabilities.  
Duplicate any IPv6-specific signatures in Engine Atomic IP that can also apply to IPv6.  
Provide default signatures for identifying tunneled traffic based on IP address, port, protocol, and  
limited information from the packet data.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix B Signature Engines  
Atomic Engine  
Only the outermost IP tunnel is identified. When an IPv6 tunnel or IPv6 traffic inside of an IPv4 tunnel  
is detected, a signature fires an alert. All of the other IPv6 traffic in embedded tunnels is not inspected.  
The following tunneling methods are supported, but not individually detected. For example, ISATAP,  
6to4, and manual IPv6 RFC 4213 tunnels all appear as IPv6 in IPv4, which is detected by signature 1007:  
ISATAP  
6to4 (RFC 3056)  
Manually configured tunnels (RFC 4213)  
IPv6 over GRE  
Teredo (IPv6) inside UDP  
MPLS (unencrypted)  
IPv6 over IPv6  
IPv6 supports the following:  
Denying by source IP address, destination IP address, or IP address pair  
Alerts  
Resetting the TCP connection  
Logging  
Atomic IP Advanced Engine Restrictions  
The Atomic IP Advanced engine contains the following restrictions:  
Cannot detect the Layer 4 field of the packets if the packets are fragmented so that the Layer 4  
identifier does not appear in the first packet.  
Cannot detect Layer 4 attacks in flows with packets that are fragmented by IPv6 because there is no  
fragment reassembly.  
Cannot detect attacks with tunneled flows.  
Limited checks are provided for the fragmentation header.  
There is no support for IPv6 on the management (command and control) interface.  
If there are illegal duplicate headers, a signature fires, but the individual headers cannot be  
separately inspected.  
Anomaly detection does not support IPv6 traffic; only IPv4 traffic is directed to the anomaly  
detection processor.  
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a  
block or rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action  
is not carried out.  
Note  
The second number in the ranges must be greater than or equal to the first number.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix B Signature Engines  
Atomic Engine  
Table B-8 lists the parameters that are specific to the Atomic IP Advanced engine.  
Table B-8  
Atomic IP Advanced Engine Parameters  
Parameter  
Global  
Description  
Value  
fragment-status  
Specifies whether or not fragments are  
wanted.  
any | no-fragments |  
want-fragments  
specify-encapsulation {yes |  
no}  
(Optional) Enables any encapsulation  
none | mpls | gre |  
before the start of Layer 3 for the packet:1 ipv4-in-ipv6 | ipip| any  
encapsulation—Specifies the type of  
encapsulation to inspect.  
specify-ip-version {yes | no}  
swap-attacker-victim  
(Optional) Enables the IP protocol version: ipv4 | ipv6  
version—Specifies IPv4 or IPv6.  
Swaps the attacker and victim addresses  
and ports (source and destination) in the  
alert message and in any actions taken.  
true |false (default)  
Regex  
specify-regex-inspection  
regex-scope  
(Optional) Enables Regex inspection.  
yes | no  
Specifies the start and end points for the  
regular expression search.  
ipv6-doh-only  
ipv6-doh-plus  
ipv6-hoh-only  
ipv6-hoh-plus  
ipv6-rh-only  
ipv6-rh-plus  
layer3-only  
layer3-plus  
layer4  
regex-string  
Specifies the regular expression to search string  
for in a single TCP packet.  
specify-exact-match-offset  
{yes | no}  
Enables exact match offset:  
0 to 65535  
exact-match-offset—Specifies the  
exact stream offset the regex-string  
must report for a match to be valid.  
specify-min-match-length {yes Enables minimum match length:  
| no}  
0 to 65535  
0 to 65535  
min-match-length—Specifies the  
minimum number of bytes the  
regex-string must match.  
specify-min-match-offset {yes | Enables minimum match offset:  
no}  
min-match-offset—Specifies the  
minimum stream offset the  
regex-string must report for a match to  
be valid.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Atomic Engine  
Table B-8  
Atomic IP Advanced Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-max-match-offset {yes Enables maximum match offset:  
| no}  
0 to 65535  
max-match-offset—Specifies the  
maximum stream offset the  
regex-string must report for a match to  
be valid.  
IPv6  
specify-authentication-header  
{yes | no}  
(Optional) Enables inspection of the  
authentication header:  
have-ah | no-ah0 to  
1028  
ah-present—Inspects the  
authentication header:  
0 to 255  
ah-length—Specifies the length of  
the authentication header to  
inspect.  
ah-next-header—Specifies the  
value of the authentication header  
to inspect.  
specify-dest-options-header  
{yes | no}  
(Optional) Enables inspection of the  
destination options header:  
have-doh | no-doh0  
to 2  
doh-present—Inspects the destination  
options header:  
8 to 2048  
0 to 255  
0 to 255  
0 to 255  
doh-count—Specifies the number  
of destination options headers to  
inspect.  
doh-length—Specifies the length  
of destination options headers to  
inspect.  
doh-next-header—Specifies the  
number of next destination options  
headers to inspect.  
doh-option-type—Specifies the  
type of destination options  
headers to inspect.  
doh-option-length—Specifies the  
length of destination options  
headers to inspect.  
specify-esp-header {yes | no}  
(Optional) Enables inspection of the ESP have-esp | no-esp  
header:  
esp-present —Inspects the ESP header.  
specify-first-next-header {yes | (Optional) Enables inspection of the first 0 to 255  
no} next header:  
first-next-header—Specifies the value  
of the first next header to inspect.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-8  
Parameter  
Atomic IP Advanced Engine Parameters (continued)  
Description  
Value  
specify-flow-label {yes | no}  
(Optional) Enables inspection of the flow 0 to 1048575  
label:  
flow-label—Specifies the value of the  
flow label to inspect.  
specify-headers-out-of-order  
{yes | no}  
(Optional) Enables inspection of  
out-of-order headers:  
true | false  
headers-out-of-order—Inspects  
headers that are out of order.  
specify-headers-repeated {yes | (Optional) Enables inspection of repeated {yes | no}  
no}  
headers:  
headers-repeated—Inspects repeated  
headers.  
(Optional) Enables hop limit:  
specify-hop-limit {yes | no}  
0 to 255  
hop-limit—Specifies the value of the  
hop limit to inspect.  
specify-hop-options-header  
{yes | no}  
(Optional) Enables inspection of the  
hop-by-hop options header:  
have-hoh | no-hoh  
hoh-present—Inspects the hop-by-hop  
options header.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-8  
Atomic IP Advanced Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-ipv6-addr-options {yes (Optional) Enables the IPv6 address  
| no} options:  
true | false  
ipv6-addr-options—Specifies the IPv6  
address options:  
address-with-localhost—IP  
address with ::1.  
documentation-address—IP  
address with 2001:db8::/32 prefix.  
ipv6-addr—IP address.  
link-local-address—Inspects for  
an IPv6 link local address.  
multicast-dst—Inspects for a  
destination multicast address.  
multicast-src—Inspects for a  
source multicast address.  
not-link-local-address—Inspects  
for an address that is not  
link-local.  
not-valid-address—Inspects for an  
address that is not reserved for  
link-local, global, or multicast.  
src-ip-eq-dst-ip—Source and  
destination addresses are the  
same.  
specify-ipv6-data-length {yes | (Optional) Enables inspection of IPv6 data 0 to 65535  
no}  
length:  
ipv6-data-length—Specifies the IPv6  
data length to inspect.  
specify-ipv6-header-length  
{yes | no}  
(Optional) Enables inspection of IPv6  
header length:  
0 to 65535  
ipv6-header-length—Specifies the  
length of the IPv6 header to inspect.  
specify-ipv6-total-length {yes | (Optional) Enables inspection of IPv6 total 0 to 65535  
no}  
length:  
ipv6-total-length—Specifies the IPv6  
total length to inspect.  
specify-ipv6-payload-length  
{yes | no}  
(Optional) Enables inspection of IPv6  
payload length:  
0 to 65535  
ipv6-payload-length—Specifies the  
IPv6 payload length to inspect.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-8  
Parameter  
Atomic IP Advanced Engine Parameters (continued)  
Description  
Value  
have-rh | no-rh  
specify-routing-header {yes |  
no}  
(Optional) Enables inspection of the  
routing header:  
rh-present—Inspects the routing  
header.  
specify-traffic-class {yes | no} (Optional) Enables inspection of the traffic 0 to 255  
class:  
traffic-class—Specifies the value of  
the traffic class to inspect.  
IPV4  
specify-ip-addr-options {yes | (Optional) Enables IP address options:  
no}  
address-with-localhost  
ip-addr2  
ip-addr-options—Specifies the IP  
address options.  
rfc-1918-address  
src-ip-eq-dst-ip  
0 to 16  
specify-ip-header-length {yes | (Optional) Enables inspection of the IP  
no}  
header length:  
ip-header-length—Specifies the length  
of the IP header to inspect.  
specify-ip-id {yes | no}  
(Optional) Enables inspection of the IP  
identifier:  
0 to 255  
ip-id—Specifies the IP ID to inspect.  
specify-ip-option-inspection  
{yes | no}  
(Optional) Enables inspection of the IP  
options:  
0 to 65535  
ip-option-inspection—Specifies the  
value of the IP option:  
ip-option—IP OPTION code to  
match.  
ip-option-abnormal—The list of  
options is malformed.  
specify-ip-payload-length {yes (Optional) Enables inspection of the IP  
0 to 65535  
0 to 255  
| no}  
payload length:  
ip-payload-length—Specifies the  
length of the IP payload to inspect.  
specify-ip-tos {yes | no}  
(Optional) Enables inspection of the IP  
type of service:  
ip-tos—Specifies the IP type of service  
to inspect.  
specify-ip-total-length {yes |  
no}  
(Optional) Enables inspection of the IP  
total length:  
0 to 65535  
ip-total-length—Specifies the total  
length of the IP packet to inspect.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-8  
Atomic IP Advanced Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-ip-ttl {yes | no}  
specify-ip-version {yes | no}  
L4 Protocol  
(Optional) Enables inspection of the IP  
time-to-live:  
0 to 255  
ip-ttl—Specifies the value of the IP  
TTL to inspect.  
(Optional) Enables inspection of the IP  
version:  
0 to 16  
ip-version—Specifies which IP  
version to inspect.  
specify-l4-protocol {yes | no} (Optional) Enables inspection of Layer 4  
protocol:  
icmp  
icmpv6  
tcp  
l4-protocol—Specifies which Layer 4  
protocol to inspect.  
udp  
other  
L4 Protocol Other  
specify-other-ip-protocol-id  
(Optional) Enables inspection of other  
Layer 4 protocols:  
0 to 255  
other-ip-protocol-id—Specifies which  
single IP protocol ID or single range of  
IP protocol IDs for which to send  
alerts.  
L4 Protocol ICMP  
specify-icmp-code {yes | no}  
(Optional) Enables inspection of Layer 4  
ICMP code:  
0 to 65535  
0 to 65535  
0 to 65535  
0 to 65535  
icmp-code—Specifies the value of the  
ICMP header CODE.  
specify-icmp-id {yes | no}  
specify-icmp-seq {yes | no}  
specify-icmp-type {yes | no}  
L4 Protocol ICMPv6  
(Optional) Enables inspection of Layer 4  
ICMP ID:  
icmp-id—Specifies the value of the  
ICMP header IDENTIFIER.  
(Optional) Enables inspection of Layer 4  
ICMP sequence:  
icmp-seq—Specifies the ICMP  
sequence for which to look.  
(Optional) Enables inspection of the  
Layer 4 ICMP header type:  
icmp-type—Specifies the value of the  
ICMP header TYPE.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-8  
Parameter  
Atomic IP Advanced Engine Parameters (continued)  
Description  
Value  
specify-icmpv6-code {yes | no} (Optional) Enables inspection of the  
Layer 4 ICMPv6 code:  
0 to 255  
icmpv6-code—Specifies the value of  
the ICMPv6 header CODE.  
specify-icmpv6-id {yes | no}  
(Optional) Enables inspection of the  
Layer 4 ICMPv6 identifier:  
0 to 65535  
0 to 65535  
4,294,967,295  
0 to 255  
icmpv6-id—Specifies the value of the  
ICMPv6 header IDENTIFIER.  
specify-icmpv6-length {yes |  
no}  
(Optional) Enables inspection of the  
Layer 4 ICMPv6 length:  
icmpv6-length—Specifies the value of  
the ICMPv6 header LENGTH.  
specify-icmpv6-mtu-field {yes | (Optional) Enables inspection of the  
no}  
Layer 4 ICMPv6 MTU field:  
icmpv6-mtu-field—Specifies the value  
of the ICMPv6 header MTU field.  
specify-icmpv6-option-type  
{yes | no}  
(Optional) Enables inspection of the  
Layer 4 ICMPv6 type:  
icmpv6-option-type—Specifies the  
ICMPv6 option type to inspect.  
specify-icmpv6-option-length (Optional) Enables inspection of the  
{yes | no} Layer 4 ICMPv6 option length:  
0 to 255  
icmpv6-option-length—Specifies the  
ICMPv6 option length to inspect.  
specify-icmpv6-seq {yes | no} (Optional) Enables inspection of the  
Layer 4 ICMPv6 sequence:  
0 to 65535  
0 to 255  
icmpv6-seq—Specifies the value of  
the ICMPv6 header SEQUENCE.  
specify-icmpv6-type {yes | no} (Optional) Enables inspection of the  
Layer 4 ICMPv6 type:  
icmpv6-type—Specifies the value of  
the ICMPv6 header TYPE.  
L4 Protocol TCP and UDP  
specify-dst-port {yes | no}  
(Optional) Enables the destination port for 0 to 65535  
use:  
dst-port—Specifies the destination  
port of interest for this signature.  
specify-src-port {yes | no}  
(Optional) Enables source port for use:  
0 to 65535  
src-port—Specifies the source port of  
interest for this signature.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-8  
Atomic IP Advanced Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-tcp-mask {yes | no}  
(Optional) Enables the TCP mask for use: urg  
tcp-mask—Specifies the mask used in ack  
TCP flags comparison:  
psh  
rst  
URG bit  
ACK bit  
PSH bit  
RST bit  
SYN bit  
FIN bit  
syn  
fin  
specify-tcp-flags {yes | no}  
(Optional) Enables TCP flags for use:  
urg  
tcp-flags—Specifies the TCP flags to ack  
match when masked by mask:  
psh  
URG bit  
ACK bit  
PSH bit  
RST bit  
SYN bit  
FIN bit  
rst  
syn  
fin  
specify-tcp-reserved {yes | no} (Optional) Enables TCP reserved for use: 0 to 63  
tcp-reserved—Specifies the value of  
TCP reserved.  
specify-tcp-header-length {yes (Optional) Enables inspection of the  
0 to 60  
| no}  
Layer 4 TCP header length:  
tcp-header-length—Specifies the  
length of the TCP header used in  
inspection.  
specify-tcp-payload-length  
{yes | no}  
(Optional) Enables inspection of the  
Layer 4 TCP payload length:  
0 to 65535  
0 to 65535  
0 to 65535  
tcp-payload-length—Specifies the  
length of the TCP payload.  
specify-tcp-urg-pointer {yes |  
no}  
(Optional) Enables inspection of the  
Layer 4 TCP URG pointer:  
tcp-urg-pointer—Specifies the value  
of the TCP URG flag inspection.  
specify-tcp-window-size {yes | (Optional) Enables inspection of the  
no} Layer 4 TCP window size:  
tcp-window-size—Specifies the  
window size of the TCP packet.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-8  
Parameter  
Atomic IP Advanced Engine Parameters (continued)  
Description  
Value  
specify-udp-valid-length {yes | (Optional) Enables inspection of the  
0 to 65535  
no}  
Layer 4 UDP valid length:  
udp-valid-length—Specifies the UDP  
packet lengths that are considered  
valid and should not be inspected.  
specify-udp-length-mismatch  
{yes | no}  
(Optional) Enables inspection of the  
Layer 4 UDP length mismatch:  
0 to 65535  
udp-length-mismatch—Fires an alert  
when IP Data length is less than the  
UDP Header length.  
1. When a packet is GRE, IPIP, IPv4inIPv6, or MPL the sensor skips the Layer 3 encapsulation header and the encapsulation  
header, and all inspection is done starting from the second Layer 3. The encapsulation enumerator allows the engine to look  
backward to see if there is an encapsulation header before the Layer 3 in question.  
2. Use the following syntax: x.x.x.x-z.z.z.z, for example, 10.10.10.1-10.10.10.254.  
For More Information  
For an example custom IPv6 signature, see Example IPv6 Engine Signature, page 7-50.  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
For more information on the parameters common to all signature engines, see Master Engine,  
Atomic IP Engine  
The Atomic IP engine defines signatures that inspect IP protocol headers and associated Layer 4  
transport protocols (TCP, UDP, and ICMP) and payloads. The Atomic engines do not store persistent  
data across packets. Instead they can fire an alert from the analysis of a single packet.  
Table B-9 lists the parameters that are specific to the Atomic IP engine.  
Table B-9  
Atomic IP Engine Parameters  
Parameter  
Description  
Value  
specify-ip-addr-options {yes | no}  
(Optional) Enables IP address options: address-with-localhost  
ip-addr-options—Specifies the IP ip-addr1  
address options.  
rfc-1918-address  
src-ip-eq-dst-ip  
specify-ip-header-length {yes | no} (Optional) Enables inspection of the IP 0 to 16  
header length:  
ip-header-length—Specifies the  
length of the IP header to inspect.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix B Signature Engines  
Atomic Engine  
Table B-9  
Atomic IP Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-ip-id {yes | no}  
(Optional) Enables inspection of the IP 0 to 255  
identifier:  
ip-id—Specifies the IP ID to  
inspect.  
specify-ip-option-inspection {yes | (Optional) Enables inspection of the IP 0 to 65535  
no} options:  
ip-option-inspection—Specifies  
the value of the IP option:  
ip-option—Specifies the IP  
OPTION code to match.  
ip-option-abnormal—Specifies  
the list of options is  
malformed.  
specify-ip-payload-length {yes | no} (Optional) Enables inspection of the IP 0 to 65535  
payload length:  
ip-payload-length—Specifies the  
length of IP payload to inspect.  
specify-ip-tos {yes | no}  
(Optional) Specifies the IP type of  
service:  
0 to 6 255  
ip-tos—Specifies the IP type of  
service to inspect.  
specify-ip-total-length {yes | no}  
specify-ip-ttl {yes | no}  
(Optional) Enables inspection of the IP 0 to 65535  
total length:  
ip-total-length—Specifies the  
total length of IP packet to inspect.  
(Optional) Enables inspection of IP  
time-to-live:  
0 to 255  
ip-ttl—Specifies the value of the  
IP TTL to inspect.  
specify-ip-version {yes | no}  
specify-l4-protocol {yes | no}  
(Optional) Enables inspection of the IP 0 to 16  
version:  
ip-version—Specifies which IP  
version to inspect.  
(Optional) Enables inspection of the  
Layer 4 protocol:  
icmp  
tcp  
l4-protocol—Specifies which  
Layer 4 protocol to inspect.  
udp  
other-protocol  
0 to 65535  
specify-icmp-code {yes | no}  
(Optional) Enables inspection of the  
Layer 4 ICMP code:  
icmp-code—Specifies the value of  
the ICMP header CODE.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-9  
Parameter  
Atomic IP Engine Parameters (continued)  
Description  
Value  
specify-icmp-id {yes | no}  
specify-icmp-seq {yes | no}  
specify-icmp-type {yes | no}  
(Optional) Enables inspection of the  
Layer 4 ICMP ID:  
0 to 65535  
0 to 65535  
0 to 65535  
0 to 65535  
icmp-id—Specifies the value of  
the ICMP header IDENTIFIER.  
(Optional) Enables inspection of the  
Layer 4 ICMP sequence:  
icmp-seq—Specifies the ICMP  
sequence to inspect.  
(Optional) Enables inspection of the  
ICMP header type:  
icmp-type—Specifies the value of  
the ICMP header TYPE.  
specify-icmp-total-length {yes | no} (Optional) Enables inspection of the  
Layer 4 ICMP total header length:  
icmp-total-length—Specifies the  
value of the ICMP total length to  
inspect.  
specify-other-ip-protocol-id {yes | (Optional) Enables inspection of the  
0 to 255  
no}  
other Layer 4 protocols:  
other-ip-protocol-id—Specifies  
which single IP protocol ID or  
single range of IP protocol IDs for  
which to send alerts.  
specify-dst-port {yes | no}  
(Optional) Enables the destination port 0 to 65535  
for use:  
dst-port—Specifies the destination  
port of interest for this signature.  
specify-src-port {yes | no}  
specify-tcp-mask {yes | no}  
(Optional) Enables source port for use: 0 to 65535  
src-port—Specifies the source port  
of interest for this signature.  
(Optional) Enables the TCP mask for urg  
use:  
ack  
tcp-mask—Specifies the mask  
used in TCP flags comparison:  
psh  
rst  
URG bit  
ACK bit  
PSH bit  
RST bit  
SYN bit  
FIN bit  
syn  
fin  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-9  
Atomic IP Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-tcp-flags {yes | no}  
(Optional) Enables TCP flags for use: urg  
tcp-flags—Specifies the TCP flags ack  
to match when masked by mask:  
psh  
rst  
URG bit  
ACK bit  
PSH bit  
RST bit  
SYN bit  
FIN bit  
syn  
fin  
specify-tcp-reserved {yes | no}  
(Optional) Enables TCP reserved for  
use:  
0 to 63  
0 to 60  
tcp-reserved—Specifies the value  
of TCP reserved.  
specify-tcp-header-length {yes | no} (Optional) Enables inspection of the  
Layer 4 TCP header length:  
tcp-header-length—Specifies the  
length of the TCP header used in  
inspection.  
specify-tcp-payload-length {yes |  
no}  
(Optional) Enables inspection of the  
Layer 4 TCP payload length:  
0 to 65535  
0 to 65535  
tcp-payload-length—Specifies the  
length of the TCP payload.  
specify-tcp-urg-pointer {yes | no}  
(Optional) Enables inspection of the  
L4 TCP URG pointer:  
tcp-urg-pointer—Specifies the  
value of the TCP URG flag to  
inspect.  
specify-tcp-window-size {yes | no} (Optional) Enables inspection of the  
Layer 4 TCP window size:  
0 to 65535  
0 to 65535  
tcp-window-size—Specifies the  
window size of the TCP packet.  
specify-udp-length {yes | no}  
(Optional) Enables inspection of the  
Layer 4 UDP length:  
udp-length-—Fires an alert when  
the IP Data length is less than the  
UDP Header length.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Atomic Engine  
Table B-9  
Parameter  
Atomic IP Engine Parameters (continued)  
Description  
Value  
specify-udp-valid-length {yes | no} (Optional) Enables inspection of the  
Layer 4 UDP valid length:  
0 to 65535  
udp-valid-length—Specifies UDP  
packet lengths that are considered  
valid and should not be inspected.  
specify-udp-length-mismatch {yes | (Optional) Enables inspection of the  
no} Layer 4 UDP length mismatch:  
0 to 65535  
udp-length-mismatch—Fires an  
alert when the IP Data length is  
less than the UDP Header length.  
1. Use the following syntax: x.x.x.x-z.z.z.z, for example, 10.10.10.1-10.10.10.254.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Atomic IPv6 Engine  
The Atomic IPv6 engine detects two IOS vulnerabilities that are stimulated by malformed IPv6 traffic.  
These vulnerabilities can lead to router crashes and other security issues. One IOS vulnerability deals  
with multiple first fragments, which cause a buffer overflow. The other one deals with malformed  
ICMPv6 Neighborhood Discovery options, which also cause a buffer overflow.  
Note  
IPv6 increases the IP address size from 32 bits to 128 bits, which supports more levels of addressing  
hierarchy, a much greater number of addressable nodes, and autoconfiguration of addresses.  
Atomic IPv6 Signatures  
There are eight Atomic IPv6 signatures. The Atomic IPv6 inspects Neighborhood Discovery protocol of  
the following types:  
Type 133—Router Solicitation  
Type 134—Router Advertisement  
Type 135—Neighbor Solicitation  
Type 136—Neighbor Advertisement  
Type 137—Redirect  
Note  
Hosts and routers use Neighborhood Discovery to determine the link-layer addresses for neighbors  
known to reside on attached links and to quickly purge cached values that become invalid. Hosts also use  
Neighborhood Discovery to find neighboring routers that will forward packets on their behalf.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix B Signature Engines  
Fixed Engine  
Each Neighborhood Discovery type can have one or more Neighborhood Discovery options. The Atomic  
IPv6 engine inspects the length of each option for compliance with the legal values stated in RFC 2461.  
Violations of the length of an option results in an alert corresponding to the option type where the  
malformed length was encountered (signatures 1601 to 1605).  
Note  
The Atomic IPv6 signatures do not have any specific parameters to configure.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Fixed Engine  
The Fixed engines combine multiple regular expression patterns in to a single pattern matching table that  
allows a single search through the data. It supports ICMP, TCP, and UDP protocols. After a minimum  
inspection depth is reached (1 to 100 bytes), inspection stops. There are three Fixed engines: Fixed  
ICMP, Fixed TCP, and Fixed UDP.  
Note  
The Fixed TCP and Fixed UDP engines use the service-ports parameter as exclusion ports. The Fixed  
ICMP engine uses the service-ports parameter as excluded ICMP types.  
Table B-10 lists the parameters specific to the Fixed ICMP engine.  
Table B-10  
Fixed ICMP Engine Parameters  
Parameter  
Description  
Value  
direction  
Specifies the direction of traffic:  
from-service  
to-service  
Traffic from service port destined to  
client port.  
Traffic from client port destined to  
service port.  
max-payload-inspect-length  
regex-string  
Specifies the maximum inspection depth  
for the signature.  
1 to 250  
Specifies the regular expression to search string  
for in a single packet.  
specify-exact-match-offset  
{yes | no}  
(Optional) Enables exact match offset:  
0 to 65535  
exact-match-offset—Specifies the  
exact stream offset the regex-string  
must report for a match to be valid.  
specify-min-match-length {yes (Optional) Enables minimum match length: 0 to 65535  
| no}  
min-match-length—Specifies the  
minimum number of bytes the  
regex-string must match.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Appendix B Signature Engines  
Fixed Engine  
Table B-10  
Parameter  
Fixed ICMP Engine Parameters (continued)  
Description  
Value  
specify-icmp-type {yes | no}  
(Optional) Enables inspection of the  
Layer 4 ICMP header type:  
0 to 65535  
icmp-type—Specifies the value of the  
ICMP header TYPE.  
swap-attacker-victim  
Swaps the attacker and victim addresses  
and ports (source and destination) in the  
alert message and in any actions taken.  
false | true (default)  
Table B-11 lists the parameters specific to the Fixed TCP engine.  
Table B-11  
Fixed TCP Engine Parameters  
Parameter  
Description  
Value  
direction  
Specifies the direction of traffic:  
from-service  
to-service  
Traffic from service port destined to  
client port.  
Traffic from client port destined to  
service port.  
max-payload-inspect-length  
regex-string  
Specifies the maximum inspection depth  
for the signature.  
1 to 250  
Specifies the regular expression to search string  
for in a single packet.  
specify-exact-match-offset  
{yes | no}  
(Optional) Enables exact match offset:  
0 to 65535  
exact-match-offset—Specifies the  
exact stream offset the regex-string  
must report for a match to be valid.  
specify-min-match-length {yes (Optional) Enables minimum match length: 0 to 65535  
| no}  
min-match-length—Specifies the  
minimum number of bytes the  
regex-string must match.  
exclude-service-ports {yes |  
no}  
Enables service ports for use:  
0 to 655351  
a-b[,c-d]  
excluded-service-ports—Specifies a  
comma-separated list of ports or port  
ranges to exclude.  
swap-attacker-victim  
Swaps the attacker and victim addresses  
and ports (source and destination) in the  
alert message and in any actions taken.  
false | true (default)  
1. The second number in the range must be greater than or equal to the first number.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Flood Engine  
Table B-12 lists the parameters specific to the Fixed UDP engine.  
Table B-12  
Fixed UDP Engine Parameters  
Parameter  
Description  
Value  
direction  
Specifies the direction of traffic:  
from-service  
to-service  
Traffic from service port destined to  
client port.  
Traffic from client port destined to  
service port  
max-payload-inspect-length  
regex-string  
Specifies the maximum inspection depth  
for the signature.  
1 to 250  
Specifies the regular expression to search string  
for in a single packet.  
specify-exact-match-offset  
{yes | no}  
(Optional) Enables exact match offset:  
0 to 65535  
exact-match-offset—Specifies the  
exact stream offset the regex-string  
must report for a match to be valid.  
specify-min-match-length {yes (Optional) Enables minimum match length: 0 to 65535  
| no}  
min-match-length—Specifies the  
minimum number of bytes the  
regex-string must match.  
exclude-service-ports {yes |  
no}  
Enables service ports for use:  
0 to 655351  
a-b[,c-d]  
excluded-service-ports—Specifies a  
comma-separated list of ports or port  
ranges to exclude.  
swap-attacker-victim  
Swaps the attacker and victim addresses  
and ports (source and destination) in the  
alert message and in any actions taken.  
false | true (default)  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Flood Engine  
The Flood engines define signatures that watch for any host or network sending multiple packets to a  
single host or network. For example, you can create a signature that fires when 150 or more packets per  
second (of the specific type) are found going to the victim host. There are two Flood engines: Flood Host  
and Flood Net.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Appendix B Signature Engines  
Meta Engine  
Table B-13 lists the parameters specific to the Flood Host engine.  
Table B-13  
Flood Host Engine Parameters  
Parameter  
Description  
Value  
protocol  
Specifies which kind of traffic to inspect.  
ICMP  
UDP  
rate  
Specifies the threshold number of packets per second.  
Specifies the value for the ICMP header type.  
Specifies the destination ports when you choose UDP protocol. 0 to 655352  
a-b[,c-d]  
0 to 655351  
icmp-type  
dst-ports  
0 to 65535  
src-ports  
Specifies the source ports when you choose UDP protocol.  
0 to 655352  
a-b[,c-d]  
1. An alert fires when the rate is greater than the packets per second.  
2. The second number in the range must be greater than or equal to the first number.  
Flood Net Engine Parameters  
Table B-14 lists the parameters specific to the Flood Net engine.  
Table B-14  
Flood Net Engine Parameters  
Parameter  
Description  
Value  
gap  
Specifies the gap of time allowed (in seconds) for a flood 0 to 65535  
signature.  
peaks  
Specifies the number of allowed peaks of flood traffic.  
Specifies which kind of traffic to inspect.  
0 to 65535  
protocol  
ICMP  
TCP  
UDP  
rate  
Specifies the threshold number of packets per second.  
Specifies the interval used for sampling traffic.  
Specifies the value for the ICMP header type.  
0 to 655351  
sampling-interval  
icmp-type  
1 to 3600  
0 to 65535  
1. An alert fires when the rate is greater than the packets per second.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Meta Engine  
Caution  
A large number of Meta engine signatures could adversely affect overall sensor performance.  
The Meta engine defines events that occur in a related manner within a sliding time interval. This engine  
processes events rather than packets. As signature events are generated, the Meta engine inspects them  
to determine if they match any or several Meta definitions. The Meta engine generates a signature event  
after all requirements for the event are met.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Appendix B Signature Engines  
Meta Engine  
All signature events are handed off to the Meta engine by the Signature Event Action Processor. The  
Signature Event Action Processor hands off the event after processing the minimum hits option.  
Summarization and event action are processed after the Meta engine has processed the component  
events.  
Table B-15 lists the parameters specific to the Meta engine.  
Table B-15  
Meta Engine Parameters  
Parameter  
Description  
Value  
component-list  
Specifies the Meta engine component:  
name1  
edit—Edits an existing entry.  
insert—Inserts a new entry into the list:  
begin—Places the entry at the beginning  
of the active list.  
end—Places the entry at the end of the  
active list.  
inactive—Places the entry into the  
inactive list.  
before—Places the entry before the  
specified entry.  
after—Places the entry after the  
specified entry.  
move—Moves an entry in the list.  
component-count—Specifies the number of  
times component must fire before this  
component is satisfied  
component-sig-id—Specifies the signature  
ID of the signature to match this component  
on.  
component-subsig-id—Specifies the  
subsignature ID of the signature to match  
this component on.  
true | false  
is-not-component—Specifies that the  
component is a NOT component.  
component-list-in-order  
all-components-required  
Specifies to fire the component list in order.  
Specifies to use all components.  
true | false  
true | false  
all-not-components-required Specifies to use all of the NOT components.  
true | false  
swap-attacker-victim  
Swaps the attacker and victim addresses and  
ports (source and destination) in the alert  
message and in any actions taken.  
true| false (default)  
meta-reset-interval  
Specifies the time in seconds to reset the Meta  
signature.  
0 to 3600  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix B Signature Engines  
Multi String Engine  
Table B-15  
Meta Engine Parameters (continued)  
Parameter  
Description  
Value  
meta-key  
Specifies the storage type for the Meta signature:  
Attacker address  
Attacker and victim addresses  
Axxx  
AxBx  
AaBb  
xxBx  
Attacker and victim addresses and ports  
Victim address  
unique-victim-ports  
Specifies the number of unique victims ports  
required per Meta signature.  
1 to 256  
For More Information  
For an example of a custom Meta engine signature, see Example Meta Engine Signature, page 7-46.  
For more information on the parameters common to all signature engines, see Master Engine,  
Multi String Engine  
Caution  
The Multi String engine can have a significant impact on memory usage.  
The Multi String engine lets you define signatures that inspect Layer 4 transport protocol (ICMP, TCP,  
and UDP) payloads using multiple string matches for one signature. You can specify a series of regular  
expression patterns that must be matched to fire the signature. For example, you can define a signature  
that looks for regex 1 followed by regex 2 on a UDP service. For UDP and TCP you can specify port  
numbers and direction. You can specify a single source port, a single destination port, or both ports. The  
string matching takes place in both directions.  
Use the Multi String engine when you need to specify more than one Regex pattern. Otherwise, you can  
use the String ICMP, String TCP, or String UDP engine to specify a single Regex pattern for one of those  
protocols.  
Table B-16 lists the parameters specific to the Multi String Engine.  
Table B-16  
Multi String Engine Parameters  
Parameter  
Description  
Value  
inspect-length  
Specifies the length of the stream or packet that  
0 to 4294967295  
must contain all offending strings for the signature  
to fire.  
protocol  
Specifies the Layer 4 protocol selection.  
icmp  
tcp  
udp  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Appendix B Signature Engines  
Normalizer Engine  
Table B-16  
Multi String Engine Parameters (continued)  
Parameter  
Description  
Value  
regex-component  
Specifies the list of Regex components:  
list (1 to 16 items)  
exact  
regex-string—Specifies the string to search  
for.  
minimum  
spacing-type—Specifies the type of spacing  
required from the match before or from the  
beginning of the stream/packet if it is the first  
entry in the list.  
port-selection  
Specifies the type of TCP or UDP port to inspect: 0 to 65535 2  
both-ports—Specifies both source and  
destination port.  
dest-ports—Specifies a range of destination  
ports.  
source-ports—Specifies a range of source  
ports.1  
exact-spacing  
Specifies the exact number of bytes that must be  
between this Regex string and the one before, or  
from the beginning of the stream/packet if it is the  
first entry in the list.  
0 to 4294967296  
min-spacing  
Specifies the minimum number of bytes that must 0 to 4294967296  
be between this Regex string and the one before, or  
from the beginning of the stream/packet if it is the  
first entry in the list.  
swap-attacker-victim  
Swaps the attacker and victim addresses and ports true | false (default)  
(source and destination) in the alert message and in  
any actions taken.  
1. Port matching is performed bidirectionally for both the client-to-server and server-to-client traffic flow directions. For  
example, if the source-ports value is 80, in a client-to-server traffic flow direction, inspection occurs if the client port is 80.  
In a server-to-client traffic flow direction, inspection occurs if the server port is port 80.  
2. A valid value is a comma- separated list of integer ranges a-b[,c-d] within 0 to 65535. The second number in the range must  
be greater than or equal to the first number.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Normalizer Engine  
Note  
You cannot add custom signatures to the Normalizer engine. You can tune the existing ones.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix B Signature Engines  
Normalizer Engine  
The Normalizer engine deals with IP fragment reassembly and TCP stream reassembly. With the  
Normalizer engine you can set limits on system resource usage, for example, the maximum number of  
fragments the sensor tries to track at the same time. Sensors in promiscuous mode report alerts on  
violations. Sensors in inline mode perform the action specified in the event action parameter, such as  
produce-alert, deny-packet-inline, and modify-packet-inline.  
Caution  
For signature 3050 Half Open SYN Attack, if you choose modify-packet-inline as the action, you can  
see as much as 20 to 30% performance degradation while the protection is active. The protection is only  
active during an actual SYN flood.  
IP Fragmentation Normalization  
Intentional or unintentional fragmentation of IP datagrams can hide exploits making them difficult or  
impossible to detect. Fragmentation can also be used to circumvent access control policies like those  
found on firewalls and routers. And different operating systems use different methods to queue and  
dispatch fragmented datagrams. If the sensor has to check for all possible ways that the end host can  
reassemble the datagrams, the sensor becomes vulnerable to DoS attacks. Reassembling all fragmented  
datagrams inline and only forwarding completed datagrams and refragmenting the datagram if  
necessary, prevents this. The IP Fragmentation Normalization unit performs this function.  
TCP Normalization  
Through intentional or natural TCP session segmentation, some classes of attacks can be hidden. To  
make sure policy enforcement can occur with no false positives and false negatives, the state of the two  
TCP endpoints must be tracked and only the data that is actually processed by the real host endpoints  
should be passed on. Overlaps in a TCP stream can occur, but are extremely rare except for TCP segment  
retransmits. Overwrites in the TCP session should not occur. If overwrites do occur, someone is  
intentionally trying to elude the security policy or the TCP stack implementation is broken. Maintaining  
full information about the state of both endpoints is not possible unless the sensor acts as a TCP proxy.  
Instead of the sensor acting as a TCP proxy, the segments are ordered properly and the Normalizer  
engine looks for any abnormal packets associated with evasion and attacks.  
IPv6 Fragments  
The Normalizer engine can reassemble IPv6 fragments and forward the reassembled buffer for  
inspection and actions by other engines and processors. The following differences exist between IPv4  
and IPv6:  
modify-packet-inline for Normalizer engine signatures has no effect on IPv6 datagrams.  
Signature 1206 (IP Fragment Too Small) does not fire for IPv6 datagrams. Signature 1741 in the  
Atomic IP Advanced engine fires for IPv6 fragments that are too small.  
Signature 1202 allows 48 additional bytes beyond the max-datagram-size for IPv6 because of the  
longer IPv6 header fields.  
TCP Normalizer Signature Warning  
You receive the following warning if you disable a default-enabled TCP Normalizer signature or remove  
a default-enabled modify packet inline, deny packet inline, or deny connection inline action:  
Use caution when disabling, retiring, or changing the event action settings of a <Sig ID>  
TCP Normalizer signature for a sensor operating in IPS mode. The TCP Normalizer signature  
default values are essential for proper operation of the sensor.  
If the sensor is seeing duplicate packets, consider assigning the traffic to multiple  
virtual sensors. If you are having problems with asymmetric or out-of-order TCP packets,  
consider changing the normalizer mode from strict evasion protection to asymmetric mode  
protection. Contact Cisco TAC if you require further assistance.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix B Signature Engines  
Normalizer Engine  
ASA IPS Modules and the Normalizer Engine  
The majority of the features in the Normalizer engine are not used on the ASA 5500-X IPS SSP or  
ASA 5585-X IPS SSP, because the ASA itself handles the normalization. Packets on the ASA IPS  
modules go through a special path in the Normalizer that only reassembles fragments and puts packets  
in the right order for the TCP stream. The Normalizer does not do any of the normalization that is done  
on an inline IPS appliance, because that causes problems in the way the ASA handles the packets.  
The following Normalizer engine signatures are not supported:  
1300.0  
1304.0  
1305.0  
1307.0  
1308.0  
1309.0  
1311.0  
1315.0  
1316.0  
1317.0  
1330.0  
1330.1  
1330.2  
1330.9  
1330.10  
1330.12  
1330.14  
1330.15  
1330.16  
1330.17  
1330.18  
Table B-17 lists the parameters that are specific to the Normalizer engine.  
Table B-17  
Normalizer Engine Parameters  
Parameter  
Description  
edit-default-sigs-only  
Editable signatures.  
specify-fragment-reassembly-timeout  
specify-hijack-max-old-ack  
specify-max-dgram-size  
(Optional) Enables fragment reassembly timeout.  
(Optional) Enables hijack-max-old-ack.  
(Optional) Enables maximum datagram size.  
(Optional) Enables maximum fragments:  
specify-max-fragments  
max-fragments—Lets you specify the number of  
maximum fragments.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix B Signature Engines  
Service Engines  
Table B-17  
Normalizer Engine Parameters (continued)  
Parameter  
Description  
specify-max-fragments-per-dgram  
specify-max-last-fragments  
specify-max-partial-dgrams  
specify-max-small-fragss  
specify-min-fragment-size  
specify-service-ports  
(Optional) Enables maximum fragments per datagram.  
(Optional) Enables maximum last fragments.  
(Optional) Enables maximum partial datagrams.  
(Optional) Enables maximum small fragments.  
(Optional) Enables minimum fragment size.  
(Optional) Enables service ports.  
specify-syn-flood-max-embryonic  
specify-tcp-closed-timeout  
specify-tcp-embryonic-timeout  
specify-tcp-idle-timeout  
(Optional) Enables SYN flood maximum embryonic.  
(Optional) Enables TCP closed timeout.  
(Optional) Enables TCP embryonic timeout.  
(Optional) Enables TCP idle timeout:  
tcp-idle-timeout—Lets you specify the TCP idle timeout  
time.  
specify-tcp-max-mss  
specify-tcp-max-queue  
specify-tcp-min-mss  
(Optional) Enables TCP maximum mss.  
(Optional) Enables TCP maximum queue.  
(Optional) Enables TCP minimum mss.  
(Optional) Enables TCP option number.  
specify-tcp-option-number  
For More Information  
For the procedure for configuring IP fragment reassembly signatures in the Normalizer engine, see  
For the procedure for configuring TCP stream reassembly signatures in the Normalizer engine, see  
For more information on the parameters common to all signature engines, see Master Engine,  
Service Engines  
This section describes the Service engines, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix B Signature Engines  
Service Engines  
Understanding the Service Engines  
The Service engines analyze Layer 5+ traffic between two hosts. These are one-to-one signatures that  
track persistent data. The engines analyze the Layer 5+ payload in a manner similar to the live service.  
The Service engines have common characteristics but each engine has specific knowledge of the service  
that it is inspecting. The Service engines supplement the capabilities of the generic string engine  
specializing in algorithms where using the string engine is inadequate or undesirable.  
Service DNS Engine  
The Service DNS engine specializes in advanced DNS decode, which includes anti-evasive techniques,  
such as following multiple jumps. It has many parameters, such as lengths, opcodes, strings, and so forth.  
The Service DNS engine is a biprotocol inspector operating on both TCP and UDP port 53. It uses the  
stream for TCP and the quad for UDP.  
Table B-18 lists the parameters specific to the Service DNS engine.  
Table B-18  
Service DNS Engine Parameters  
Parameter  
Description  
Value  
protocol  
Specifies the protocol of interest for this tcp  
inspector.  
udp  
specify-query-chaos-string {yes |no} (Optional) Enables the DNS Query Class query-chaos-string  
Chaos String:  
query-chaos-string—Specifies the  
query chaos string to search on.  
specify-query-class {yes |no}  
(Optional) Enables the query class:  
0 to 65535  
no | yes  
query-class—Specifies the DNS  
Query Class 2 Byte Value.  
specify-query-invalid-domain-name  
{yes |no}  
(Optional) Enables the query invalid  
domain name:  
query-invalid-domain-name—Specifie  
s the DNS Query Length greater  
than 255.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Appendix B Signature Engines  
Service Engines  
Table B-18  
Parameter  
Service DNS Engine Parameters (continued)  
Description  
Value  
specify-query-jump-count-exceeded (Optional) Enables query jump count  
no | yes  
{yes |no}  
exceeded:  
query-jump-count-exceeded—DNS  
compression counter.  
(Optional) Enables query opcode:  
specify-query-opcode {yes |no}  
0 to 65535  
no | yes  
query-opcode—Specifies the DNS  
Query Opcode 1 byte Value.  
specify-query-record-data-invalid  
{yes |no}  
(Optional) Enables query record data  
invalid:  
query-record-data-invalid—Specifiets  
he DNS Record Data incomplete.  
specify-query-record-data-len {yes  
|no}  
(Optional) Enables the query record data 0 to 65535  
length:  
query-record-data-len—Specifies  
the DNS Response Record Data  
Length.  
specify-query-src-port-53 {yes |no}  
specify-query-stream-len {yes |no}  
(Optional) Enables the query source port no | yes  
53:  
query-src-port-53—Specifies the  
DNS packet source port 53.  
(Optional) Enables the query stream  
length:  
0 to 65535  
query-stream-len—Specifies the  
DNS Packet Length.  
specify-query-type {yes |no}  
specify-query-value {yes |no}  
(Optional) Enables the query type:  
0 to 65535  
no | yes  
query-type—Specifies the DNS  
Query Type 2 Byte Value.  
(Optional) Enables the query value:  
query-value—Specifies the Query 0  
Response 1.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Service FTP Engine  
The Service FTP engine specializes in FTP port command decode, trapping invalid port commands and  
the PASV port spoof. It fills in the gaps when the String engine is not appropriate for detection. The  
parameters are Boolean and map to the various error trap conditions in the port command decode. The  
Service FTP engine runs on TCP ports 20 and 21. Port 20 is for data and the Service FTP engine does  
not do any inspection on this. It inspects the control transactions on port 21.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix B Signature Engines  
Service Engines  
Table B-19 lists the parameters that are specific to the Service FTP engine.  
Table B-19  
Service FTP Engine Parameters  
Parameter  
Description  
Value  
direction  
Specifies the direction of traffic:  
from-service  
to-service  
Traffic from service port destined to client port.  
Traffic from client port destined to service port.  
ftp-inspection-type  
Specifies the type of inspection to perform:  
bad-port-cmd-address  
bad-port-cmd-port  
pasv  
Looks for an invalid address in the FTP port  
command.  
Looks for an invalid port in the FTP port  
command.  
Looks for the PASV port spoof.  
service-ports  
Specifies a comma-separated list of ports or port  
ranges where the target service resides.  
0 to 655351  
a-b[,c-d]  
swap-attacker-victim Swaps the attacker and victim addresses and ports  
true | false (default)  
(source and destination) in the alert message and in any  
actions taken.  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Service Generic Engine  
The Service Generic engine allows programmatic signatures to be issued in a config-file-only signature  
update. It has a simple machine and assembly language that is defined in the configuration file. It runs  
the machine code (distilled from the assembly language) through its virtual machine, which processes  
the instructions and pulls the important pieces of information out of the packet and runs them through  
the comparisons and operations specified in the machine code. It is intended as a rapid signature  
response engine to supplement the String and State engines.  
New functionality adds the Regex parameter to the Service Generic engine and enhanced instructions.  
The Service Generic engine can analyze traffic based on the mini-programs that are written to parse the  
packets. These mini-programs are composed of commands, which dissect the packet and look for certain  
conditions.  
Note  
You cannot use the Service Generic engine to create custom signatures.  
Caution  
Due to the proprietary nature of this complex language, we do not recommend that you edit the Service  
Generic engine signature parameters other than severity and event action.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix B Signature Engines  
Service Engines  
Table B-20 lists the parameters specific to the Service Generic engine.  
Table B-20  
Service Generic Engine Parameters  
Parameter  
Description  
Value  
specify-dst-port {yes | (Optional) Enables the destination port:  
no}  
0 to 65535  
dst-port—Specifies the destination port of  
interest for this signature.  
specify-ip-protocol  
{yes | no}  
(Optional) Enables IP protocol:  
0 to 255  
ip-protocol—Specifies the IP protocol this  
inspector should examine.  
specify-payload-source (Optional) Enables payload source inspection:  
{yes | no}  
icmp-data  
l2-header  
l3-header  
l4-header  
tcp-data  
payload-source—Specifies the payload source  
inspection for the following types:  
Inspects ICMP data  
udp-data  
Inspects Layer 2 headers  
Inspects Layer 3 headers  
Inspects Layer 4 headers  
Inspects TCP data  
Inspects UDP data  
specify-src-port {yes | (Optional) Enables the source port:  
no}  
0 to 65535  
src-port—Specifies the source port of interest  
for this signature.  
specify-regex-string  
{yes | no}  
Specifies the regular expression to look for when the string  
policy type is Regex:  
0 to 65535  
regex-string—Specifies a regular expression to  
search for in a single TCP packet.  
(Optional) specify-min-match-length—Enables  
minimum match length for use:  
min-match-length—Specifies the minimum  
length of the Regex match required to  
constitute a match.  
swap-attacker-victim  
Swaps the attacker and victim addresses and ports  
(source and destination) in the alert message and in  
any actions taken.  
true | false (default)  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Service Engines  
Service H225 Engine  
The Service H225 engine analyzes H225.0 protocol, which consists of many subprotocols and is part of  
the H.323 suite. H.323 is a collection of protocols and other standards that together enable conferencing  
over packet-based networks.  
H.225.0 call signaling and status messages are part of the H.323 call setup. Various H.323 entities in a  
network, such as the gatekeeper and endpoint terminals, run implementations of the H.225.0 protocol  
stack. The Service H225 engine analyzes H225.0 protocol for attacks on multiple H.323 gatekeepers,  
VoIP gateways, and endpoint terminals. It provides deep packet inspection for call signaling messages  
that are exchanged over TCP PDUs. The Service H225 engine analyzes the H.225.0 protocol for invalid  
H.255.0 messages, and misuse and overflow attacks on various protocol fields in these messages.  
H.225.0 call signaling messages are based on Q.931 protocol. The calling endpoint sends a Q.931 setup  
message to the endpoint that it wants to call, the address of which it procures from the admissions  
procedure or some lookup means. The called endpoint either accepts the connection by transmitting a  
Q.931 connect message or rejects the connection. When the H.225.0 connection is established, either the  
caller or the called endpoint provides an H.245 address, which is used to establish the control protocol  
(H.245) channel.  
Especially important is the SETUP call signaling message because this is the first message exchanged  
between H.323 entities as part of the call setup. The SETUP message uses many of the commonly found  
fields in the call signaling messages, and implementations that are exposed to probable attacks will  
mostly also fail the security checks for the SETUP messages. Therefore, it is highly important to check  
the H.225.0 SETUP message for validity and enforce checks on the perimeter of the network.  
The Service H225 engine has built-in signatures for TPKT validation, Q.931 protocol validation, and  
ASN.1PER validations for the H225 SETUP message. ASN.1 is a notation for describing data structures.  
PER uses a different style of encoding. It specializes the encoding based on the data type to generate  
much more compact representations.  
You can tune the Q.931 and TPKT length signatures and you can add and apply granular signatures on  
specific H.225 protocol fields and apply multiple pattern search signatures of a single field in Q.931 or  
H.225 protocol.  
The Service H225 engine supports the following features:  
TPKT validation and length check  
Q.931 information element validation  
Regular expression signatures on text fields in Q.931 information elements  
Length checking on Q.931 information elements  
SETUP message validation  
ASN.1 PER encode error checks  
Configuration signatures for fields like ULR-ID, E-mail-ID, h323-id, and so forth for both regular  
expression and length.  
There is a fixed number of TPKT and ASN.1 signatures. You cannot create custom signatures for these  
types. For TPKT signatures, you should only change the value-range for length signatures. You should  
not change any parameters for ASN.1. For Q.931 signatures, you can add new regular expression  
signatures for text fields. For SETUP signatures, you can add signatures for length and regular  
expression checks on various SETUP message fields.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Appendix B Signature Engines  
Service Engines  
Table B-21 lists parameters specific to the Service H225 engine.  
Table B-21  
Service H.225 Engine Parameters  
Parameter  
Description  
Value  
message-type  
Specifies the type of H225 message to which the asn.1-per  
signature applies:  
q.931  
SETUP  
ASN.1-PER  
Q.931  
setup  
tpkt  
TPKT  
policy-type  
Specifies the type of H225 policy to which the  
signature applies:  
length  
presence  
regex  
Inspects field length.  
Inspects presence.  
validate  
value  
If certain fields are present in the message, an  
alert is sent.  
Inspects regular expressions.  
Inspects field validations.  
Inspects values.  
Note  
Regex and presence are not valid for  
TPKT signatures.  
specify-field-name {yes |  
no}  
(Optional) Enables field name for use. Gives a  
dotted representation of the field name to which  
this signature applies.  
1 to 512  
field-name—Specifies the field name to  
inspect.  
Note  
Only valid for SETUP and Q.931 message  
types.  
specify-invalid-packet-index (Optional) Enables invalid packet index for use  
0 to 255  
{yes | no}  
for specific errors in ASN, TPKT, and other errors  
that have fixed mapping.  
invalid-packet-index—Specifies the  
inspection for invalid packet index.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Service Engines  
Table B-21  
Service H.225 Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-regex-string {yes |  
no}  
Specifies the regular expression to look for when string  
the policy type is Regex:  
0 to 65535  
regex-string—Specifies a regular expression  
to search for in a single TCP packet.  
(Optional)  
specify-min-match-length—Enables  
minimum match length for use:  
min-match-length—Specifies the  
minimum length of the Regex match  
required to constitute a match.  
Note  
This is never set for TPKT signatures.  
specify-value-range {yes |  
no}  
Enables value range for use:  
0 to 655351  
a-b  
value-range—Specifies the range of values.  
Note  
Valid for the length or value policy types  
(0x00 to 6535). Not valid for other policy  
types.  
swap-attacker-victim  
Swaps the attacker and victim addresses and ports true | false (default)  
(source and destination) in the alert message and  
in any actions taken.  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Service HTTP Engine  
The Service HTTP engine is a service-specific string-based pattern-matching inspection engine. The  
HTTP protocol is one of the most commonly used in networks of today. In addition, it requires the most  
amount of preprocessing time and has the most number of signatures requiring inspection making it  
critical to the overall performance of the system.  
The Service HTTP engine uses a Regex library that can combine multiple patterns into a single  
pattern-matching table allowing a single search through the data. This engine searches traffic directed  
only to web services, or HTTP requests. You cannot inspect return traffic with this engine. You can  
specify separate web ports of interest in each signature in this engine.  
HTTP deobfuscation is the process of decoding an HTTP message by normalizing encoded characters  
to ASCII equivalent characters. It is also known as ASCII normalization.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix B Signature Engines  
Service Engines  
Before an HTTP packet can be inspected, the data must be deobfuscated or normalized to the same  
representation that the target system sees when it processes the data. It is ideal to have a customized  
decoding technique for each host target type, which involves knowing what operating system and web  
server version is running on the target. The Service HTTP engine has default deobfuscation behavior for  
the Microsoft IIS web server.  
Table B-22 lists the parameters specific the Service HTTP engine.  
Table B-22  
Service HTTP Engine Parameters  
Parameter  
Description  
Value  
de-obfuscate  
Applies anti-evasive deobfuscation before  
true | false  
searching.  
max-field-sizes  
Enables maximum field sizes grouping.  
specify-max-arg-field-length  
{yes | no}  
(Optional) Enables maximum argument field 0 to 65535  
length:  
max-arg-field-length—Specifies the  
maximum length of the arguments field.  
specify-max-header-field-length (Optional) Enables maximum header field  
{yes | no} length:  
0 to 65535  
max-header-field-length—Specifies the  
maximum length of the header field.  
specify-max-request-length {yes (Optional) Enables maximum request field 0 to 65535  
| no}  
length:  
max-request-length—Specifies the  
maximum length of the request field.  
specify-max-uri-field-length  
{yes | no}  
(Optional) Enables the maximum URI field 0 to 65535  
length:  
max-uri-field-length—Specifies the  
maximum length of the URI field.  
regex  
Enables regular expression grouping.  
specify-arg-name-regex {yes |  
no}  
(Optional) Enables searching the Arguments  
field for a specific regular expression:  
arg-name-regex—Specifies the regular  
expression to search for in the HTTP  
Arguments field (after the ? and in the  
Entity body as defined by  
Content-Length).  
specify-header-regex {yes | no} (Optional) Enables searching the Header  
field for a specific regular expression:  
header-regex—Specifies the regular  
expression to search in the HTTP Header  
field.  
Note  
The Header is defined after the first  
CRLF and continues until  
CRLFCRLF.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Service Engines  
Table B-22  
Service HTTP Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-request-regex {yes | no} (Optional) Enables searching the Request  
field for a specific regular expression:  
0 to 65535  
request-regex—Specifies the regular  
expression to search in both HTTP URI  
and HTTP Argument fields.  
specify-min-request-match-length—Enabl  
es setting a minimum request match  
length:  
min-request-match-length—Specifies  
the minimum request match length.  
specify-uri-regex {yes | no}  
(Optional) Specifies the regular expression [/\\][a-zA-Z][a-zA-  
to search in HTTP URI field.  
Z][a-zA-Z][a-zA-Z]  
[a-zA-Z][a-zA-Z][a  
-zA-Z][.]jpeg  
Note  
The URI field is defined to be after  
the HTTP method (GET, for  
example) and before the first CRLF.  
Note  
The regular expression is protected,  
which means you cannot change the  
value.  
service-ports  
Specifies a comma-separated list of ports or 0 to 655351  
port ranges where the target service resides. a-b[,c-d]  
swap-attacker-victim  
Swaps the attacker and victim addresses and true | false (default)  
ports (source and destination) in the alert  
message and in any actions taken.  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For an example Service HTTP custom signature, see Example Service HTTP Engine Signature,  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Service IDENT Engine  
The Service IDENT engine inspects TCP port 113 traffic. It has basic decode and provides parameters  
to specify length overflows. For example, when a user or program at computer A makes an IDENT  
request of computer B, it may only ask for the identity of users of connections between A and B. The  
IDENT server on B listens for connections on TCP port 113. The client at A establishes a connection,  
then specifies which connection it wants identification for by sending the numbers of the ports on A and  
B that the connection is using. The server at B determines what user is using that connection, and replies  
to A with a string that names that user. The Service IDENT engine inspects the TCP port 113 for IDENT  
abuse.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix B Signature Engines  
Service Engines  
Table B-23 lists the parameters specific to the Service IDENT engine.  
Table B-23  
Service IDENT Engine Parameters  
Parameter  
Description  
Value  
inspection-type  
Specifies the type of inspection to perform.  
has-newline  
has-bad-port  
size  
has-newline  
has-bad-port  
size  
Inspects payload for a nonterminating new line character.  
Inspects payload for a bad port.  
Inspects for payload length longer than this:  
0 to 65535  
max-bytes—Specifies the maximum bytes for the payload  
length.  
service-ports  
direction  
Specifies a comma-separated list of ports or port ranges where 0 to 655351  
the target service resides.  
a-b[,c-d]  
Specifies the direction of the traffic:  
from-service  
to-service  
Traffic from service port destined to client port.  
Traffic from client port destined to service port.  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Service MSRPC Engine  
The Service MSRPC engine processes MSRPC packets. MSRPC allows for cooperative processing  
between multiple computers and their application software in a networked environment. It is a  
transaction-based protocol, implying that there is a sequence of communications that establishes the  
channel and passes processing requests and replies.  
MSRPC is an ISO Layer 5-6 protocol and is layered on top of other transport protocols such as UDP,  
TCP, and SMB. The MSRPC engine contains facilities to allow for fragmentation and reassembly of the  
MSRPC PDUs.  
This communication channel is the source of recent Windows NT, Windows 2000, and Window XP  
security vulnerabilities. The Service MSRPC engine only decodes the DCE and RPC protocol for the  
most common transaction types.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix B Signature Engines  
Service Engines  
Table B-24 lists the parameters specific to the Service MSRPC engine.  
Table B-24  
Service MSRPC Engine Parameters  
Parameter  
Description  
Value  
protocol  
Enables the protocol of interest for this inspector: tcp  
type—Specifies UDP or TCP.  
udp  
specify-flags {yes |  
no}  
Enables the flags to set:  
concurrent-execution  
msrpc-flags—Specifies MSRPC TCP flags. did-not-execute  
msrpc-tcp-flags-mask—Specifies the  
MSRPC TCP flags mask.  
first-fragment  
last-fragment  
maybe-semantics  
object-uuid  
reserved  
specify-operation {yes (Optional) Enables using MSRPC operation:  
| no}  
0 to 65535  
operation—Specifies the MSRPC operation  
requested.  
Note  
Required for  
SMB_COM_TRANSACTION  
commands. Exact match.  
swap-attacker-victim  
Swaps the attacker and victim addresses and  
ports (source and destination) in the alert  
message and in any actions taken.  
true | false (default)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Service Engines  
Table B-24  
Parameter  
Service MSRPC Engine Parameters (continued)  
Description  
Value  
specify-regex-string  
{yes | no}  
(Optional) Enables using a regular expression  
string:  
0 to 65535  
specify-exact-match-offset—Enables the  
exact match offset:  
exact-match-offset—Specifies the exact  
stream offset the regular expression  
string must report for a match to be  
valid.  
specify-min-match-length—Enables the  
minimum match length:  
min-match-length—Specifies the  
minimum number of bytes the regular  
expression string must match.  
specify-min-match-offset—Enables the  
minimum match length:  
min-match-offset—Specifies the  
minimum stream offset the regular  
expression string must report for a match  
to be valid.  
specify-max-match-offset—Enables the  
maximum match offset:  
max-match-offset—Specifies the  
maximum stream offset the regular  
expression string must report for a match  
to be valid.  
specify-uuid {yes | no} (Optional) Enables UUID:  
uuid—Specifies the MSRPC UUID field.  
000001a000000000c0000  
00000000046  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Service MSSQL Engine  
The Service MSSQL engine inspects the protocol used by the Microsoft SQL server. There is one  
MSSQL signature. It fires an alert when it detects an attempt to log in to an MSSQL server with the  
default sa account. You can add custom signatures based on MSSQL protocol values, such as login  
username and whether a password was used.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix B Signature Engines  
Service Engines  
Table B-25 lists the parameters specific to the Service MSSQL engine.  
Table B-25  
Service MSSQL Engine Parameters  
Parameter  
Description  
Value  
password-present  
Specifies whether or not a password was used in an MS SQL true | false  
login.  
specify-sql-username  
(Optional) Enables using an SQL username:  
sa  
sql-username—Specifies the username (exact match) of  
user logging in to MS SQL service.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Service NTP Engine  
The Service NTP engine inspects NTP protocol. There is one NTP signature, the NTP readvar overflow  
signature, which fires an alert if a readvar command is seen with NTP data that is too large for the NTP  
service to capture. You can tune this signature and create custom signatures based on NTP protocol  
values, such as mode and size of control packets.  
Table B-26 lists the parameters specific to the Service NTP engine.  
Table B-26  
Service NTP Engine Parameters  
Parameter  
Description  
Value  
inspection-type  
Specifies the type of inspection to perform.  
inspect-ntp-packets  
is-invalid-data-packet  
is-non-ntp-traffic  
inspect-ntp-packets  
Enables inspection of NTP packets:  
0 to 65535  
control-opcode—Specifies the opcode  
number of an NTP control packet according  
to RFC1305, Appendix B.  
max-control-data-size—Specifies the  
maximum allowed amount of data sent in a  
control packet.  
mode—Specifies the mode of operation of  
the NTP packet per RFC 1305.  
is-invalid-data-packet  
is-non-ntp-traffic  
Enables inspection of invalid NTP data packets  
and checks the structure of the NTP data packet  
to make sure it is the correct size.  
Enables the inspection of nonNTP packets on an  
NTP port.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Appendix B Signature Engines  
Service Engines  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Service P2P Engine  
P2P networks use nodes that can simultaneously function as both client and server for the purpose of file  
sharing. P2P networks often contain copyrighted material and their use on a corporate network can  
violate company policy. The Service P2P engine monitors such networks and provides optimized TCP  
and UDP P2P protocol identification. The Service P2P engine has the following characteristics:  
Listens on all TCP and UDP ports.  
Increased performance through the use of hard-coded signatures rather than regular expressions.  
Ignores traffic once P2P protocol is identified or after seeing 10 packets without a P2P protocol  
being identified.  
Note  
Because the P2P signatures are hard coded, the only parameters that you can edit are the Master engine  
parameters.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Service RPC Engine  
The Service RPC engine specializes in RPC protocol and has full decode as an anti-evasive strategy. It  
can handle fragmented messages (one message in several packets) and batch messages (several messages  
in a single packet).  
The RPC portmapper operates on port 111. Regular RPC messages can be on any port greater than 550.  
RPC sweeps are like TCP port sweeps, except that they only count unique ports when a valid RPC  
message is sent. RPC also runs on UDP.  
Table B-27 lists the parameters specific to the Service RPC engine.  
Table B-27  
Service RPC Engine Parameters  
Parameter  
Description  
Value  
from-service  
direction  
Specifies the direction of traffic:  
Traffic from service port destined to client port. to-service  
Traffic from client port destined to service port.  
protocol  
Specifies the protocol of interest.  
tcp  
udp  
service-ports  
Specifies a comma-separated list of ports or port  
ranges where the target service resides.  
0 to 655351  
a-b[,c-d]  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                       
Appendix B Signature Engines  
Service Engines  
Table B-27  
Service RPC Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-regex-string {yes | (Optional) Enables using a regular expression string: 0 to 65535  
no}  
specify-exact-match-offset—Enables the exact  
match offset:  
exact-match-offset—Specifies the exact  
stream offset the regular expression string  
must report for a match to be valid.  
specify-min-match-length—Enables the  
minimum match length:  
min-match-length—Specifies the minimum  
number of bytes the regular expression  
string must match.  
specify-is-spoof-src {yes | (Optional) Enables the spoof source address:  
no}  
true | false  
is-spoof-src—Fires an alert when the source  
address is 127.0.0.1.  
specify-port-map-program (Optional) Enables the portmapper program:  
{yes | no}  
0 to 9999999999  
0 to 65535  
port-map-program—Specifies the program  
number sent to the portmapper for this signature.  
specify-rpc-max-length  
{yes | no}  
(Optional) Enables RPC maximum length:  
rpc-max-length—Specifies the maximum  
allowed length of the entire RPC message.  
Note  
Lengths longer than what you specify fire an  
alert.  
specify-rpc-procedure  
{yes | no}  
(Optional) Enables RPC procedure:  
0 to 1000000  
rpc-procedure—Specifies the RPC procedure  
number for this signature.  
specify-rpc-program {yes | (Optional) Enables RPC program:  
no}  
0 to 1000000  
rpc-program—Specifies the RPC program  
number for this signature.  
swap-attacker-victim  
Swaps the attacker and victim addresses and ports  
(source and destination) in the alert message and in  
any actions taken.  
true| false (default)  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Service Engines  
Service SMB Advanced Engine  
Note  
The SMB engine has been replaced by the SMB Advanced engine. Even though the SMB engine is still  
visible in IDM, IME, and the CLI, its signatures have been obsoleted; that is, the new signatures have  
the obsoletes parameter set with the IDs of their corresponding old signatures. Use the new SMB  
Advanced engine to rewrite any custom signature that were in the SMB engine.  
The Service SMB Advanced engine processes Microsoft SMB and Microsoft RPC over SMB packets.  
The Service SMB Advanced engine uses the same decoding method for connection-oriented MSRPC as  
the MSRPC engine with the requirement that the MSRPC packet must be over the SMB protocol. The  
Service SMB Advanced engine supports MSRPC over SMB on TCP ports 139 and 445. It uses a copy  
of the connection-oriented DCS/RPC code from the MSRPC engine.  
Table B-28 lists the parameters specific to the Service SMB Advanced engine.  
Table B-28  
Service SMB Advanced Engine Parameters  
Parameter  
Description  
Value  
service-ports  
Specifies a comma-separated list of ports or 0 to 65535  
port ranges where the target service resides. a-b[,c-d] 1  
specify-smb-command {yes (Optional) Enables SMB commands:  
| no}  
0 to 255  
smb-command—Specifies the SMB  
command value.  
Note  
Exact match required; defines the  
SMB packet type.2  
specify-direction {yes | no} (Optional) Enables traffic direction:  
from service  
to service  
direction—Specifies the direction of  
traffic:  
from service—Traffic from service  
port destined to client port.  
to service—Traffic from client port  
destined to service port.  
specify-msrpc-over-smb-op (Optional) Enables MSRPC over SMB:  
eration {yes | no}  
0 to 65535  
msrpc-over-smb-operation—Specifies  
MSRPC over SMB.  
Note  
Required for  
SMB_COM_TRANSACTION  
commands, exact match required.  
specify-regex-string {yes |  
no}  
(Optional) Enables searching for Regex  
strings:  
string  
regex-string—Specifies a regular  
expression to search for in a single TCP  
packet.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix B Signature Engines  
Service Engines  
Table B-28  
Service SMB Advanced Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-exact-match-offset (Optional) Enables exact match offset:  
{yes | no}  
0 to 65535  
exact-match-offset—Specifies the exact  
stream offset the Regex string must  
report for a match to be valid.  
specify-min-match-length  
{yes | no}  
(Optional) Enables minimum match length: 0 to 65535  
min-match-length—Specifies the  
minimum number of bytes the Regex  
string must match.  
specify-regex-payload-sour (Optional) Enables payload source  
ce {yes | no} inspection:  
resource  
smb-data  
tcp-data  
payload-source—Specifies the kind of  
payload source inspection.3  
specify-scan-interval {yes | (Optional) Enables scan interval:  
no}  
1 to 131071  
scan-interval—Specifies the interval in  
seconds used to calculate alert rates.  
specify-tcp-flags {yes | no} (Optional) Enables TCP flags:  
concurrent-execution  
msrpc-tcp-flags—Specifies the MSRPC did-not-execute  
TCP flags.  
first-fragment  
last fragment  
maybe-semantics  
object-uuid  
msrpc-tcp-flags-mask—Specifies the  
MSRPC flags mask.  
pending-cancel  
reserved  
specify-msrpc-over-smb-pd (Optional) Enables MSRPC PDU type over 0 = Request  
u-type  
the SMB packet:  
2 = Response  
11 = Bind  
msrpc-over-smb-pdu-type—Specifies  
the PDU type of MSRPC over the SMB  
packet.  
12 = Bind Ack  
specify-msrpc-over-smb-uui (Optional) Enables MSRPC over UUID:  
d {yes | no}  
32-character string  
composed of hexadecimal  
characters 0-9, a-f, A-F.  
msrpc-over-smb-uuid—Specifies the  
MSRPC UUID.  
swap-attacker-victim  
Swaps the attacker and victim addresses and true | false (default)  
ports (source and destination) in the alert  
message and in any actions taken.  
1. The second number in the range must be greater than or equal to the first number.  
2. Currently supporting 37 (0x25) SMB_COM_TRANSACTION command \x26amp; 162 (0xA2)  
SMB_COM_NT_CREATE_ANDX command.  
3. TCP_Data performs Regex over entire packet, SMB_Data performs Regex on SMB payload only, Resource_DATA performs  
Regex on SMB_Resource.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
Service Engines  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
Service SNMP Engine  
The Service SNMP engine inspects all SNMP packets destined for port 161. You can tune SNMP  
signatures and create custom SNMP signatures based on specific community names and object  
identifiers.  
Instead of using string comparison or regular expression operations to match the community name and  
object identifier, all comparisons are made using the integers to speed up the protocol decode and reduce  
storage requirements.  
Table B-29 lists the parameters specific to the Service SNMP engine.  
Table B-29  
Service SNMP Engine Parameters  
Parameter  
Description  
Value  
inspection-type  
Enables the SNMP inspection type.  
brute-force-inspection  
(default)  
invalid-packet-inspection  
non-snmp-traffic-inspection  
snmp-inspection  
brute-force-inspection  
Enables brute force inspection:  
0 to 65535  
brute-force-count—Specifies the  
number of unique SNMP  
community names that constitute a  
brute force attempt.  
invalid-packet-inspection  
Inspects for SNMP protocol violations. —  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix B Signature Engines  
Service Engines  
Table B-29  
Service SNMP Engine Parameters (continued)  
Parameter  
Description  
Value  
non-snmp-traffic-inspection  
Inspects for non-SNMP traffic destined  
for UDP port 161.  
snmp-inspection {yes | no}  
Enables inspection of SNMP traffic:  
object-id  
specify-object-id—Enables  
inspection of the SNMP Object  
identifier:  
community-name  
object-id—Specifies to search  
for the SNMP object identifier.  
specify-community-name—Enableis  
nspection of the SNMP community  
name:  
community-name—Specifies  
to search for the SNMP  
community name (SNMP  
password).  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Service SSH Engine  
The Service SSH engine specializes in port 22 SSH traffic. Because all but the setup of an SSH session  
is encrypted, the Service SSH engine only looks at the fields in the setup. There are two default  
signatures for SSH. You can tune these signatures, but you cannot create custom signatures.  
Table B-30 lists the parameters specific to the Service SSH engine.  
Table B-30  
Service SSH Engine Parameters  
Parameter  
Description  
Value  
length-type  
Inspects for one of the following SSH length types:  
0 to 65535  
key-length—Enables inspection of the length of the  
SSH key:  
length—Specifies that keys larger than this fire the  
RSAREF overflow.  
user-length—Enables user length SSH inspection:  
length—Specifies that keys larger than this fire the  
RSAREF overflow.  
service-ports  
Specifies a comma-separated list of ports or port ranges  
where the target service resides.  
0 to 655351  
a-b[,c-d]  
specify-packet-depth (Optional) Enables packet depth:  
{yes | no}  
0 to 65535  
packet-depth—Specifies the number of packets to  
watch before determining the session key was missed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix B Signature Engines  
Service Engines  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Service TNS Engine  
The Service TNS engine inspects TNS protocol. TNS provides database applications with a single  
common interface to all industry-standard network protocols. With TNS, applications can connect to  
other database applications across networks with different protocols. The default TNS listener port is  
TCP 1521. TNS also supports REDIRECT frames that redirect the client to another host and/or another  
TCP port. To support REDIRECT packets, the TNS engine listens on all TCP ports and has a quick TNS  
frame header validation routine to ignore non-TNS streams.  
Table B-31 lists the parameters specific to the Service TNS engine  
.
Table B-31  
Service TNS Engine Parameters  
Parameter  
Description  
Value  
from-service  
direction  
Specifies the direction of traffic:  
Traffic from service port destined to client port. to-service  
Traffic from client port destined to service port.  
specify-regex-string {yes | (Optional) Enables using a regular expression string: string  
no}  
regex-string—Specifies the regular expression  
to search for.  
specify-exact-match-offset Enables the exact match offset:  
{yes | no}  
0 to 65535  
0 to 65535  
0 to 65535  
0 to 65535  
exact-match-offset—Specifies the exact stream  
offset the regex-string must report for a match to  
be valid.  
specify-max-match-offset Enables maximum match offset:  
{yes | no}  
max-match-offset—Specifies the maximum  
stream offset the regex-string must report for a  
match to be valid.  
specify-min-match-offset Enables minimum match offset:  
{yes | no}  
min-match-offset—Specifies the minimum  
stream offset the regex-string must report for a  
match to be valid.  
specify-min-match-length Enables the minimum match length:  
{yes | no}  
min-match-length—Specifies the minimum  
number of bytes the regex-string must  
match.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix B Signature Engines  
State Engine  
Table B-31  
Service TNS Engine Parameters (continued)  
Parameter  
Description  
Value  
specify-regex-payload-src Enables the inspection of TCP or TNS protocol:  
{yes | no}  
tcp data  
tns data  
payload-src—Specifies which protocol to  
inspect:  
tcp-data—Performs Regex over the data  
portion of the TCP packet.  
tns-data—Performs Regex only over the  
TNS data (with all white space removed).  
type  
Specifies the TNS frame value type:  
1
1—Connect  
2—Accept  
4—Refuse  
5—Redirect  
6—Data  
2
4
5
6
11  
12  
11—Resend  
12—Marker  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For a list of the signature regular expression syntax, see Regular Expression Syntax, page B-9.  
State Engine  
The State engine provides state-based regular expression-based pattern inspection of TCP streams. A  
state engine is a device that stores the state of an event and at a given time can operate on input to  
transition from one state to another and/or cause an action or output to take place. State machines are  
used to describe a specific event that causes an output or alarm. There are three state machines in the  
State engine: SMTP, Cisco Login, and LPR Format String.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix B Signature Engines  
State Engine  
Table B-32 lists the parameters specific to the State engine.  
Table B-32  
State Engine Parameters  
Parameter  
Description  
Value  
state-machine  
Specifies the state machine grouping.  
cisco-login  
lpr-format-string  
smpt  
cisco-login  
Specifies the state machine for Cisco login:  
cisco-device  
state-name—Name of the state required before the control-c  
signature fires an alert:  
pass-prompt  
start  
Cisco device state  
Control-C state  
Password prompt state  
Start state  
lpr-format-string  
Specifies the state machine to inspect for the LPR  
format string vulnerability:  
abort  
format-char  
start  
state-name—Name of the state required before the  
signature fires an alert:  
Abort state to end LPR Format String  
inspection  
Format character state  
State state  
smpt  
Specifies the state machine for the SMTP protocol:  
abort  
state-name—Name of the state required before the mail-body  
signature fires an alert:  
mail-header  
Abort state to end LPR Format String  
inspection  
smtp-commands  
start  
Mail body state  
Mail header state  
SMTP commands state  
Start state  
specify-min-match- (Optional) Enables minimum match length:  
length {yes | no}  
0 to 65535  
min-match-length—Specifies the minimum  
number of bytes the regular expression string must  
match.  
regex-string  
Specifies the regular expression to search for.  
Note This parameter is protected; you cannot edit it.  
string  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
String Engines  
Table B-32  
State Engine Parameters (continued)  
Parameter  
Description  
Value  
direction  
Specifies the direction of the traffic:  
from-service  
to-service  
Traffic from service port destined to client port.  
Traffic from client port destined to service port.  
service-ports  
Specifies a comma-separated list of ports or port ranges 0 to 655351  
where the target service resides.  
a-b[,c-d]  
swap-attacker-victim Swaps the attacker and victim addresses and ports  
(source and destination) in the alert message and in any  
actions taken.  
true| false (default)  
specify-exact-match- (Optional) Enables exact match offset:  
offset {yes | no}  
0 to 65535  
0 to 65535  
0 to 65535  
exact-match-offset—Specifies the exact stream  
offset the regular expression string must report for  
a match to be valid.  
specify-max-match-o (Optional) Enables maximum match offset:  
ffset {yes | no}  
max-match-offset—Specifies the maximum stream  
offset the regular expression string must report for  
a match to be valid.  
specify-min-match-o (Optional) Enables minimum match offset:  
ffset {yes | no}  
min-match-offset—Specifies the minimum stream  
offset the regular expression string must report for  
a match to be valid.  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
String Engines  
The String engine is a generic-based pattern-matching inspection engine for ICMP, TCP, and UDP  
protocols. The String engine uses a regular expression engine that can combine multiple patterns into a  
single pattern-matching table allowing for a single search through the data. There are three String  
engines: String ICMP, String TCP, and String UDP.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix B Signature Engines  
String Engines  
Table B-33 lists the parameters specific to the String ICMP engine.  
Table B-33  
String ICMP Engine Parameters  
Parameter  
Description  
Value  
from-service  
Traffic from service port destined to client to-service  
direction  
Specifies the direction of the traffic:  
port.  
Traffic from client port destined to service  
port.  
icmp-type  
Specifies the value of the ICMP header TYPE. 0 to 181  
a-b[,c-d]  
regex-string  
The Regex pattern to use in the search.  
(Optional) Enables exact match offset:  
string  
specify-exact-match-offset  
{yes | no}  
0 to 65535  
exact-match-offset—Specifies the exact  
stream offset the regular expression string  
must report for a match to be valid.  
specify-min-match-  
length {yes | no}  
(Optional) Enables minimum match length:  
0 to 65535  
min-match-length—Specifies the minimum  
number of bytes the regular expression  
string must match.  
swap-attacker-victim  
Swaps the attacker and victim addresses and  
ports (source and destination) in the alert  
message and in any actions taken.  
true| false (default)  
1. The second number in the range must be greater than or equal to the first number.  
Table B-34 lists the parameters specific to the String TCP engine.  
Table B-34  
String TCP Engine  
Parameter  
Description  
Specifies the direction of the traffic:  
Value  
direction  
from-service  
Traffic from service port destined to client to-service  
port.  
Traffic from client port destined to service  
port.  
regex-string  
service-ports  
The Regex pattern to use in the search.  
Specifies a comma-separated list of ports or port 0 to 655351  
string  
ranges where the target service resides.  
(Optional) Enables exact match offset:  
a-b[,c-d]  
specify-exact-match-offset  
{yes | no}  
0 to 65535  
exact-match-offset—Specifies the exact  
stream offset the regular expression string  
must report for a match to be valid.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix B Signature Engines  
String Engines  
Table B-34  
String TCP Engine (continued)  
Parameter  
Description  
Value  
specify-min-match-  
length {yes | no}  
(Optional) Enables minimum match length:  
0 to 65535  
min-match-length—Specifies the minimum  
number of bytes the regular expression  
string must match.  
strip-telnet-options  
swap-attacker-victim  
Strips the Telnet option characters from the data true | false  
before the pattern is searched.2  
Swaps the attacker and victim addresses and  
ports (source and destination) in the alert  
message and in any actions taken.  
true| false (default)  
1. The second number in the range must be greater than or equal to the first number.  
2. This parameter is primarily used as an IPS anti-evasion tool.  
Table B-35 lists the parameters specific to the String UDP engine.  
Table B-35  
String UDP Engine  
Parameter  
Description  
Specifies the direction of the traffic:  
Value  
direction  
from-service  
to-service  
Traffic from service port destined to client  
port.  
Traffic from client port destined to service  
port.  
regex-string  
service-ports  
The Regex pattern to use in the search.  
string  
0 to 655351  
a-b[,c-d]  
Specifies a comma-separated list of ports or  
port ranges where the target service resides.  
specify-exact-match-offset  
{yes | no}  
(Optional) Enables exact match offset:  
0 to 65535  
0 to 65535  
true| false  
exact-match-offset—Specifies the exact  
stream offset the regular expression string  
must report for a match to be valid.  
specify-min-match-  
length {yes | no}  
(Optional) Enables minimum match length:  
min-match-length—Specifies the  
minimum number of bytes the regular  
expression string must match.  
swap-attacker-victim  
Swaps the attacker and victim addresses and  
ports (source and destination) in the alert  
message and in any actions taken.  
1. The second number in the range must be greater than or equal to the first number.  
For More Information  
For an example custom String engine signature, see Example String TCP Engine Signature, page 7-41.  
For more information on the parameters common to all signature engines, see Master Engine,  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
String XL Engines  
String XL Engines  
Note  
The IPS 4345, IPS 4360, IPS 4510, IPS 4520, ASA 5525-X IPS SSP, ASA 5545-X IPS SSP,  
ASA 5555-X IPS SSP, and ASA 5585-X IPS SSP support the String XL engines and the Regex  
accelerator card.  
The String XL engines do the same thing as the other String engines—provide a matching capability of  
one string per signature—but they use a different Regex syntax.The String TCP XL engine is  
stream-based and uses cross-packet inspection (XPI). The packets must be in order. UDP and ICMP are  
both stateless, thus the String UDP XL and String ICMP XL signature engines require no session state  
to be allocated and so each packet is a separate search.  
The Regex accelerator card is used for both the standard String engines and the String XL engines. Most  
standard String engine signatures can be compiled and analyzed by the Regex accelerator card without  
modification. However, there are special circumstances in which the standard String engine signatures  
cannot be compiled for the Regex accelerator card. In these situations a new signature is written in a  
String XL engine using the specific parameters in the String XL engine that do compile on the Regex  
accelerator card. The new signature in the String XL engine obsoletes the original signature in the  
standard String engine.  
Although you can use regular expression syntax or raw expression syntax, raw expression syntax is for  
expert users only. When configuring String XL signatures, the regex-string parameter is required unless  
you are using raw expression syntax.  
Note  
Raw Regex is regular expression syntax used for raw mode processing. It is expert mode only and  
targeted for use by the Cisco IPS signature development team or only those who are under supervision  
by the Cisco IPS signature development team. You can configure a String XL signature in either regular  
Regex or raw Regex.  
Table B-36 lists the parameters specific to the String XL engines (TCP, ICMP, and UDP).  
Table B-36  
String XL Engine Parameters  
Parameter  
Description  
Value  
direction  
(Required) Direction of the traffic to inspect:  
from-service  
Traffic from service port destined to client to-service  
port.  
Traffic from client port destined to service  
port.  
dot-all  
If set to true, matches [\x00-\xFF] including \n; true | false (default)  
if set to false, matches anything in the range  
[\x00-\xFF] except \n.  
end-optional  
icmp-type  
Specifies that at the end of a packet, if all other true | false (default)  
conditions are satisfied but the end is not seen,  
a match is reported if the minimum is exceeded.  
Specifies the ICMP message type. Required if 0 to 181  
the signature engine is string-icmp.  
a-b[,c-d]  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                 
Appendix B Signature Engines  
String XL Engines  
Table B-36  
String XL Engine Parameters (continued) (continued)  
Parameter  
Description  
Value  
no-case  
Specifies to treat all alphabetic characters in the true | false (default)  
expression as case insensitive.  
raw-regex  
If set to true, min-match-length,  
true | false (default)  
max-match-length, min-whole-length,  
max-whole-length, dot-all, utf8, no-case,  
stingy, and end-optional are not used to  
reformat the regular expression string.  
Note  
raw-regex lets you enter a regular  
expression string in Raw syntax without  
being translated.  
regex-string  
service-ports  
(Required) Specifies the Regex pattern to use in string  
the search.  
Note  
This parameter is required unless  
max-stream-length is set. Do not set the  
regex-string if max-stream-length is set.  
(Required) Specifies a comma-separated list of 0 to 655351  
ports or port ranges where the target service  
resides.  
a-b[,c-d]  
Note  
This parameter is required for the String  
XL TCP and String XL UDP signature  
engines. It cannot be used for the String  
XL ICMP signature engine.  
specify-exact-match-offset  
{yes | No}  
Enables exact match offset:  
0 to 65535  
0 to 65535  
0 to 65535  
0 to 65535  
exact-match-offset—Specifies the exact  
stream offset in bytes the regular  
expression string must report for a match to  
be valid.  
specify-max-match-offset  
{yes | No}  
Enables maximum match offset:  
maximum-match-offset—Specifies the  
maximum stream offset in bytes the regular  
expression string must report for a match to  
be valid.  
specify-min-match-offset {yes Enables minimum match offset:  
| No}  
min-match-offset—Specifies the minimum  
stream offset in bytes the regular  
expression string must report for a match to  
be valid.  
specify-max-match-  
length {yes | No}  
Enables maximum match length:  
max-match-length—Specifies the  
maximum number of bytes the regular  
expression string must match for the  
pattern to be considered a hit.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Signature Engines  
String XL Engines  
Table B-36  
Parameter  
String XL Engine Parameters (continued) (continued)  
Description  
Value  
specify-min-match-  
length {yes | No}  
Enables minimum match length:  
0 to 65535  
min-match-length—Specifies the  
minimum number of bytes the regular  
expression string must match for the  
pattern to be considered a hit.  
specify-max-stream-  
length {yes | No}  
Enables maximum stream length:  
yes | no  
0 to 65535  
max-stream-  
length—Limits the search to the first  
configured number of bytes. The length of  
the stream is checked again this value. If  
the stream contains more bytes than this  
value, an alert is triggered.  
Note  
When you specify this parameter, you  
cannot configure raw-regex or  
regex-string.  
specify-max-whole-  
length {yes | No}  
Enables maximum whole length:  
yes | no  
0 to 65535  
max-whole-length—Specifies the  
maximum length for the pattern that will  
not be fragmented.  
specify-min-whole-  
length {yes | No}  
Enables minimum whole length:  
yes | no0 to 65535  
true | false (default)  
min-whole-length—Specifies the  
minimum length for the pattern that will  
not be fragmented.  
stingy  
Specifies to stop looking for larger matches  
after the first completed match.  
Note  
stingy can only be used with  
min-match-length; otherwise, it is  
ignored.  
strip-telnet-options  
swap-attacker-victim  
Strips the Telnet option characters from the data true | false (default)  
before the pattern is searched.2  
True if address (and ports) source and  
destination are swapped in the alert message.  
False for no swap (default).  
true| false (default)  
utf8  
Treats all legal UTF-8 byte sequences in the  
expression as a single character.  
true | false (default)  
1. The second number in the range must be greater than or equal to the first number.  
2. This parameter is primarily used as an IPS anti-evasion tool.  
Unsupported String XL Parameters  
Although you see the end-optional and specify-max-stream-length parameters in the String XL engine,  
they are disabled. You receive an error message if you try to configure them. For example, here is the  
error message you receive after you create a signature using specify-max-stream-length and then try to  
save it:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix B Signature Engines  
Sweep Engines  
Apply Changes?[yes]: yes  
Error: string-xl-tcp 60003.0 : Maximum Stream Length is currently not supported.  
Please don't use this option.  
The configuration changes failed validation, no changes were applied.  
Would you like to return to edit mode to correct the errors? [yes]:  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine,  
For example String XL engine signatures, see Example String XL TCP Engine Match Offset  
Sweep Engines  
This section describes the Sweep engines, and contains the following topics:  
Sweep Engine  
The Sweep engine analyzes traffic between two hosts or from one host to many hosts. You can tune the  
existing signatures or create custom signatures. The Sweep engine has protocol-specific parameters for  
ICMP, UDP, and TCP.  
The alert conditions of the Sweep engine ultimately depend on the count of the unique parameter. The  
unique parameter is the threshold number of distinct hosts or ports depending on the type of sweep. The  
unique parameter triggers the alert when more than the unique number of ports or hosts is seen on the  
address set within the time period. The processing of unique port and host tracking is called counting.  
Caution  
Event action filters based on source and destination IP addresses do not function for the Sweep engine,  
because they do not filter as regular signatures. To filter source and destination IP addresses in sweep  
alerts, use the source and destination IP address filter parameters in the Sweep engine signatures.  
A unique parameter must be specified for all signatures in the Sweep engine. A limit of 2 through 40  
(inclusive) is enforced on the sweeps. 2 is the absolute minimum for a sweep, otherwise, it is not a sweep  
(of one host or port). 40 is a practical maximum that must be enforced so that the sweep does not  
consume excess memory. More realistic values for unique range between 5 and 15.  
TCP sweeps must have a TCP flag and mask specified to determine which sweep inspector slot in which  
to count the distinct connections. ICMP sweeps must have an ICMP type specified to discriminate  
among the various types of ICMP packets.  
Data Nodes  
When an activity related to Sweep engine signatures is seen, the IPS uses a data node to determine when  
it should stop monitoring for a particular host. The data node contains various persistent counters and  
variables needed for cross-packet reassembly of streams and for tracking the inspection state on a  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix B Signature Engines  
Sweep Engines  
per-stream/per-source/per-destination basis The data node containing the sweep determines when the  
sweep should expire. The data node stops a sweep when the data node has not seen any traffic for x  
number of seconds (depending on the protocol).  
There are several adaptive timeouts for the data nodes. The data node expires after 30 seconds of idle  
time on the address set after all of the contained objects have been removed. Each contained object has  
various timeouts, for example, TCP Stream has a one-hour timeout for established connections. Most  
other objects have a much shorter expiration time, such as 5 or 60 seconds.  
Table B-37 lists the parameters specific to the Sweep engine.  
Table B-37  
Sweep Engine Parameters  
Parameter  
Description  
Value  
dst-addr-filter  
Specifies the destination IP address to exclude from the <A.B.C.D>-  
sweep counting algorithm.  
<A.B.C.D>  
[,<A.B.C.D>-  
<A.B.C.D>]  
src-addr-filter  
protocol  
Specifies the source IP address to exclude from the  
sweep counting algorithm.  
<A.B.C.D>-  
<A.B.C.D>  
[,<A.B.C.D>-  
<A.B.C.D>]  
Specifies the protocol of interest for this inspector.  
(Optional) Enables the ICMP header type:  
icmp  
udp  
tcp  
specify-icmp-type  
{yes | no}  
0 to 255  
icmp-type—Specifies the value of the ICMP header  
TYPE.  
specify-port-range  
{yes | no}  
(Optional) Enables using a port range for inspection:  
0 to 65535  
a-b[,c-d]  
port-range—Specifies the UDP port range used in  
inspection.  
fragment-status  
Specifies whether fragments are wanted or not:  
any  
Any fragment status  
Do not inspect fragments  
Inspect fragments  
no-fragments  
want-fragments  
inverted-sweep  
mask  
Uses source port instead of destination port for unique true | false  
counting.  
Specifies the mask used in TCP flags comparison:  
urg  
ack  
psh  
rst  
URG bit  
ACK bit  
PSH bit  
RST bit  
SYN bit  
FIN bit  
syn  
fin  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Sweep Engines  
Table B-37  
Sweep Engine Parameters (continued)  
Parameter  
Description  
Value  
storage-key  
Specifies the type of address key used to store persistent Axxx  
data:  
AxBx  
Axxb  
Attacker address  
Attacker and victim addresses  
Attacker address and victim port  
suppress-reverse  
Does not fire when a sweep has fired in the reverse  
direction on this address set.  
true| false  
swap-attacker-victim Swaps the attacker and victim addresses and ports  
(source and destination) in the alert message and in any  
actions taken.  
true| false (default)  
tcp-flags  
Specifies the TCP flags to match when masked by  
mask:  
urg  
ack  
psh  
rst  
URG bit  
ACK bit  
PSH bit  
RST bit  
SYN bit  
FIN bit  
syn  
fin  
unique  
Specifies the threshold number of unique port  
connections between the two hosts.  
0 to 65535  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Sweep Other TCP Engine  
The Sweep Other TCP engine analyzes traffic between two hosts looking for abnormal packets typically  
used to fingerprint a victim. You can tune the existing signatures or create custom signatures.  
TCP sweeps must have a TCP flag and mask specified. You can specify multiple entries in the set of TCP  
flags. And you can specify an optional port range to filter out certain packets.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix B Signature Engines  
Traffic Anomaly Engine  
Sweep Other TCP Engine Parameters  
Table B-38 lists the parameters specific to the Sweep Other TCP engine.  
Table B-38  
Sweep Other TCP Engine Parameters  
Parameter  
Description  
Value  
specify-port-range  
{yes | no}  
(Optional) Enables using a port range for inspection:  
0 to 65535  
a-b[,c-d]  
port-range—Specifies the UDP port range used in  
inspection.  
set-tcp-flags  
Lets you set TCP flags to match.  
urg  
ack  
psh  
rst  
tcp-flags—Specifies the TCP flags used in this  
inspection:  
URG bit  
ACK bit  
PSH bit  
RST bit  
SYN bit  
FIN bit  
syn  
fin  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Traffic Anomaly Engine  
Note  
You can edit or tune anomaly detection signatures but you cannot create custom anomaly detection  
signatures.  
The Traffic Anomaly engine contains nine anomaly detection signatures covering the three protocols  
(TCP, UDP, and other). Each signature has two subsignatures, one for the scanner and the other for the  
worm-infected host (or a scanner under worm attack). When anomaly detection discovers an anomaly, it  
triggers an alert for these signatures. All anomaly detection signatures are enabled by default and the  
alert severity for each one is set to high.  
When a scanner is detected but no histogram anomaly occurred, the scanner signature fires for that  
attacker (scanner) IP address. If the histogram signature is triggered, the attacker addresses that are doing  
the scanning each trigger the worm signature (instead of the scanner signature). The alert details state  
which threshold is being used for the worm detection now that the histogram has been triggered. From  
that point on, all scanners are detected as worm-infected hosts.  
The following anomaly detection event actions are possible:  
produce-alert—Writes the event to the Event Store.  
deny-attacker-inline—Does not transmit this packet and future packets originating from the attacker  
address for a specified period of time.  
log-attacker-packets—Starts IP logging for packets that contain the attacker address.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
               
Appendix B Signature Engines  
Traffic Anomaly Engine  
log-pair-packets—Starts IP logging for packets that contain the attacker and victim address pair.  
deny-attacker-service-pair-inline—Blocks the source IP address and the destination port.  
request-snmp-trap—Sends a request to NotificationApp to perform SNMP notification.  
request-block-host—Sends a request to ARC to block this host (the attacker).  
Table B-39 lists the anomaly detection worm signatures.  
Table B-39 Anomaly Detection Worm Signatures  
Signature Subsignature  
ID  
ID  
Name  
Description  
13000  
0
Internal TCP Scanner Identified a single scanner over a TCP protocol in  
the internal zone.  
13000  
1
Internal TCP Scanner Identified a worm attack over a TCP protocol in  
the internal zone; the TCP histogram threshold  
was crossed and a scanner over a TCP protocol  
was identified.  
13001  
13001  
0
1
Internal UDP Scanner Identified a single scanner over a UDP protocol  
in the internal zone.  
Internal UDP Scanner Identified a worm attack over a UDP protocol in  
the internal zone; the UDP histogram threshold  
was crossed and a scanner over a UDP protocol  
was identified.  
13002  
13002  
0
1
Internal Other Scanner Identified a single scanner over an Other protocol  
in the internal zone.  
Internal Other Scanner Identified a worm attack over an Other protocol  
in the internal zone; the Other histogram  
threshold was crossed and a scanner over an  
Other protocol was identified.  
13003  
13003  
0
1
External TCP Scanner Identified a single scanner over a TCP protocol in  
the external zone.  
External TCP Scanner Identified a worm attack over a TCP protocol in  
the external zone; the TCP histogram threshold  
was crossed and a scanner over a TCP protocol  
was identified.  
13004  
13004  
0
1
External UDP Scanner Identified a single scanner over a UDP protocol  
in the external zone.  
External UDP Scanner Identified a worm attack over a UDP protocol in  
the external zone; the UDP histogram threshold  
was crossed and a scanner over a UDP protocol  
was identified.  
13005  
13005  
0
1
External Other Scanner Identified a single scanner over an Other protocol  
in the external zone.  
External Other Scanner Identified a worm attack over an Other protocol  
in the external zone; the Other histogram  
threshold was crossed and a scanner over an  
Other protocol was identified.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B Signature Engines  
Traffic ICMP Engine  
Table B-39  
Anomaly Detection Worm Signatures (continued)  
Signature Subsignature  
ID  
ID  
Name  
Description  
13006  
0
Illegal TCP Scanner  
Identified a single scanner over a TCP protocol in  
the illegal zone.  
13006  
1
Illegal TCP Scanner  
Identified a worm attack over a TCP protocol in  
the illegal zone; the TCP histogram threshold  
was crossed and a scanner over a TCP protocol  
was identified.  
13007  
13007  
0
1
Illegal UDP Scanner  
Illegal UDP Scanner  
Identified a single scanner over a UDP protocol  
in the illegal zone.  
Identified a worm attack over a UDP protocol in  
the illegal zone; the UDP histogram threshold  
was crossed and a scanner over a UDP protocol  
was identified.  
13008  
13008  
0
1
Illegal Other Scanner  
Illegal Other Scanner  
Identified a single scanner over an Other protocol  
in the illegal zone.  
Identified a worm attack over an Other protocol  
in the illegal zone; the Other histogram threshold  
was crossed and a scanner over an Other protocol  
was identified.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Traffic ICMP Engine  
The Traffic ICMP engine analyzes nonstandard protocols, such as TFN2K, LOKI, and DDoS. There are  
only two signatures (based on the LOKI protocol) with user-configurable parameters.  
TFN2K is the newer version of the TFN. It is a DDoS agent that is used to control coordinated attacks  
by infected computers (zombies) to target a single computer (or domain) with bogus traffic floods from  
hundreds or thousands of unknown attacking hosts. TFN2K sends randomized packet header  
information, but it has two discriminators that can be used to define signatures. One is whether the L3  
checksum is incorrect and the other is whether the character 64 ‘Ais found at the end of the payload.  
TFN2K can run on any port and can communicate with ICMP, TCP, UDP, or a combination of these  
protocols.  
LOKI is a type of back door Trojan. When the computer is infected, the malicious code creates an ICMP  
Tunnel that can be used to send small payload in ICMP replies (which may go straight through a firewall  
if it is not configured to block ICMP.) The LOKI signatures look for an imbalance of ICMP echo requests  
to replies and simple ICMP code and payload discriminators.  
The DDoS category (excluding TFN2K) targets ICMP-based DDoS agents. The main tools used here are  
TFN and Stacheldraht. They are similar in operation to TFN2K, but rely on ICMP only and have fixed  
commands: integers and strings.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                     
Appendix B Signature Engines  
Trojan Engines  
Table B-40 lists the parameters specific to the Traffic ICMP engine.  
Table B-40  
Traffic ICMP Engine Parameters  
Parameter  
Description  
Value  
parameter-tunable-sig  
Specifies the whether this signature has  
configurable parameters.  
yes | no  
inspection-typee  
Specifies the type of inspection to perform:  
is-loki  
Inspects for original LOKI traffic  
Inspects for modified LOKI traffic  
is-mod-lok  
reply-ratio  
Specifies the imbalance of replies to requests. The 0 to 65535  
alert fires when there are this many more replies  
than requests.  
want-request  
Requires an ECHO REQUEST be seen before firing true | false  
the alert.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Trojan Engines  
The Trojan engines analyze nonstandard protocols, such as BO2K and TFN2K. There are three Trojan  
engines: Trojan BO2K, TrojanTFN2K, and Trojan UDP.  
BO was the original Windows back door Trojan that ran over UDP only. It was soon superseded by  
BO2K. BO2K supported UDP and TCP both with basic XOR encryption. They have plain BO headers  
that have certain cross-packet characteristics.  
BO2K also has a stealthy TCP module that was designed to encrypt the BO header and make the  
cross-packet patterns nearly unrecognizable. The UDP modes of BO and BO2K are handled by the  
Trojan UDP engine. The TCP modes are handled by the Trojan BO2K engine.  
Note  
There are no specific parameters to the Trojan engines, except for swap-attacker-victim in the Trojan  
UDP engine.  
For More Information  
For more information on the parameters common to all signature engines, see Master Engine, page B-4.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
B-74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                   
A P P E N D I X  
C
Troubleshooting  
This appendix contains troubleshooting tips and procedures for sensors and software. It contains the  
following sections:  
Bug Toolkit  
For the most complete and up-to-date list of caveats, use the Bug Toolkit to refer to the caveat release  
note. You can use the Bug Toolkit to search for known bugs based on software version, feature set, and  
keywords. The resulting matrix shows when each bug was integrated, or fixed if applicable. It also lets  
you save the results of a search in Bug Groups, and also create persistent Alert Agents that can feed those  
groups with new defect alerts.  
Note  
You must be logged in to Cisco.com to access the Bug Toolkit.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix C Troubleshooting  
Preventive Maintenance  
If you are a registered Cisco.com user, you can view the Bug Toolkit at this URL:  
To become a registered cisco.com user, go to this URL:  
Preventive Maintenance  
This section describes how to perform preventive maintenance for your sensor, and contains the  
following topics:  
Understanding Preventive Maintenance  
The following actions will help you maintain your sensor:  
Back up a good configuration. If your current configuration becomes unusable, you can replace it  
with the backup version.  
Save your backup configuration to a remote system.  
Always back up your configuration before you do a manual upgrade. If you have auto upgrades  
configured, make sure you do periodic backups.  
Create a service account. A service account is needed for special debug situations directed by TAC.  
Caution  
You should carefully consider whether you want to create a service account. The service account  
provides shell access to the system, which makes the system vulnerable. Analyze your situation to decide  
if you want a service account existing on the system.  
For More Information  
For the procedure for backing up a configuration file, see Creating and Using a Backup  
For the procedure for using a remote server to copy and restore the a configuration file, see Backing  
For more information about the service account, see Creating the Service Account, page C-5.  
Creating and Using a Backup Configuration File  
To protect your configuration, you can back up the current configuration and then display it to confirm  
that is the configuration you want to save. If you need to restore this configuration, you can merge the  
backup configuration file with the current configuration or overwrite the current configuration file with  
the backup configuration file.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Preventive Maintenance  
To back up your current configuration, follow these steps:  
Log in to the CLI using an account with administrator privileges.  
Step 1  
Step 2  
Save the current configuration. The current configuration is saved in a backup file.  
sensor# copy current-config backup-config  
Step 3  
Step 4  
Display the backup configuration file. The backup configuration file is displayed.  
sensor# more backup-config  
You can either merge the backup configuration with the current configuration, or you can overwrite the  
current configuration:  
Merge the backup configuration into the current configuration.  
sensor# copy backup-config current-config  
Overwrite the current configuration with the backup configuration.  
sensor# copy /erase backup-config current-config  
Backing Up and Restoring the Configuration File Using a Remote Server  
Note  
We recommend copying the current configuration file to a remote server before upgrading.  
Use the copy [/erase] source_url destination_url keyword command to copy the configuration file to a  
remote server. You can then restore the current configuration from the remote server. You are prompted  
to back up the current configuration first.  
The following options apply:  
/erase—Erases the destination file before copying.  
This keyword only applies to the current-config; the backup-config is always overwritten. If this  
keyword is specified for destination current-config, the source configuration is applied to the system  
default configuration. If it is not specified for the destination current-config, the source  
configuration is merged with the current-config.  
source_url—The location of the source file to be copied. It can be a URL or keyword.  
destination_url—The location of the destination file to be copied. It can be a URL or a keyword.  
current-config—The current running configuration. The configuration becomes persistent as the  
commands are entered.  
backup-config—The storage location for the configuration backup.  
The exact format of the source and destination URLs varies according to the file. Here are the valid  
types:  
ftp:—Source or destination URL for an FTP network server. The syntax for this prefix is:  
ftp://[[username@]location][/relativeDirectory]/filename  
ftp://[[username@]location][//absoluteDirectory]/filename  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Preventive Maintenance  
Note  
You are prompted for a password.  
scp:—Source or destination URL for the SCP network server. The syntax for this prefix is:  
scp://[[username@]location][/relativeDirectory]/filename  
scp://[[username@]location][//absoluteDirectory]/filename  
Note  
You are prompted for a password. You must add the remote host to the SSH known hosts  
list.  
http:—Source URL for the web server. The syntax for this prefix is:  
http://[[username@]location][/directory]/filename  
Note  
The directory specification should be an absolute path to the desired file.  
https:—Source URL for the web server. The syntax for this prefix is:  
https://[[username@]location][/directory]/filename  
Note  
The directory specification should be an absolute path to the desired file. The remote  
host must be a TLS trusted host.  
Caution  
Copying a configuration file from another sensor may result in errors if the sensing interfaces and virtual  
sensors are not configured the same.  
Backing Up the Current Configuration to a Remote Server  
To back up your current configuration to a remote server, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Back up the current configuration to the remote server.  
sensor# copy current-config scp://[email protected]//configuration/cfg current-config  
Password: ********  
Warning: Copying over the current configuration may leave the box in an unstable state.  
Would you like to copy current-config to backup-config before proceeding? [yes]:  
Step 3  
Enter yesto copy the current configuration to a backup configuration.  
cfg  
100% |************************************************| 36124  
00:00  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix C Troubleshooting  
Preventive Maintenance  
Restoring the Current Configuration From a Backup File  
To restore your current configuration from a backup file, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Back up the current configuration to the remote server.  
sensor# copy scp://[email protected]//configuration/cfg current-config  
Password: ********  
Warning: Copying over the current configuration may leave the box in an unstable state.  
Would you like to copy current-config to backup-config before proceeding? [yes]:  
Step 3  
Enter yesto copy the current configuration to a backup configuration.  
cfg  
100% |************************************************| 36124  
00:00  
Warning: Replacing existing network-settings may leave the box in an unstable state.  
Would you like to replace existing network settings  
(host-ipaddress/netmask/gateway/access-list) on sensor before proceeding? [no]:  
sensor#  
Step 4  
Enter no to retain the currently configured hostname, IP address, subnet mask, management interface,  
and access list. We recommend you retain this information to preserve access to your sensor after the  
rest of the configuration has been restored.  
For More Information  
For a list of supported HTTP/HTTPS servers, see Supported FTP and HTTP/HTTPS Servers, page 21-3.  
Creating the Service Account  
You can create a service account for TAC to use during troubleshooting. Although more than one user  
can have access to the sensor, only one user can have service privileges on a sensor. The service account  
is for support purposes only.  
The root user password is synchronized to the service account password when the service account is  
created. To gain root access you must log in with the service account and switch to user root with the  
su - root command.  
Caution  
Caution  
Do not make modifications to the sensor through the service account except under the direction of TAC.  
If you use the service account to configure the sensor, your configuration is not supported by TAC.  
Adding services to the operating system through the service account affects proper performance and  
functioning of the other IPS services. TAC does not support a sensor on which additional services have  
been added.  
You should carefully consider whether you want to create a service account. The service account  
provides shell access to the system, which makes the system vulnerable. However, you can use the  
service account to create a password if the administrator password is lost. Analyze your situation to  
decide if you want a service account existing on the system.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Disaster Recovery  
Note  
For IPS 5.0 and later, you can no longer remove the cisco account. You can disable it using the no  
password cisco command, but you cannot remove it. To use the no password cisco command, there  
must be another administrator account on the sensor. Removing the cisco account through the service  
account is not supported. If you remove the cisco account through the service account, the sensor most  
likely will not boot up, so to recover the sensor you must reinstall the sensor system image.  
To create the service account, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter configuration mode.  
sensor# configure terminal  
Step 3  
Step 4  
Step 5  
Specify the parameters for the service account. The username follows the pattern  
^[A-Za-z0-9()+:,_/-]+$, which means the username must start with a letter or number, and can include  
any letter A to Z (capital or small), any number 0 to 9, - and _, and can contain 1 to 64 characters.  
sensor(config)# user username privilege service  
Specify a password when prompted. A valid password is 8 to 32 characters long. All characters except  
space are allowed. If a service account already exists for this sensor, the following error is displayed and  
no service account is created.  
Error: Only one service account may exist  
Exit configuration mode.  
sensor(config)# exit  
sensor#  
When you use the service account to log in to the CLI, you receive this warning.  
************************ WARNING *******************************************************  
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. This account is intended to be  
used for support and troubleshooting purposes only. Unauthorized modifications are not  
supported and will require this device to be reimaged to guarantee proper operation.  
****************************************************************************************  
Disaster Recovery  
Follow these recommendations so that you are ready in case of a disaster:  
If you are using the CLI, IDM, or IME for configuration, copy the current configuration from the  
sensor to an FTP or SCP server any time a change has been made.  
You should note the specific software version for that configuration. You can apply the copied  
configuration only to a sensor of the same version.  
You also need the list of user IDs that have been used on that sensor. The list of user IDs and  
passwords are not saved in the configuration.  
When a disaster happens and you need to recover the sensor, try the following:  
1. Reimage the sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Password Recovery  
2. Log in to the sensor with the default user ID and password—cisco.  
Note  
You are prompted to change the cisco password.  
3. Initialize the sensor.  
4. Upgrade the sensor to the IPS software version it had when the configuration was last saved and  
copied.  
Warning  
Trying to copy the saved configuration without getting the sensor back to the same IPS software  
version it had before the disaster can cause configuration errors.  
5. Copy the last saved configuration to the sensor.  
6. Update clients to use the new key and certificate of the sensor. Reimaging changes the sensor SSH  
keys and HTTPS certificate, so you must add the hosts back to the SSN known hosts list.  
7. Create previous users.  
For More Information  
For the procedure for backing up a configuration file, see Creating and Using a Backup  
For the procedure for obtaining a list of the current users on the sensor, see Showing User Status,  
For the procedures for reimage a sensor, see Chapter 21, “Upgrading, Downgrading, and Installing  
For the procedure for using the setup command to initialize the sensor, see Chapter 2, “Initializing  
For more information on obtaining IPS software and how to install it, see Obtaining Cisco IPS  
For the procedure for using a remote server to copy and restore the a configuration file, see Backing  
For the procedure for adding hosts to the SSH known hosts list, see Adding Hosts to the SSH Known  
For the procedure for adding users, see Adding and Removing Users, page 3-18.  
Password Recovery  
For most IPS platforms, you can now recover the password on the sensor rather than using the service  
account or reimaging the sensor. This section describes how to recover the password for the various IPS  
platforms. It contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix C Troubleshooting  
Password Recovery  
Understanding Password Recovery  
Note  
Administrators may need to disable the password recovery feature for security reasons.  
Password recovery implementations vary according to IPS platform requirements. Password recovery is  
implemented only for the cisco administrative account and is enabled by default. The IPS administrator  
can then recover user passwords for other accounts using the CLI. The cisco user password reverts to  
cisco and must be changed after the next login.  
Table C-1 lists the password recovery methods according to platform.  
Table C-1  
Password Recovery Methods According to Platform  
Platform  
Description  
Recovery Method  
4300 series sensors  
4500 series sensors  
Standalone IPS appliances  
GRUB prompt or ROMMON  
ASA 5500-X IPS SSP  
ASA 5585-X IPS SSP  
ASA 5500 series adaptive  
security appliance IPS modules command  
Adaptive security appliance CLI  
Recovering the Password for the Appliance  
This section describes the two ways to recover the password for appliances. It contains the following  
topics:  
Using the GRUB Menu  
Note  
You must have a terminal server or direct serial connection to the appliance to use the GRUB menu to  
recover the password.  
For the IPS 4355, IPS 4360, IPS 4510, and IPS 4520 appliances, the password recovery is found in the  
GRUB menu, which appears during bootup. When the GRUB menu appears, press any key to pause the  
boot process.  
To recover the password on appliances, follow these steps:  
Step 1  
Reboot the appliance to see the GRUB menu.  
GNU GRUB version 0.94 (632K lower / 523264K upper memory)  
-------------------------------------------  
0: Cisco IPS  
1: Cisco IPS Recovery  
2: Cisco IPS Clear Password (cisco)  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                     
Appendix C Troubleshooting  
Password Recovery  
-------------------------------------------  
Use the ^ and v keys to select which entry is highlighted.  
Press enter to boot the selected OS, 'e' to edit the  
Commands before booting, or 'c' for a command-line.  
Highlighted entry is 0:  
Step 2  
Step 3  
Press any key to pause the boot process.  
Choose 2: Cisco IPS Clear Password (cisco). The password is reset to cisco. Log in to the CLI with  
username cisco and password cisco. You can then change the password.  
Using ROMMON  
For the IPS 4345 IPS 4360, IPS 4510, and IPS 4520, you can use the ROMMON to recover the  
password. To access the ROMMON CLI, reboot the sensor from a terminal server or direct connection  
and interrupt the boot process.  
To recover the password using the ROMMON CLI, follow these steps:  
Step 1  
Step 2  
Reboot the appliance.  
To interrupt the boot process, press ESC or Control-R (terminal server) or send a BREAK command  
(direct connection). The boot code either pauses for 10 seconds or displays something similar to one of  
the following:  
Evaluating boot options  
Use BREAK or ESC to interrupt boot  
Step 3  
Enter the following commands to reset the password:  
confreg 0x7  
boot  
Sample ROMMON session:  
Booting system, please wait...  
CISCO SYSTEMS  
Embedded BIOS Version 1.0(11)2 01/25/06 13:21:26.17  
...  
Evaluating BIOS Options...  
Launch BIOS Extension to setup ROMMON  
Cisco Systems ROMMON Version (1.0(11)2) #0: Thu Jan 26 10:43:08 PST 2006  
Platform IPS-4360-K9  
Use BREAK or ESC to interrupt boot.  
Use SPACE to begin boot immediately.  
Boot interrupted.  
Management0/0  
Link is UP  
MAC Address:000b.fcfa.d155  
Use ? for help.  
rommon #0> confreg 0x7  
Update Config Register (0x7) in NVRAM...  
rommon #1> boot  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix C Troubleshooting  
Password Recovery  
Recovering the Password for the ASA 5500-X IPS SSP  
You can reset the password to the default (cisco) for the ASA 5500-X IPS SSP using the CLI or the  
ASDM. Resetting the password causes it to reboot. IPS services are not available during a reboot.  
Note  
To reset the password, you must have ASA 8.6.1 or later.  
Use the sw-module module ips password-reset command to reset the password to the default cisco. If  
the module in the specified slot has an IPS version that does not support password recovery, the  
following error message is displayed:  
ERROR: the module in slot <n> does not support password recovery.  
To reset the password on the ASA 5500-X IPS SSP, follow these steps:  
Step 1  
Log into the adaptive security appliance and enter the following command:  
asa# sw-module module ips password-reset  
Reset the password on module ips? [confirm]  
Step 2  
Step 3  
Press Enter to confirm.  
Password-Reset issued for module ips.  
Verify the status of the module. Once the status reads Up, you can session to the ASA 5500-X IPS SSP.  
asa# show module ips  
Mod Card Type  
Model  
Serial No.  
--- -------------------------------------------- ------------------ -----------  
ips ASA 5555-X IPS Security Services Processor  
Mod MAC Address Range Hw Version  
ASA5555-IPS  
FCH151070GR  
Fw Version  
Sw Version  
--- --------------------------------- ------------ ------------ ---------------  
ips 503d.e59c.7c4c to 503d.e59c.7c4c N/A N/A 7.2(1)E4  
Mod SSM Application Name  
Status  
SSM Application Version  
--- ------------------------------ ---------------- --------------------------  
ips IPS  
Up  
7.2(1)E4  
Mod Status  
Data Plane Status  
Compatibility  
--- ------------------ --------------------- -------------  
ips Up  
Up  
Mod License Name  
License Status Time Remaining  
--- -------------- --------------- ---------------  
ips IPS Module Enabled 210 days  
Step 4  
Step 5  
Session to the ASA 5500-X IPS SSP.  
asa# session ips  
Opening command session with module ips.  
Connected to module ips. Escape character sequence is 'CTRL-^X'.  
Enter the default username (cisco) and password (cisco) at the login prompt.  
login: cisco  
Password: cisco  
You are required to change your password immediately (password aged)  
Changing password for cisco.  
(current) password: cisco  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Password Recovery  
Step 6  
Enter your new password twice.  
New password: new password  
Retype new password: new password  
***NOTICE***  
This product contains cryptographic features and is subject to United States and local  
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic  
products does not imply third-party authority to import, export, distribute or use  
encryption. Importers, exporters, distributors and users are responsible for compliance  
with U.S. and local country laws. By using this product you agree to comply with  
applicable laws and regulations. If you are unable to comply with U.S. and local laws,  
return this product immediately.  
A summary of U.S. laws governing Cisco cryptographic products may be found at:  
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html  
If you require further assistance please contact us by sending email to [email protected].  
***LICENSE NOTICE***  
There is no license key installed on this IPS platform. The system will continue to  
operate with the currently installed signature set. A valid license must be obtained in  
order to apply signature updates. Please go to http://www.cisco.com/go/license to obtain a  
new license or install a license.  
asa-ssp#  
Using the ASDM  
To reset the password in the ASDM, follow these steps:  
Step 1  
From the ASDM menu bar, choose Tools > IPS Password Reset.  
Note  
This option does not appear in the menu if there is no IPS present.  
Step 2  
Step 3  
In the IPS Password Reset confirmation dialog box, click OK to reset the password to the default (cisco).  
A dialog box displays the success or failure of the password reset. If the reset fails, make sure you have  
the correct ASA and IPS software versions.  
Click Close to close the dialog box. The sensor reboots.  
Recovering the Password for the ASA 5585-X IPS SSP  
Note  
To reset the password, you must have ASA 8.2.(4.4) or later or ASA 8.4.2 or later. The  
ASA 5585-X IPS SSP is not supported in ASA 8.3(x).  
You can reset the password to the default (cisco) for the ASA 5585-X IPS SSP using the CLI or the  
ASDM. Resetting the password causes it to reboot. IPS services are not available during a reboot.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Password Recovery  
Use the hw-module module slot_number password-reset command to reset the password to the default  
cisco. If the module in the specified slot has an IPS version that does not support password recovery, the  
following error message is displayed:  
ERROR: the module in slot <n> does not support password recovery.  
To reset the password on the ASA 5585-X IPS SSP, follow these steps:  
Step 1  
Log into the adaptive security appliance and enter the following command:  
asa# hw-module module 1 password-reset  
Reset the password on module in slot 1? [confirm]  
Step 2  
Step 3  
Press Enter to confirm.  
Password-Reset issued for slot 1.  
Verify the status of the module. Once the status reads Up, you can session to the ASA 5585-X IPS SSP.  
asa# show module 1  
Mod Card Type  
Model  
Serial No.  
--- -------------------------------------------- ------------------ -----------  
1 ASA 5585-X IPS Security Services Processor-4 ASA5585-SSP-IPS40 JAF1436ABSG  
Mod MAC Address Range  
--- --------------------------------- ------------ ------------ ---------------  
1 5475.d029.8c74 to 5475.d029.8c7f 0.1 2.0(12)3 7.2(1)E4  
Hw Version  
Fw Version  
Sw Version  
Mod SSM Application Name  
Status  
SSM Application Version  
--- ------------------------------ ---------------- --------------------------  
1 IPS  
Up  
7.2(1)E4  
Mod Status  
Data Plane Status  
Compatibility  
--- ------------------ --------------------- -------------  
1 Up Up  
Step 4  
Step 5  
Session to the ASA 5585-X IPS SSP.  
asa# session 1  
Opening command session with slot 1.  
Connected to slot 1. Escape character sequence is 'CTRL-^X'.  
Enter the default username (cisco) and password (cisco) at the login prompt.  
login: cisco  
Password: cisco  
You are required to change your password immediately (password aged)  
Changing password for cisco.  
(current) password: cisco  
Step 6  
Enter your new password twice.  
New password: new password  
Retype new password: new password  
***NOTICE***  
This product contains cryptographic features and is subject to United States and local  
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic  
products does not imply third-party authority to import, export, distribute or use  
encryption. Importers, exporters, distributors and users are responsible for compliance  
with U.S. and local country laws. By using this product you agree to comply with  
applicable laws and regulations. If you are unable to comply with U.S. and local laws,  
return this product immediately.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Password Recovery  
A summary of U.S. laws governing Cisco cryptographic products may be found at:  
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html  
If you require further assistance please contact us by sending email to [email protected].  
***LICENSE NOTICE***  
There is no license key installed on this IPS platform. The system will continue to  
operate with the currently installed signature set. A valid license must be obtained in  
order to apply signature updates. Please go to http://www.cisco.com/go/license to obtain a  
new license or install a license.  
ips_ssp#  
Using the ASDM  
To reset the password in the ASDM, follow these steps:  
Step 1  
From the ASDM menu bar, choose Tools > IPS Password Reset.  
Note  
This option does not appear in the menu if there is no IPS present.  
Step 2  
Step 3  
In the IPS Password Reset confirmation dialog box, click OK to reset the password to the default (cisco).  
A dialog box displays the success or failure of the password reset. If the reset fails, make sure you have  
the correct ASA and IPS software versions.  
Click Close to close the dialog box. The sensor reboots.  
Disabling Password Recovery  
Caution  
If you try to recover the password on a sensor on which password recovery is disabled, the process  
proceeds with no errors or warnings; however, the password is not reset. If you cannot log in to the sensor  
because you have forgotten the password, and password recovery is set to disabled, you must reimage  
your sensor.  
Password recovery is enabled by default. You can disable password recovery through the CLI, IDM, or  
IME.  
Disabling Password Recovery Using the CLI  
To disable password recovery in the CLI, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter global configuration mode.  
sensor# configure terminal  
Step 3  
Enter host mode.  
sensor(config)# service host  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix C Troubleshooting  
Password Recovery  
Step 4  
Disable password recovery.  
sensor(config-hos)# password-recovery disallowed  
Disabling Password Recovery Using the IDM or IME  
To disable password recovery in the IDM or IME, follow these steps:  
Step 1  
Step 2  
Step 3  
Log in to the IDM or IME using an account with administrator privileges.  
Choose Configuration > sensor_name > Sensor Setup > Network.  
To disable password recovery, uncheck the Allow Password Recovery check box.  
Verifying the State of Password Recovery  
Use the show settings | include password command to verify whether password recovery is enabled.  
To verify whether password recovery is enabled, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Enter service host submode.  
sensor# configure terminal  
sensor (config)# service host  
sensor (config-hos)#  
Step 3  
Verify the state of password recovery by using the include keyword to show settings in a filtered output.  
sensor(config-hos)# show settings | include password  
password-recovery: allowed <defaulted>  
sensor(config-hos)#  
Troubleshooting Password Recovery  
When you troubleshoot password recovery, pay attention to the following:  
You cannot determine whether password recovery has been disabled in the sensor configuration  
from the ROMMON prompt, GRUB menu, switch CLI, or router CLI. If you attempt password  
recovery, it always appears to succeed. If it has been disabled, the password is not reset to cisco. The  
only option is to reimage the sensor.  
You can disable password recovery in the host configuration. For the platforms that use external  
mechanisms, such as ROMMON, although you can run commands to clear the password, if  
password recovery is disabled in the IPS, the IPS detects that password recovery is not allowed and  
rejects the external request.  
To check the state of password recovery, use the show settings | include password command.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Time Sources and the Sensor  
Time Sources and the Sensor  
This section describes how to maintain accurate time on the sensor, and contains the following topics:  
Time Sources and the Sensor  
Note  
We recommend that you use an NTP server to regulate time on your sensor. You can use authenticated  
or unauthenticated NTP. For authenticated NTP, you must obtain the NTP server IP address, NTP server  
key ID, and the key value from the NTP server. You can set up NTP during initialization or you can  
configure NTP through the CLI, IDM, IME, or ASDM.  
The sensor requires a reliable time source. All events (alerts) must have the correct UTC and local time  
stamp, otherwise, you cannot correctly analyze the logs after an attack. When you initialize the sensor,  
you set up the time zones and summertime settings. This section provides a summary of the various ways  
to set the time on sensors.  
The IPS Standalone Appliances  
Use the clock set command to set the time. This is the default.  
Configure the appliance to get its time from an NTP time synchronization source.  
Note  
The currently supported Cisco IPS appliances are the IPS 4345, IPS 4360, IPS 4510, and IPS 4520.  
The ASA IPS Modules  
The ASA 5500-X IPS SSP and ASA 5585-X IPS SSP automatically synchronize their clocks with  
the clock in the adaptive security appliance in which they are installed. This is the default.  
Configure them to get their time from an NTP time synchronization source, such as a Cisco router  
other than the parent router.  
For More Information  
For the procedure for configuring NTP, see Configuring NTP, page 3-42.  
Synchronizing IPS Clocks with Parent Device Clocks  
The ASA IPS modules (ASA 5500-X IPS SSP and ASA 5585-X IPS SSP) synchronize their clocks to  
the parent chassis clock (switch, router, or adaptive security appliance) each time the IPS boots up and  
any time the parent chassis clock is set. The IPS clock and parent chassis clock tend to drift apart over  
time. The difference can be as much as several seconds per day. To avoid this problem, make sure that  
both the IPS clock and the parent clock are synchronized to an external NTP server. If only the IPS clock  
or only the parent chassis clock is synchronized to an NTP server, the time drift occurs.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
                       
Appendix C Troubleshooting  
Time Sources and the Sensor  
Verifying the Sensor is Synchronized with the NTP Server  
In IPS, you cannot apply an incorrect NTP configuration, such as an invalid NTP key value or ID, to the  
sensor. If you try to apply an incorrect configuration, you receive an error message. To verify the NTP  
configuration, use the show statistics host command to gather sensor statistics. The NTP statistics  
section provides NTP statistics including feedback on sensor synchronization with the NTP server.  
To verify the NTP configuration, follow these steps:  
Step 1  
Step 2  
Log in to the sensor.  
Generate the host statistics.  
sensor# show statistics host  
...  
NTP Statistics  
remote  
11.22.33.44  
LOCAL(0)  
refid  
CHU_AUDIO(1)  
73.78.73.84  
st t when poll reach  
delay  
0.536  
0.000  
offset jitter  
8 u  
5 l  
36  
35  
64  
64  
1
1
0.069  
0.000  
0.001  
0.001  
ind assID status conf reach auth condition last_event cnt  
1 10372 f014  
2 10373 9014  
yes  
yes  
yes  
yes none  
ok  
reject  
reject  
reachable 1  
reachable 1  
status = Not Synchronized  
...  
Step 3  
Generate the hosts statistics again after a few minutes.  
sensor# show statistics host  
...  
NTP Statistics  
remote  
*11.22.33.44  
LOCAL(0)  
refid  
CHU_AUDIO(1)  
73.78.73.84  
st t when poll reach  
delay  
0.518  
0.000  
offset jitter  
37.975 33.465  
8 u  
5 l  
22  
22  
64 377  
64 377  
0.000  
0.001  
ind assID status conf reach auth condition last_event cnt  
1 10372 f624  
2 10373 9024  
yes  
yes  
yes  
yes none  
ok  
sys.peer  
reject  
reachable 2  
reachable 2  
status = Synchronized  
Step 4  
If the status continues to read Not Synchronized, check with the NTP server administrator to make sure  
the NTP server is configured correctly.  
Correcting Time on the Sensor  
If you set the time incorrectly, your stored events will have the incorrect time because they are stamped  
with the time the event was created. The Event Store time stamp is always based on UTC time. If during  
the original sensor setup, you set the time incorrectly by specifying 8:00 p.m. rather than 8:00 a.m.,  
when you do correct the error, the corrected time will be set backwards. New events might have times  
older than old events.  
For example, if during the initial setup, you configure the sensor as central time with daylight saving  
time enabled and the local time is 8:04 p.m., the time is displayed as 20:04:37 CDT and has an offset  
from UTC of -5 hours (01:04:37 UTC, the next day). A week later at 9:00 a.m., you discover the error:  
the clock shows 21:00:23 CDT. You then change the time to 9:00 a.m. and now the clock shows  
09:01:33 CDT. Because the offset from UTC has not changed, it requires that the UTC time now be  
14:01:33 UTC, which creates the time stamp problem.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Advantages and Restrictions of Virtualization  
To ensure the integrity of the time stamp on the event records, you must clear the event archive of the  
older events by using the clear events command.  
Note  
You cannot remove individual events.  
For More Information  
For the procedure for clearing events, see Clearing Events, page C-101.  
Advantages and Restrictions of Virtualization  
To avoid configuration problems on your sensor, make sure you understand the advantages and  
restrictions of virtualization on your sensor.  
Virtualization has the following advantages:  
You can apply different configurations to different sets of traffic.  
You can monitor two networks with overlapping IP spaces with one sensor.  
You can monitor both inside and outside of a firewall or NAT device.  
Virtualization has the following restrictions:  
You must assign both sides of asymmetric traffic to the same virtual sensor.  
Using VACL capture or SPAN (promiscuous monitoring) is inconsistent with regard to VLAN  
tagging, which causes problems with VLAN groups.  
When using Cisco IOS software, a VACL capture port or a SPAN target does not always receive  
tagged packets even if it is configured for trunking.  
When using the MSFC, fast path switching of learned routes changes the behavior of VACL  
captures and SPAN.  
Persistent store is limited.  
Virtualization has the following traffic capture requirements:  
The virtual sensor must receive traffic that has 802.1q headers (other than traffic on the native VLAN  
of the capture port).  
The sensor must see both directions of traffic in the same VLAN group in the same virtual sensor  
for any given sensor.  
The following sensors support virtualization:  
ASA 5500-X IPS SSP  
ASA 5585-X IPS SSP  
IPS 4345  
IPS 4345-DC  
IPS 4360  
IPS 4510  
IPS 4520  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Supported MIBs  
Supported MIBs  
To avoid problems with configuring SNMP, be aware of the MIBs that are supported on the sensor.  
The following private MIBs are supported on the sensor:  
CISCO-CIDS-MIB  
The CISCO-CIDS-MIB has been updated to include SNMP health data.  
CISCO-ENHANCED-MEMPOOL-MIB  
CISCO-ENTITY-ALARM-MIB  
You can obtain these private Cisco MIBs under the heading SNMP v2 MIBs at this URL:  
Note  
Note  
MIB II is available on the sensor, but we do not support it. We know that some elements are not correct  
(for example, the packet counts from the IF MIB on the sensing interfaces). While you can use elements  
from MIB II, we do not guarantee that they all provide correct information. We fully support the other  
listed MIBs and their output is correct.  
CISCO-PROCESS-MIB is available on the sensor, but we do not support it. We know that some elements  
are not available. While you can use elements from CISCO-PROCESS-MIB, we do not guarantee that  
they all provide correct information. We fully support the other listed MIBs and their output is correct.  
Troubleshooting Global Correlation  
Make sure you observe the following when configuring global correlation:  
Because global correlation updates occur through the sensor management interface, firewalls must  
allow port 443/80 traffic.  
You must have an HTTP proxy server or a DNS server configured to allow global correlation  
features to function.  
If you have an HTTP proxy server configured, the proxy must allow port 443/80 traffic from IPS  
systems.  
You must have a valid IPS license to allow global correlation features to function.  
Global correlation features only contain external IP addresses, so if you position a sensor in an  
internal lab, you may never receive global correlation information.  
Make sure your sensor supports the global correlation features.  
Make sure your IPS version supports the global correlation features.  
TFor More Information  
For detailed information about global correlation, see Chapter 10, “Configuring Global Correlation.”  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix C Troubleshooting  
When to Disable Anomaly Detection  
When to Disable Anomaly Detection  
If you have anomaly detection enabled and you have your sensor configured to see only one direction of  
traffic, you should disable anomaly detection. Otherwise, you will receive many alerts, because anomaly  
detection sees asymmetric traffic as having incomplete connections, that is, like worm scanners, and fires  
alerts.  
To disable anomaly detection, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Enter analysis engine submode.  
sensor# configure terminal  
sensor(config)# service analysis-engine  
sensor(config-ana)#  
Step 3  
Step 4  
Enter the virtual sensor name that contains the anomaly detection policy you want to disable.  
sensor(config-ana)# virtual-sensor vs0  
sensor(config-ana-vir)#  
Disable anomaly detection operational mode.  
sensor(config-ana-vir)# anomaly-detection  
sensor(config-ana-vir-ano)# operational-mode inactive  
sensor(config-ana-vir-ano)#  
Step 5  
Step 6  
Exit analysis engine submode.  
sensor(config-ana-vir-ano)# exit  
sensor(config-ana-vir)# exit  
sensor(config-ana-)# exit  
Apply Changes:?[yes]:  
Press Enter to apply your changes or enter no to discard them.  
For More Information  
To learn more about Worms, see Understanding Worms, page 9-2.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Analysis Engine Not Responding  
Analysis Engine Not Responding  
Error Message Output from show statistics analysis-engine  
Error: getAnalysisEngineStatistics : ct-sensorApp.424 not responding, please  
check system processes - The connect to the specified Io::ClientPipe failed.  
Error Message Output from show statistics anomaly-detection  
Error: getAnomalyDetectionStatistics : ct-sensorApp.424 not responding, please  
check system processes - The connect to the specified Io::ClientPipe failed.  
Error Message Output from show statistics denied-attackers  
Error: getDeniedAttackersStatistics : ct-sensorApp.424 not responding, please  
check system processes - The connect to the specified Io::ClientPipe failed.  
Possible Cause These error messages appear when you run the show tech support command and the  
Analysis Engine is not running.  
Recommended Action Verify the Analysis Engine is running and monitor it to see if the issue is  
resolved.  
To verify the Analysis Engine is running and to monitor the issue, follow these steps:  
Step 1  
Step 2  
Log in to the sensor.  
Verify that the Analysis Engine is not running, Check to see if the Analysis Engine reads Not Running.  
sensor# show version  
-----  
MainApp  
Running  
AnalysisEngine  
Not Running  
CollaborationApp  
Running  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
CLI  
Step 3  
Step 4  
Step 5  
Step 6  
Enter show tech-support and save the output.  
Reboot the sensor.  
Enter show version after the sensor has stabilized to see if the issue is resolved.  
If the Analysis Engine still reads Not Running, contact TAC with the original show tech support  
command output.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting External Product Interfaces  
Troubleshooting External Product Interfaces  
This section lists issues that can occur with external product interfaces and provides troubleshooting tips.  
For more information on external product interfaces, see Chapter 11, “Configuring External Product  
Interfaces.” This section contains the following topics:  
External Product Interfaces Issues  
When the external product interface receives host posture and quarantine events, the following issues  
can arise:  
The sensor can store only a certain number of host records:  
If the number of records exceeds 10,000, subsequent records are dropped.  
If the 10,000 limit is reached and then it drops to below 9900, new records are no longer  
dropped.  
Hosts can change an IP address or appear to use another host IP address, for example, because of  
DHCP lease expiration or movement in a wireless network. In the case of an IP address conflict, the  
sensor presumes the most recent host posture event to be the most accurate.  
A network can include overlapping IP address ranges in different VLANs, but host postures do not  
include VLAN ID information. You can configure the sensor to ignore specified address ranges.  
A host can be unreachable from the CSA MC because it is behind a firewall. You can exclude  
unreachable hosts.  
The CSA MC event server allows up to ten open subscriptions by default. You can change this value.  
You must have an administrative account and password to open subscriptions.  
CSA data is not virtualized; it is treated globally by the sensor.  
Host posture OS and IP addresses are integrated into passive OS fingerprinting storage. You can  
view them as imported OS profiles.  
You cannot see the quarantined hosts.  
The sensor must recognize each CSA MC host X.509 certificate. You must add them as a trusted  
host.  
You can configure a maximum of two external product devices.  
For More Information  
For more information on working with OS maps and identifications, see Adding, Editing, Deleting,  
For the procedure for adding trusted hosts, see Adding TLS Trusted Hosts, page 3-52.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the Appliance  
External Product Interfaces Troubleshooting Tips  
To troubleshoot external product interfaces, check the following:  
Make sure the interface is active by checking the output from the show statistics  
external-product-interface command in the CLI, or choose Monitoring > Sensor Monitoring >  
Support Information > Statistics in the IDM and check the Interface state line in the response, or  
choose Configuration > sensor_name > Sensor Monitoring > Support Information > Statistics  
in the IME, and check the Interface state line in the response.  
Make sure you have added the CSA MC IP address to the trusted hosts. If you forgot to add it, add  
it, wait a few minutes and then check again.  
Confirm subscription login information by opening and closing a subscription on the CSA MC using  
the browser.  
Check the Event Store for the CSA MC subscription errors.  
For More Information  
For the procedure for adding trusted hosts, see Adding TLS Trusted Hosts, page 3-52.  
For the procedure for displaying events, see Displaying Events, page C-98.  
Troubleshooting the Appliance  
This section contains information to troubleshoot the appliance. It contains the following topics:  
Tip  
Before troubleshooting the appliance, check the Caveats section of the Readme for the software  
version you have installed on your sensor to see if you are dealing with a known issue.  
Troubleshooting Loose Connections  
Perform the following actions to troubleshoot loose connections on sensors:  
Make sure all power cords are securely connected.  
Make sure all cables are properly aligned and securely connected for all external and internal  
components.  
Remove and check all data and power cables for damage. Make sure no cables have bent pins or  
damaged connectors.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Make sure each device is properly seated.  
If a device has latches, make sure they are completely closed and locked.  
Check any interlock or interconnect indicators that indicate a component is not connected properly.  
If problems continue, remove and reinstall each device, checking the connectors and sockets for bent  
pins or other damage.  
The Analysis Engine is Busy  
After you reimage a sensor, the Analysis Engine is busy rebuilding Regex tables and does not respond  
to new configurations. You can check whether the Analysis Engine is busy by using the show statistics  
virtual-sensor command. You receive the following error message if the Analysis Engine is busy:  
sensor# show statistics virtual-sensor  
Error: getVirtualSensorStatistics : Analysis Engine is busy rebuilding regex tables. This  
may take a while.  
sensor#  
When the Analysis Engine is busy rebuilding Regex tables, you receive an error message if you try to  
update a configuration, for example, enabling or retiring a signature:  
sensor# configure terminal  
sensor(config)# service sig sig0  
sensor(config-sig)# sig 2000 0  
sensor(config-sig-sig)# status enabled  
sensor(config-sig-sig)# status  
sensor(config-sig-sig-sta)# enabled true  
sensor(config-sig-sig-sta)# retired false  
sensor(config-sig-sig-sta)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes?[yes]:  
Error: editConfigDeltaSignatureDefinition : Analysis Engine is busy rebuilding regex  
tables. This may take a while.  
The configuration changes failed validation, no changes were applied.  
Would you like to return to edit mode to correct the errors? [yes]: no  
No changes were made to the configuration.  
sensor(config)#  
If you try to get the virtual sensor statistics immediately after you boot a sensor, you receive an error  
message. Although the sensor has rebuilt the cache files, the virtual sensor is not finished initializing.  
sensor# show statistics virtual-sensor  
Error: getVirtualSensorStatistics : Analysis Engine is busy.  
sensor#  
When you receive the errors that the Analysis Engine is busy, wait a while before trying to make  
configuration changes. Use the show statistics virtual-sensor command to find out when the Analysis  
Engine is available again.  
Communication Problems  
This section helps you troubleshoot communication problems with the 4200 series sensor. It contains the  
following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Cannot Access the Sensor CLI Through Telnet or SSH  
If you cannot access the sensor CLI through Telnet (if you already have it enabled) or SSH, follow these  
steps:  
Step 1  
Step 2  
Log in to the sensor CLI through a console, terminal, or module session.  
Make sure that the sensor management interface is enabled. The management interface is the interface  
in the list with the status line Media Type = TX. If the Link Status is Down, go to Step 3. If the Link Status  
is Up, go to Step 5.  
sensor# show interfaces  
Interface Statistics  
Total Packets Received = 0  
Total Bytes Received = 0  
Missed Packet Percentage = 0  
Current Bypass Mode = Auto_off  
MAC statistics from interface GigabitEthernet0/1  
Media Type = backplane  
Missed Packet Percentage = 0  
Inline Mode = Unpaired  
Pair Status = N/A  
Link Status = Up  
Link Speed = Auto_1000  
Link Duplex = Auto_Full  
Total Packets Received = 0  
Total Bytes Received = 0  
Total Multicast Packets Received = 0  
Total Broadcast Packets Received = 0  
Total Jumbo Packets Received = 0  
Total Undersize Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 0  
Total Bytes Transmitted = 0  
Total Multicast Packets Transmitted = 0  
Total Broadcast Packets Transmitted = 0  
Total Jumbo Packets Transmitted = 0  
Total Undersize Packets Transmitted = 0  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
MAC statistics from interface GigabitEthernet0/0  
Media Type = TX  
Link Status = Up  
Link Speed = Auto_100  
Link Duplex = Auto_Full  
Total Packets Received = 944333  
Total Bytes Received = 83118358  
Total Multicast Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 397633  
Total Bytes Transmitted = 435730956  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 3  
Make sure the sensor IP address is unique. If the management interface detects that another device on  
the network has the same IP address, it does not come up.  
sensor# setup  
--- System Configuration Dialog ---  
At any point you may enter a question mark '?' for help.  
User ctrl-c to abort configuration dialog at any prompt.  
Default settings are in square brackets '[]'.  
Current Configuration:  
service host  
network-settings  
host-ip 192.168.1.2/24,192.168.1.1  
host-name sensor  
telnet-option enabled  
access-list 0.0.0.0/0  
ftp-timeout 300  
no login-banner-text  
exit  
--MORE--  
Step 4  
Step 5  
Make sure the management port is connected to an active network connection. If the management port  
is not connected to an active network connection, the management interface does not come up.  
Make sure the IP address of the workstation that is trying to connect to the sensor is permitted in the  
sensor access list. If the workstation network address is permitted in the sensor access list, go to Step 6.  
sensor# setup  
--- System Configuration Dialog ---  
At any point you may enter a question mark '?' for help.  
User ctrl-c to abort configuration dialog at any prompt.  
Default settings are in square brackets '[]'.  
Current Configuration:  
service host  
network-settings  
host-ip 192.168.1.2/24,192.168.1.1  
host-name sensor  
telnet-option enabled  
access-list 0.0.0.0/0  
ftp-timeout 300  
no login-banner-text  
exit  
--MORE--  
Step 6  
Step 7  
Add a permit entry for the workstation network address, save the configuration, and try to connect again.  
Make sure the network configuration allows the workstation to connect to the sensor. If the sensor is  
protected behind a firewall and the workstation is in front of the firewall, make sure the firewall is  
configured to allow the workstation to access the sensor. Or if the workstation is behind a firewall that  
is performing network address translation on the workstation IP address, and the sensor is in front of the  
firewall, make sure that the sensor access list contains a permit entry for the workstation translated  
address.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the Appliance  
For More Information  
For the procedure for enabling and disabling Telnet on the sensor, see Enabling and Disabling  
For the various ways to open a CLI session directly on the sensor, see Chapter ii, “Logging In to the  
For the procedure for changing the IP address, see Changing the IP Address, Netmask, and Gateway,  
For the procedure for changing the access list, see Correcting a Misconfigured Access List,  
Correcting a Misconfigured Access List  
To correct a misconfigured access list, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
View your configuration to see the access list.  
sensor# show configuration | include access-list  
access-list 10.0.0.0/8  
access-list 64.0.0.0/8  
sensor#  
Step 3  
Step 4  
Verify that the client IP address is listed in the allowed networks. If it is not, add it.  
sensor# configure terminal  
sensor(config)# service host  
sensor(config-hos)# network-settings  
sensor(config-hos-net)# access-list 171.69.70.0/24  
Verify the settings.  
sensor(config-hos-net)# show settings  
network-settings  
-----------------------------------------------  
host-ip: 192.168.1.2/24,192.168.1.1 default: 10.1.9.201/24,10.1.9.1  
host-name: sensor-238 default: sensor  
telnet-option: enabled default: disabled  
access-list (min: 0, max: 512, current: 3)  
-----------------------------------------------  
network-address: 10.0.0.0/8  
-----------------------------------------------  
network-address: 64.0.0.0/8  
-----------------------------------------------  
network-address: 171.69.70.0/24  
-----------------------------------------------  
-----------------------------------------------  
ftp-timeout: 300 seconds <defaulted>  
login-banner-text: <defaulted>  
-----------------------------------------------  
sensor(config-hos-net)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Duplicate IP Address Shuts Interface Down  
If you have two newly imaged sensors with the same IP address that come up on the same network at the  
same time, the interface shuts down. Linux prevents the command and control interface from activating  
if it detects an address conflict with another host.  
To verify that the sensor in question does not have an IP address conflict with another host on the  
network, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Determine whether the interface is up. If the output says the command and control interface link status  
is down, there is a hardware issue or an IP address conflict.  
sensor# show interfaces  
Interface Statistics  
Total Packets Received = 0  
Total Bytes Received = 0  
Missed Packet Percentage = 0  
Current Bypass Mode = Auto_off  
MAC statistics from interface GigabitEthernet0/1  
Media Type = backplane  
Missed Packet Percentage = 0  
Inline Mode = Unpaired  
Pair Status = N/A  
Link Status = Up  
Link Speed = Auto_1000  
Link Duplex = Auto_Full  
Total Packets Received = 0  
Total Bytes Received = 0  
Total Multicast Packets Received = 0  
Total Broadcast Packets Received = 0  
Total Jumbo Packets Received = 0  
Total Undersize Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 0  
Total Bytes Transmitted = 0  
Total Multicast Packets Transmitted = 0  
Total Broadcast Packets Transmitted = 0  
Total Jumbo Packets Transmitted = 0  
Total Undersize Packets Transmitted = 0  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
MAC statistics from interface GigabitEthernet0/0  
Media Type = TX  
Link Status = Up  
Link Speed = Auto_100  
Link Duplex = Auto_Full  
Total Packets Received = 1822323  
Total Bytes Received = 131098876  
Total Multicast Packets Received = 20  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 219260  
Total Bytes Transmitted = 103668610  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
sensor#  
Step 3  
Make sure the sensor cabling is correct.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 4  
Make sure the IP address is correct.  
For More Information  
To make sure the sensor cabling is correct, refer to the chapter for your sensor in Cisco Intrusion  
For the procedure for making sure the IP address is correct, see Changing Network Settings,  
The SensorApp and Alerting  
This section helps you troubleshoot issues with the SensorApp and alerting. It contains the following  
topics:  
The SensorApp is Not Running  
The sensing process, SensorApp, should always be running. If it is not, you do not receive any alerts.  
The SensorApp is part of the Analysis Engine, so you must make sure the Analysis Engine is running.  
To make sure the Analysis Engine is running, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Determine the status of the Analysis Engine service and whether you have the latest software updates.  
sensor# show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Realm Keys  
Signature Definition:  
Signature Update  
OS Version:  
key1.0  
S697.0  
2.6.29.1  
IPS4360  
2013-02-15  
Platform:  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24% usage)  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96% usage)  
MainApp  
Running  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
2013-04-10T11:05:55-0500  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the Appliance  
AnalysisEngine  
Running  
CollaborationApp  
Running  
CLI  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
Upgrade History:  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Recovery Partition Version 1.1 - 7.2(1)E4  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
sensor#  
Step 3  
If the Analysis Engine is not running, look for any errors connected to it.  
sensor# show events error fatal past 13:00:00 | include AnalysisEngine  
evError: eventId=1077219258696330005 severity=warning  
originator:  
hostId: sensor  
appName: sensorApp  
appInstanceId: 1045  
time: 2004/02/19 19:34:20 2004/02/19 19:34:20 UTC  
errorMessage: name=errUnclassified Generating new Analysis Engine configuration file.  
Note  
The date and time of the last restart is listed. In this example, the last restart was on 2-19-2004  
at 7:34.  
Step 4  
If you do not have the latest software updates, download them from Cisco.com. Read the Readme that  
accompanies the software upgrade for any known DDTS for the SensorApp or the Analysis Engine.  
Step 5  
Step 6  
Step 7  
Step 8  
If the Analysis Engine is still not running, enter show tech-support and save the output.  
Reboot the sensor.  
Enter show version after the sensor has stabilized to see if the issue is resolved.  
If the Analysis Engine still reads Not Running, contact TAC with the original show tech support  
command output.  
For More Information  
For more information on IPS system architecture, see Chapter A, “System Architecture.”  
For the procedure for obtaining the latest Cisco IPS software, see Obtaining Cisco IPS Software,  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Physical Connectivity, SPAN, or VACL Port Issue  
If the sensor is not connected properly, you do not receive any alerts.  
To make sure the sensor is connected properly, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Make sure the interfaces are up and that the packet count is increasing.  
sensor# show interfaces  
Interface Statistics  
Total Packets Received = 0  
Total Bytes Received = 0  
Missed Packet Percentage = 0  
Current Bypass Mode = Auto_off  
MAC statistics from interface GigabitEthernet0/1  
Media Type = backplane  
Missed Packet Percentage = 0  
Inline Mode = Unpaired  
Pair Status = N/A  
Link Status = Up  
Link Speed = Auto_1000  
Link Duplex = Auto_Full  
Total Packets Received = 0  
Total Bytes Received = 0  
Total Multicast Packets Received = 0  
Total Broadcast Packets Received = 0  
Total Jumbo Packets Received = 0  
Total Undersize Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 0  
Total Bytes Transmitted = 0  
Total Multicast Packets Transmitted = 0  
Total Broadcast Packets Transmitted = 0  
Total Jumbo Packets Transmitted = 0  
Total Undersize Packets Transmitted = 0  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
MAC statistics from interface GigabitEthernet0/0  
Media Type = TX  
Link Status = Up  
Link Speed = Auto_100  
Link Duplex = Auto_Full  
Total Packets Received = 1830137  
Total Bytes Received = 131624465  
Total Multicast Packets Received = 20  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 220052  
Total Bytes Transmitted = 103796666  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
sensor#  
Step 3  
If the Link Status is down, make sure the sensing port is connected properly:  
Make sure the sensing port is connected properly on the appliance.  
Make sure the sensing port is connected to the correct SPAN or VACL capture port on IDSM2.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 4  
Step 5  
Verify the interface configuration:  
Make sure you have the interfaces configured properly.  
Verify the SPAN and VACL capture port configuration on the Cisco switch.  
Refer to your switch documentation for the procedure.  
Verify again that the interfaces are up and that the packet count is increasing.  
sensor# show interfaces  
For More Information  
For the procedure for properly installing the sensing interface on your sensor, refer to the chapter on  
For the procedures for configuring interfaces on your sensor, see Chapter 4, “Configuring  
Unable to See Alerts  
If you are not seeing alerts, try the following:  
Make sure the signature is enabled  
Make sure the signature is not retired  
Make sure that you have Produce Alert configured as an action  
Note  
If you choose Produce Alert, but come back later and add another event action and do not  
add Produce Alert to the new configuration, alerts are not sent to the Event Store. Every time  
you configure a signature, the new configuration overwrites the old one, so make sure you  
have configured all the event actions you want for each signature.  
Make sure the sensor is seeing packets  
Make sure that alerts are being generated  
Make sure the sensing interface is in a virtual sensor  
To make sure you can see alerts, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Make sure the signature is enabled.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
sensor(config-sig)# signatures 1300 0  
sensor(config-sig-sig)# status  
sensor(config-sig-sig-sta)# show settings  
status  
-----------------------------------------------  
enabled: true <defaulted>  
retired: false <defaulted>  
-----------------------------------------------  
sensor(config-sig-sig-sta)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 3  
Make sure you have Produce Alert configured.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
sensor(config-sig)# signatures 1300 0  
sensor(config-sig-sig)# engine ?  
normalizer  
Signature engine  
sensor(config-sig-sig)# engine normalizer  
sensor(config-sig-sig-nor)# event-action produce-alert  
sensor(config-sig-sig-nor)# show settings  
normalizer  
-----------------------------------------------  
event-action: produce-alert default: produce-alert|deny-connection-inline  
edit-default-sigs-only  
-----------------------------------------------  
sensor#  
Step 4  
Make sure the sensor is seeing packets.  
sensor# show interfaces FastEthernet0/1  
MAC statistics from interface FastEthernet0/1  
Media Type = backplane  
Missed Packet Percentage = 0  
Inline Mode = Unpaired  
Pair Status = N/A  
Link Status = Up  
Link Speed = Auto_100  
Link Duplex = Auto_Full  
Total Packets Received = 267581  
Total Bytes Received = 24886471  
Total Multicast Packets Received = 0  
Total Broadcast Packets Received = 0  
Total Jumbo Packets Received = 0  
Total Undersize Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 57301  
Total Bytes Transmitted = 3441000  
Total Multicast Packets Transmitted = 0  
Total Broadcast Packets Transmitted = 0  
Total Jumbo Packets Transmitted = 0  
Total Undersize Packets Transmitted = 0  
Total Transmit Errors = 1  
Total Transmit FIFO Overruns = 0  
sensor#  
Step 5  
Check for alerts.  
sensor# show statistics virtual-sensor  
SigEvent Preliminary Stage Statistics  
Number of Alerts received = 0  
Number of Alerts Consumed by AlertInterval = 0  
Number of Alerts Consumed by Event Count = 0  
Number of FireOnce First Alerts = 0  
Number of FireOnce Intermediate Alerts = 0  
Number of Summary First Alerts = 0  
Number of Summary Intermediate Alerts = 0  
Number of Regular Summary Final Alerts = 0  
Number of Global Summary Final Alerts = 0  
Number of Alerts Output for further processing = 0alertDetails: Traffic Source: int0 ;  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Sensor Not Seeing Packets  
If the sensor is not seeing any packets on the network, you could have the interfaces set up incorrectly.  
If the sensor is not seeing packets, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Make sure the interfaces are up and receiving packets.  
sensor# show interfaces GigabitEthernet0/1  
MAC statistics from interface GigabitEthernet0/1  
Media Type = backplane  
Missed Packet Percentage = 0  
Inline Mode = Unpaired  
Pair Status = N/A  
Link Status = Down  
Link Speed = Auto_1000  
Link Duplex = Auto_Full  
Total Packets Received = 0  
Total Bytes Received = 0  
Total Multicast Packets Received = 0  
Total Broadcast Packets Received = 0  
Total Jumbo Packets Received = 0  
Total Undersize Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 0  
Total Bytes Transmitted = 0  
Total Multicast Packets Transmitted = 0  
Total Broadcast Packets Transmitted = 0  
Total Jumbo Packets Transmitted = 0  
Total Undersize Packets Transmitted = 0  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
sensor#  
Step 3  
If the interfaces are not up, do the following:  
Check the cabling.  
Enable the interface.  
sensor# configure terminal  
sensor(config)# service interface  
sensor(config-int)# physical-interfaces GigabitEthernet0/1  
sensor(config-int-phy)# admin-state enabled  
sensor(config-int-phy)# show settings  
<protected entry>  
name: GigabitEthernet0/1  
-----------------------------------------------  
media-type: tx <protected>  
description: <defaulted>  
admin-state: enabled default: disabled  
duplex: auto <defaulted>  
speed: auto <defaulted>  
alt-tcp-reset-interface  
-----------------------------------------------  
none  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-int-phy)#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 4  
Check to see that the interface is up and receiving packets.  
sensor# show interfaces  
MAC statistics from interface GigabitEthernet0/1  
Media Type = TX  
Missed Packet Percentage = 0  
Inline Mode = Unpaired  
Pair Status = N/A  
Link Status = Up  
Link Speed = Auto_100  
Link Duplex = Auto_Full  
Total Packets Received = 3  
Total Bytes Received = 900  
Total Multicast Packets Received = 3  
Total Broadcast Packets Received = 0  
Total Jumbo Packets Received = 0  
Total Undersize Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 0  
Total Bytes Transmitted = 0  
Total Multicast Packets Transmitted = 0  
Total Broadcast Packets Transmitted = 0  
Total Jumbo Packets Transmitted = 0  
Total Undersize Packets Transmitted = 0  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0 ...  
For More Information  
For the procedure for installing the sensor properly, refer to your sensor chapter in Cisco Intrusion  
Cleaning Up a Corrupted SensorApp Configuration  
If the SensorApp configuration has become corrupted and the SensorApp cannot run, you must delete it  
entirely and restart the SensorApp.  
To delete the SensorApp configuration, follow these steps:  
Step 1  
Step 2  
Step 3  
Log in to the service account.  
Su to root.  
Stop the IPS applications.  
/etc/init.d/cids stop  
Step 4  
Step 5  
Replace the virtual sensor file.  
cp /usr/cids/idsRoot/etc/defVirtualSensorConfig.xml  
/usr/cids/idsRoot/etc/VS-Config/virtualSensor.xml  
Remove the cache files.  
rm /usr/cids/idsRoot/var/virtualSensor/*.pmz  
Step 6  
Step 7  
Exit the service account.  
Log in to the sensor CLI.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 8  
Step 9  
Start the IPS services.  
sensor# cids start  
Log in to an account with administrator privileges.  
Step 10 Reboot the sensor.  
sensor# reset  
Warning: Executing this command will stop all applications and reboot the node.  
Continue with reset? [yes]:yes  
Request Succeeded.  
sensor#  
For More Information  
To learn more about IPS system architecture, see Appendix A, “System Architecture.”  
Blocking  
This section provides troubleshooting help for blocking and the ARC service. It contains the following  
topics.  
Troubleshooting Blocking  
After you have configured the ARC, you can verify if it is running properly by using the show version  
command. To verify that the ARC is connecting to the network devices, use the show statistics  
network-access command.  
Note  
The ARC was formerly known as Network Access Controller. Although the name has been changed  
since IPS 5.1, it still appears in IDM, IME, and the CLI as Network Access Controller, nac, and  
network-access.  
To troubleshoot the ARC, follow these steps:  
1. Verify that the ARC is running.  
2. Verify that the ARC is connecting to the network devices.  
3. Verify that the Event Action is set to Block Host for specific signatures.  
4. Verify that the master blocking sensor is properly configured.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the Appliance  
For More Information  
For the procedure to verify that the ARC is running, see Verifying the ARC is Running, page C-36.  
For the procedure to verify that the ARC is connecting, see Verifying ARC Connections are Active,  
For the procedure to verify that the Event Action is set to Block Host, see Blocking Not Occurring  
For the procedure to verify that the master blocking sensor is properly configured, see Verifying the  
For a discussion of ARC architecture, see Attack Response Controller, page A-12.  
Verifying the ARC is Running  
To verify that the ARC is running, use the show version command. If the MainApp is not running, the  
ARC cannot run. The ARC is part of the MainApp.  
To verify that the ARC is running, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Verify that the MainApp is running.  
sensor# show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Realm Keys  
Signature Definition:  
Signature Update  
OS Version:  
key1.0  
S697.0  
2.6.29.1  
IPS4360  
2013-02-15  
Platform:  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24%  
usage)  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96%  
usage)  
MainApp  
Running  
AnalysisEngine  
Running  
CollaborationApp  
Running  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
CLI  
Upgrade History:  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Recovery Partition Version 1.1 - 7.2(1)E4  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
sensor#  
Step 3  
If the MainApp displays Not Running, the ARC has failed. Contact TAC.  
For More Information  
To learn more about IPS system architecture, see Appendix A, “System Architecture.”  
Verifying ARC Connections are Active  
If the State is not Activein the ARC statistics, there is a problem.  
To verify that the State is Active in the statistics, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Verify that the ARC is connecting. Check the State section of the output to verify that all devices are  
connecting.  
sensor# show statistics network-access  
Current Configuration  
LogAllBlockEventsAndSensors = true  
EnableNvramWrite = false  
EnableAclLogging = false  
AllowSensorBlock = false  
BlockMaxEntries = 250  
MaxDeviceInterfaces = 250  
NetDevice  
Type = Cisco  
IP = 10.89.147.54  
NATAddr = 0.0.0.0  
Communications = telnet  
BlockInterface  
InterfaceName = fa0/0  
InterfaceDirection = in  
State  
BlockEnable = true  
NetDevice  
IP = 10.89.147.54  
AclSupport = uses Named ACLs  
Version = 12.2  
State = Active  
sensor#  
Step 3  
Step 4  
If the ARC is not connecting, look for recurring errors.  
sensor# show events error hh:mm:ss month day year | include : nac  
Example  
sensor# show events error 00:00:00 Apr 01 2011 | include : nac  
Make sure you have the latest software updates.  
sensor# show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Realm Keys  
key1.0  
Signature Definition:  
Signature Update  
OS Version:  
S697.0  
2.6.29.1  
IPS4360  
2013-02-15  
Platform:  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24%  
usage)  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96%  
usage)  
MainApp  
Running  
AnalysisEngine  
Running  
CollaborationApp  
Running  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
CLI  
Upgrade History:  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Recovery Partition Version 1.1 - 7.2(1)E4  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
sensor#  
Note  
If you do not have the latest software updates, download them from Cisco.com. Read the  
Readme that accompanies the software upgrade for any known DDTS for the ARC.  
Step 5  
Make sure the configuration settings for each device are correct (the username, password, and IP  
address).  
Step 6  
Step 7  
Make sure the interface and directions for each network device are correct.  
If the network device is using SSH-3DES, make sure that you have enabled SSH connections to the  
device.  
Step 8  
Verify that each interface and direction on each controlled device is correct.  
For More Information  
For the procedure for obtaining the latest Cisco IPS software, see Obtaining Cisco IPS Software,  
For more information about configuring devices, see Device Access Issues, page C-39.  
For the procedure for verifying the interfaces and directions for each network device, see Verifying  
For the procedure for enabling SSH, see Enabling SSH Connections to the Network Device,  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Device Access Issues  
The ARC may not be able to access the devices it is managing. Make sure the you have the correct IP  
address and username and password for the managed devices and the correct interface and direction  
configured.  
Note  
SSH devices must support SSH 1.5. The sensor does not support SSH 2.0.  
To troubleshoot device access issues, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Verify the IP address for the managed devices.  
sensor# configure terminal  
sensor (config)# service network-access  
sensor(config-net)# show settings  
general  
-----------------------------------------------  
log-all-block-events-and-errors: true <defaulted>  
enable-nvram-write: false <defaulted>  
enable-acl-logging: false <defaulted>  
allow-sensor-block: false <defaulted>  
block-enable: true <defaulted>  
block-max-entries: 250 <defaulted>  
max-interfaces: 250 <defaulted>  
master-blocking-sensors (min: 0, max: 100, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
never-block-networks (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
block-hosts (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
block-networks (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
user-profiles (min: 0, max: 250, current: 1)  
-----------------------------------------------  
profile-name: r7200  
-----------------------------------------------  
enable-password: <hidden>  
password: <hidden>  
username: netrangr default:  
-----------------------------------------------  
-----------------------------------------------  
cat6k-devices (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
router-devices (min: 0, max: 250, current: 1)  
-----------------------------------------------  
ip-address: 10.89.147.54  
-----------------------------------------------  
communication: telnet default: ssh-3des  
nat-address: 0.0.0.0 <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
profile-name: r7200  
block-interfaces (min: 0, max: 100, current: 1)  
-----------------------------------------------  
interface-name: fa0/0  
direction: in  
-----------------------------------------------  
pre-acl-name: <defaulted>  
post-acl-name: <defaulted>  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
firewall-devices (min: 0, max: 250, current: 0)  
-----------------------------------------------  
-----------------------------------------------  
sensor(config-net)#  
Step 3  
Manually connect to the device to make sure you have used the correct username, password, and enable  
password, and to ensure that the device is reachable from the sensor:  
a. Log in to the service account.  
b. Telnet or SSH to the network device to verify the configuration.  
c. Make sure you can reach the device.  
d. Verify the username and password.  
Step 4  
Verify that each interface and direction on each network device is correct.  
For More Information  
For the procedure for verifying the interfaces and directions for each network device, see Verifying the  
Verifying the Interfaces and Directions on the Network Device  
To verify that each interface and direction on each controlled device is correct, you can send a manual  
block to a bogus host and then check to see if deny entries exist for the blocked addresses in the ACL of  
the router.  
Note  
To perform a manual block using IDM, choose Configuration > Sensor Management > Time-Based  
Actions > Host Blocks. To perform a manual block using IME, choose Configuration >  
sensor_name > Sensor Management > Time-Based Actions > Host Blocks.  
To initiate a manual block to a bogus host, follow these steps:  
Enter ARC general submode.  
Step 1  
Step 2  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)# general  
Start the manual block of the bogus host IP address.  
sensor(config-net-gen)# block-hosts 10.16.0.0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 3  
Exit general submode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:? [yes]:  
Step 4  
Step 5  
Press Enter to apply the changes or type no to discard them.  
Telnet to the router and verify that a deny entry for the blocked address exists in the router ACL. Refer  
to the router documentation for the procedure.  
Step 6  
Remove the manual block by repeating Steps 1 through 4 except in Step 2 place no in front of the  
command.  
sensor(config-net-gen)# no block-hosts 10.16.0.0  
Enabling SSH Connections to the Network Device  
If you are using SSH-3DES as the communication protocol for the network device, you must make sure  
you have enabled it on the device.  
To enable SSH-3DES connections to the network device, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Enter configuration mode.  
sensor# configure terminal  
Step 3  
Step 4  
Enable SSH-3DES.  
sensor(config)# ssh-3des host blocking_device_ip_address  
Type yes when prompted to accept the device.  
Blocking Not Occurring for a Signature  
If blocking is not occurring for a specific signature, check that the event action is set to block the host.  
To make sure blocking is occurring for a specific signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Enter signature definition submode.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
sensor(config-sig)#  
Step 3  
Make sure the event action is set to block the host.  
Note  
If you want to receive alerts, you must always add produce-alert any time you configure the  
event actions.  
sensor(config-sig)# signatures 1300 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Troubleshooting the Appliance  
sensor(config-sig-sig)# engine normalizer  
sensor(config-sig-sig-nor)# event-action produce-alert|request-block-host  
sensor(config-sig-sig-nor)# show settings  
normalizer  
-----------------------------------------------  
event-action: produce-alert|request-block-host default: produce-alert|deny  
-connection-inline  
edit-default-sigs-only  
-----------------------------------------------  
default-signatures-only  
-----------------------------------------------  
specify-service-ports  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
specify-tcp-max-mss  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
specify-tcp-min-mss  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
--MORE--  
Step 4  
Step 5  
Exit signature definition submode.  
sensor(config-sig-sig-nor)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or type no to discard them.  
Verifying the Master Blocking Sensor Configuration  
To verify that a master blocking sensor is set up properly or to troubleshoot a master blocking sensor  
that is not set up properly, you can use the show statistics network-access command. Make sure that  
the forwarding sensor is set up as TLS trusted host if the remote master blocking sensor is using TLS for  
web access.  
To verify a master blocking sensor configuration, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
View the ARC statistics and verify that the master blocking sensor entries are in the statistics.  
sensor# show statistics network-access  
Current Configuration  
AllowSensorShun = false  
ShunMaxEntries = 250  
MasterBlockingSensor  
SensorIp = 10.89.149.46  
SensorPort = 443  
UseTls = 1  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the Appliance  
State  
ShunEnable = true  
ShunnedAddr  
Host  
IP = 122.122.122.44  
ShunMinutes = 60  
MinutesRemaining = 59  
Step 3  
Step 4  
If the master blocking sensor does not show up in the statistics, you need to add it.  
Initiate a manual block to a bogus host IP address to make sure the master blocking sensor is initiating  
blocks.  
sensor# configure terminal  
sensor(config)# service network-access  
sensor(config-net)# general  
sensor(config-net-gen)# block-hosts 10.16.0.0  
Step 5  
Exit network access general submode.  
sensor(config-net-gen)# exit  
sensor(config-net)# exit  
Apply Changes:? [yes]:  
Step 6  
Step 7  
Press Enter to apply the changes or type no to discard them.  
Verify that the block shows up in the ARC statistics.  
sensor# show statistics network-access  
Current Configuration  
AllowSensorShun = false  
ShunMaxEntries = 100  
State  
ShunEnable = true  
ShunnedAddr  
Host  
IP = 10.16.0.0  
ShunMinutes =  
Step 8  
Log in to the CLI of the master blocking sensor host, and using the show statistics network-access  
command, verify that the block also shows up in the master blocking sensor ARC statistics.  
sensor# show statistics network-access  
Current Configuration  
AllowSensorShun = false  
ShunMaxEntries = 250  
MasterBlockingSensor  
SensorIp = 10.89.149.46  
SensorPort = 443  
UseTls = 1  
State  
ShunEnable = true  
ShunnedAddr  
Host  
IP = 10.16.0.0  
ShunMinutes = 60  
MinutesRemaining = 59  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 9  
If the remote master blocking sensor is using TLS for web access, make sure the forwarding sensor is  
configured as a TLS host.  
sensor# configure terminal  
sensor(config)# tls trust ip master_blocking_sensor_ip_address  
For More Information  
For the procedure to configure the sensor to be a master blocking sensor, see Configuring the Sensor to  
Logging  
TAC may suggest that you turn on debug logging for troubleshooting purposes. Logger controls what  
log messages are generated by each application by controlling the logging severity for different logging  
zones. By default, debug logging is not turned on. If you enable individual zone control, each zone uses  
the level of logging that it is configured for. Otherwise, the same logging level is used for all zones. This  
section contains the following topics:  
Enabling Debug Logging  
Caution  
Enabling debug logging seriously affects performance and should only be done when instructed by TAC.  
To enable debug logging, follow these steps:  
Step 1  
Step 2  
Log in to the service account.  
Edit the log.conf file to increase the size of the log to accommodate the additional log statements.  
vi /usr/cids/idsRoot/etc/log.conf  
Step 3  
Step 4  
Change fileMaxSizeInK=500 to fileMaxSizeInK=5000.  
Locate the zone and CID section of the file and set the severity to debug.  
severity=debug  
Step 5  
Step 6  
Step 7  
Save the file, exit the vi editor, and exit the service account.  
Log in to the CLI as administrator.  
Enter master control submode.  
sensor# configure terminal  
sensor(config)# service logger  
sensor(config-log)# master-control  
Step 8  
Enable debug logging for all zones.  
sensor(config-log-mas)# enable-debug true  
sensor(config-log-mas)# show settings  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix C Troubleshooting  
Troubleshooting the Appliance  
master-control  
-----------------------------------------------  
enable-debug: true default: false  
individual-zone-control: false <defaulted>  
-----------------------------------------------  
sensor(config-log-mas)#  
Step 9  
Turn on individual zone control.  
sensor(config-log-mas)# individual-zone-control true  
sensor(config-log-mas)# show settings  
master-control  
-----------------------------------------------  
enable-debug: true default: false  
individual-zone-control: true default: false  
-----------------------------------------------  
sensor(config-log-mas)#  
Step 10 Exit master zone control.  
sensor(config-log-mas)# exit  
Step 11 View the zone names.  
sensor(config-log)# show settings  
master-control  
-----------------------------------------------  
enable-debug: false <defaulted>  
individual-zone-control: true default: false  
-----------------------------------------------  
zone-control (min: 0, max: 999999999, current: 14)  
-----------------------------------------------  
<protected entry>  
zone-name: AuthenticationApp  
severity: warning <defaulted>  
<protected entry>  
zone-name: Cid  
severity: debug <defaulted>  
<protected entry>  
zone-name: Cli  
severity: warning <defaulted>  
<protected entry>  
zone-name: IdapiCtlTrans  
severity: warning <defaulted>  
<protected entry>  
zone-name: IdsEventStore  
severity: warning <defaulted>  
<protected entry>  
zone-name: MpInstaller  
severity: warning <defaulted>  
<protected entry>  
zone-name: cmgr  
severity: warning <defaulted>  
<protected entry>  
zone-name: cplane  
severity: warning <defaulted>  
<protected entry>  
zone-name: csi  
severity: warning <defaulted>  
<protected entry>  
zone-name: ctlTransSource  
severity: warning <defaulted>  
<protected entry>  
zone-name: intfc  
severity: warning <defaulted>  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the Appliance  
<protected entry>  
zone-name: nac  
severity: warning <defaulted>  
<protected entry>  
zone-name: sensorApp  
severity: warning <defaulted>  
<protected entry>  
zone-name: tls  
severity: warning <defaulted>  
-----------------------------------------------  
sensor(config-log)#  
Step 12 Change the severity level (debug, timing, warning, or error) for a particular zone.  
sensor(config-log)# zone-control IdsEventStore severity error  
sensor(config-log)# show settings  
master-control  
-----------------------------------------------  
enable-debug: true default: false  
individual-zone-control: true default: false  
-----------------------------------------------  
zone-control (min: 0, max: 999999999, current: 14)  
-----------------------------------------------  
<protected entry>  
zone-name: AuthenticationApp  
severity: warning <defaulted>  
<protected entry>  
zone-name: Cid  
severity: debug <defaulted>  
<protected entry>  
zone-name: Cli  
severity: warning <defaulted>  
<protected entry>  
zone-name: IdapiCtlTrans  
severity: warning <defaulted>  
<protected entry>  
zone-name: IdsEventStore  
severity: error default: warning  
<protected entry>  
zone-name: MpInstaller  
severity: warning <defaulted>  
<protected entry>  
zone-name: cmgr  
severity: warning <defaulted>  
<protected entry>  
zone-name: cplane  
severity: warning <defaulted>  
<protected entry>  
zone-name: csi  
severity: warning <defaulted>  
<protected entry>  
zone-name: ctlTransSource  
severity: warning <defaulted>  
<protected entry>  
zone-name: intfc  
severity: warning <defaulted>  
<protected entry>  
zone-name: nac  
severity: warning <defaulted>  
<protected entry>  
zone-name: sensorApp  
severity: warning <defaulted>  
<protected entry>  
zone-name: tls  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the Appliance  
severity: warning <defaulted>  
-----------------------------------------------  
sensor(config-log)#  
Step 13 Turn on debugging for a particular zone.  
sensor(config-log)# zone-control nac severity debug  
sensor(config-log)# show settings  
master-control  
-----------------------------------------------  
enable-debug: true default: false  
individual-zone-control: true default: false  
-----------------------------------------------  
zone-control (min: 0, max: 999999999, current: 14)  
-----------------------------------------------  
<protected entry>  
zone-name: AuthenticationApp  
severity: warning <defaulted>  
<protected entry>  
zone-name: Cid  
severity: debug <defaulted>  
<protected entry>  
zone-name: Cli  
severity: warning <defaulted>  
<protected entry>  
zone-name: IdapiCtlTrans  
severity: warning <defaulted>  
<protected entry>  
zone-name: IdsEventStore  
severity: error default: warning  
<protected entry>  
zone-name: MpInstaller  
severity: warning <defaulted>  
<protected entry>  
zone-name: cmgr  
severity: warning <defaulted>  
<protected entry>  
zone-name: cplane  
severity: warning <defaulted>  
<protected entry>  
zone-name: csi  
severity: warning <defaulted>  
<protected entry>  
zone-name: ctlTransSource  
severity: warning <defaulted>  
<protected entry>  
zone-name: intfc  
severity: warning <defaulted>  
<protected entry>  
zone-name: nac  
severity: debug default: warning  
<protected entry>  
zone-name: sensorApp  
severity: warning <defaulted>  
<protected entry>  
zone-name: tls  
severity: warning <defaulted>  
-----------------------------------------------  
sensor(config-log)#  
Step 14 Exit the logger submode.  
sensor(config-log)# exit  
Apply Changes:?[yes]:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 15 Press Enter to apply changes or type no to discard them:  
For More Information  
For a list of what each zone name refers to, see Zone Names, page C-48.  
Zone Names  
Table C-2 lists the debug logger zone names:  
Table C-2  
Debug Logger Zone Names  
Zone Name  
Description  
AD  
Anomaly Detection zone  
AuthenticationApp  
Authentication zone  
Cid  
General logging zone  
CLI zone  
Cli  
IdapiCtlTrans  
IdsEventStore  
MpInstaller  
cmgr  
All control transactions zone  
Event Store zone  
IDSM-2 master partition installer zone  
Card Manager service zone1  
Control Plane zone2  
CIDS Servlet Interface3  
Outbound control transactions zone  
Interface zone  
cplane  
csi  
ctlTransSource  
intfc  
nac  
ARC zone  
rep  
Reputation zone  
sched  
Automatic update scheduler zone  
AnalysisEngine zone  
SSL and TLS zone  
sensorApp  
tls  
1. The Card Manager service is used on the AIP SSM to exchange control and state  
information between modules in the chassis.  
2. The Control Plane is the transport communications layer used by Card Manager on the  
AIP SSM.  
3. The CIDS servlet interface is the interface layer between the CIDS web server and the  
servlets.  
For More Information  
To learn more about the IPS Logger service, see Logger, page A-19.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Directing cidLog Messages to SysLog  
It might be useful to direct cidLog messages to syslog.  
To direct cidLog messages to syslog, follow these steps:  
Step 1  
Step 2  
Go to the idsRoot/etc/log.conf file.  
Make the following changes:  
a. Set [logApp] enabled=false  
Comment out the enabled=true because enabled=false is the default.  
b. Set [drain/main] type=syslog  
The following example shows the logging configuration file:  
timemode=local  
;timemode=utc  
[logApp]  
;enabled=true  
;-------- FIFO parameters --------  
fifoName=logAppFifo  
fifoSizeInK=240  
;-------- logApp zone and drain parameters --------  
zoneAndDrainName=logApp  
fileName=main.log  
fileMaxSizeInK=500  
[zone/Cid]  
severity=warning  
drain=main  
[zone/IdsEventStore]  
severity=debug  
drain=main  
[drain/main]  
type=syslog  
The syslog output is sent to the syslog facility local6 with the following correspondence to syslog  
message priorities:  
LOG_DEBUG,  
LOG_INFO,  
LOG_WARNING,  
LOG_ERR,  
//  
debug  
//  
warning  
timing  
//  
//  
//  
error  
fatal  
LOG_CRIT  
Note  
Make sure that your /etc/syslog.conf has that facility enabled at the proper priority.  
Caution  
The syslog is much slower than logApp (about 50 messages per second as opposed to 1000 or so). We  
recommend that you enable debug severity on one zone at a time.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the Appliance  
TCP Reset Not Occurring for a Signature  
Note  
There is only one sensing interface on the ASA IPS modules (ASA 5500-X IPS SSP and  
ASA 5585-X IPS SSP), so you cannot designate an alternate TCP reset interface.  
If you do not have the event action set to reset, the TCP reset does not occur for a specific signature.  
Note  
TCP Resets are not supported over MPLS links or the following tunnels: GRE, IPv4 in IPv4, IPv6 in  
IPv4, or IPv4 in IPv6.  
To troubleshoot a reset not occurring for a specific signature, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Make sure the event action is set to TCP reset.  
sensor# configure terminal  
sensor(config)# service signature-definition sig0  
sensor(config-sig)# signatures 1000 0  
sensor(config-sig-sig)# engine atomic-ip  
sensor(config-sig-sig-ato)# event-action reset-tcp-connection|produc-alert  
sensor(config-sig-sig-ato)# show settings  
atomic-ip  
-----------------------------------------------  
event-action: produce-alert|reset-tcp-connection default: produce-alert  
fragment-status: any <defaulted>  
specify-l4-protocol  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
specify-ip-payload-length  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
specify-ip-header-length  
-----------------------------------------------  
no  
-----------------------------------------------  
-----------------------------------------------  
-----------------------------------------------  
specify-ip-tos  
-----------------------------------------------  
--MORE--  
Step 3  
Step 4  
Exit signature definition submode.  
sensor(config-sig-sig-ato)# exit  
sensor(config-sig-sig)# exit  
sensor(config-sig)# exit  
Apply Changes:?[yes]:  
Press Enter to apply the changes or type no to discard them.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Step 5  
Make sure the correct alarms are being generated.  
sensor# show events alert  
evAlert: eventId=1047575239898467370 severity=medium  
originator:  
hostId: sj_4250_40  
appName: sensorApp  
appInstanceId: 1004  
signature: sigId=20000 sigName=STRING.TCP subSigId=0 version=Unknown  
addr: locality=OUT 172.16.171.19  
port: 32771  
victim:  
addr: locality=OUT 172.16.171.13 port: 23  
actions:  
tcpResetSent: true  
Step 6  
Step 7  
Make sure the switch is allowing incoming TCP reset packet from the sensor. Refer to your switch  
documentation for more information.  
Make sure the resets are being sent.  
root# ./tcpdump -i eth0 src host 172.16.171.19  
tcpdump: WARNING: eth0: no IPv4 address assigned  
tcpdump: listening on eth0  
13:58:03.823929 172.16.171.19.32770 > 172.16.171.13.telnet: R 79:79(0) ack 62 win 0  
13:58:03.823930 172.16.171.19.32770 > 172.16.171.13.telnet: R 80:80(0) ack 62 win 0  
13:58:03.823930 172.16.171.19.32770 > 172.16.171.13.telnet: R 80:80(0) ack 62 win 0  
13:58:03.823930 172.16.171.19.32770 > 172.16.171.13.telnet: R 80:80(0) ack 62 win 0  
Software Upgrades  
This section helps in troubleshooting software upgrades. It contains the following topics:  
Upgrading Error  
When you upgrade an IPS sensor, you may receive an error that the Analysis Engine is not running:  
sensor# upgrade scp://[email protected]/upgrades/IPS-K9-7.2-1-E4.pkg  
Password: ********  
Warning: Executing this command will apply a major version upgrade to the application  
partition. The system may be rebooted to complete the upgrade.  
Continue with upgrade?: yes  
Error: AnalysisEngine is not running. Please reset box and attempt upgrade again.  
If you receive this error, you must get the Analysis Engine running before trying to upgrade again. This  
error is often caused by a defect in the currently running version. Try rebooting the sensor, and after  
reboot, run the setup command and remove the interfaces from the virtual sensor vs0. When it is not  
monitoring traffic, Analysis Engine usually stays up and running. You can upgrade at this time. After the  
upgrade, add the interfaces back to the virtual sensor vs0 using the setup command.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Or you can use the system image file to reimage the sensor directly to the version you want. You can  
reimage a sensor and avoid the error because the reimage process does not check to see if the Analysis  
Engine is running.  
Caution  
Reimaging using the system image file restores all configuration defaults.  
For More Information  
For more information on running the setup command, see Chapter 2, “Initializing the Sensor.”  
For more information on reimaging your sensor, see Chapter 21, “Upgrading, Downgrading, and  
Which Updates to Apply and Their Prerequisites  
You must have the correct service pack and minor and major version of the software. If you are having  
trouble with applying new software, make sure that you are applying the proper updates with the proper  
prerequisites:  
Signature updates require the minimum version and engine version listed in the filename.  
Engine updates require the major or minor version in the engine update filename. Service packs  
require the correct minor version.  
Minor versions require the correct major version.  
Major versions require the previous major version.  
For More Information  
To understand how to interpret the IPS software filenames, see IPS Software Versioning, page 20-2.  
Issues With Automatic Update  
The following list provides suggestions for troubleshooting automatic updates:  
Run TCPDUMP:  
Create a service account. Su to root and run TCPDUMP on the command and control interface  
to capture packets between the sensor and the FTP server.  
Use the upgrade command to manually upgrade the sensor.  
Look at the TCPDUMP output for errors coming back from the FTP server.  
Make sure the sensor is in the correct directory. The directory must be specified correctly. This has  
caused issues with Windows FTP servers. Sometimes an extra “/” or even two “/” are needed in front  
of the directory name. To verify this, use the same FTP commands you see in the TCPDUMP output  
through your own FTP connection.  
You must use the Windows FTP server setup option to emulate UNIX file structure and not MS-DOS  
file structure.  
If you are using SCP, make sure you have added the SSH host key to the known hosts list.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix C Troubleshooting  
Troubleshooting the Appliance  
Try the manual upgrade command before attempting the automatic update. If it works with the upgrade  
command and does not work with the automatic update, try the following:  
Determine which IPS software version your sensor has.  
Make sure the passwords are configured for automatic update. Make sure they match the same  
passwords used for manual update.  
Make sure that the filenames in the FTP server are exactly what you see on Downloads on  
Cisco.com. This includes capitalization. Some Windows FTP servers allow access to the file with  
the incorrect capitalization but the sensor ultimately rejects the file because the name has changed.  
If necessary, run TCPDUMP on automatic update. You can compare the successful manual update  
with the unsuccessful automatic update and troubleshoot from there.  
For More Information  
For the procedure for creating the service account, see Creating the Service Account, page 3-28.  
For the procedure for reimaging your sensor, see Chapter 21, “Upgrading, Downgrading, and  
For the procedure for adding hosts to the SSH known hosts list, see Adding Hosts to the SSH Known  
For the procedure for determining the software version, see Displaying Version Information,  
Updating a Sensor with the Update Stored on the Sensor  
You can store the update package in the /var directory on the sensor and update the sensor from there if  
you need to.  
To update the sensor with an update stored on the sensor, follow these steps:  
Step 1  
Step 2  
Step 3  
Step 4  
Log in to the service account.  
Obtain the update package file from Cisco.com.  
FTP or SCP the update file to the sensor /usr/cids/idsRoot/var directory.  
Set the file permissions:.  
chmod 644 ips_package_file_name  
Step 5  
Step 6  
Step 7  
Exit the service account.  
Log in to the sensor using an account with administrator privileges.  
Store the sensor host key.  
sensor# configure terminal  
sensor(config)# service ssh  
sensor(config-ssh)# rsa1-keys sensor_ip_address  
Step 8  
Upgrade the sensor.  
sensor(config)# upgrade scp://service@sensor_ip_address/upgrade/ips_package_file_name  
Enter password: *****  
Re-enter password: *****  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the IDM  
For More Information  
For the procedure for obtaining Cisco IPS software, see Obtaining Cisco IPS Software, page 20-1.  
Troubleshooting the IDM  
Note  
These procedures also apply to the IPS section of the ASDM.  
Note  
After you upgrade any IPS software on your sensor, you must restart the IDM to see the latest software  
features.  
This section contains troubleshooting procedures for the IDM. It contains the following topics:  
Cannot Launch the IDM - Loading Java Applet Failed  
Symptom The browser displays Loading Cisco IDM. Please wait ... At the bottom left corner of the  
window, Loading Java Applet Failed is displayed.  
Possible Cause This condition can occur if multiple Java Plug-ins are installed on the machine on  
which you are launching the IDM.  
Recommended Action Clear the Java cache and remove temp files and clear history in the browser you  
are using. The result is that neither of these plug-ins will be used by default and each applet should  
use the correct plug-in.  
To clear the cache, follow these steps:  
Step 1  
Step 2  
Close all browser windows.  
If you have Java Plug-in 1.3.x installed:  
a. Click Start > Settings > Control Panel > Java Plug-in 1.3.x.  
b. Click the Advanced tab.  
c. Under Java Runtime Environment, select JRE 1.3.x from the drop-down menu.  
d. Click the Cache tab.  
e. Click Clear.  
Step 3  
If you have Java Plug-in 1.4.x installed:  
a. Click Start > Settings > Control Panel > Java Plug-in 1.4.x.  
b. Click the Advanced tab.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the IDM  
c. Under Java Runtime Environment, select JRE 1.3.x from the drop-down menu.  
d. Click the Cache tab.  
e. Click the Browser tab.  
f. Deselect all browser check boxes.  
g. Click Clear Cache.  
Step 4  
Delete the temp files and clear the history in the browser.  
Cannot Launch the IDM-The Analysis Engine Busy  
Error Message Error connecting to sensor. Failed to load  
sensor-errNotAvailable-Analysis Engine is busy. Exiting IDM.  
Possible Cause This condition can occur if the Analysis Engine in the sensor is busy getting ready  
to perform a task and so does not respond to the IDM.  
Recommended Action Wait for a while and try again to connect.  
The IDM, Remote Manager, or Sensing Interfaces Cannot Access Sensor  
If the IDM, a remote manager, or sensing interfaces cannot access the sensor, but you can access the  
sensor CLI using SSH or Telnet (if enabled), follow these steps:  
Step 1  
Make sure the network configuration allows access to the web server port that is configured on the  
sensor:  
sensor# setup  
--- System Configuration Dialog ---  
At any point you may enter a question mark '?' for help.  
User ctrl-c to abort configuration dialog at any prompt.  
Default settings are in square brackets '[]'.  
Current Configuration:  
service host  
network-settings  
host-ip 192.168.1.2/24,192.168.1.1  
host-name sensor  
telnet-option enabled  
access-list 0.0.0.0/0  
ftp-timeout 300  
no login-banner-text  
exit  
time-zone-settings  
offset 0  
standard-time-zone-name UTC  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix C Troubleshooting  
Troubleshooting the IME  
exit  
summertime-option disabled  
ntp-option disabled  
exit  
service web-server  
port 443  
exit  
Step 2  
If network devices, such as routers, switches, or firewalls, are between the sensor and the workstation,  
make sure these devices are configured to allow the workstation to access the sensor web server port. All  
remote management communication is performed by the sensor web server.  
For More Information  
For the procedure for enabling and disabling Telnet on the sensor, see Enabling and Disabling  
For the procedure for configuring the web server, see Changing Web Server Settings, page 3-15.  
Signatures Not Producing Alerts  
Caution  
You cannot add other actions each time you configure the event actions. You are actually replacing the  
list of event actions every time you configure it, so make sure you choose Produce Alert every time you  
configure event actions.  
If you are not seeing any alerts when signatures are firing, make sure that you have configured Produce  
Alert as an event action. For example, if you choose Produce Alert, but later add another event action  
and do not add Produce Alert to the new configuration, alerts are not sent to the Event Store. To make  
sure you are getting alerts, check the statistics for the virtual sensor and the Event Store.  
For More Information  
For more information about event actions, see Event Actions, page 8-4.  
For the procedure for configuring event actions, see Assigning Actions to Signatures, page 7-15.  
For the procedure for obtaining statistics about the virtual sensor and Event Store, see Displaying  
Troubleshooting the IME  
This section describes troubleshooting tools for the IME, and contains the following sections:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Time Synchronization on IME and the Sensor  
Symptom The IME displays No Data Available on the Events dashboard. A historical query does not  
return any events; however, events are coming in to the IME and they appear in the real-time event  
viewer.  
Possible Cause The time is not synchronized between the sensor and the IME local server. The IME  
dashboards use a time relative to the IME local time. If these times are not synchronized, the query  
does not return any results. When you add a sensor to the IME, it checks for the time synchronization  
and warns you to correct it if is in wrong. The IME also displays a clock warning in Home >  
Devices > Device List to warn you about problems with synchronization.  
Recommended Action Change the time settings on the sensor or the IME local server. In most cases,  
the time change is required for the sensor because it is configured with the incorrect or default time.  
For More Information  
For more information on time and the sensor, see Time Sources and the Sensor, page C-15.  
For the procedure for changing the time on the sensor, see Correcting Time on the Sensor,  
Not Supported Error Message  
Symptom The IME displays Not Supported in the device list table and in some gadgets, and no data is  
included.  
Possible Cause Click Details to see an explanation for this message. The IME needs IPS 6.1 or later  
to obtain certain information. The IME still operates with event monitoring and reporting for IPS 5.0  
and later and specific IOS IPS versions, but some functions, such as health information and  
integrated configuration, are not available.  
Recommended Action Upgrade to IPS 6.1 or later.  
Troubleshooting the ASA 5500-X IPS SSP  
Note  
Before troubleshooting the ASA 5500-X IPS SSP, check the Caveats section of the Readme for the  
software version installed on your sensor to see if you are dealing with a known issue.  
This section contains troubleshooting information specific to the ASA 5500-X IPS SSP, and contains the  
following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Health and Status Information  
To see the general health of the ASA 5500-X IPS SSP, use the show module ips details command.  
asa# show module ips details  
Getting details from the Service Module, please wait...  
Card Type:  
IPS 5555 Intrusion Prevention System  
Model:  
IPS5555  
N/A  
FCH1504V0CW  
N/A  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 503d.e59c.7ca0 to 503d.e59c.7ca0  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data Plane Status: Up  
Status:  
Up  
License:  
Mgmt IP addr:  
IPS Module Enabled perpetual  
192.168.1.2  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt web ports:  
Mgmt TLS enabled:  
asa#  
192.168.1.1  
443  
true  
The output shows that the ASA 5500-X IPS SSP is up. If the status reads Down, you can reset it using the  
sw-module module 1 reset command.  
If you have problems with reimaging the ASA 5500-X IPS SSP, use the debug module-boot command  
to see the output as it boots. Make sure you have the correct IP address for the TFTP server and you have  
the correct file on the TFTP server. Then use the sw-module module ips recover command again to  
reimage the module.  
asa-ips# sw-module module ips recover configure image  
disk0:/IPS-SSP_5555-K9-sys-1.1-a-7.2-1-E4.aip  
Image URL [tftp://192.0.2.1/IPS-5545-K9-sys-1.1-a-7.2-1-E4.aip]:  
Port IP Address [192.0.2.226]:  
VLAN ID [0]:  
Gateway IP Address [192.0.2.254]:  
asa-ips# debug module-boot  
debug module-boot enabled at level 1  
asa-ips# sw-module module ips reload  
Reload module ips? [confirm]  
Reload issued for module ips.  
asa-ips# Mod-ips 228> ***  
Mod-ips 229> *** EVENT: The module is reloading.  
Mod-ips 230> *** TIME: 08:07:36 CST Jan 17 2012  
Mod-ips 231> ***  
Mod-ips 232> Mod-ips 233> The system is going down NOW!  
Mod-ips 234> Sending SIGTERM to all processes  
Mod-ips 235> Sending SIGKILL to all processes  
Mod-ips 236> Requesting system reboot  
Mod-ips 237> e1000 0000:00:07.0: PCI INT A disabled  
Mod-ips 238> e1000 0000:00:06.0: PCI INT A disabled  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Mod-ips 239> e1000 0000:00:05.0: PCI INT A disabled  
Mod-ips 240> Restarting system.  
Mod-ips 241> machine restart  
Mod-ips 242> IVSHMEM: addr = 4093640704 size = 67108864  
Mod-ips 243>  
Booting 'Cisco IPS'  
Mod-ips 244> root (hd0,0)  
Mod-ips 245> Filesystem type is ext2fs, partition type 0x83  
Mod-ips 246> kernel /ips-2.6.ld ro initfsDev=/dev/hda1 init=loader.run rootrw=/dev/hda2  
init  
Mod-ips 247> fs=runtime-image.cpio.bz2 hda=nodma console=ttyS0 plat=saleen htlblow=1  
hugepag  
Mod-ips 248> es=3223  
Mod-ips 249>  
[Linux-bzImage, setup=0x2c00, size=0x2bad80]  
Mod-ips 250> Linux version 2.6.29.1 (ipsbuild@seti-teambuilder-a) (gcc version 4.3.2  
(crosstool  
Mod-ips 251> -NG-1.4.1) ) #56 SMP Tue Dec 6 00:46:11 CST 2011  
Mod-ips 252> Command line: ro initfsDev=/dev/hda1 init=loader.run rootrw=/dev/hda2  
initfs=runti  
Mod-ips 253> me-image.cpio.bz2 hda=nodma console=ttyS0 plat=saleen htlblow=1  
hugepages=3223  
Mod-ips 254> KERNEL supported cpus:  
Mod-ips 255>  
Mod-ips 256>  
Mod-ips 257>  
Intel GenuineIntel  
AMD AuthenticAMD  
Centaur CentaurHauls  
Mod-ips 258> BIOS-provided physical RAM map:  
Mod-ips 259> BIOS-e820: 0000000000000000 - 000000000009f400 (usable)  
Mod-ips 260> BIOS-e820: 000000000009f400 - 00000000000a0000 (reserved)  
Mod-ips 261> BIOS-e820: 00000000000f0000 - 0000000000100000 (reserved)  
Mod-ips 262> BIOS-e820: 0000000000100000 - 00000000dfffd000 (usable)  
Mod-ips 263> BIOS-e820: 00000000dfffd000 - 00000000e0000000 (reserved)  
Mod-ips 264> BIOS-e820: 00000000fffbc000 - 0000000100000000 (reserved)  
Mod-ips 265> BIOS-e820: 0000000100000000 - 0000000201400000 (usable)  
Mod-ips 266> DMI 2.4 present.  
Mod-ips 267> last_pfn = 0x201400 max_arch_pfn = 0x100000000  
Mod-ips 268> last_pfn = 0xdfffd max_arch_pfn = 0x100000000  
Mod-ips 269> init_memory_mapping: 0000000000000000-00000000dfffd000  
Mod-ips 270> last_map_addr: dfffd000 end: dfffd000  
Mod-ips 271> init_memory_mapping: 0000000100000000-0000000201400000  
Mod-ips 272> last_map_addr: 201400000 end: 201400000  
Mod-ips 273> ACPI: RSDP 000F88D0, 0014 (r0 BOCHS )  
Mod-ips 274> ACPI: RSDT DFFFDD00, 0034 (r1 BOCHS BXPCRSDT  
Mod-ips 275> ACPI: FACP DFFFFD90, 0074 (r1 BOCHS BXPCFACP  
1 BXPC  
1 BXPC  
1)  
1)  
Mod-ips 276> FADT: X_PM1a_EVT_BLK.bit_width (16) does not match PM1_EVT_LEN (4)  
Mod-ips 277> ACPI: DSDT DFFFDF10, 1E22 (r1  
Mod-ips 278> ACPI: FACS DFFFFD40, 0040  
BXPC  
BXDSDT  
1 INTL 20090123)  
Mod-ips 279> ACPI: SSDT DFFFDE90, 0079 (r1 BOCHS BXPCSSDT  
Mod-ips 280> ACPI: APIC DFFFDD80, 0090 (r1 BOCHS BXPCAPIC  
Mod-ips 281> ACPI: HPET DFFFDD40, 0038 (r1 BOCHS BXPCHPET  
Mod-ips 282> No NUMA configuration found  
1 BXPC  
1 BXPC  
1 BXPC  
1)  
1)  
1)  
Mod-ips 283> Faking a node at 0000000000000000-0000000201400000  
Mod-ips 284> Bootmem setup node 0 0000000000000000-0000000201400000  
Mod-ips 285>  
Mod-ips 286>  
NODE_DATA [0000000000011000 - 000000000001ffff]  
bootmap [0000000000020000 - 000000000006027f] pages 41  
Mod-ips 287> (6 early reservations) ==> bootmem [0000000000 - 0201400000]  
Mod-ips 288>  
Mod-ips 289>  
Mod-ips 290>  
Mod-ips 291>  
Mod-ips 292>  
Mod-ips 293>  
#0 [0000000000 - 0000001000]  
#1 [0000006000 - 0000008000]  
#2 [0000200000 - 0000d55754]  
#3 [000009f400 - 0000100000]  
#4 [0000008000 - 000000c000]  
#5 [000000c000 - 0000011000]  
BIOS data page ==> [0000000000 - 0000001000]  
TRAMPOLINE ==> [0000006000 - 0000008000]  
TEXT DATA BSS ==> [0000200000 - 0000d55754]  
BIOS reserved ==> [000009f400 - 0000100000]  
PGTABLE ==> [0000008000 - 000000c000]  
PGTABLE ==> [000000c000 - 0000011000]  
Mod-ips 294> found SMP MP-table at [ffff8800000f8920] 000f8920  
Mod-ips 295> Zone PFN ranges:  
Mod-ips 296>  
Mod-ips 297>  
DMA  
DMA32  
0x00000000 -> 0x00001000  
0x00001000 -> 0x00100000  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Mod-ips 298>  
Normal  
0x00100000 -> 0x00201400  
Mod-ips 299> Movable zone start PFN for each node  
Mod-ips 300> early_node_map[3] active PFN ranges  
Mod-ips 301>  
Mod-ips 302>  
Mod-ips 303>  
0: 0x00000000 -> 0x0000009f  
0: 0x00000100 -> 0x000dfffd  
0: 0x00100000 -> 0x00201400  
Mod-ips 304> ACPI: PM-Timer IO Port: 0xb008  
Mod-ips 305> ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled)  
Mod-ips 306> ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled)  
Mod-ips 307> ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)  
Mod-ips 308> ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled)  
Mod-ips 309> ACPI: LAPIC (acpi_id[0x04] lapic_id[0x04] enabled)  
Mod-ips 310> ACPI: LAPIC (acpi_id[0x05] lapic_id[0x05] enabled)  
Mod-ips 311> ACPI: IOAPIC (id[0x06] address[0xfec00000] gsi_base[0])  
Mod-ips 312> IOAPIC[0]: apic_id 6, version 0, address 0xfec00000, GSI 0-23  
Mod-ips 313> ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)  
Mod-ips 314> ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)  
Mod-ips 315> ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)  
Mod-ips 316> ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)  
Mod-ips 317> Using ACPI (MADT) for SMP configuration information  
Mod-ips 318> ACPI: HPET id: 0x8086a201 base: 0xfed00000  
Mod-ips 319> SMP: Allowing 6 CPUs, 0 hotplug CPUs  
Mod-ips 320> Allocating PCI resources starting at e2000000 (gap: e0000000:1ffbc000)  
Mod-ips 321> NR_CPUS:32 nr_cpumask_bits:32 nr_cpu_ids:6 nr_node_ids:1  
Mod-ips 322> PERCPU: Allocating 49152 bytes of per cpu data  
Mod-ips 323> Built 1 zonelists in Zone order, mobility grouping on. Total pages: 1939347  
Mod-ips 324> Policy zone: Normal  
Mod-ips 325> Kernel command line: ro initfsDev=/dev/hda1 init=loader.run rootrw=/dev/hda2  
initf  
Mod-ips 326> s=runtime-image.cpio.bz2 hda=nodma console=ttyS0 plat=saleen htlblow=1  
hugepages=3  
Mod-ips 327> 223  
Mod-ips 328> hugetlb_lowmem_setup: Allocated 2097152 huge pages (size=0x200000) from  
lowmem are  
Mod-ips 329> a at 0xffff88002ee00000 phys addr 0x000000002ee00000  
Mod-ips 330> Initializing CPU#0  
Mod-ips 331> PID hash table entries: 4096 (order: 12, 32768 bytes)  
Mod-ips 332> Fast TSC calibration using PIT  
Mod-ips 333> Detected 2792.965 MHz processor.  
Mod-ips 334> Console: colour VGA+ 80x25  
Mod-ips 335> console [ttyS0] enabled  
Mod-ips 336> Checking aperture...  
Mod-ips 337> No AGP bridge found  
Mod-ips 338> PCI-DMA: Using software bounce buffering for IO (SWIOTLB)  
Mod-ips 339> Placing 64MB software IO TLB between ffff880020000000 - ffff880024000000  
Mod-ips 340> software IO TLB at phys 0x20000000 - 0x24000000  
Mod-ips 341> Memory: 7693472k/8409088k available (3164k kernel code, 524688k absent,  
190928k re  
Mod-ips 342> served, 1511k data, 1032k init)  
Mod-ips 343> Calibrating delay loop (skipped), value calculated using timer frequency..  
5585.93  
Mod-ips 344> BogoMIPS (lpj=2792965)  
Mod-ips 345> Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes)  
Mod-ips 346> Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes)  
Mod-ips 347> Mount-cache hash table entries: 256  
Mod-ips 348> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 349> CPU: L2 cache: 4096K  
Mod-ips 350> CPU 0/0x0 -> Node 0  
Mod-ips 351> Freeing SMP alternatives: 29k freed  
Mod-ips 352> ACPI: Core revision 20081204  
Mod-ips 353> Setting APIC routing to flat  
Mod-ips 354> ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1  
Mod-ips 355> CPU0: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 356> Booting processor 1 APIC 0x1 ip 0x6000  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Mod-ips 357> Initializing CPU#1  
Mod-ips 358> Calibrating delay using timer specific routine.. 5585.16 BogoMIPS  
(lpj=2792581)  
Mod-ips 359> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 360> CPU: L2 cache: 4096K  
Mod-ips 361> CPU 1/0x1 -> Node 0  
Mod-ips 362> CPU1: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 363> checking TSC synchronization [CPU#0 -> CPU#1]:  
Mod-ips 364> Measured 1453783140569731 cycles TSC warp between CPUs, turning off TSC  
clock.  
Mod-ips 365> Marking TSC unstable due to check_tsc_sync_source failed  
Mod-ips 366> Booting processor 2 APIC 0x2 ip 0x6000  
Mod-ips 367> Initializing CPU#2  
Mod-ips 368> Calibrating delay using timer specific routine.. 5580.51 BogoMIPS  
(lpj=2790259)  
Mod-ips 369> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 370> CPU: L2 cache: 4096K  
Mod-ips 371> CPU 2/0x2 -> Node 0  
Mod-ips 372> CPU2: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 373> Booting processor 3 APIC 0x3 ip 0x6000  
Mod-ips 374> Initializing CPU#3  
Mod-ips 375> Calibrating delay using timer specific routine.. 5585.18 BogoMIPS  
(lpj=2792594)  
Mod-ips 376> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 377> CPU: L2 cache: 4096K  
Mod-ips 378> CPU 3/0x3 -> Node 0  
Mod-ips 379> CPU3: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 380> Booting processor 4 APIC 0x4 ip 0x6000  
Mod-ips 381> Initializing CPU#4  
Mod-ips 382> Calibrating delay using timer specific routine.. 5585.15 BogoMIPS  
(lpj=2792579)  
Mod-ips 383> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 384> CPU: L2 cache: 4096K  
Mod-ips 385> CPU 4/0x4 -> Node 0  
Mod-ips 386> CPU4: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 387> Booting processor 5 APIC 0x5 ip 0x6000  
Mod-ips 388> Initializing CPU#5  
Mod-ips 389> Calibrating delay using timer specific routine.. 5585.21 BogoMIPS  
(lpj=2792609)  
Mod-ips 390> CPU: L1 I cache: 32K, L1 D cache: 32K  
Mod-ips 391> CPU: L2 cache: 4096K  
Mod-ips 392> CPU 5/0x5 -> Node 0  
Mod-ips 393> CPU5: Intel QEMU Virtual CPU version 0.12.5 stepping 03  
Mod-ips 394> Brought up 6 CPUs  
Mod-ips 395> Total of 6 processors activated (33507.17 BogoMIPS).  
Mod-ips 396> net_namespace: 1312 bytes  
Mod-ips 397> Booting paravirtualized kernel on bare hardware  
Mod-ips 398> NET: Registered protocol family 16  
Mod-ips 399> ACPI: bus type pci registered  
Mod-ips 400> dca service started, version 1.8  
Mod-ips 401> PCI: Using configuration type 1 for base access  
Mod-ips 402> mtrr: your CPUs had inconsistent variable MTRR settings  
Mod-ips 403> mtrr: your CPUs had inconsistent MTRRdefType settings  
Mod-ips 404> mtrr: probably your BIOS does not setup all CPUs.  
Mod-ips 405> mtrr: corrected configuration.  
Mod-ips 406> bio: create slab <bio-0> at 0  
Mod-ips 407> ACPI: Interpreter enabled  
Mod-ips 408> ACPI: (supports S0 S5)  
Mod-ips 409> ACPI: Using IOAPIC for interrupt routing  
Mod-ips 410> ACPI: No dock devices found.  
Mod-ips 411> ACPI: PCI Root Bridge [PCI0] (0000:00)  
Mod-ips 412> pci 0000:00:01.3: quirk: region b000-b03f claimed by PIIX4 ACPI  
Mod-ips 413> pci 0000:00:01.3: quirk: region b100-b10f claimed by PIIX4 SMB  
Mod-ips 414> IVSHMEM: addr = 4093640704 size = 67108864  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Mod-ips 415> ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11)  
Mod-ips 416> ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11)  
Mod-ips 417> ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11)  
Mod-ips 418> ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11)  
Mod-ips 419> SCSI subsystem initialized  
Mod-ips 420> usbcore: registered new interface driver usbfs  
Mod-ips 421> usbcore: registered new interface driver hub  
Mod-ips 422> usbcore: registered new device driver usb  
Mod-ips 423> PCI: Using ACPI for IRQ routing  
Mod-ips 424> pnp: PnP ACPI init  
Mod-ips 425> ACPI: bus type pnp registered  
Mod-ips 426> pnp: PnP ACPI: found 9 devices  
Mod-ips 427> ACPI: ACPI bus type pnp unregistered  
Mod-ips 428> NET: Registered protocol family 2  
Mod-ips 429> IP route cache hash table entries: 262144 (order: 9, 2097152 bytes)  
Mod-ips 430> TCP established hash table entries: 524288 (order: 11, 8388608 bytes)  
Mod-ips 431> TCP bind hash table entries: 65536 (order: 8, 1048576 bytes)  
Mod-ips 432> TCP: Hash tables configured (established 524288 bind 65536)  
Mod-ips 433> TCP reno registered  
Mod-ips 434> NET: Registered protocol family 1  
Mod-ips 435> Adding htlb page ffff88002ee00000 phys 000000002ee00000 page ffffe20000a41000  
Mod-ips 436> HugeTLB registered 2 MB page size, pre-allocated 3223 pages  
Mod-ips 437> report_hugepages: Using 1 pages from low memory at ffff88002ee00000 HugeTLB  
FS  
Mod-ips 438> msgmni has been set to 15026  
Mod-ips 439> alg: No test for stdrng (krng)  
Mod-ips 440> io scheduler noop registered  
Mod-ips 441> io scheduler anticipatory registered  
Mod-ips 442> io scheduler deadline registered  
Mod-ips 443> io scheduler cfq registered (default)  
Mod-ips 444> pci 0000:00:00.0: Limiting direct PCI/PCI transfers  
Mod-ips 445> pci 0000:00:01.0: PIIX3: Enabling Passive Release  
Mod-ips 446> pci 0000:00:01.0: Activating ISA DMA hang workarounds  
Mod-ips 447> pci_hotplug: PCI Hot Plug PCI Core version: 0.5  
Mod-ips 448> pciehp: PCI Express Hot Plug Controller Driver version: 0.4  
Mod-ips 449> acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5  
Mod-ips 450> acpiphp_glue: can't get bus number, assuming 0  
Mod-ips 451> decode_hpp: Could not get hotplug parameters. Use defaults  
Mod-ips 452> acpiphp: Slot [1] registered  
Mod-ips 453> acpiphp: Slot [2] registered  
Mod-ips 454> acpiphp: Slot [3] registered  
Mod-ips 455> acpiphp: Slot [4] registered  
Mod-ips 456> acpiphp: Slot [5] registered  
Mod-ips 457> acpiphp: Slot [6] registered  
Mod-ips 458> acpiphp: Slot [7] registered  
Mod-ips 459> acpiphp: Slot [8] registered  
Mod-ips 460> acpiphp: Slot [9] registered  
Mod-ips 461> acpiphp: Slot [10] registered  
Mod-ips 462> acpiphp: Slot [11] registered  
Mod-ips 463> acpiphp: Slot [12] registered  
Mod-ips 464> acpiphp: Slot [13] registered  
Mod-ips 465> acpiphp: Slot [14] registered  
Mod-ips 466> acpiphp: Slot [15] registered  
Mod-ips 467> acpiphp: Slot [16] registered  
Mod-ips 468> acpiphp: Slot [17] registered  
Mod-ips 469> acpiphp: Slot [18] registered  
Mod-ips 470> acpiphp: Slot [19] registered  
Mod-ips 471> acpiphp: Slot [20] registered  
Mod-ips 472> acpiphp: Slot [21] registered  
Mod-ips 473> acpiphp: Slot [22] registered  
Mod-ips 474> acpiphp: Slot [23] registered  
Mod-ips 475> acpiphp: Slot [24] registered  
Mod-ips 476> acpiphp: Slot [25] registered  
Mod-ips 477> acpiphp: Slot [26] registered  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Mod-ips 478> acpiphp: Slot [27] registered  
Mod-ips 479> acpiphp: Slot [28] registered  
Mod-ips 480> acpiphp: Slot [29] registered  
Mod-ips 481> acpiphp: Slot [30] registered  
Mod-ips 482> acpiphp: Slot [31] registered  
Mod-ips 483> shpchp: Standard Hot Plug PCI Controller Driver version: 0.4  
Mod-ips 484> fakephp: Fake PCI Hot Plug Controller Driver  
Mod-ips 485> fakephp: pci_hp_register failed with error -16  
Mod-ips 486> fakephp: pci_hp_register failed with error -16  
Mod-ips 487> fakephp: pci_hp_register failed with error -16  
Mod-ips 488> fakephp: pci_hp_register failed with error -16  
Mod-ips 489> fakephp: pci_hp_register failed with error -16  
Mod-ips 490> fakephp: pci_hp_register failed with error -16  
Mod-ips 491> fakephp: pci_hp_register failed with error -16  
Mod-ips 492> processor ACPI_CPU:00: registered as cooling_device0  
Mod-ips 493> processor ACPI_CPU:01: registered as cooling_device1  
Mod-ips 494> processor ACPI_CPU:02: registered as cooling_device2  
Mod-ips 495> processor ACPI_CPU:03: registered as cooling_device3  
Mod-ips 496> processor ACPI_CPU:04: registered as cooling_device4  
Mod-ips 497> processor ACPI_CPU:05: registered as cooling_device5  
Mod-ips 498> hpet_acpi_add: no address or irqs in _CRS  
Mod-ips 499> Non-volatile memory driver v1.3  
Mod-ips 500> Linux agpgart interface v0.103  
Mod-ips 501> ipmi message handler version 39.2  
Mod-ips 502> ipmi device interface  
Mod-ips 503> IPMI System Interface driver.  
Mod-ips 504> ipmi_si: Unable to find any System Interface(s)  
Mod-ips 505> IPMI SMB Interface driver  
Mod-ips 506> IPMI Watchdog: driver initialized  
Mod-ips 507> Copyright (C) 2004 MontaVista Software - IPMI Powerdown via sys_reboot.  
Mod-ips 508> Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled  
Mod-ips 509> ?serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A  
Mod-ips 510> serial8250: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A  
Mod-ips 511> 00:06: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A  
Mod-ips 512> 00:07: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A  
Mod-ips 513> brd: module loaded  
Mod-ips 514> loop: module loaded  
Mod-ips 515> lpc: version 0.1 (Nov 10 2011)  
Mod-ips 516> tun: Universal TUN/TAP device driver, 1.6  
Mod-ips 517> tun: (C) 1999-2004 Max Krasnyansky <[email protected]>  
Mod-ips 518> Uniform Multi-Platform E-IDE driver  
Mod-ips 519> piix 0000:00:01.1: IDE controller (0x8086:0x7010 rev 0x00)  
Mod-ips 520> piix 0000:00:01.1: not 100native mode: will probe irqs later  
Mod-ips 521>  
Mod-ips 522>  
ide0: BM-DMA at 0xc000-0xc007  
ide1: BM-DMA at 0xc008-0xc00f  
Mod-ips 523> hda: QEMU HARDDISK, ATA DISK drive  
Mod-ips 524> Clocksource tsc unstable (delta = 2851415955127 ns)  
Mod-ips 525> hda: MWDMA2 mode selected  
Mod-ips 526> hdc: QEMU DVD-ROM, ATAPI CD/DVD-ROM drive  
Mod-ips 527> hdc: MWDMA2 mode selected  
Mod-ips 528> ide0 at 0x1f0-0x1f7,0x3f6 on irq 14  
Mod-ips 529> ide1 at 0x170-0x177,0x376 on irq 15  
Mod-ips 530> ide_generic: please use "probe_mask=0x3f" module parameter for probing all  
legacy  
Mod-ips 531> ISA IDE ports  
Mod-ips 532> ide-gd driver 1.18  
Mod-ips 533> hda: max request size: 512KiB  
Mod-ips 534> hda: 7815168 sectors (4001 MB) w/256KiB Cache, CHS=7753/255/63  
Mod-ips 535> hda: cache flushes supported  
Mod-ips 536> hda: hda1 hda2 hda3 hda4  
Mod-ips 537> Driver 'sd' needs updating - please use bus_type methods  
Mod-ips 538> Driver 'sr' needs updating - please use bus_type methods  
Mod-ips 539> ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver  
Mod-ips 540> ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Mod-ips 541> uhci_hcd: USB Universal Host Controller Interface driver  
Mod-ips 542> Initializing USB Mass Storage driver...  
Mod-ips 543> usbcore: registered new interface driver usb-storage  
Mod-ips 544> USB Mass Storage support registered.  
Mod-ips 545> PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12  
Mod-ips 546> serio: i8042 KBD port at 0x60,0x64 irq 1  
Mod-ips 547> serio: i8042 AUX port at 0x60,0x64 irq 12  
Mod-ips 548> mice: PS/2 mouse device common for all mice  
Mod-ips 549> rtc_cmos 00:01: rtc core: registered rtc_cmos as rtc0  
Mod-ips 550> rtc0: alarms up to one day, 114 bytes nvram  
Mod-ips 551> input: AT Translated Set 2 keyboard as /class/input/input0  
Mod-ips 552> i2c /dev entries driver  
Mod-ips 553> piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0  
Mod-ips 554> device-mapper: ioctl: 4.14.0-ioctl (2008-04-23) initialised:  
Mod-ips 555> cpuidle: using governor ladder  
Mod-ips 556> usbcore: registered new interface driver usbhid  
Mod-ips 557> usbhid: v2.6:USB HID core driver  
Mod-ips 558> TCP cubic registered  
Mod-ips 559> IPv6: Loaded, but is disabled by default. IPv6 may be enabled on individual  
interf  
Mod-ips 560> aces.  
Mod-ips 561> NET: Registered protocol family 10  
Mod-ips 562> NET: Registered protocol family 17  
Mod-ips 563> NET: Registered protocol family 5  
Mod-ips 564> rtc_cmos 00:01: setting system clock to 2012-01-17 14:06:34 UTC (1326809194)  
Mod-ips 565> Freeing unused kernel memory: 1032k freed  
Mod-ips 566> Write protecting the kernel read-only data: 4272k  
Mod-ips 567> Loader init started...  
Mod-ips 568> kjournald starting. Commit interval 5 seconds  
Mod-ips 569> EXT3-fs: mounted filesystem with ordered data mode.  
Mod-ips 570> input: ImExPS/2 Generic Explorer Mouse as /class/input/input1  
Mod-ips 571> 51216 blocks  
Mod-ips 572> Checking rootrw fs: corrected filesystem  
Mod-ips 573> kjournald starting. Commit interval 5 seconds  
Mod-ips 574> EXT3 FS on hda2, internal journal  
Mod-ips 575> EXT3-fs: mounted filesystem with ordered data mode.  
Mod-ips 576> mkdir: cannot create directory '/lib/modules': File exists  
Mod-ips 577> init started: BusyBox v1.13.1 (2011-11-01 07:21:34 CDT)  
Mod-ips 578> starting pid 678, tty '': '/etc/init.d/rc.init'  
Mod-ips 579> Checking system fs: no errors  
Mod-ips 580> kjournald starting. Commit interval 5 seconds  
Mod-ips 581> EXT3-fs: mounted filesystem with ordered data mode.  
Mod-ips 582> /etc/init.d/rc.init: line 102: /proc/sys/vm/bdflush: No such file or  
directory  
Mod-ips 583> starting pid 728, tty '': '/etc/init.d/rcS'  
Mod-ips 584> Initializing random number generator... done.  
Mod-ips 585> Starting network... ifconfig lo 127.0.0.1 netmask 255.255.255.255 up  
Mod-ips 586> starting inetd  
Mod-ips 587> done  
Mod-ips 588> Starting sshd:  
Mod-ips 589> Starting nscd:  
Mod-ips 590> Set Irq Affinity ... cpus:  
Mod-ips 591> Checking kernel allocated memory: EXT3 FS on hda1, internal journal  
Mod-ips 592> [ OK ]  
Mod-ips 593> Unloading REGEX-CP drivers ...  
Mod-ips 594> Loading REGEX-CP drivers ...  
Mod-ips 595> ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 11  
Mod-ips 596> cpp_user_kvm 0000:00:04.0: PCI INT A -> Link[LNKD] -> GSI 11 (level, high) ->  
IRQ  
Mod-ips 597> 11  
Mod-ips 598> Detected cpp_user_kvm device with 33554432 bytes of shared memory  
Mod-ips 599> Device 0: model=LCPX8640, cpc=T2005, cpe0=None, cpe1=None  
Mod-ips 600> Load cidmodcap:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Mod-ips 601> Create node:  
Mod-ips 602> ln: /etc/modprobe.conf: File exists  
Mod-ips 603> Shutting down network... ifconfig lo down  
Mod-ips 604> ifconfig lo down  
Mod-ips 605> done  
Mod-ips 606> Load ihm:  
Mod-ips 607> Create node:  
Mod-ips 608> Load kvm_ivshmem: IVSHMEM: writing 0x0 to 0xc86cf8  
Mod-ips 609> IVSHMEM: IntrMask write(w) val = 0xffff  
Mod-ips 610> Create node:  
Mod-ips 611> Create node:  
Mod-ips 612> Create node:  
Mod-ips 613> Set Irq Affinity ... cpus: 6  
Mod-ips 614> Starting network... ifconfig lo 127.0.0.1 netmask 255.255.255.255 up  
Mod-ips 615> done  
Mod-ips 616> Creating boot.info[ OK ]  
Mod-ips 617> Checking for system modifications since last boot[ OK ]  
Mod-ips 618> Checking model identification[ OK ]  
Mod-ips 619> Model: ASA-5555  
Mod-ips 620> Model=ASA-5555  
Mod-ips 621> Unable to set speed and duplex for user mode interfaces  
Mod-ips 622> interface type 0x8086:0x100e at pci address 0:6.0(0) is currently named eth1  
Mod-ips 623> Renaming eth1 --> ma0_0  
Mod-ips 624> interface type 0x8086:0x100e at pci address 0:7.0(0) is currently named po0_0  
Mod-ips 625> interface type 0x8086:0x100e at pci address 0:5.0(0) is currently named eth0  
Mod-ips 626> Renaming eth0 --> sy0_0  
Mod-ips 627> Initializing access list  
Mod-ips 628> MGMT_INTFC_CIDS_NAME Management0/0  
Mod-ips 629> MGMT_INTFC_OS_NAME ma0_0  
Mod-ips 630> SYSTEM_PCI_IDS 0x0030,0x0028  
Mod-ips 631> Load rebootkom:  
Mod-ips 632> root: Starting SSM controlplane  
Mod-ips 633> Starting CIDS:  
Mod-ips 634> starting pid 1718, tty '/dev/ttyS0': '/sbin/getty -L ttyS0 9600 vt100'  
Failover Scenerios  
The following failover scenarios apply to the ASA 5500-X series in the event of configuration changes,  
signature/signature engine updates, service packs, and SensorApp crashes on theASA 5500-X IPS SSP.  
Single ASA in Fail-Open Mode  
If the ASA is configured in fail-open mode for the ASA 5500-X IPS SSP, and the  
ASA 5500-X IPS SSP experiences a configuration change or signature/signature engine update,  
traffic is passed through the ASA without being inspected.  
If the ASA is configured in fail-open mode for the ASA 5500-X IPS SSP, and the  
ASA 5500-X IPS SSP experiences a SensorApp crash or a service pack upgrade, traffic is passed  
through the ASA without being inspected.  
Single ASA in Fail-Close Mode  
If the ASA is configured in fail-close mode for the ASA 5500-X IPS SSP, and the  
ASA 5500-X IPS SSP experiences a configuration change or a signature/signature engine update,  
traffic is stopped from passing through the ASA.  
If the ASA is configured in fail-close mode for the ASA 5500-X IPS SSP, and the  
ASA 5500-X IPS SSP experiences a SensorApp crash or a service pack upgrade, traffic is stopped  
from passing through the ASA.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
Two ASAs in Fail-Open Mode  
If the ASAs are configured in fail-open mode and if the ASA 5500-X IPS SSP on the active ASA  
experiences a configuration change or a signature/signature engine update, traffic is still passed  
through the active ASA without being inspected. Failover is not triggered.  
If the ASAs are configured in fail-open mode, and if the ASA 5500-X IPS SSP on the active ASA  
experiences a SensorApp crash or a service pack upgrade, failover is triggered and traffic passes  
through the ASA 5500-X IPS SSP that was previously the standby ASA 5500-X IPS SSP.  
Two ASAs in Fail-Close Mode  
If the ASAs are configured in fail-close mode, and if the ASA 5500-X IPS SSP on the active ASA  
experiences a configuration change or a signature/signature engine update, traffic is stopped from  
passing through the active ASA. No failover is triggered.  
If the ASAs are configured in fail-close mode, and if the ASA 5500-X IPS SSP on the active ASA  
experiences a SensorApp crash or a service pack upgrade, failover is triggered and traffic passes  
through the ASA 5500-X IPS SSP that was previously the standby for the ASA 5500-X IPS SSP.  
Configuration Examples  
Use the following configuration for the primary ASA:  
interface GigabitEthernet0/7  
description LAN Failover Interface  
failover  
failover lan unit primary  
failover lan interface folink GigabitEthernet0/7  
failover interface ip folink 172.27.48.1 255.255.255.0 standby 172.27.48.2  
Use the following configuration for the secondary ASA:  
interface GigabitEthernet0/7  
description LAN Failover Interface  
failover  
failover lan unit secondary  
failover lan interface folink GigabitEthernet0/7  
failover interface ip folink 172.27.48.1 255.255.255.0 standby 172.27.48.2  
The ASA 5500-X IPS SSP and the Normalizer Engine  
The majority of the features in the Normalizer engine are not used on the ASA 5500-X IPS SSP, because  
the ASA itself handles the normalization. Packets on the ASA IPS modules go through a special path in  
the Normalizer that only reassembles fragments and puts packets in the right order for the TCP stream.  
The Normalizer does not do any of the normalization that is done on an inline IPS appliance, because  
that causes problems in the way the ASA handles the packets.  
The following Normalizer engine signatures are not supported:  
1300.0  
1304.0  
1305.0  
1307.0  
1308.0  
1309.0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the ASA 5500-X IPS SSP  
1311.0  
1315.0  
1316.0  
1317.0  
1330.0  
1330.1  
1330.2  
1330.9  
1330.10  
1330.12  
1330.14  
1330.15  
1330.16  
1330.17  
1330.18  
The ASA 5500-X IPS SSP and Memory Usage  
For the ASA 5500-X IPS SSP, the memory usage is 93%. The default health thresholds for the sensor  
are 80% for yellow and 91% for red, so the sensor health will be shown as red on these platforms even  
for normal operating conditions. You can tune the threshold percentage for memory usage so that it reads  
more accurately for these platforms by configuring the memory-usage-policy option in the sensor health  
metrics.  
Note  
Make sure you have the memory-usage-policy option in the sensor health metrics enabled.  
Table C-3 lists the yellow-threshold and the red-threshold health values.  
Table C-3  
ASA 5500-X IPS SSP Memory Usage Values  
Platform  
Yellow  
85%  
88%  
88%  
93%  
95%  
Red  
Memory Used  
28%  
ASA 5512-X IPS SSP  
ASA 5515-X IPS SSP  
ASA 5525-X IPS SSP  
ASA 5545-X IPS SSP  
ASA 5555-X IPS SSP  
91%  
92%  
92%  
96%  
98%  
14%  
14%  
13%  
17%  
The ASA 5500-X IPS SSP and Jumbo Packets  
The jumbo packet count in the show interface command output from the lines Total Jumbo Packets  
Received and Total Jumbo Packets Transmitted for ASA IPS modules may be larger than expected  
due to some packets that were almost jumbo size on the wire being counted as jumbo size by the IPS.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix C Troubleshooting  
Troubleshooting the ASA 5585-X IPS SSP  
This miscount is a result of header bytes added to the packet by the ASA before the packet is transmitted  
to the IPS. For IPv4, 58 bytes of header data are added. For IPv6, 78 bytes of header data are added. The  
ASA removes the added IPS header before the packet leaves the ASA.  
Troubleshooting the ASA 5585-X IPS SSP  
Note  
Before troubleshooting the ASA 5585-X IPS SSP, check the Caveats section of the Readme for the  
software version installed on your sensor to see if you are dealing with a known issue.  
This section contains troubleshooting information specific to the ASA 5585-X IPS SSP, and contains the  
following topics:  
Health and Status Information  
To see the general health of the ASA 5585-X IPS SSP, use the show module 1 details command.  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(1)3  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 8843.e12f.5414 to 8843.e12f.541f  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data plane Status: Up  
Status:  
Up  
Mgmt IP addr:  
192.0.2.3  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt Access List:  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled  
asa  
192.0.2.254  
10.0.0.0/8  
64.0.0.0/8  
443  
true  
The output shows that the ASA 5585-X IPS SSP is up. If the status reads Down, you can reset it using the  
hw-module module 1 reset command.  
asa# hw-module module 1 reset  
The module in slot 1 should be shut down before  
resetting it or loss of configuration may occur.  
Reset module in slot 1? [confirm]  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Troubleshooting the ASA 5585-X IPS SSP  
Reset issued for module in slot 1  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
Unable to read details from slot 1  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Not Applicable  
Not Applicable  
7.2(1)E4  
Data plane Status: Not Applicable  
Status: Shutting Down  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
Unable to read details from slot 1  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Not Applicable  
Not Applicable  
7.2(1)E4  
Data plane Status: Not Applicable  
Status: Down  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
Unable to read details from slot 1  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Not Applicable  
Not Applicable  
7.2(1)E4  
Data plane Status: Not Applicable  
Status: Init  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Reload  
Starting up  
7.2(1)E4  
Data plane Status: Down  
Status: Up  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the ASA 5585-X IPS SSP  
Mgmt IP addr:  
192.0.2.3  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
192.0.2.254  
0.0.0.0/0  
443  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled:  
true  
asa# show module 1 details  
Getting details from the Service Module, please wait...  
ASA 5585-X IPS Security Services Processor-20 with 8GE  
Model:  
ASA5585-SSP-IPS20  
1.0  
ABC1234DEFG  
2.0(7)0  
Hardware version:  
Serial Number:  
Firmware version:  
Software version:  
7.2(1)E4  
MAC Address Range: 5475.d029.7f9c to 5475.d029.7fa7  
App. name:  
IPS  
App. Status:  
App. Status Desc:  
App. version:  
Up  
Normal Operation  
7.2(1)E4  
Data plane Status: Up  
Status:  
Up  
Mgmt IP addr:  
192.0.2.3  
Mgmt Network mask: 255.255.255.0  
Mgmt Gateway:  
Mgmt Access List:  
Mgmt web ports:  
Mgmt TLS enabled:  
asa#  
192.0.2.254  
0.0.0.0/0  
443  
true  
If you have problems with reimaging the ASA 5585-X IPS SSP, use the debug module-boot command  
to see the output as it boots. Make sure you have the correct IP address for the TFTP server and you have  
the correct file on the TFTP server. Then use the hw-module module 1 recover command again to  
reimage the module.  
ips-ssp# hw-module module 1 recover configure  
Image URL [tftp://0.0.0.0/]: tftp://10.10.10.10//IPS-SSP_20-K9-sys-1.1-a-7.2-1-E4.img  
Port IP Address [0.0.0.0]: 10.10.10.11  
VLAN ID [0]:  
Gateway IP Address [0.0.0.0]: 10.10.10.254  
asa(config)# debug module-boot  
debug module-boot enabled at level 1  
asa(config)# hw-module module 1 recover boot  
The module in slot 1 will be recovered. This may erase all configuration and all data on  
that device and attempt to download a new image for it.  
Recover module in slot 1? [confirm]  
Recover issued for module in slot 1  
asa(config)# Slot-1 140> Cisco Systems ROMMON Version (1.0(10)0) #0: Fri Mar 25 23:02:10  
PST 2010  
Slot-1 141> Platform ASA5585-SSP-IPS20  
Slot-1 142> GigabitEthernet0/0  
Slot-1 143> Link is UP  
Slot-1 144> MAC Address: 000b.fcf8.0176  
Slot-1 145> ROMMON Variable Settings:  
Slot-1 146>  
Slot-1 147>  
Slot-1 148>  
Slot-1 149>  
Slot-1 150>  
Slot-1 151>  
Slot-1 152>  
Slot-1 153>  
Slot-1 154>  
ADDRESS=192.0.2.3  
SERVER=192.0.2.15  
GATEWAY=192.0.2.254  
PORT=GigabitEthernet0/0  
VLAN=untagged  
IMAGE=IPS-SSP-K9-sys-1.1-a-7.2-1.img  
CONFIG=  
LINKTIMEOUT=20  
PKTTIMEOUT=4  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Troubleshooting the ASA 5585-X IPS SSP  
Slot-1 155>  
RETRY=20  
Slot-1 156> tftp [email protected] via 192.0.2.254  
Slot-1 157> TFTP failure: Packet verify failed after 20 retries  
Slot-1 158> Rebooting due to Autoboot error ...  
Slot-1 159> Rebooting....  
Slot-1 160> Cisco Systems ROMMON Version (1.0(10)0) #0: Fri Mar 25 23:02:10 PST 2010  
Slot-1 161> Platform ASA5585-SSP-IPS20  
Slot-1 162> GigabitEthernet0/0  
Slot-1 163> Link is UP  
Slot-1 164> MAC Address: 000b.fcf8.0176  
Slot-1 165> ROMMON Variable Settings:  
Slot-1 166>  
Slot-1 167>  
Slot-1 168>  
Slot-1 169>  
Slot-1 170>  
Slot-1 171>  
Slot-1 172>  
Slot-1 173>  
Slot-1 174>  
Slot-1 175>  
ADDRESS=192.0.2.3  
SERVER=192.0.2.15  
GATEWAY=192.0.2.254  
PORT=GigabitEthernet0/0  
VLAN=untagged  
IMAGE=IPS-SSP_10-K9-sys-1.1-a-7.2-1.img  
CONFIG=  
LINKTIMEOUT=20  
PKTTIMEOUT=4  
RETRY=20  
Slot-1 176> tftp [email protected] via 192.0.2.254  
Failover Scenarios  
The following failover scenarios apply to the ASA 5585-X in the event of configuration changes,  
signature/signature engine updates, service packs, and SensorApp crashes on the ASA 5585-X IPS SSP.  
Single ASA 5585-X in Fail-Open Mode  
If the ASA is configured in fail-open mode for the ASA 5585-X IPS SSP, and the  
ASA 5585-X IPS SSP experiences a configuration change or signature/signature engine update,  
traffic is passed through the ASA without being inspected.  
If the ASA is configured in fail-open mode for the ASA 5585-X IPS SSP, and the  
ASA 5585-X IPS SSP experiences a SensorApp crash or a service pack upgrade, traffic is passed  
through the ASA without being inspected.  
Single ASA 5585-X in Fail-Close Mode  
If the ASA is configured in fail-close mode for the ASA 5585-X IPS SSP, and the  
ASA 5585-X IPS SSP experiences a configuration change or a signature/signature engine update,  
traffic is stopped from passing through the ASA.  
If the ASA is configured in fail-close mode for the ASA 5585-X IPS SSP, and the  
ASA 5585-X IPS SSP experiences a SensorApp crash or a service pack upgrade, traffic is stopped  
from passing through the ASA.  
Two ASA 5585-Xs in Fail-Open Mode  
If the ASAs are configured in fail-open mode and if the ASA 5585-X IPS SSP on the active ASA  
experiences a configuration change or a signature/signature engine update, traffic is still passed  
through the active ASA without being inspected. Failover is not triggered.  
If the ASAs are configured in fail-open mode, and if the ASA 5585-X IPS SSP on the active ASA  
experiences a SensorApp crash or a service pack upgrade, failover is triggered and traffic passes  
through the ASA 5585-X IPS SSP that was previously the standby ASA 5585-X IPS SSP.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Troubleshooting the ASA 5585-X IPS SSP  
Two ASA 5585-Xs in Fail-Close Mode  
If the ASAs are configured in fail-close mode, and if the ASA 5585-X IPS SSP on the active ASA  
experiences a configuration change or a signature/signature engine update, traffic is stopped from  
passing through the active ASA. No failover is triggered.  
If the ASAs are configured in fail-close mode, and if the ASA 5585-X IPS SSP on the active ASA  
experiences a SensorApp crash or a service pack upgrade, failover is triggered and traffic passes  
through the ASA 5585-X IPS SSP that was previously the standby for the ASA 5585-X IPS SSP.  
Configuration Examples  
Use the following configuration for the primary ASA:  
interface GigabitEthernet0/7  
description LAN Failover Interface  
failover  
failover lan unit primary  
failover lan interface folink GigabitEthernet0/7  
failover interface ip folink 172.27.48.1 255.255.255.0 standby 172.27.48.2  
Use the following configuration for the secondary ASA:  
interface GigabitEthernet0/7  
description LAN Failover Interface  
failover  
failover lan unit secondary  
failover lan interface folink GigabitEthernet0/7  
failover interface ip folink 172.27.48.1 255.255.255.0 standby 172.27.48.2  
Traffic Flow Stopped on IPS Switchports  
Problem Traffic on any port located on the ASA 5585-X IPS SSP (1/x) no longer passes through the  
adaptive security appliance when the ASA 5585-X IPS SSP is reset or shut down. This affects all traffic  
through these ports regardless of whether or not the traffic would have been monitored by the IPS. The  
link on the ports will link down when the ASA 5585-X IPS SSP is reset or shut down.  
Possible Cause Using the ports located on the ASA 5585-X IPS SSP (1/x), and resetting or shutting  
it down via any mechanism.  
Solution Use the ports on the adaptive security appliance (0/x) instead because those ports do not lose  
their link when the ASA 5585-X IPS SSP is reset or shut down.  
The ASA 5585-X IPS SSP and the Normalizer Engine  
The majority of the features in the Normalizer engine are not used on the ASA 5585-X IPS SSP, because  
the ASA itself handles the normalization. Packets on the ASA IPS modules go through a special path in  
the Normalizer that only reassembles fragments and puts packets in the right order for the TCP stream.  
The Normalizer does not do any of the normalization that is done on an inline IPS appliance, because  
that causes problems in the way the ASA handles the packets.  
The following Normalizer engine signatures are not supported:  
1300.0  
1304.0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Gathering Information  
1305.0  
1307.0  
1308.0  
1309.0  
1311.0  
1315.0  
1316.0  
1317.0  
1330.0  
1330.1  
1330.2  
1330.9  
1330.10  
1330.12  
1330.14  
1330.15  
1330.16  
1330.17  
1330.18  
The ASA 5585-X IPS SSP and Jumbo Packets  
The jumbo packet count in the show interface command output from the lines Total Jumbo Packets  
Received and Total Jumbo Packets Transmitted for ASA IPS modules may be larger than expected  
due to some packets that were almost jumbo size on the wire being counted as jumbo size by the IPS.  
This miscount is a result of header bytes added to the packet by the ASA before the packet is transmitted  
to the IPS. For IPv4, 58 bytes of header data are added. For IPv6, 78 bytes of header data are added. The  
ASA removes the added IPS header before the packet leaves the ASA.  
Gathering Information  
You can use the following CLI commands and scripts to gather information and diagnose the state of the  
sensor when problems occur. You can use the show tech-support command to gather all the information  
of the sensor, or you can use the other individual commands listed in this section for specific  
information. This section contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix C Troubleshooting  
Gathering Information  
Health and Network Security Information  
Caution  
When the sensor is first starting, it is normal for certain health metric statuses to be red until the sensor  
is fully up and running.  
Note  
The ASA 5500-X IPS SSP and the ASA 5585-X IPS SSP do not support bypass mode. The adaptive  
security appliance will either fail open, fail close, or fail over depending on the configuration of the  
adaptive security appliance and the type of activity being done on the IPS.  
Use the show health command in privileged EXEC mode to display the overall health status information  
of the sensor. The health status categories are rated by red and green with red being critical.  
To display the overall health status of the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Show the health and security status of the sensor.  
sensor# show health  
Overall Health Status  
Red  
Health Status for Failed Applications  
Health Status for Signature Updates  
Health Status for License Key Expiration  
Health Status for Running in Bypass Mode  
Health Status for Interfaces Being Down  
Health Status for the Inspection Load  
Health Status for the Time Since Last Event Retrieval  
Health Status for the Number of Missed Packets  
Health Status for the Memory Usage  
Green  
Green  
Red  
Green  
Red  
Green  
Green  
Green  
Not Enabled  
Red  
Health Status for Global Correlation  
Health Status for Network Participation  
Not Enabled  
Security Status for Virtual Sensor vs0  
sensor#  
Green  
Tech Support Information  
The show tech-support command is useful for capturing all sensor status and configuration information.  
This section describes the show tech-support command, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Gathering Information  
Understanding the show tech-support Command  
Note  
The /var/log/messages file is now persistent across reboots and the information is displayed in the output  
of the show tech-support command.  
Note  
The show tech-support command now displays historical interface data for each interface for the past  
72 hours.  
The show tech-support command captures all status and configuration information on the sensor and  
includes the current configuration, version information, and cidDump information. The output can be  
large, over 1 MB. You can transfer the output to a remote system. For the procedure for copying the  
output to a remote system, see Displaying Tech Support Information, page C-75.  
Note  
Always run the show tech-support command before contacting TAC.  
Displaying Tech Support Information  
Use the show tech-support [page] [destination-url destination_url] command to display system  
information on the screen or have it sent to a specific URL. You can use the information as a  
troubleshooting tool with TAC.  
The following parameters are optional:  
page—Displays the output, one page of information at a time. Press Enter to display the next line  
of output or use the spacebar to display the next page of information.  
destination-url—Indicates the information should be formatted as HTML and sent to the  
destination that follows this command. If you use this keyword, the output is not displayed on the  
screen.  
destination_url—Indicates the information should be formatted as HTML.The URL specifies where  
the information should be sent. If you do not use this keyword, the information is displayed on the  
screen.  
You can specify the following destination types:  
ftp:—Destination URL for FTP network server. The syntax for this prefix is:  
ftp:[[//username@location]/relativeDirectory]/filename or  
ftp:[[//username@location]//absoluteDirectory]/filename.  
scp:—Destination URL for the SCP network server. The syntax for this prefix is:  
scp:[[//username@]location]/relativeDirectory]/filename or  
scp:[[//username@]location]//absoluteDirectory]/filename.  
Displaying Tech Support Information  
To display tech support information, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
View the output on the screen. The system information appears on the screen, one page at a time. Press  
the spacebar to view the next page or press Ctrl-C to return to the prompt  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Gathering Information  
sensor# show tech-support page  
Step 3  
To send the output (in HTML format) to a file:  
a. Enter the following command, followed by a valid destination. The password: prompt appears.  
sensor# show tech-support destination-url destination_url  
Example  
To send the tech support output to the file /absolute/reports/sensor1Report.html:  
sensor# show tech support dest  
ftp://[email protected]//absolute/reports/sensor1Report.html  
b. Enter the password for this user account. The Generating report: message is displayed.  
Tech Support Command Output  
The following is an example of the show tech-support command output:  
Note  
This output example shows the first part of the command and lists the information for the interfaces,  
authentication, and the Analysis Engine.  
sensor# show tech-support page  
System Status Report  
This Report was generated on Sat Apr 20 23:18:07 2013.  
Output from show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Realm Keys  
Signature Definition:  
Signature Update  
OS Version:  
key1.0  
S697.0  
2.6.29.1  
IPS4360  
2013-02-15  
Platform:  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24% usage)  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96% usage)  
MainApp  
Running  
AnalysisEngine  
Running  
CollaborationApp  
Running  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
CLI  
Upgrade History:  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Gathering Information  
Recovery Partition Version 1.1 - 7.2(1)E4  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
Output from show interfaces  
Interface Statistics  
Total Packets Received = 135259  
Total Bytes Received = 12352221  
Missed Packet Percentage = 0  
Current Bypass Mode = Auto_off  
MAC statistics from interface GigabitEthernet0/0  
Interface function = Sensing interface  
Description =  
Media Type = TX  
Default Vlan = 0  
Inline Mode = Paired with interface GigabitEthernet0/1  
Pair Status = Up  
Hardware Bypass Capable = No  
Hardware Bypass Paired = N/A  
Link Status = Up  
Admin Enabled Status = Enabled  
Link Speed = Auto_1000  
Link Duplex = Auto_Full  
Missed Packet Percentage = 0  
Total Packets Received = 126806  
Total Bytes Received = 10418658  
Total Multicast Packets Received = 110975  
Total Broadcast Packets Received = 14013  
Total Jumbo Packets Received = 0  
Total Undersize Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 6190  
Total Bytes Transmitted = 1361024  
Total Multicast Packets Transmitted = 5175  
Total Broadcast Packets Transmitted = 685  
Total Jumbo Packets Transmitted = 0  
Total Undersize Packets Transmitted = 0  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
MAC statistics from interface Management0/0  
Interface function = Command-control interface  
Description =  
Media Type = TX  
Default Vlan = 0  
Link Status = Up  
Link Speed = Auto_1000  
Link Duplex = Auto_Full  
Total Packets Received = 2638072  
Total Bytes Received = 195979033  
Total Multicast Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 1439814  
Total Bytes Transmitted = 351764075  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
--MORE--  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Version Information  
The show version command is useful for obtaining sensor information. This section describes the show  
version command, and contains the following topics:  
Understanding the show version Command  
The show version command shows the basic sensor information and can indicate where a failure is  
occurring. It gives the following information:  
Which applications are running  
Versions of the applications  
Disk and memory usage  
Upgrade history of the applications  
Note  
To get the same information from IDM, choose Monitoring > Sensor Monitoring > Support  
Information > Diagnostics Report. To get the same information from IME, choose Configuration >  
sensor_name > Sensor Monitoring > Support Information > Diagnostics Report.  
Displaying Version Information  
Use the show version command to display version information for all installed operating system  
packages, signature packages, and IPS processes running on the system. To view the configuration for  
the entire system, use the more current-config command.  
Note  
Note  
The CLI output is an example of what your configuration may look like. It will not match exactly due to  
the optional setup choices, sensor model, and IPS version you have installed.  
For the IPS 4500 series sensors, the show version command output contains an extra application called  
the SwitchApp.  
To display the version and configuration, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
View version information.  
sensor# show version  
Application Partition:  
Cisco Intrusion Prevention System, Version 7.2(1)E4  
Host:  
Realm Keys  
key1.0  
Signature Definition:  
Signature Update  
S697.0  
2013-02-15  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Appendix C Troubleshooting  
Gathering Information  
OS Version:  
Platform:  
2.6.29.1  
IPS4360  
Serial Number:  
No license present  
FCH1504V0CF  
Sensor up-time is 3 days.  
Using 14470M out of 15943M bytes of available memory (90% usage)  
system is using 32.4M out of 160.0M bytes of available disk space (20% usage)  
application-data is using 87.1M out of 376.1M bytes of available disk space (24%  
usage)  
boot is using 61.2M out of 70.1M bytes of available disk space (92% usage)  
application-log is using 494.0M out of 513.0M bytes of available disk space (96%  
usage)  
MainApp  
Running  
AnalysisEngine  
Running  
CollaborationApp  
Running  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
V-2013_04_10_11_00_7_2_0_14  
(Release)  
(Release)  
(Release)  
(Release)  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
2013-04-10T11:05:55-0500  
CLI  
Upgrade History:  
IPS-K9-7.2-1-E4  
11:17:07 UTC Thu Jan 10 2013  
Recovery Partition Version 1.1 - 7.2(1)E4  
Host Certificate Valid from: 17-Apr-2013 to 18-Apr-2015  
sensor#  
Note  
If the —-MORE-prompt is displayed, press the spacebar to see more information or Ctrl-C to  
cancel the output and get back to the CLI prompt.  
Step 3  
View configuration information.  
Note  
You can use the more current-config or show configuration commands.  
sensor# more current-config  
! ------------------------------  
! Current configuration last modified Fri Apr 19 19:01:05 2013  
! ------------------------------  
! Version 7.2(1)  
! Host:  
!
Realm Keys  
! Signature Definition:  
Signature Update  
key1.0  
!
S697.0  
2013-02-15  
! ------------------------------  
service interface  
physical-interfaces GigabitEthernet0/0  
admin-state enabled  
exit  
physical-interfaces GigabitEthernet0/1  
admin-state enabled  
exit  
inline-interfaces pair0  
interface1 GigabitEthernet0/0  
interface2 GigabitEthernet0/1  
exit  
bypass-mode auto  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
exit  
! ------------------------------  
service authentication  
exit  
! ------------------------------  
service event-action-rules rules0  
exit  
! ------------------------------  
service host  
network-settings  
host-ip 10.106.133.159/23,10.106.132.1  
host-name sensor  
telnet-option enabled  
access-list 0.0.0.0/0  
dns-primary-server disabled  
dns-secondary-server disabled  
dns-tertiary-server disabled  
exit  
exit  
! ------------------------------  
service logger  
exit  
! ------------------------------  
service network-access  
exit  
! ------------------------------  
service notification  
exit  
! ------------------------------  
service signature-definition sig0  
exit  
! ------------------------------  
service ssh-known-hosts  
exit  
! ------------------------------  
service trusted-certificates  
exit  
! ------------------------------  
service web-server  
websession-inactivity-timeout 3600  
exit  
! ------------------------------  
service anomaly-detection ad0  
exit  
! ------------------------------  
service external-product-interface  
exit  
! ------------------------------  
service health-monitor  
exit  
! ------------------------------  
service global-correlation  
exit  
! ------------------------------  
service aaa  
exit  
! ------------------------------  
service analysis-engine  
virtual-sensor vs0  
logical-interface pair0  
exit  
exit  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Statistics Information  
The show statistics command is useful for examining the state of the sensor services. This section  
describes the show statistics command, and contains the following topics:  
Understanding the show statistics Command  
The show statistics command provides a snapshot of the state of the sensor services. The following  
services provide statistics:  
AnalysisEngine  
Authentication  
Denied Attackers  
Event Server  
Event Store  
Host  
Logger  
Attack Response (formerly known as Network Access)  
Notification  
SDEE Server  
Transaction Server  
Transaction Source  
Virtual Sensor  
Web Server  
Note  
To get the same information from IDM, choose Monitoring > Sensor Monitoring > Support  
Information > Statistics. To get the same information from IME, choose Configuration >  
sensor_name > Sensor Monitoring > Support Information >Statistics.  
Displaying Statistics  
Use the show statistics [analysis-engine | anomaly-detection | authentication | denied-attackers |  
event-server | event-store | external-product-interface | global-correlation | host | logger |  
network-access | notification | os-identification | sdee-server | transaction-server | virtual-sensor |  
web-server] [clear] command to display statistics for each sensor application.  
Use the show statistics {anomaly-detection | denied-attackers | os-identification | virtual-sensor}  
[name | clear] command to display statistics for these components for all virtual sensors. If you provide  
the virtual sensor name, the statistics for that virtual sensor only are displayed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix C Troubleshooting  
Gathering Information  
Note  
The clear option is not available for the analysis engine, anomaly detection, host, network access, or OS  
identification applications.  
For the IPS 4510 and IPS 4520, at the end of the command output, there are extra details for the Ethernet  
controller statistics, such as the total number of packets received at the Ethernet controller, the total  
number of packets dropped at the Ethernet controller under high load conditions, and the total packets  
transmitted including the customer traffic packets and the internal keepalive packet count.  
Note  
The Ethernet controller statistics are polled at an interval of 5 seconds from the hardware side. The  
keepalives are sent or updated at an interval of 10 ms. Because of this, there may be a disparity in the  
actual count reflected in the total packets transmitted. At times, it is even possible that the total packets  
transmitted may be less that the keepalive packets transmitted.  
To display statistics for the sensor, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the statistics for the Analysis Engine.  
sensor# show statistics analysis-engine  
Analysis Engine Statistics  
Number of seconds since service started = 431157  
Processing Load Percentage  
Thread  
5 sec  
1 min  
5 min  
0
1
2
3
4
5
6
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Average  
The rate of TCP connections tracked per second = 0  
The rate of packets per second = 0  
The rate of bytes per second = 0  
Receiver Statistics  
Total number of packets processed since reset = 0  
Total number of IP packets processed since reset = 0  
Transmitter Statistics  
Total number of packets transmitted = 133698  
Total number of packets denied = 203  
Total number of packets reset = 3  
Fragment Reassembly Unit Statistics  
Number of fragments currently in FRU = 0  
Number of datagrams currently in FRU = 0  
TCP Stream Reassembly Unit Statistics  
TCP streams currently in the embryonic state = 0  
TCP streams currently in the established state = 0  
TCP streams currently in the closing state = 0  
TCP streams currently in the system = 0  
TCP Packets currently queued for reassembly = 0  
The Signature Database Statistics.  
Total nodes active = 0  
TCP nodes keyed on both IP addresses and both ports = 0  
UDP nodes keyed on both IP addresses and both ports = 0  
IP nodes keyed on both IP addresses = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix C Troubleshooting  
Gathering Information  
Statistics for Signature Events  
Number of SigEvents since reset = 0  
Statistics for Actions executed on a SigEvent  
Number of Alerts written to the IdsEventStore = 0  
Inspection Stats  
Inspector  
AtomicAdvanced  
Fixed  
MSRPC_TCP  
MSRPC_UDP  
MultiString  
ServiceDnsUdp  
ServiceGeneric  
ServiceHttp  
ServiceNtp  
ServiceP2PTCP  
ServiceRpcUDP  
ServiceRpcTCP  
ServiceSMBAdvanced  
ServiceSnmp  
ServiceTNS  
String  
active  
call  
2312  
1659  
20  
1808  
145  
1841  
2016  
2
create  
4
delete  
4
loadPct  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
33  
1
0
0
2
0
1
51  
0
0
0
0
0
0
0
0
6
0
0
0
0
1606  
4
1575  
10  
3
14  
2
3176  
9
3
9
3
3
1606  
4
1575  
10  
3
14  
2
3176  
9
3
9
3
3
3682  
21  
1841  
130  
139  
1841  
18  
225  
1808  
576  
288  
261  
1808  
14  
16  
1555  
17  
6
14  
16  
1555  
17  
6
SweepUDP  
SweepTCP  
SweepOtherTcp  
TrojanBO2K  
TrojanUdp  
11  
1555  
11  
1555  
GlobalCorrelationStats  
SwVersion = 7.1(4.70)E4  
SigVersion = 645.0  
DatabaseRecordCount = 0  
DatabaseVersion = 0  
RuleVersion = 0  
ReputationFilterVersion = 0  
AlertsWithHit = 0  
AlertsWithMiss = 0  
AlertsWithModifiedRiskRating = 0  
AlertsWithGlobalCorrelationDenyAttacker = 0  
AlertsWithGlobalCorrelationDenyPacket = 0  
AlertsWithGlobalCorrelationOtherAction = 0  
AlertsWithAuditRepDenies = 0  
ReputationForcedAlerts = 0  
EventStoreInsertTotal = 0  
EventStoreInsertWithHit = 0  
EventStoreInsertWithMiss = 0  
EventStoreDenyFromGlobalCorrelation = 0  
EventStoreDenyFromOverride = 0  
EventStoreDenyFromOverlap = 0  
EventStoreDenyFromOther = 0  
ReputationFilterDataSize = 0  
ReputationFilterPacketsInput = 0  
ReputationFilterRuleMatch = 0  
DenyFilterHitsNormal = 0  
DenyFilterHitsGlobalCorrelation = 0  
SimulatedReputationFilterPacketsInput = 0  
SimulatedReputationFilterRuleMatch = 0  
SimulatedDenyFilterInsert = 0  
SimulatedDenyFilterPacketsInput = 0  
SimulatedDenyFilterRuleMatch = 0  
TcpDeniesDueToGlobalCorrelation = 0  
TcpDeniesDueToOverride = 0  
TcpDeniesDueToOverlap = 0  
TcpDeniesDueToOther = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
SimulatedTcpDeniesDueToGlobalCorrelation = 0  
SimulatedTcpDeniesDueToOverride = 0  
SimulatedTcpDeniesDueToOverlap = 0  
SimulatedTcpDeniesDueToOther = 0  
LateStageDenyDueToGlobalCorrelation = 0  
LateStageDenyDueToOverride = 0  
LateStageDenyDueToOverlap = 0  
LateStageDenyDueToOther = 0  
SimulatedLateStageDenyDueToGlobalCorrelation = 0  
SimulatedLateStageDenyDueToOverride = 0  
SimulatedLateStageDenyDueToOverlap = 0  
SimulatedLateStageDenyDueToOther = 0  
AlertHistogram  
RiskHistogramEarlyStage  
RiskHistogramLateStage  
ConfigAggressiveMode = 0  
ConfigAuditMode = 0  
RegexAccelerationStats  
Status = Enabled  
DriverVersion = 6.2.1  
Devices = 1  
Agents = 12  
Flows = 7  
Channels = 0  
SubmittedJobs = 4968  
CompletedJobs = 4968  
SubmittedBytes = 72258005  
CompletedBytes = 168  
TCPFlowsWithoutLCB = 0  
UDPFlowsWithoutLCB = 0  
TCPMissedPacketsDueToUpdate = 0  
UDPMissedPacketsDueToUpdate = 0  
MemorySize = 1073741824  
HostDirectMemSize = 0  
MaliciousSiteDenyHitCounts  
MaliciousSiteDenyHitCountsAUDIT  
Ethernet Controller Statistics  
Total Packets Received = 0  
Total Received Packets Dropped = 0  
Total Packets Transmitted = 13643"  
sensor#  
Step 3  
Display the statistics for anomaly detection.  
sensor# show statistics anomaly-detection  
Statistics for Virtual Sensor vs0  
No attack  
Detection - ON  
Learning - ON  
Next KB rotation at 10:00:01 UTC Sat Jan 18 2008  
Internal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
External Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Illegal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Statistics for Virtual Sensor vs1  
No attack  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Detection - ON  
Learning - ON  
Next KB rotation at 10:00:00 UTC Sat Jan 18 2008  
Internal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
External Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
Illegal Zone  
TCP Protocol  
UDP Protocol  
Other Protocol  
sensor#  
Step 4  
Step 5  
Display the statistics for authentication.  
sensor# show statistics authentication  
General  
totalAuthenticationAttempts = 128  
failedAuthenticationAttempts = 0  
sensor#  
Display the statistics for the denied attackers in the system.  
sensor# show statistics denied-attackers  
Denied Attackers and hit count for each.  
Denied Attackers and hit count for each.  
Statistics for Virtual Sensor vs0  
Denied Attackers with percent denied and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
Statistics for Virtual Sensor vs1  
Denied Attackers with percent denied and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
sensor#  
Step 6  
Display the statistics for the Event Server.  
sensor# show statistics event-server  
General  
openSubscriptions = 0  
blockedSubscriptions = 0  
Subscriptions  
sensor#  
Step 7  
Display the statistics for the Event Store.  
sensor# show statistics event-store  
EEvent store statistics  
General information about the event store  
The current number of open subscriptions = 2  
The number of events lost by subscriptions and queries = 0  
The number of filtered events not written to the event store = 850763  
The number of queries issued = 0  
The number of times the event store circular buffer has wrapped = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Number of events of each type currently stored  
Status events = 4257  
Shun request events = 0  
Error events, warning = 669  
Error events, error = 8  
Error events, fatal = 0  
Alert events, informational = 0  
Alert events, low = 0  
Alert events, medium = 0  
Alert events, high = 0  
Alert events, threat rating 0-20 = 0  
Alert events, threat rating 21-40 = 0  
Alert events, threat rating 41-60 = 0  
Alert events, threat rating 61-80 = 0  
Alert events, threat rating 81-100 = 0  
Cumulative number of each type of event  
Status events = 4257  
Shun request events = 0  
Error events, warning = 669  
Error events, error = 8  
Error events, fatal = 0  
Alert events, informational = 0  
Alert events, low = 0  
Alert events, medium = 0  
Alert events, high = 0  
Alert events, threat rating 0-20 = 0  
Alert events, threat rating 21-40 = 0  
Alert events, threat rating 41-60 = 0  
Alert events, threat rating 61-80 = 0  
Alert events, threat rating 81-100 = 0  
sensor#  
Step 8  
Display the statistics for global correlation.  
sensor# show statistics global-correlation  
Network Participation:  
Counters:  
Total Connection Attempts = 0  
Total Connection Failures = 0  
Connection Failures Since Last Success = 0  
Connection History:  
Updates:  
Status Of Last Update Attempt = Disabled  
Time Since Last Successful Update = never  
Counters:  
Update Failures Since Last Success = 0  
Total Update Attempts = 0  
Total Update Failures = 0  
Update Interval In Seconds = 300  
Update Server = update-manifests.ironport.com  
Update Server Address = Unknown  
Current Versions:  
Warnings:  
Unlicensed = Global correlation inspection and reputation filtering have been  
disabled because the sensor is unlicensed.  
Action Required = Obtain a new license from http://www.cisco.com/go/license.  
sensor#  
Step 9  
Display the statistics for the host.  
sensor# show statistics host  
General Statistics  
Last Change To Host Config (UTC) = 25-Jan-2012 02:59:18  
Command Control Port Device = Management0/0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Network Statistics  
= ma0_0  
Link encap:Ethernet HWaddr 00:04:23:D5:A1:8D  
=
=
=
=
inet addr:10.89.130.98 Bcast:10.89.131.255 Mask:255.255.254.0  
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1  
RX packets:1688325 errors:0 dropped:0 overruns:0 frame:0  
TX packets:38546 errors:0 dropped:0 overruns:0 carrier:0  
collisions:0 txqueuelen:1000  
=
=
=
RX bytes:133194316 (127.0 MiB) TX bytes:5515034 (5.2 MiB)  
Base address:0xcc80 Memory:fcee0000-fcf00000  
NTP Statistics  
status = Not applicable  
Memory Usage  
usedBytes = 1889357824  
freeBytes = 2210988032  
totalBytes = 4100345856  
CPU Statistics  
Note: CPU Usage statistics are not a good indication of the sensor processin load. The  
Inspection Load Percentage in the output of 'show inspection-load' should be used instead.  
Usage over last 5 seconds = 0  
Usage over last minute = 2  
Usage over last 5 minutes = 2  
Usage over last 5 seconds = 0  
Usage over last minute = 1  
Usage over last 5 minutes = 1  
Memory Statistics  
Memory usage (bytes) = 1889357824  
Memory free (bytes) = 2210988032  
Auto Update Statistics  
lastDirectoryReadAttempt = N/A  
lastDownloadAttempt = N/A  
lastInstallAttempt = N/A  
nextAttempt = N/A  
Auxilliary Processors Installed  
sensor#  
Step 10 Display the statistics for the logging application.  
sensor# show statistics logger  
The number of Log interprocessor FIFO overruns = 0  
The number of syslog messages received = 11  
The number of <evError> events written to the event store by severity  
Fatal Severity = 0  
Error Severity = 64  
Warning Severity = 35  
TOTAL = 99  
The number of log messages written to the message log by severity  
Fatal Severity = 0  
Error Severity = 64  
Warning Severity = 24  
Timing Severity = 311  
Debug Severity = 31522  
Unknown Severity = 7  
TOTAL = 31928  
sensor#  
Step 11 Display the statistics for the ARC.  
sensor# show statistics network-access  
Current Configuration  
LogAllBlockEventsAndSensors = true  
EnableNvramWrite = false  
EnableAclLogging = false  
AllowSensorBlock = false  
BlockMaxEntries = 11  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
MaxDeviceInterfaces = 250  
NetDevice  
Type = PIX  
IP = 10.89.150.171  
NATAddr = 0.0.0.0  
Communications = ssh-3des  
NetDevice  
Type = PIX  
IP = 192.0.2.4  
NATAddr = 0.0.0.0  
Communications = ssh-3des  
NetDevice  
Type = PIX  
IP = 192.0.2.5  
NATAddr = 0.0.0.0  
Communications = telnet  
NetDevice  
Type = Cisco  
IP = 192.0.2.6  
NATAddr = 0.0.0.0  
Communications = telnet  
BlockInterface  
InterfaceName = ethernet0/1  
InterfaceDirection = out  
InterfacePostBlock = Post_Acl_Test  
BlockInterface  
InterfaceName = ethernet0/1  
InterfaceDirection = in  
InterfacePreBlock = Pre_Acl_Test  
InterfacePostBlock = Post_Acl_Test  
NetDevice  
Type = CAT6000_VACL  
IP = 192.0.2.1  
NATAddr = 0.0.0.0  
Communications = telnet  
BlockInterface  
InterfaceName = 502  
InterfacePreBlock = Pre_Acl_Test  
BlockInterface  
InterfaceName = 507  
InterfacePostBlock = Post_Acl_Test  
State  
BlockEnable = true  
NetDevice  
IP = 192.0.2.3  
AclSupport = Does not use ACLs  
Version = 6.3  
State = Active  
Firewall-type = PIX  
NetDevice  
IP = 192.0.2.7  
AclSupport = Does not use ACLs  
Version = 7.0  
State = Active  
Firewall-type = ASA  
NetDevice  
IP = 102.0.2.8  
AclSupport = Does not use ACLs  
Version = 2.2  
State = Active  
Firewall-type = FWSM  
NetDevice  
IP = 192.0.2.9  
AclSupport = uses Named ACLs  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Version = 12.2  
State = Active  
NetDevice  
IP = 192.0.2.10  
AclSupport = Uses VACLs  
Version = 8.4  
State = Active  
BlockedAddr  
Host  
IP = 203.0.113.1  
Vlan =  
ActualIp =  
BlockMinutes =  
Host  
IP = 203.0.113.2  
Vlan =  
ActualIp =  
BlockMinutes =  
Host  
IP = 203.0.113.4  
Vlan =  
ActualIp =  
BlockMinutes = 60  
MinutesRemaining = 24  
Network  
IP = 203.0.113.9  
Mask = 255.255.0.0  
BlockMinutes =  
sensor#  
Step 12 Display the statistics for the notification application.  
sensor# show statistics notification  
General  
Number of SNMP set requests = 0  
Number of SNMP get requests = 0  
Number of error traps sent = 0  
Number of alert traps sent = 0  
sensor#  
Step 13 Display the statistics for OS identification.  
sensor# show statistics os-identification  
Statistics for Virtual Sensor vs0  
OS Identification  
Configured  
Imported  
Learned  
sensor#  
Step 14 Display the statistics for the SDEE server.  
sensor# show statistics sdee-server  
General  
Open Subscriptions = 1  
Blocked Subscriptions = 1  
Maximum Available Subscriptions = 5  
Maximum Events Per Retrieval = 500  
Subscriptions  
sub-4-d074914f  
State = Read Pending  
Last Read Time = 23:54:16 UTC Wed Nov 30 2011  
Last Read Time (nanoseconds) = 1322697256078549000  
sensor#  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Step 15 Display the statistics for the transaction server.  
sensor# show statistics transaction-server  
General  
totalControlTransactions = 35  
failedControlTransactions = 0  
sensor#  
Step 16 Display the statistics for a virtual sensor.  
sensor# show statistics virtual-sensor vs0  
Statistics for Virtual Sensor vs0  
Name of current Signature-Defintion instance = sig0  
Name of current Event-Action-Rules instance = rules0  
List of interfaces monitored by this virtual sensor =  
General Statistics for this Virtual Sensor  
Number of seconds since a reset of the statistics = 1151770  
MemoryAlloPercent = 23  
MemoryUsedPercent = 22  
MemoryMaxCapacity = 3500000  
MemoryMaxHighUsed = 4193330  
MemoryCurrentAllo = 805452  
MemoryCurrentUsed = 789047  
Processing Load Percentage = 1  
Total packets processed since reset = 0  
Total IP packets processed since reset = 0  
Total IPv4 packets processed since reset = 0  
Total IPv6 packets processed since reset = 0  
Total IPv6 AH packets processed since reset = 0  
Total IPv6 ESP packets processed since reset = 0  
Total IPv6 Fragment packets processed since reset = 0  
Total IPv6 Routing Header packets processed since reset = 0  
Total IPv6 ICMP packets processed since reset = 0  
Total packets that were not IP processed since reset = 0  
Total TCP packets processed since reset = 0  
Total UDP packets processed since reset = 0  
Total ICMP packets processed since reset = 0  
Total packets that were not TCP, UDP, or ICMP processed since reset = 0  
Total ARP packets processed since reset = 0  
Total ISL encapsulated packets processed since reset = 0  
Total 802.1q encapsulated packets processed since reset = 0  
Total GRE Packets processed since reset = 0  
Total GRE Fragment Packets processed since reset = 0  
Total GRE Packets skipped since reset = 0  
Total GRE Packets with Bad Header skipped since reset = 0  
Total IpIp Packets with Bad Header skipped since reset = 0  
Total Encapsulated Tunnel Packets with Bad Header skipped since reset = 0  
Total packets with bad IP checksums processed since reset = 0  
Total packets with bad layer 4 checksums processed since reset = 0  
Total cross queue TCP packets processed since reset = 0  
Total cross queue UDP packets processed since reset = 0  
Packets dropped due to regex resources unavailable since reset = 0  
Total number of bytes processed since reset = 0  
The rate of packets per second since reset = 0  
The rate of bytes per second since reset = 0  
The average bytes per packet since reset = 0  
Denied Address Information  
Number of Active Denied Attackers = 0  
Number of Denied Attackers Inserted = 0  
Number of Denied Attacker Victim Pairs Inserted = 0  
Number of Denied Attacker Service Pairs Inserted = 0  
Number of Denied Attackers Total Hits = 0  
Number of times max-denied-attackers limited creation of new entry = 0  
Number of exec Clear commands during uptime = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-90  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Denied Attackers and hit count for each.  
Denied Attackers with percent denied and hit count for each.  
The Signature Database Statistics.  
The Number of each type of node active in the system  
Total nodes active = 0  
TCP nodes keyed on both IP addresses and both ports = 0  
UDP nodes keyed on both IP addresses and both ports = 0  
IP nodes keyed on both IP addresses = 0  
The number of each type of node inserted since reset  
Total nodes inserted = 0  
TCP nodes keyed on both IP addresses and both ports = 0  
UDP nodes keyed on both IP addresses and both ports = 0  
IP nodes keyed on both IP addresses = 0  
The rate of nodes per second for each time since reset  
Nodes per second = 0  
TCP nodes keyed on both IP addresses and both ports per second = 0  
UDP nodes keyed on both IP addresses and both ports per second = 0  
IP nodes keyed on both IP addresses per second = 0  
The number of root nodes forced to expire because of memory constraints  
TCP nodes keyed on both IP addresses and both ports = 0  
Packets dropped because they would exceed Database insertion rate limits = 0  
Fragment Reassembly Unit Statistics for this Virtual Sensor  
Number of fragments currently in FRU = 0  
Number of datagrams currently in FRU = 0  
Number of fragments received since reset = 0  
Number of fragments forwarded since reset = 0  
Number of fragments dropped since last reset = 0  
Number of fragments modified since last reset = 0  
Number of complete datagrams reassembled since last reset = 0  
Fragments hitting too many fragments condition since last reset = 0  
Number of overlapping fragments since last reset = 0  
Number of Datagrams too big since last reset = 0  
Number of overwriting fragments since last reset = 0  
Number of Inital fragment missing since last reset = 0  
Fragments hitting the max partial dgrams limit since last reset = 0  
Fragments too small since last reset = 0  
Too many fragments per dgram limit since last reset = 0  
Number of datagram reassembly timeout since last reset = 0  
Too many fragments claiming to be the last since last reset = 0  
Fragments with bad fragment flags since last reset = 0  
TCP Normalizer stage statistics  
Packets Input = 0  
Packets Modified = 0  
Dropped packets from queue = 0  
Dropped packets due to deny-connection = 0  
Duplicate Packets = 0  
Current Streams = 0  
Current Streams Closed = 0  
Current Streams Closing = 0  
Current Streams Embryonic = 0  
Current Streams Established = 0  
Current Streams Denied = 0  
Total SendAck Limited Packets = 0  
Total SendAck Limited Streams = 0  
Total SendAck Packets Sent = 0  
Statistics for the TCP Stream Reassembly Unit  
Current Statistics for the TCP Stream Reassembly Unit  
TCP streams currently in the embryonic state = 0  
TCP streams currently in the established state = 0  
TCP streams currently in the closing state = 0  
TCP streams currently in the system = 0  
TCP Packets currently queued for reassembly = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Cumulative Statistics for the TCP Stream Reassembly Unit since reset  
TCP streams that have been tracked since last reset = 0  
TCP streams that had a gap in the sequence jumped = 0  
TCP streams that was abandoned due to a gap in the sequence = 0  
TCP packets that arrived out of sequence order for their stream = 0  
TCP packets that arrived out of state order for their stream = 0  
The rate of TCP connections tracked per second since reset = 0  
SigEvent Preliminary Stage Statistics  
Number of Alerts received = 0  
Number of Alerts Consumed by AlertInterval = 0  
Number of Alerts Consumed by Event Count = 0  
Number of FireOnce First Alerts = 0  
Number of FireOnce Intermediate Alerts = 0  
Number of Summary First Alerts = 0  
Number of Summary Intermediate Alerts = 0  
Number of Regular Summary Final Alerts = 0  
Number of Global Summary Final Alerts = 0  
Number of Active SigEventDataNodes = 0  
Number of Alerts Output for further processing = 0  
--MORE--  
Step 17 Display the statistics for the web server.  
sensor# show statistics web-server  
listener-443  
session-11  
remote host = 64.101.182.167  
session is persistent = no  
number of requests serviced on current connection = 1  
last status code = 200  
last request method = GET  
last request URI = cgi-bin/sdee-server  
last protocol version = HTTP/1.1  
session state = processingGetServlet  
number of server session requests handled = 957134  
number of server session requests rejected = 0  
total HTTP requests handled = 365871  
maximum number of session objects allowed = 40  
number of idle allocated session objects = 12  
number of busy allocated session objects = 1  
summarized log messages  
number of TCP socket failure messages logged = 0  
number of TLS socket failure messages logged = 0  
number of TLS protocol failure messages logged = 0  
number of TLS connection failure messages logged = 595015  
number of TLS crypto warning messages logged = 0  
number of TLS expired certificate warning messages logged = 0  
number of receipt of TLS fatal alert message messages logged = 594969  
crypto library version = 6.2.1.0  
sensor#  
Step 18 Clear the statistics for an application, for example, the logging application. The statistics are retrieved  
and cleared.  
sensor# show statistics logger clear  
The number of Log interprocessor FIFO overruns = 0  
The number of syslog messages received = 141  
The number of <evError> events written to the event store by severity  
Fatal Severity = 0  
Error Severity = 14  
Warning Severity = 142  
TOTAL = 156  
The number of log messages written to the message log by severity  
Fatal Severity = 0  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-92  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
Error Severity = 14  
Warning Severity = 1  
Timing Severity = 0  
Debug Severity = 0  
Unknown Severity = 28  
TOTAL = 43  
Step 19 Verify that the statistics have been cleared. The statistics now all begin from 0.  
sensor# show statistics logger  
The number of Log interprocessor FIFO overruns = 0  
The number of syslog messages received = 0  
The number of <evError> events written to the event store by severity  
Fatal Severity = 0  
Error Severity = 0  
Warning Severity = 0  
TOTAL = 0  
The number of log messages written to the message log by severity  
Fatal Severity = 0  
Error Severity = 0  
Warning Severity = 0  
Timing Severity = 0  
Debug Severity = 0  
Unknown Severity = 0  
TOTAL = 0  
sensor#  
Interfaces Information  
The show interfaces command is useful for gathering information on the sensing and command and  
control interfaces. This section describes the show interfaces command, and contains the following  
topics:  
Understanding the show interfaces Command  
You can learn the following information from the show interfaces command:  
Whether the interface is up or down  
Whether or not packets are being seen, and on which interfaces  
Whether or not packets are being dropped by SensorApp  
Whether or not there are errors being reported by the interfaces that can result in packet drops  
The show interfaces command displays statistics for all system interfaces. Or you can use the individual  
commands to display statistics for the command and control interface (show interfaces  
command_control_interface_name), the sensing interface (show interfaces interface_name).  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-93  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Appendix C Troubleshooting  
Gathering Information  
Interfaces Command Output  
The following example shows the output from the show interfaces command:  
sensor# show interfaces  
Interface Statistics  
Total Packets Received = 0  
Total Bytes Received = 0  
Missed Packet Percentage = 0  
Current Bypass Mode = Auto_off  
MAC statistics from interface GigabitEthernet0/1  
Media Type = backplane  
Missed Packet Percentage = 0  
Inline Mode = Unpaired  
Pair Status = N/A  
Link Status = Up  
Link Speed = Auto_1000  
Link Duplex = Auto_Full  
Total Packets Received = 0  
Total Bytes Received = 0  
Total Multicast Packets Received = 0  
Total Broadcast Packets Received = 0  
Total Jumbo Packets Received = 0  
Total Undersize Packets Received = 0  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 0  
Total Bytes Transmitted = 0  
Total Multicast Packets Transmitted = 0  
Total Broadcast Packets Transmitted = 0  
Total Jumbo Packets Transmitted = 0  
Total Undersize Packets Transmitted = 0  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
MAC statistics from interface GigabitEthernet0/0  
Media Type = TX  
Link Status = Up  
Link Speed = Auto_100  
Link Duplex = Auto_Full  
Total Packets Received = 2211296  
Total Bytes Received = 157577635  
Total Multicast Packets Received = 20  
Total Receive Errors = 0  
Total Receive FIFO Overruns = 0  
Total Packets Transmitted = 239723  
Total Bytes Transmitted = 107213390  
Total Transmit Errors = 0  
Total Transmit FIFO Overruns = 0  
sensor#  
Displaying Interface Traffic History  
Use the show interfaces-history [traffic-by-hour | traffic-by-minute] command in EXEC mode to  
display historical interfaces statistics for all system interfaces. The historical information for each  
interface is maintained for three days with 60 seconds granularity. Use the show interfaces-history  
{FastEthernet | GigabitEthernet | Management | PortChannel} [traffic-by-hour |  
traffic-by-minute] command to display statistics for specific interfaces.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-94  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix C Troubleshooting  
Gathering Information  
Note  
You must have health monitoring enabled to support the historic interface function.  
Each record has the following details:  
Total packets received  
Total bytes received  
FIFO overruns  
Receive errors  
Received Mbps  
Missed packet percentage  
Average load  
Peak load  
Note  
Historical data for each interface for the past 72 hours is also included in the show tech-support  
command.  
The following options apply:  
traffic-by-hour—Displays interface traffic history by the hour.  
traffic-by-minute—Displays interface traffic history by the minute.  
past—Displays historical interface traffic information.  
HH:MM—Specifies the amount of time to go back in the past to begin the traffic display. The range  
for HH is 0 to 72. The range for MM is 0 to 59. The minimum value is 00:01 and the maximum value  
is 72:00.  
FastEthernet—Displays statistics for FastEthernet interfaces.  
GigabitEthernet—Displays statistics for GigabitEthernet interfaces.  
Management—Displays statistics for Management interfaces.  
Note  
Only platforms with external ports marked Management support this keyword.  
PortChannel—Displays statistics for PortChannel interfaces.  
Displaying Historical Interface Statistics  
To display interface traffic history, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display the interface traffic history by the hour.  
sensor# show interfaces-history traffic-by-hour past 02:15  
GigabitEthernet0/0  
Time  
FIFO Overruns  
11:30:31 UTC Tue Mar 05 2013  
0
10:27:32 UTC Tue Mar 05 2013  
0
Packets Received  
Bytes Received  
Mbps  
MPP  
0
Receive Errors  
Avg Load  
Peak Load  
0
0
0
0
0
0
0
0
0
0
0
0
0
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-95  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix C Troubleshooting  
Gathering Information  
GigabitEthernet0/1  
Time  
Packets Received  
Bytes Received  
Mbps  
MPP  
0
FIFO Overruns  
Receive Errors  
Avg Load  
Peak Load  
11:30:31 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
10:27:32 UTC Tue Mar 05 2013  
0
0
0
0
GigabitEthernet0/2  
Time  
Packets Received  
Bytes Received  
Mbps  
MPP  
0
FIFO Overruns  
Receive Errors  
Avg Load  
Peak Load  
11:30:31 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
0
10:27:32 UTC Tue Mar 05 2013  
0
0
0
GigabitEthernet0/3  
Time  
Packets Received  
Bytes Received  
Mbps  
MPP  
0
FIFO Overruns  
Receive Errors  
Avg Load  
Peak Load  
11:30:31 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
10:27:32 UTC Tue Mar 05 2013  
0
0
0
0
Management0/0  
Time  
FIFO Overruns  
11:30:31 UTC Tue Mar 05 2013  
0
Packets Received  
Avg Load  
31071600  
Bytes Received  
3240924703  
Mbps  
MPP  
0
Receive Errors  
Peak Load  
0
0
0
0
0
10:27:32 UTC Tue Mar 05 2013  
0
30859941  
0
3216904786  
0
0
0
--MORE--  
Step 3  
Display the interface traffic history by the minute.  
sensor# show interfaces-history traffic-by-minute past 00:45  
GigabitEthernet0/0  
Time  
FIFO Overruns  
12:27:49 UTC Tue Mar 05 2013  
Packets Received  
Bytes Received  
Mbps  
MPP  
0
Receive Errors  
Avg Load  
Peak Load  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
12:26:45 UTC Tue Mar 05 2013  
0
12:25:48 UTC Tue Mar 05 2013  
0
12:24:42 UTC Tue Mar 05 2013  
0
12:23:37 UTC Tue Mar 05 2013  
0
12:22:30 UTC Tue Mar 05 2013  
0
12:21:31 UTC Tue Mar 05 2013  
0
12:20:29 UTC Tue Mar 05 2013  
0
12:19:25 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
12:18:18 UTC Tue Mar 05 2013  
0
12:17:12 UTC Tue Mar 05 2013  
0
0
0
0
0
12:16:07 UTC Tue Mar 05 2013  
0
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-96  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
12:15:00 UTC Tue Mar 05 2013  
0
12:13:54 UTC Tue Mar 05 2013  
0
12:12:49 UTC Tue Mar 05 2013  
0
12:11:43 UTC Tue Mar 05 2013  
0
12:10:36 UTC Tue Mar 05 2013  
0
12:09:30 UTC Tue Mar 05 2013  
0
12:08:24 UTC Tue Mar 05 2013  
0
12:07:25 UTC Tue Mar 05 2013  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
12:06:23 UTC Tue Mar 05 2013  
0
12:05:25 UTC Tue Mar 05 2013  
0
0
0
sensor#  
Step 4  
Display the interface traffic history for a specific interface.  
sensor# show interfaces-history GigabitEthernet0/0 traffic-by-minute past 00:05  
GigabitEthernet0/0  
Time  
FIFO Overruns  
13:34:38 UTC Thu Mar 07 2013  
0
13:33:35 UTC Thu Mar 07 2013  
0
13:32:32 UTC Thu Mar 07 2013  
0
13:31:27 UTC Thu Mar 07 2013  
0
13:30:25 UTC Thu Mar 07 2013  
0
Packets Received  
Receive Errors Avg Load Peak Load  
Bytes Received  
Mbps  
MPP  
00  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
00  
00  
00  
00  
0
0
0
0
sensor#  
Events Information  
You can use the show events command to view the alerts generated by SensorApp and errors generated  
by an application. This section describes the show events command, and contains the following topics:  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-97  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix C Troubleshooting  
Gathering Information  
Sensor Events  
There are five types of events:  
evAlert—Intrusion detection alerts  
evError—Application errors  
evStatus—Status changes, such as an IP log being created  
evLogTransaction—Record of control transactions processed by each sensor application  
evShunRqst—Block requests  
Events remain in the Event Store until they are overwritten by newer events.  
Understanding the show events Command  
Note  
The Event Store has a fixed size of 30 MB for all platforms.  
The show events command is useful for troubleshooting event capture issues in which you are not seeing  
events in Event Viewer or Security Monitor. You can use the show events command to determine which  
events are being generated on the sensor to make sure events are being generated and that the fault lies  
with the monitoring side.  
You can clear all events from Event Store by using the clear events command.  
Here are the parameters for the show events command:  
sensor# show events  
<cr>  
alert  
error  
hh:mm[:ss]  
log  
Display local system alerts.  
Display error events.  
Display start time.  
Display log events.  
nac  
past  
status  
|
Display NAC shun events.  
Display events starting in the past specified time.  
Display status events.  
Output modifiers.  
Displaying Events  
Note  
The Event Store has a fixed size of 30 MB for all platforms.  
Note  
Events are displayed as a live feed. To cancel the request, press Ctrl-C.  
Use the show events [{alert [informational] [low] [medium] [high] [include-traits traits]  
[exclude-traits traits] [min-threat-rating min-rr] [max-threat-rating max-rr] | error [warning]  
[error] [fatal] | NAC | status}] [hh:mm:ss [month day [year]] | past hh:mm:ss] command to display  
events from Event Store. Events are displayed beginning at the start time. If you do not specify a start  
time, events are displayed beginning at the current time. If you do not specify an event type, all events  
are displayed.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-98  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix C Troubleshooting  
Gathering Information  
The following options apply:  
alert—Displays alerts. Provides notification of some suspicious activity that may indicate an attack  
is in process or has been attempted. Alert events are generated by the Analysis Engine whenever a  
signature is triggered by network activity. If no level is selected (informational, low, medium, or  
high), all alert events are displayed.  
include-traits—Displays alerts that have the specified traits.  
exclude-traits—Does not display alerts that have the specified traits.  
traits—Specifies the trait bit position in decimal (0 to 15).  
min-threat-rating—Displays events with a threat rating above or equal to this value. The default is  
0. The valid range is 0 to 100.  
max-threat-rating—Displays events with a threat rating below or equal to this value. The default  
is 100. The valid range is 0 to 100.  
error—Displays error events. Error events are generated by services when error conditions are  
encountered. If no level is selected (warning, error, or fatal), all error events are displayed.  
NAC—Displays the ARC (block) requests.  
Note  
The ARC is formerly known as NAC. This name change has not been completely  
implemented throughout the IDM, the IME, and the CLI.  
status—Displays status events.  
past—Displays events starting in the past for the specified hours, minutes, and seconds.  
hh:mm:ss—Specifies the hours, minutes, and seconds in the past to begin the display.  
Note  
The show events command continues to display events until a specified event is available. To exit, press  
Ctrl-C.  
Displaying Events  
To display events from the Event Store, follow these steps:  
Step 1  
Step 2  
Log in to the CLI.  
Display all events starting now. The feed continues showing all events until you press Ctrl-C.  
sensor# show events  
evError: eventId=1041472274774840147 severity=warning vendor=Cisco  
originator:  
hostId: sensor2  
appName: cidwebserver  
appInstanceId: 12075  
time: 2011/01/07 04:41:45 2011/01/07 04:41:45 UTC  
errorMessage: name=errWarning received fatal alert: certificate_unknown  
evError: eventId=1041472274774840148 severity=error vendor=Cisco  
originator:  
hostId: sensor2  
appName: cidwebserver  
appInstanceId: 351  
time: 2011/01/07 04:41:45 2011/01/07 04:41:45 UTC  
errorMessage: name=errTransport WebSession::sessionTask(6) TLS connection exce  
ption: handshake incomplete.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-99  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Appendix C Troubleshooting  
Gathering Information  
Step 3  
Display the block requests beginning at 10:00 a.m. on February 9, 2011.  
sensor# show events NAC 10:00:00 Feb 9 2011  
evShunRqst: eventId=1106837332219222281 vendor=Cisco  
originator:  
deviceName: Sensor1  
appName: NetworkAccessControllerApp  
appInstance: 654  
time: 2011/02/09 10:33:31 2011/08/09 13:13:31  
shunInfo:  
host: connectionShun=false  
srcAddr: 11.0.0.1  
destAddr:  
srcPort:  
destPort:  
protocol: numericType=0 other  
timeoutMinutes: 40  
evAlertRef: hostId=esendHost 123456789012345678  
sensor#  
Step 4  
Display errors with the warning level starting at 10:00 a.m. on February 9, 2011.  
sensor# show events error warning 10:00:00 Feb 9 2011  
evError: eventId=1041472274774840197 severity=warning vendor=Cisco  
originator:  
hostId: sensor  
appName: cidwebserver  
appInstanceId: 12160  
time: 2011/01/07 04:49:25 2011/01/07 04:49:25 UTC  
errorMessage: name=errWarning received fatal alert: certificate_unknown  
Step 5  
Display alerts from the past 45 seconds.  
sensor# show events alert past 00:00:45  
evIdsAlert: eventId=1109695939102805307 severity=medium vendor=Cisco  
originator:  
hostId: sensor  
appName: sensorApp  
appInstanceId: 367  
time: 2011/03/02 14:15:59 2011/03/02 14:15:59 UTC  
signature: description=Nachi Worm ICMP Echo Request id=2156 version=S54  
subsigId: 0  
sigDetails: Nachi ICMP  
interfaceGroup:  
vlan: 0  
participants:  
attacker:  
addr: locality=OUT 10.89.228.202  
target:  
addr: locality=OUT 10.89.150.185  
riskRatingValue: 70  
interface: fe0_1  
protocol: icmp  
evIdsAlert: eventId=1109695939102805308 severity=medium vendor=Cisco  
originator:  
--MORE--  
Step 6  
Display events that began 30 seconds in the past.  
sensor# show events past 00:00:30  
evStatus: eventId=1041526834774829055 vendor=Cisco  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Troubleshooting  
Gathering Information  
originator:  
hostId: sensor  
appName: mainApp  
appInstanceId: 2215  
time: 2011/01/08 02:41:00 2011/01/08 02:41:00 UTC  
controlTransaction: command=getVersion successful=true  
description: Control transaction response.  
requestor:  
user: cids  
application:  
hostId: 64.101.182.101  
appName: -cidcli  
appInstanceId: 2316  
evStatus: eventId=1041526834774829056 vendor=Cisco  
originator:  
hostId: sensor  
appName: login(pam_unix)  
appInstanceId: 2315  
time: 2011/01/08 02:41:00 2011/01/08 02:41:00 UTC  
syslogMessage:  
description: session opened for user cisco by cisco(uid=0)  
Clearing Events  
Use the clear events command to clear the Event Store.  
To clear events from the Event Store, follow these steps:  
Step 1  
Step 2  
Log in to the CLI using an account with administrator privileges.  
Clear the Event Store.  
sensor# clear events  
Warning: Executing this command will remove all events currently stored in the event  
store.  
Continue with clear? []:  
Step 3  
Enter yesto clear the events.  
cidDump Script  
If you do not have access to the IDM, the IME, or the CLI, you can run the underlying script cidDump  
from the service account by logging in as root and running /usr/cids/idsRoot/bin/cidDump. The path of  
the cidDump file is /usr/cids/idsRoot/htdocs/private/cidDump.html. cidDump is a script that captures a  
large amount of information including the IPS processes list, log files, OS information, directory  
listings, package information, and configuration files.  
To run the cidDump script, follow these steps:  
Step 1  
Step 2  
Log in to the sensor service account.  
Su to root using the service account password.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-101  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Appendix C Troubleshooting  
Gathering Information  
Step 3  
Step 4  
Step 5  
Enter the following command.  
/usr/cids/idsRoot/bin/cidDump  
Enter the following command to compress the resulting /usr/cids/idsRoot/log/cidDump.html file.  
gzip /usr/cids/idsRoot/log/cidDump.html  
Send the resulting HTML file to TAC or the IPS developers in case of a problem.  
For More Information  
For the procedure for putting a file on the Cisco FTP site, see Uploading and Accessing Files on the  
Uploading and Accessing Files on the Cisco FTP Site  
You can upload large files, for example, cidDump.html, the show tech-support command output, and  
cores, to the ftp-sj server.  
To upload and access files on the Cisco FTP site, follow these steps:  
Step 1  
Step 2  
Step 3  
Step 4  
Step 5  
Log in to ftp-sj.cisco.com as anonymous.  
Change to the /incoming directory.  
Use the put command to upload the files. Make sure to use the binary transfer type.  
To access uploaded files, log in to an ECS-supported host.  
Change to the /auto/ftp/incoming directory.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
C-102  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
A P P E N D I X  
D
CLI Error Messages  
This appendix lists the CLI error messages and CLI validation error messages. It contains the following  
sections:  
CLI Error Messages  
Table D-1 describes CLI error messages.  
Table D-1  
CLI Error Messages  
Error Message  
Reason  
Command  
getVirtualSensorStatistics :  
Analysis Engine is busy  
Analysis Engine is busy because the show statistics  
virtual sensor has not finished  
initializing.  
virtual-sensor  
getVirtualSensorStatistics :  
Analysis Engine is busy  
rebuilding regex tables.  
This may take a while.  
Analysis Engine is busy building  
cache files immediately after the  
sensor has been imaged.  
show statistics  
virtual-sensor  
editConfigDeltaSignatureDefi  
nition : Analysis Engine is  
busy rebuilding regex  
tables. This may take a  
while.  
Analysis Engine is busy building  
cache files immediately after the  
sensor has been imaged.  
service  
signature-definition  
Invalid command received.  
The .conf file and code are out of  
synchronization, which should never  
occur in the field.  
All commands  
Invalid port number was  
entered.  
An out-of-range port number was  
entered in URI.  
copy, upgrade,  
show tech-support  
Invalid scheme was entered.  
Internal tables are out of  
copy, upgrade,  
synchronization, which should never show tech-support  
occur in the field.  
Unknown scheme was entered.  
An invalid scheme was entered in  
URI.  
copy, upgrade,  
show tech-support  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
D-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Appendix D CLI Error Messages  
CLI Error Messages  
Table D-1  
CLI Error Messages (continued)  
Error Message  
Reason  
Command  
The filename <file> is not a  
valid upgrade file type.  
Attempt to install the wrong file for upgrade  
your platform and version.  
idsPackageMgr: digital  
signature of the update was  
not valid  
The signature update or service pack upgrade  
is corrupt. Contact TAC.  
Cannot create a new  
event-action-rules  
configuration. “rules0” is  
currently the only  
An invalid logical instance name was service event-action-rules  
entered for service event action  
rules.1  
configuration allowed.  
Cannot create a new  
signature-definition  
configuration. “sig0” is  
currently the only  
An invalid logical instance name was service  
entered for service signature  
signature-definition  
definition.2  
configuration allowed.  
Cannot create a new  
anomaly-detection  
configuration. “ad0” is  
currently the only  
configuration allowed.  
An invalid logical instance name was service anomaly-detection  
entered for service anomaly  
detection.3  
User does not exist.  
The Administrator is attempting to  
change the password for a username  
that does not exist in the system.  
password  
Incorrect password for user  
account.  
The user entered an invalid password password  
while attempting to change the  
password.  
Empty user list.  
The curUserAccountList.xml file  
does not contain any entries, which  
should never occur in the field.  
username  
User already exists.  
An attempt to create a user that  
already exists in the system was  
made.  
username  
Cannot communicate with  
system processes. Please  
contact your system  
administrator.  
One or more required applications is All commands  
not responding to control  
transactions.  
Source and Destination are  
the same.  
copy  
Backup config was missing.  
The user attempted to copy or erase copy  
the backup config file but no backup erase  
config file has been generated.  
Could not load CLI  
configuration files, can not  
complete request.  
The .conf files could not be located, copy  
which should never occur in the  
field.  
Error writing to <URL>.  
The URL specified in the destination copy  
could not be written.  
Error reading from <URL>.  
The URL specified in the source  
could not be read.  
copy  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
D-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix D CLI Error Messages  
CLI Error Messages  
Table D-1  
Error Message  
CLI Error Messages (continued)  
Reason  
Command  
Packet-file does not exist.  
The user attempted to copy or erase copy  
the packet-file but no packet-file has erase  
been captured.  
No downgrade available.  
No packet-file available.  
The user attempted to downgrade a downgrade  
system that has not been upgraded.  
The user attempted to display the  
file-info or the packet-file but no  
packet-file exists.  
packet  
Log file exists but an error  
occurred during read.  
The user was displaying or copying packet  
an iplog file that was overwritten.  
The partial file contents should still  
be viewable.  
Another user is currently  
capturing into the  
packet-file. Please try  
again later.  
packet capture  
Another CLI client is  
currently displaying packets  
from the interface.  
The user must wait for the other CLI packet display  
session to terminate display before  
this will be available. Multiple users  
may display the command control  
interface simultaneously.  
Log does not exist.  
The user attempted to copy or  
copy iplog  
display an iplog that does not exist. packet display iplog  
The requested IPLOG is not  
complete. Please try again  
after the IPLOG status is  
'completed.'  
The user attempted to copy or  
display an iplog that is not complete.  
copy iplog  
copy iplog  
Could not create pipe  
/usr/cids/idsRoot/tmp/  
pipe_cliPacket.<pid>.tmp  
Could not open pipe for sending  
iplog file. This indicates a space or  
resource limitation, which should  
not occur in the field.  
The log file was overwritten  
while the copy was in  
progress. The copied log file  
may be viewable but is  
incomplete.  
The iplog was overwritten while it  
was being copied off the sensor.  
copy iplog  
Could not read license file.  
The license file was copied but  
cannot be opened.  
copy license-key  
copy license-key  
Could not write the temporary  
license file location used to  
copy the file off the box.  
Could not open the temporary  
storage location  
/usr/cids/idsRoot/tmp/ips.lic. This  
indicates a space issue, which should  
not occur in the field.  
Virtual sensor name does not  
exist.  
The user attempted to start or stop an iplog  
iplog on a non-existent virtual  
sensor.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
D-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix D CLI Error Messages  
CLI Error Messages  
Table D-1  
CLI Error Messages (continued)  
Error Message  
Reason  
Command  
You do not have permission to  
terminate the requested CLI  
session.  
An operator or viewer user attempted clear line  
to terminate a CLI session belonging  
to another user.  
Invalid CLI ID specified, use  
the 'show users all' command  
to view the valid CLI session  
IDs.  
The user attempted to cancel a CLI clear line  
session that does not exist.  
The maximum allowed CLI  
sessions are currently open,  
please try again later.  
Operator or viewer user attempted to initial login  
log in when the maximum number of  
CLI sessions were already open.  
The maximum allowed CLI  
Administrator user attempted to log initial login  
in when the maximum number of  
CLI sessions were already open.  
sessions are currently open,  
would you like to terminate  
one of the open sessions?  
Can not communicate with  
system processes. Please  
contact your system  
administrator.  
The CLI cannot contact the  
applications on the sensor to retrieve  
start-up information. This is a fatal  
error that should never happen. The  
user has to log in to the service  
account and manually reboot the  
sensor.  
initial login  
The instance cannot be  
removed. Instance assigned  
to virtual sensor name.  
The user attempted to remove a  
configuration instance that is  
currently assigned to a virtual sensor.  
Use the default service command to  
reset the configuration setting to  
default.  
no service component  
instance  
Insufficient disk space to  
complete request.  
Not enough disk space is available to copy instance  
create a new instance of a  
configuration file.  
service component instance  
execAutoUpdateNow : DNS or  
HTTP proxy is required for  
Auto Updates from  
www.cisco.com but no DNS or  
proxy servers are defined.  
Add an HTTP proxy server or  
DNS server in the 'host'  
service configuration  
Unsuccessful automatic download  
attempt from Cisco.com because a  
DNS or HTTP proxy server is not  
configured.  
autoupdatenow  
execAutoUpdateNow : either  
of cisco-server or  
user-server is not enabled in  
the 'host' service  
configuration. Enable one of  
them to download updates.  
Unsuccessful automatic download  
attempt from Cisco.com because  
either the Cisco server or user server  
is not enable in the service host  
configuration.  
autoupdatenow  
Not a valid upgrade file.  
If the user tries to get the hash for a show digest [md5 |  
file does not exist.  
sha2-512] file  
No such file or directory.  
If the user tries to erase a file that  
does not exist.  
erase upgrade-file file  
1. This error only occurs on platforms that do not support virtual policies.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
D-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix D CLI Error Messages  
CLI Error Messages  
2. This error only occurs on platforms that do not support virtual policies.  
3. This error only occurs on platforms that do not support virtual policies.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
D-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix D CLI Error Messages  
CLI Validation Error Messages  
CLI Validation Error Messages  
Table D-2 describes the validation error messages.  
Table D-2 Validation Error Messages  
Error Message  
Reason/Location  
Interface ‘name’ has not been subdivided.  
The physical interface or inline interface name  
subinterface type is none (service interface  
submode).  
Interface ‘name’ subinterface ‘num’ does  
not exist.  
The physical interface name has been subdivided  
into inline VLAN pairs, but the specified  
subinterface number does not exist (service  
interface submode).  
Interface ‘name’ is the command-control  
interface.  
The physical interface name is the command and  
control interface (service interface submode).  
Interface ‘name’ has been subdivided.  
The physical interface name subinterface type is  
inline VLAN pair or VLAN group. Or the inline  
interface name subinterface type is VLAN group  
(service interface submode).  
Interface ‘name’ is assigned to  
inline-interfaces ‘inlinename.’  
The physical interface name is assigned to an  
inline interface entry’s interface1 or interface2  
(service interface submode).  
Vlan ‘vlannum’ is assigned to subinterface  
‘subnum.’  
The VLAN vlannum is already assigned to a  
different subinterface subnum entry’s vlan1 or  
vlan2 (service interface submode).  
Vlan range ‘vlanrange’ overlaps with vlans  
assigned to subinterface ‘subnum.’  
The VLAN range vlanrange contains values that  
are already used in a different subinterface  
subnum entry’s vlans range (service interface  
submode).  
Unassigned vlans already assigned to  
subinterface ‘subnum.’  
Unassigned VLANs have already been selected in  
a different subinterface subnum entry.  
Inline-interface ‘inlinename’ does not  
exist.  
The inline interface inlinename does not exist  
(service interface submode).  
The default-vlans for the selected  
interfaces do not match. interface1, ‘name’  
default-vlan is ‘vlannum,’ interface2,  
‘name’ default-vlan is ‘vlannum.’  
The user is trying to change the subinterface type  
of an inline interface to VLAN group, but the  
default VLANs for the two interfaces assigned to  
the inline interface do not match (service interface  
submode).  
interface1 and interface2 must be set  
The user is trying to change the subinterface type  
before the logical interface can be divided of an inline interface to VLAN group, but has not  
into subinterfaces.  
set both interface1 and interface2 (service  
interface submode).  
Interface ‘name’ has not been subdivided  
into inline-vlan-pairs.  
The physical interface name subinterface type is  
not inline VLAN pair (service interface  
submode).  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
D-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix D CLI Error Messages  
CLI Validation Error Messages  
Table D-2  
Error Message  
Validation Error Messages (continued)  
Reason/Location  
Interface already assigned to virtual  
sensor ‘vsname.’  
The interface and optional sub-interface being  
added to the virtual sensor entry physical  
interface set has already been assigned to another  
virtual sensor entry.  
The instance cannot be removed. Instance  
assigned to virtual sensor ‘vsname.’  
The user is trying to remove a signature  
definition, event action rules, or anomaly  
detection configuration file that is currently in use  
by virtual sensor vsname.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
D-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix D CLI Error Messages  
CLI Validation Error Messages  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
D-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
G L O S S A R Y  
Revised: April 25, 2013  
Numerals  
Triple Data Encryption Standard. A stronger version of DES, which is the default encryption method  
for SSH version 1.5. Used when establishing an SSH session with the sensor. It can be used when the  
sensor is managing a device.  
3DES  
A set of IEEE standards for the definition of LAN protocols.  
802.x  
A
authentication, authorization, and accounting. Pronounced “triple a.” The primary and recommended  
method for access control in Cisco devices.  
AAA  
Access Control Entry. An entry in the ACL that describes what action should be taken for a specified  
address or protocol. The sensor adds/removes ACE to block hosts.  
ACE  
ACK  
ACL  
acknowledgement. Notification sent from one network device to another to acknowledge that some  
event occurred (for example, the receipt of a message).  
Access Control List. A list of ACEs that control the flow of data through a router. There are two ACLs  
per router interface for inbound data and outbound data. Only one ACL per direction can be active at a  
time. ACLs are identified by number or by name. ACLs can be standard, enhanced, or extended. You  
can configure the sensor to manage ACLs.  
Cisco Access Control Server. A RADIUS security server that is the centralized control point for  
managing network users, network administrators, and network infrastructure resources.  
ACS server  
action  
The response of the sensor to an event. An action only happens if the event is not filtered. Examples  
include TCP reset, block host, block connection, IP logging, and capturing the alert trigger packet.  
The ACL created and maintained by ARC and applied to the router block interfaces.  
active ACL  
ASA. Combines firewall, VPN concentrator, and intrusion prevention software functionality into one  
software image. You can configure the adaptive security appliance in single mode or multi-mode.  
adaptive security  
appliance  
Application Inspection and Control engine. Provides deep analysis of web traffic. It provides granular  
control over HTTP sessions to prevent abuse of the HTTP protocol. It allows administrative control  
over applications that try to tunnel over specified ports, such as instant messaging, and tunneling  
applications, such as gotomypc. It can also inspect FTP traffic and control the commands being issued.  
AIC engine  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Glossary  
Intrusion Prevention System Security Services Processor. The IPS is running as a service and ASA  
controls sending and receiving traffic to and from the IPS. The IPS services processor monitors and  
performs real-time analysis of network traffic by looking for anomalies and misuse based on an  
extensive, embedded signature library. When the ASA 5500-X IPS SSP detects unauthorized activity,  
it can terminate the specific connection, permanently block the attacking host, log the incident, and  
send an alert to the device manager. See also adaptive security appliance.  
ASA 5500-X IPS SSP  
Intrusion Prevention System Security Services Processor. The IPS plug-in module in the Cisco ASA  
5585-X adaptive security appliance. The ASA 5585-X IPS SSP is an IPS services processor that  
monitors and performs real-time analysis of network traffic by looking for anomalies and misuse based  
on an extensive, embedded signature library. When the ASA 5585-X IPS SSP detects unauthorized  
activity, it can terminate the specific connection, permanently block the attacking host, log the incident,  
and send an alert to the device manager. See also adaptive security appliance.  
ASA 5585-X IPS SSP  
The IPS software module that processes all signature events generated by the inspectors. Its primary  
function is to generate alerts for each event it receives.  
Alarm Channel  
alert  
Specifically, an IPS event type; it is written to the Event Store as an evidsAlert. In general, an alert is  
an IPS message that indicates a network exploit in progress or a potential security problem occurrence.  
Also known as an alarm.  
The IPS software module that handles sensor configuration. It maps the interfaces and also the  
signature and alarm channel policy to the configured interfaces. It performs packet analysis and alert  
detection. The Analysis Engine functionality is provided by the SensorApp process.  
Analysis Engine  
AD. The sensor component that creates a baseline of normal network traffic and then uses this baseline  
to detect worm-infected hosts.  
anomaly detection  
API  
Application Programming Interface. The means by which an application program talks to  
communications software. Standardized APIs allow application programs to be developed  
independently of the underlying method of communication. Computer application programs run a set  
of standard software interrupts, calls, and data formats to initiate contact with other devices (for  
example, network services, mainframe communications programs, or other program-to-program  
communications). Typically, APIs make it easier for software developers to create links that an  
application needs to communicate with the operating system or with the network.  
Any program (process) designed to run in the Cisco IPS environment.  
application  
Full IPS image stored on a permanent storage device used for operating the sensor.  
application image  
application instance  
A specific application running on a specific piece of hardware in the IPS environment. An application  
instance is addressable by its name and the IP address of its host computer.  
The bootable disk or compact-flash partition that contains the IPS software image.  
application partition  
ARC  
Attack Response Controller. Formerly known as Network Access Controller (NAC). A component of  
the IPS. A software module that provides block and unblock functionality where applicable.  
The overall structure of a computer or communication system. The architecture influences the  
capabilities and limitations of the system.  
architecture  
ARP  
Address Resolution Protocol. Internet protocol used to map an IP address to a MAC address. Defined  
in RFC 826.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Adaptive Security Device Manager. A web-based application that lets you configure and manage your  
adaptive security device.  
ASDM  
Abstract Syntax Notation 1. Standard for data presentation.  
ASN.1  
Version information associated with a group of IDIOM default configuration settings. For example,  
Cisco Systems publishes the standard set of attack signatures as a collection of default settings with the  
S aspect. The S-aspect version number is displayed after the S in the signature update package file  
name. Other aspects include the Virus signature definitions in the V-aspect and IDIOM signing keys in  
the key-aspect.  
aspect version  
Represents exploits contained within a single packet. For example, the “ping of death” attack is a  
single, abnormally large ICMP packet.  
atomic attack  
Atomic engine  
attack  
There are two Atomic engines: Atomic IP inspects IP protocol packets and associated Layer-4 transport  
protocols, and Atomic ARP inspects Layer-2 ARP protocol.  
An assault on system security that derives from an intelligent threat, that is, an intelligent act that is a  
deliberate attempt (especially in the sense of method or technique) to evade security services and  
violate the security policy of a system.  
ARR. A weight associated with the relevancy of the targeted OS. The attack relevance rating is a  
derived value (relevant, unknown, or not relevant), which is determined at alert time. The relevant OSes  
are configured per signature.  
attack relevance  
rating  
ASR. A weight associated with the severity of a successful exploit of the vulnerability. The attack  
severity rating is derived from the alert severity parameter (informational, low, medium, or high) of the  
signature. The attack severity rating is configured per signature and indicates how dangerous the event  
detected is.  
attack severity  
rating  
Process of verifying that a user has permission to use the system, usually by means of a password key  
or certificate.  
authentication  
AuthenticationApp  
autostate  
A component of the IPS. Authorizes and authenticates users based on IP address, password, and digital  
certificates.  
In normal autostate mode, the Layer 3 interfaces remain up if at least one port in the VLAN remains  
up. If you have appliances, such as load balancers or firewall servers that are connected to the ports in  
the VLAN, you can configure these ports to be excluded from the autostate feature to make sure that  
the forwarding SVI does not go down if these ports become inactive.  
Anti-Virus.  
AV  
B
The physical connection between an interface processor or card and the data buses and the power dis-  
tribution buses inside a chassis.  
backplane  
A software release that must be installed before a follow-up release, such as a service pack or signature  
update, can be installed. Major and minor updates are base version releases.  
base version  
A situation in which a signature is fired correctly, but the source of the traffic is nonmalicious.  
benign trigger  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Basic Input/Output System. The program that starts the sensor and communicates between the devices  
in the sensor and the system.  
BIOS  
Routing term for an area of the internetwork where packets enter, but do not emerge, due to adverse  
conditions or poor system configuration within a portion of the network.  
blackhole  
block  
The ability of the sensor to direct a network device to deny entry to all packets from a specified network  
host or network.  
The interface on the network device that the sensor manages.  
block interface  
BO  
BackOrifice. The original Windows back door Trojan that ran over UDP only.  
BackOrifice 2000. A Windows back door Trojan that runs over TCP and UDP.  
BO2K  
A small set of system software that runs when the system first powers up. It loads the operating system  
(from the disk, network, external compact flash, or external USB flash), which loads and runs the IPS  
application. For the AIM IPS, it boots the module from the network and assists in software installation  
and upgrades, disaster recovery, and other operations when the module cannot access its software.  
bootloader  
A collection of software robots, or bots, that run autonomously and automatically. The term is often  
associated with malicious software but it can also refer to the network of computers using distributed  
computing software. The term Botnet is used to refer to a collection of compromised computers (called  
Zombie computers) running software, usually installed through worms, Trojan horses, or back doors,  
under a common command-and-control infrastructure.  
Botnets  
Bridge Protocol Data Unit. Spanning-Tree Protocol hello packet that is sent out at configurable inter-  
vals to exchange information among bridges in the network.  
Bpdu  
In computing, Bubble Babble is a binary data encoding designed by Antti Huima. This encoding uses  
alternation of consonants and vowels to encode binary data to pseudowords that can be pronounced  
more easily than arbitrary lists of hexadecimal digits. While Bubble Babble is technically a binary  
encoding, it also acts as a 65,536-digit positional number system with a one-to-one mapping from each  
five-character sequence to 16 bits of data.  
Bubble Babble  
Mode that lets packets continue to flow through the sensor even if the sensor fails. Bypass mode is only  
applicable to inline-paired interfaces.  
bypass mode  
C
certification authority. Entity that issues digital certificates (especially X.509 certificates) and vouches  
for the binding between the data items in a certificate. Sensors use self-signed certificates.  
CA  
Certificate for one CA issued by another CA.  
CA certificate  
CEF  
Cisco Express Forwarding. CEF is advanced, Layer 3 IP switching technology. CEF optimizes network  
performance and scalability for networks with large and dynamic traffic patterns, such as the Internet,  
on networks characterized by intensive Web-based applications, or interactive sessions.  
Digital representation of user or device attributes, including a public key, that is signed with an  
authoritative private key.  
certificate  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
A script that captures a large amount of information including the IPS processes list, log files, OS  
information, directory listings, package information, and configuration files.  
cidDump  
CIDEE  
Cisco Intrusion Detection Event Exchange. Specifies the extensions to SDEE that are used by Cisco  
IPS systems. The CIDEE standard specifies all possible extensions that may be supported by Cisco IPS  
systems.  
The header that is attached to each packet in the IPS system. It contains packet classification, packet  
length, checksum results, timestamp, and the receive interface.  
CIDS header  
cipher key  
The secret binary data used to convert between clear text and cipher text. When the same cipher key is  
used for both encryption and decryption, it is called symmetric. When it is used for either encryption  
or decryption (but not both), it is called asymmetric.  
Cisco system software that provides common functionality, scalability, and security for all products  
under the CiscoFusion architecture. Cisco IOS allows centralized, integrated, and automated  
installation and management of internetworks while supporting a wide variety of protocols, media,  
services, and platforms.  
Cisco IOS  
command-line interface. A shell provided with the sensor used for configuring and controlling the  
sensor applications.  
CLI  
A component of the IPS. Shares information with other devices through a global correlation database  
to improve the combined efficacy of all the devices.  
CollaborationApp  
The interface on the sensor that communicates with the IPS manager and other network devices. This  
interface has an assigned IP address.  
command and  
control interface  
In SNMP, a logical group of managed devices and NMSs in the same administrative domain.  
community  
Spans multiple packets in a single session. Examples include most conversation attacks such as FTP,  
Telnet, and most Regex-based attacks.  
composite attack  
ARC blocks traffic from a given source IP address to a given destination IP address and destination  
port.  
connection block  
A terminal or laptop computer used to monitor and control the sensor.  
console  
An RJ45 or DB9 serial port on the sensor that is used to connect to a console device.  
console port  
control interface  
When ARC opens a Telnet or SSH session with a network device, it uses one of the routing interfaces  
of the device as the remote IP address. This is the control interface.  
CT. An IPS message containing a command addressed to a specific application instance. Control  
transactions can be sent between a management application and an IPS sensor, or between applications  
on the same IPS sensor. Example control transactions include start, stop, getConfig.  
control transaction  
A component of the IPS. Accepts control transactions from a remote client, initiates a local control  
transaction, and returns the response to the remote client.  
Control Transaction  
Server  
A component of the IPS. Waits for control transactions directed to remote applications, forwards the  
control transactions to the remote node, and returns the response to the initiator.  
Control Transaction  
Source  
A piece of information sent by a web server to a web browser that the browser is expected to save and  
send back to the web server whenever the browser makes additional requests of the web server.  
cookie  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Cisco Security Agent Management Center. CSA MC receives host posture information from the CSA  
agents it manages. It also maintains a watch list of IP addresses that it has determined should be  
quarantined from the network.  
CSA MC  
Cisco Security Manager, the provisioning component of the Cisco Self-Defending Networks solution.  
CS-Manager is fully integrated with CS-MARS.  
CSM  
Cisco Security Monitoring, Analysis and Reporting System. The monitoring component of the Cisco  
Self-Defending Networks solution. CS-MARS is fully integrated with CS-Manager  
CS-MARS  
Cut-through architecture is one method of design for packet-switching systems. When a packet arrives  
at a switch, the switch starts forwarding the packet almost immediately, reading only the first few bytes  
in the packet to learn the destination address. This technique improves performance  
cut-through  
architecture  
Common Vulnerabilities and Exposures. A list of standardized names for vulnerabilities and other  
information security exposures maintained at http://cve.mitre.org/.  
CVE  
D
A virtual private network where users connect only to people they trust. In its most general meaning, a  
darknet can be any type of closed, private group of people communicating, but the name is most often  
used specifically for file-sharing networks. Darknet can be used to refer collectively to all covert  
communication networks.  
darknets  
A processor in the IPS. Maintains the signature state and flow databases.  
Database Processor  
datagram  
Logical grouping of information sent as a network layer unit over a transmission medium without prior  
establishment of a virtual circuit. IP datagrams are the primary information units in the Internet. The  
terms cell, frame, message, packet, and segment also are used to describe logical information groupings  
at various layers of the OSI reference model and in various technology circles.  
data circuit-terminating equipment (ITU-T expansion). Devices and connections of a communications  
network that comprise the network end of the user-to-network interface. The DCE provides a physical  
connection to the network, forwards traffic, and provides a clocking signal used to synchronize data  
transmission between DCE and DTE devices. Modems and interface cards are examples of DCE.  
DCE  
Distributed Component Object Model. Protocol that enables software components to communicate  
directly over a network. Developed by Microsoft and previously called Network OLE, DCOM is  
designed for use across multiple network transports, including such Internet protocols as HTTP.  
DCOM  
DDoS  
Distributed Denial of Service. An attack in which a multitude of compromised systems attack a single  
target, thereby causing denial of service for users of the targeted system. The flood of incoming  
messages to the target system essentially forces it to shut down, thereby denying service to the system  
to legitimate users.  
A processor in the IPS. Handles the deny attacker functions. It maintains a list of denied source IP  
addresses.  
Deny Filters  
Processor  
Data Encryption Standard. A strong encryption method where the strength lies in a 56-bit key rather  
than an algorithm.  
DES  
Address of a network device that is receiving data.  
destination address  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Dual In-line Memory Modules.  
DIMM  
DMZ  
demilitarized zone. A separate network located in the neutral zone between a private (inside) network  
and a public (outside) network.  
Domain Name System. An Internet-wide hostname to IP address mapping. DNS enables you to convert  
human-readable names into the IP addresses needed for network packets.  
DNS  
Denial of Service. An attack whose goal is just to disrupt the operation of a specific system or network.  
DoS  
dynamic random-access memory. RAM that stores information in capacitors that must be refreshed  
periodically. Delays can occur because DRAMs are inaccessible to the processor when refreshing their  
contents. However, DRAMs are less complex and have greater capacity than SRAMs.  
DRAM  
Data Terminal Equipment. Refers to the role of a device on an RS-232C connection. A DTE writes data  
to the transmit line and reads data from the receive line.  
DTE  
DTP  
Dynamic Trunking Protocol. A Cisco proprietary protocol in the VLAN group used for negotiating  
trunking on a link between two devices and for negotiating the type of trunking encapsulation (ISL or  
802.1q) to be used.  
E
Ether Channel Load Balancing. Lets a Catalyst switch split traffic flows over different physical paths.  
Traffic leaving the network.  
ECLB  
egress  
encryption  
Application of a specific algorithm to data to alter the appearance of the data making it  
incomprehensible to those who are not authorized to see the information.  
A component of the sensor designed to support many signatures in a certain category. Each engine has  
parameters that can be used to create signatures or tune existing signatures.  
engine  
Large and diverse network connecting most major points in a company or other organization. Differs  
from a WAN in that it is privately owned and maintained.  
enterprise network  
escaped expression  
ESD  
Used in regular expression. A character can be represented as its hexadecimal value, for example, \x61  
equals ‘a,’ so \x61 is an escaped expression representing the character ‘a.’  
electrostatic discharge. Electrostatic discharge is the rapid movement of a charge from one object to  
another object, which produces several thousand volts of electrical charge that can cause severe damage  
to electronic components or entire circuit card assemblies.  
An IPS message that contains an alert, a block request, a status message, or an error message.  
One of the components of the IPS. A fixed-size, indexed store used to store IPS events.  
The XML entity written to the Event Store that represents an alert.  
event  
Event Store  
evIdsAlert  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
F
Blocks traffic on the device after a hardware failure.  
Lets traffic pass through the device after a hardware failure.  
A signature is not fired when offending traffic is detected.  
Normal traffic or a benign action causes a signature to fire.  
fail closed  
fail open  
false negative  
false positive  
Fast Ethernet  
Any of a number of 100-Mbps Ethernet specifications. Fast Ethernet offers a speed increase 10 times  
that of the 10BaseT Ethernet specification while preserving such qualities as frame format, MAC  
mechanisms, and MTU. Such similarities allow the use of existing 10BaseT applications and network  
management tools on Fast Ethernet networks. Based on an extension to the IEEE 802.3 specification.  
Fast flux is a DNS technique used by Botnets to hide phishing and malware delivery sites behind an  
ever-changing network of compromised hosts acting as proxies. It can also refer to the combination of  
peer-to-peer networking, distributed command and control, web-based load balancing and proxy  
redirection used to make malware networks more resistant to discovery and counter-measures. The  
Storm Worm is one of the recent malware variants to make use of this technique.  
Fast flux  
firewall  
Router or access server, or several routers or access servers, designated as a buffer between any  
connected public networks and a private network. A firewall router uses access lists and other methods  
to ensure the security of the private network.  
Detects ICMP and UDP floods directed at hosts and networks.  
Flood engine  
flooding  
Traffic passing technique used by switches and bridges in which traffic received on an interface is sent  
out all the interfaces of that device except the interface on which the information was received  
originally.  
Process of sending a frame toward its ultimate destination by way of an internetworking device.  
Piece of a larger packet that has been broken down to smaller units.  
forwarding  
fragment  
Process of breaking a packet into smaller units when transmitting over a network medium that cannot  
support the original size of the packet.  
fragmentation  
A processor in the IPS. Reassembles fragmented IP datagrams. It is also responsible for normalization  
of IP fragments when the sensor is in inline mode.  
Fragment  
Reassembly  
Processor  
File Transfer Protocol. Application protocol, part of the TCP/IP protocol stack, used for transferring  
files between network nodes. FTP is defined in RFC 959.  
FTP  
File Transfer Protocol server. A server that uses the FTP protocol for transferring files between network  
nodes.  
FTP server  
full duplex  
Capability for simultaneous data transmission between a sending station and a receiving station.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Fully Qualified Domain Name.A domain name that specifies its exact location in the tree hierarchy of  
the DNS. It specifies all domain levels, including the top-level domain, relative to the root domain. A  
fully qualified domain name is distinguished by this absoluteness in the name space.  
FQDN  
Firewall Security Module. A module that can be installed in a Catalyst 6500 series switch. It uses the  
FWSM  
shun command to block. You can configure the FWSM in either single mode or multi-mode.  
G
GigaBit Interface Converter. Often refers to a fiber optic transceiver that adapts optical cabling to fiber  
interfaces. Fiber-ready switches and NICs generally provide GBIC and/or SFP slots. For more  
GBIC  
Standard for a high-speed Ethernet, approved by the IEEE (Institute of Electrical and Electronics  
Engineers) 802.3z standards committee in 1996.  
Gigabit Ethernet  
global correlation  
The IPS sensor shares information with other devices through a global correlation database to improve  
the combined efficacy of all devices.  
The software component of CollaborationApp that obtains and installs updates to the local global  
correlation databases.  
global correlation  
client  
The collective information obtained from and shared with collaborative devices such as IPS sensors.  
global correlation  
database  
Greenwich Mean Time. Time zone at zero degrees longitude. Now called Coordinated Universal Time  
(UTC).  
GMT  
Grand Unified Bootloader. Boot loader is the first software program that runs when a computer starts.  
It is responsible for loading and transferring control to the operating system kernel software. The  
kernel, in turn, initializes the rest of the operating system.  
GRUB  
H
An ITU standard that governs H.225.0 session establishment and packetization. H.225.0 actually  
describes several different protocols: RAS, use of Q.931, and use of RTP.  
H.225.0  
An ITU standard that governs H.245 endpoint control.  
H.245  
H.323  
Allows dissimilar communication devices to communicate with each other by using a standardized  
communication protocol. H.323 defines a common set of CODECs, call setup and negotiating  
procedures, and basic data transport methods.  
Capability for data transmission in only one direction at a time between a sending station and a  
receiving station. BSC is an example of a half-duplex protocol.  
half duplex  
handshake  
Sequence of messages exchanged between two or more network devices to ensure transmission  
synchronization.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
A specialized interface card that pairs physical interfaces so that when a software error is detected, a  
bypass mechanism is engaged that directly connects the physical interfaces and allows traffic to flow  
through the pair. Hardware bypass passes traffic at the network interface, does not pass it to the IPS  
system.  
hardware bypass  
ARC blocks all traffic from a given IP address.  
host block  
HTTP  
Hypertext Transfer Protocol. The stateless request/response media transfer protocol used in the IPS  
architecture for remote data exchange.  
An extension to the standard HTTP protocol that provides confidentiality by encrypting the traffic from  
the website. By default this protocol uses TCP port 443.  
HTTPS  
I
Internet Control Message Protocol. Network layer Internet protocol that reports errors and provides  
other information relevant to IP packet processing. Documented in RFC 792.  
ICMP  
Denial of Service attack that sends a host more ICMP echo request (“ping”) packets than the protocol  
implementation can handle.  
ICMP flood  
IDAPI  
Intrusion Detection Application Programming Interface. Provides a simple interface between IPS  
architecture applications. IDAPI reads and writes event data and provides a mechanism for control  
transactions.  
Intrusion Detection Configuration. A data format standard that defines operational messages that are  
used to configure intrusion detection and prevention systems.  
IDCONF  
IDENT  
IDIOM  
Ident protocol, specified in RFC 1413, is an Internet protocol that helps identify the user of a particular  
TCP connection.  
Intrusion Detection Interchange and Operations Messages. A data format standard that defines the  
event messages that are reported by intrusion detection systems and the operational messages that are  
used to configure and control intrusion detection systems.  
IPS Device Manager. A web-based application that lets you configure and manage your sensor. The  
web server for IDM resides on the sensor. You can access it through Internet Explorer or Firefox web  
browsers.  
IDM  
Intrusion Detection Message Exchange Format. The IETF Intrusion Detection Working Group draft  
standard.  
IDMEF  
IME  
IPS Manager Express. A network management application that provides system health monitoring,  
events monitoring, reporting, and configuration for up to ten sensors.  
All packets entering or leaving the network must pass through the sensor.  
inline mode  
A pair of physical interfaces configured so that the sensor forwards all traffic received on one interface  
out to the other interface in the pair.  
inline interface  
A component of the IPS. Handles bypass and physical settings and defines paired interfaces. Physical  
settings are speed, duplex, and administrative state.  
InterfaceApp  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
IDS. A security service that monitors and analyzes system events to find and provide real-time or near  
real-time warning of attempts to access system resources in an unauthorized manner.  
intrusion detection  
system  
32-bit address assigned to hosts using TCP/IP. An IP address belongs to one of five classes (A, B, C,  
D, or E) and is written as 4 octets separated by periods (dotted decimal format). Each address consists  
of a network number, an optional subnetwork number, and a host number. The network and subnetwork  
numbers together are used for routing, and the host number is used to address an individual host within  
the network or subnetwork. A subnet mask is used to extract network and subnetwork information from  
the IP address.  
IP address  
Intrusion Prevention System. A system that alerts the user to the presence of an intrusion on the network  
through network traffic analysis techniques.  
IPS  
Describes the messages transferred over the command and control interface between IPS applications.  
IPS data or message  
iplog  
A log of the binary packets to and from a designated address. Iplogs are created when the log Event  
Action is selected for a signature. Iplogs are stored in a libpcap format, which can be read by WireShark  
and TCPDUMP.  
IP spoofing attack occurs when an attacker outside your network pretends to be a trusted user either by  
using an IP address that is within the range of IP addresses for your network or by using an authorized  
external IP address that you trust and to which you want to provide access to specified resources on  
your network. Should an attacker get access to your IPSec security parameters, that attacker can  
masquerade as the remote user authorized to connect to the corporate network.  
IP spoofing  
IP version 6. Replacement for the current version of IP (version 4). IPv6 includes support for flow ID  
in the packet header, which can be used to identify flows. Formerly called IPng (next generation).  
IPv6  
ISL  
Inter-Switch Link. Cisco-proprietary protocol that maintains VLAN information as traffic flows  
between switches and routers.  
J
Java Web Start provides a platform-independent, secure, and robust deployment technology. It enables  
developers to deploy full-featured applications to you by making the applications available on a  
standard web server. With any web browser, you can launch the applications and be confident you  
always have the most-recent version.  
Java Web Start  
Java Network Launching Protocol. Defined in an XML file format specifying how Java Web Start  
applications are launched. JNLP consists of a set of rules defining how exactly the launching  
mechanism should be implemented.  
JNLP  
K
Knowledge Base. The sets of thresholds learned by Anomaly Detection and used for worm virus  
detection.  
KB  
See KB.  
Knowledge Base  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
L
Link Aggregation Control Protocol. LACP aids in the automatic creation of EtherChannel links by  
exchanging LACP packets between LAN ports. This protocol is defined in IEEE 802.3ad.  
LACP  
Local Area Network. Refers to the Layer 2 network domain local to a given host. Packets exchanged  
between two hosts on the same LAN do not require Layer 3 routing.  
LAN  
A processor in the IPS. Processes layer 2-related events. It also identifies malformed packets and  
removes them from the processing path.  
Layer 2 Processor  
Logger  
A component of the IPS. Writes all the log messages of the application to the log file and the error  
messages of the application to the Event Store.  
Gathers actions that have occurred in a log file. Logging of security information is performed on two  
levels: logging of events (such as IPS commands, errors, and alerts), and logging of individual IP  
session information.  
logging  
Remote access, back door Trojan, ICMP tunneling software. When the computer is infected, the  
malicious code creates an ICMP tunnel that can be used to send small payload ICMP replies.  
LOKI  
M
The main application in the IPS. The first application to start on the sensor after the operating system  
has booted. Reads the configuration and starts applications, handles starting and stopping of  
applications and node reboots, handles software upgrades.  
MainApp  
The bootable disk partition on IDSM2, from which an IPS image can be installed on the application  
partition. No IPS capability is available while the IDSM2 is booted into the maintenance partition.  
maintenance  
partition  
The bootable software image installed on the maintenance partition on an IDSM2. You can install the  
maintenance partition image only while booted into the application partition.  
maintenance  
partition image  
A base version that contains major new functionality or a major architectural change in the product.  
Malicious software that is installed on an unknowing host.  
major update  
Malware  
Full IPS system image used by manufacturing to image sensors.  
manufacturing  
image  
A remote sensor that controls one or more devices. Blocking forwarding sensors send blocking requests  
to the master blocking sensor and the master blocking sensor executes the blocking requests.  
master blocking  
sensor  
Message Digest 5. A one-way hashing algorithm that produces a 128-bit hash. Both MD5 and Secure  
Hash Algorithm (SHA) are variations on MD4 and strengthen the security of the MD4 hashing  
algorithm. Cisco uses hashes for authentication within the IPSec framework. Also used for message  
authentication in SNMP v.2. MD5 verifies the integrity of the communication, authenticates the origin,  
and checks for timeliness.  
MD5  
Defines events that occur in a related manner within a sliding time interval. This engine processes  
events rather than packets.  
Meta engine  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Management Information Base. Database of network management information that is used and  
MIB  
maintained by a network management protocol, such as SNMP or CMIP. The value of a MIB object can  
be changed or retrieved using SNMP or CMIP commands, usually through a GUI network management  
system. MIB objects are organized in a tree structure that includes public (standard) and private  
(proprietary) branches.  
Multipurpose Internet Mail Extension. Standard for transmitting nontext data (or data that cannot be  
represented in plain ASCII code) in Internet mail, such as binary, foreign language text (such as  
Russian or Chinese), audio, or video data. MIME is defined in RFC 2045.  
MIME  
A minor version that contains minor enhancements to the product line. Minor updates are incremental  
to the major version, and are also base versions for service packs.  
minor update  
module  
A removable card in a switch, router, or security appliance chassis. The ASA 5500 AIP SSM,  
ASA 5500-X IPS SSP, and ASA 5585-X IPS SSP are IPS modules.  
See sensing interface.  
monitoring  
interface  
Modular Policy Framework. A means of configuring security appliance features in a manner similar to  
Cisco IOS software Modular QoS CLI.  
MPF  
Multilayer Switch Feature Card. An optional card on a Catalyst 6000 supervisor engine that performs  
L3 routing for the switch.  
MSFC, MSFC2  
MSRPC  
Microsoft Remote Procedure Call. MSRPC is the Microsoft implementation of the DCE RPC  
mechanism. Microsoft added support for Unicode strings, implicit handles, inheritance of interfaces  
(which are extensively used in DCOM), and complex calculations in the variable-length string and  
structure paradigms already present in DCE/RPC.  
My Self-Defending Network. A part of the signature definition section of IDM and IME. It provides  
detailed information about signatures.  
MySDN  
N
Network Access Controller. See ARC.  
NAC  
NAS-ID  
Network Access ID. An identifier that clients send to servers to communicate the type of service they  
are attempting to authenticate.  
Native Address Translation. A network device can present an IP address to the outside networks that is  
different from the actual IP address of a host.  
NAT  
Next Business Day. The arrival of replacement hardware according to Cisco service contracts.  
NBD  
Protocol for IPv6. IPv6 nodes on the same link use Neighbor Discovery to discover each other’s  
presence, to determine each other’s link-layer addresses, to find routers, and to maintain reachability  
information about the paths to active neighbors.  
Neighborhood  
Discovery  
See NAS-ID.  
Network Access ID  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
A device that controls IP traffic on a network and can block an attacking host. An example of a network  
device is a Cisco router or PIX Firewall.  
network device  
Networks contributing learned information to the global correlation database.  
network  
participation  
The software component of CollaborationApp that sends data to the SensorBase Network.  
network  
participation client  
Hosts and networks you have identified that should never be blocked.  
See never block address.  
never block address  
never shun address  
NIC  
Network Interface Card. Board that provides network communication capabilities to and from a  
computer system.  
network management system. System responsible for managing at least part of a network. An NMS is  
generally a reasonably powerful and well-equipped computer, such as an engineering workstation.  
NMSs communicate with agents to help keep track of network statistics and resources.  
NMS  
A physical communicating element on the command and control network. For example, an appliance  
or a router.  
node  
Configures how the IP and TCP normalizer functions and provides configuration for signature events  
related to the IP and TCP normalizer.  
Normalizer engine  
NOS  
network operating system. Generic term used to refer to distributed file systems. Examples include  
LAN Manager, NetWare, NFS, and VINES.  
A component of the IPS. Sends SNMP traps when triggered by alert, status, and error events.  
NotificationApp uses the public domain SNMP agent. SNMP GETs provide information about the  
general health of the sensor.  
NotificationApp  
Network Timing Protocol. Protocol built on top of TCP that ensures accurate local time-keeping with  
reference to radio and atomic clocks located on the Internet. This protocol is capable of synchronizing  
distributed clocks within milliseconds over long time periods.  
NTP  
Network Timing Protocol server. A server that uses NTP. NTP is a protocol built on top of TCP that  
ensures accurate local time-keeping with reference to radio and atomic clocks located on the Internet.  
This protocol is capable of synchronizing distributed clocks within milliseconds over long time  
periods.  
NTP server  
Non-Volatile Read/Write Memory. RAM that retains its contents when a unit is powered off.  
NVRAM  
O
online insertion and removal. Feature that permits you to add, replace, or remove cards without  
interrupting the system power, entering console commands, or causing other software or interfaces to  
shutdown.  
OIR  
Outbreak Prevention Service.  
OPS  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
P
Peer-to-Peer. P2P networks use nodes that can simultaneously function as both client and server for the  
purpose of file sharing.  
P2P  
Logical grouping of information that includes a header containing control information and (usually)  
user data. Packets most often are used to refer to network layer units of data. The terms datagram,  
frame, message, and segment also are used to describe logical information groupings at various layers  
of the OSI reference model and in various technology circles.  
packet  
Port Aggregation Control Protocol. PAgP aids in the automatic creation of EtherChannel links by  
exchanging PAgP packets between LAN ports. It is a Cisco-proprietary protocol.  
PAgP  
Software module that provides AAA functionality to applications.  
PAM  
PAP  
Password Authentication Protocol. Most commonly used RADIUS messaging protocol.  
Act of determining the OS or services available on a system from passive observation of network  
interactions.  
passive  
fingerprinting  
The sensor determines host operating systems by inspecting characteristics of the packets exchanged  
on the network.  
Passive OS  
Fingerprinting  
An attempt to open connections through a firewall to a protected FTP server to a non-FTP port. This  
happens when the firewall incorrectly interprets an FTP 227 passive command by opening an  
unauthorized connection.  
PASV Port Spoof  
Port Address Translation. A more restricted translation scheme than NAT in which a single IP address  
and different ports are used to represent the hosts of a network.  
PAT  
Release that addresses defects identified in the update (minor, major, or service pack) binaries after a  
software release (service pack, minor, or major update) has been released.  
patch release  
PAWS  
PCI  
Protection Against Wrapped Sequence. Protection against wrapped sequence numbers in high  
performance TCP networks. See RFC 1323.  
Peripheral Component Interface. The most common peripheral expansion bus used on Intel-based  
computers.  
protocol data unit. OSI term for packet. See also BPDU and packet.  
PDU  
PEP  
Cisco Product Evolution Program. PEP is the UDI information that consists of the PID, the VID, and  
the SN of your sensor. PEP provides hardware version and serial number visibility through electronic  
query, product labels, and shipping items.  
packed encoding rules. Instead of using a generic style of encoding that encodes all types in a uniform  
way, PER specializes the encoding based on the date type to generate much more compact  
representations.  
PER  
Policy Feature Card. An optional card on a Catalyst 6000 supervisor engine that supports VACL packet  
filtering.  
PFC  
PID  
Product Identifier. The orderable product identifier that is one of the three parts of the UDI. The UDI  
is part of the PEP policy.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
packet internet groper. Often used in IP networks to test the reachability of a network device. It works  
by sending ICMP echo request packets to the target host and listening for echo response replies.  
ping  
Private Internet Exchange Firewall. A Cisco network security device that can be programmed to  
block/enable addresses and ports between networks.  
PIX Firewall  
PKI  
Public Key Infrastructure. Authentication of HTTP clients using the clients X.509 certificates.  
See PAM.  
Pluggable  
Authentication  
Modules  
Power-On Self Test. Set of hardware diagnostics that runs on a hardware device when that device is  
powered up.  
POST  
Designates an ACL from which ARC should read the ACL entries, and where it places entries after all  
deny entries for the addresses being blocked.  
Post-ACL  
Designates an ACL from which ARC should read the ACL entries, and where it places entries before  
any deny entries for the addresses being blocked.  
Pre-ACL  
PD. A weight in the range of 0 to 30 configured per signature. This weight can be subtracted from the  
overall risk rating in promiscuous mode.  
promiscuous delta  
promiscuous mode  
A passive interface for monitoring packets of the network segment. The sensing interface does not have  
an IP address assigned to it and is therefore invisible to attackers.  
Q
ITU-T specification for signaling to establish, maintain, and clear ISDN network connections.  
Q.931  
QoS  
quality of service. Measure of performance for a transmission system that reflects its transmission  
quality and service availability.  
R
Refers to mounting a sensor in an equipment rack.  
rack mounting  
RADIUS  
Remote Authentication Dial In User Service. A networking protocol that provides centralized AAA  
functionality for systems to connect and use a network service.  
RAM  
RAS  
random-access memory. Volatile memory that can be read and written by a microprocessor.  
Registration, Admission, and Status Protocol. Protocol that is used between endpoints and the  
gatekeeper to perform management functions. RAS signalling function performs registration,  
admissions, bandwidth changes, status, and disengage procedures between the VoIP gateway and the  
gatekeeper.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Router Blade Control Protocol. RBCP is based on SCP, but modified specifically for the router  
RBCP  
application. It is designed to run over Ethernet interfaces and uses 802.2 SNAP encapsulation for  
messages.  
The putting back together of an IP datagram at the destination after it has been fragmented either at the  
source or at an intermediate node.  
reassembly  
An IPS package file that includes the full application image and installer used for recovery on sensors.  
See regular expression.  
recovery package  
regex  
A mechanism by which you can define how to search for a specified sequence of characters in a data  
stream or file. Regular expressions are a powerful and flexible notation almost like a  
mini-programming language that allow you to describe text. In the context of pattern matching, regular  
expressions allow a succinct description of any arbitrary pattern.  
regular expression  
See RADIUS.  
Remote  
Authentication Dial  
In User Service  
A release that addresses defects in the packaging or the installer.  
repackage release  
reputation  
Similar to human social interaction, reputation is an opinion toward a device on the Internet. It enables  
the installed base of IPS sensors in the field to collaborate using the existing network infrastructure. A  
network device with reputation is most probably malicious or infected.  
RR. A risk rating is a value between 0 and 100 that represents a numerical quantification of the risk  
associated with a particular event on the network. The risk of the attack accounts for the severity,  
fidelity, relevance, and asset value of the attack, but not any response or mitigation actions. This risk is  
higher when more damage could be inflicted on your network.  
risk rating  
Return Materials Authorization. The Cisco program for returning faulty hardware and obtaining a  
replacement.  
RMA  
Read-Only-Memory Monitor. ROMMON lets you TFTP system images onto the sensor for recovery  
purposes.  
ROMMON  
See RTT.  
round-trip time  
RPC  
remote-procedure call. Technological foundation of client/server computing. RPCs are procedure calls  
that are built or specified by clients and are executed on servers, with the results returned over the  
network to the clients.  
Router Switch Module. A router module that is installed in a Catalyst 5000 switch. It functions exactly  
like a standalone router.  
RSM  
RTP  
Real-Time Transport Protocol. Commonly used with IP networks. RTP is designed to provide  
end-to-end network transport functions for applications transmitting real-time data, such as audio,  
video, or simulation data, over multicast or unicast network services. RTP provides such services as  
payload type identification, sequence numbering, timestamping, and delivery monitoring to real-time  
applications.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
round-trip time. A measure of the time delay imposed by a network on a host from the sending of a  
packet until acknowledgement of the receipt.  
RTT  
RU  
rack unit. A rack is measured in rack units. An RU is equal to 44 mm or 1.75 inches.  
S
Switch Configuration Protocol. Cisco control protocol that runs directly over the Ethernet.  
SCP  
Simple Certificate Enrollment Protocol. The Cisco Systems PKI communication protocol that  
leverages existing technology by using PKCS#7 and PKCS#10. SCEP is the evolution of the enrollment  
protocol.  
SCEP  
Security Device Event Exchange. A product-independent standard for communicating security device  
events. It adds extensibility features that are needed for communicating events generated by various  
types of security devices.  
SDEE  
Accepts requests for events from remote clients.  
SDEE Server  
Protocol that provides a secure remote connection to a router through a Transmission Control Protocol  
(TCP) application.  
Secure Shell  
Protocol  
You can partition a single adaptive security appliance into multiple virtual devices, known as security  
contexts. Each context is an independent device, with its own security policy, interfaces, and  
administrators. Multiple contexts are similar to having multiple standalone devices. Many features are  
supported in multiple context mode, including routing tables, firewall features, IPS, and management.  
security context  
Monitoring Center for Security. Provides event collection, viewing, and reporting capability for  
network devices. Used with the IDS MC.  
Security Monitor  
sensing interface  
sensor  
The interface on the sensor that monitors the desired network segment. The sensing interface is in  
promiscuous mode; it has no IP address and is not visible on the monitored segment.  
The sensor is the intrusion detection engine. It analyzes network traffic searching for signs of  
unauthorized activity.  
A component of the IPS. Performs packet capture and analysis. SensorApp analyzes network traffic for  
malicious content. Packets flow through a pipeline of processors fed by a producer designed to collect  
packets from the network interfaces on the sensor. SensorApp is the standalone executable that runs  
Analysis Engine.  
SensorApp  
Deals with specific protocols, such as DNS, FTP, H255, HTTP, IDENT, MS RPC, MS SQL, NTP, P2P,  
RPC, SMB, SNMP, SSH, and TNS.  
Service engine  
service pack  
session command  
SFP  
Used for the release of defect fixes and for the support of new signature engines. Service packs contain  
all of the defect fixes since the last base version (minor or major) and any new defects fixes.  
Command used on routers and switches to provide either Telnet or console access to a module in the  
router or switch.  
Small Form-factor Pluggable. Often refers to a fiber optic transceiver that adapts optical cabling to fiber  
interfaces. See GBIC for more information.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
A piece of data known only to the parties involved in a secure communication. The shared secret can  
be a password, a passphrase, a big number, or an array of randomly chosen bytes.  
shared secret  
Enables a dynamic response to an attacking host by preventing new connections and disallowing  
packets from any existing connection. It is used by ARC when blocking with a PIX Firewall.  
shun command  
A processor in the IPS. Dispatches packets to the inspectors that are not stream-based and that are  
configured for interest in the packet in process.  
Signature Analysis  
Processor  
A signature distills network information and compares it against a rule set that indicates typical  
intrusion activity.  
signature  
A component of the sensor that supports many signatures in a certain category. An engine is composed  
of a parser and an inspector. Each engine has a set of legal parameters that have allowable ranges or  
sets of values.  
signature engine  
Executable file with its own versioning scheme that contains binary code to support new signature  
updates.  
signature engine  
update  
Subtracts actions based on the signature event signature ID, addresses, and risk rating. The input to the  
Signature Event Action Filter is the signature event with actions possibly added by the Signature Event  
Action Override.  
Signature Event  
Action Filter  
Performs the requested actions. The output from Signature Event Action Handler is the actions being  
performed and possibly an evIdsAlert written to the Event Store.  
Signature Event  
Action Handler  
Adds actions based on the risk rating value. Signature Event Action Override applies to all signatures  
that fall into the range of the configured risk rating threshold. Each Signature Event Action Override is  
independent and has a separate configuration value for each action type.  
Signature Event  
Action Override  
Processes event actions. Event actions can be associated with an event risk rating threshold that must  
be surpassed for the actions to take place.  
Signature Event  
Action Processor  
SFR. A weight associated with how well a signature might perform in the absence of specific  
knowledge of the target. The signature fidelity rating is configured per signature and indicates how  
accurately the signature detects the event or condition it describes.  
signature fidelity  
rating  
Executable file that contains a set of rules designed to recognize malicious network activities, such as  
worms, DDOS, viruses, and so forth. Signature updates are released independently, are dependent on a  
required signature engine version, and have their own versioning scheme.  
signature update  
A processor in the IPS. Process found on dual CPU systems.  
Slave Dispatch  
Processor  
Server Message Block. File-system protocol used in LAN manager and similar NOSs to package data  
and exchange information with other systems.  
SMB  
Simple Mail Transfer Protocol. Internet protocol providing e-mail services.  
SMTP  
SN  
Serial Number. Part of the UDI. The SN is the serial number of your Cisco product.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Subnetwork Access Protocol. Internet protocol that operates between a network entity in the  
subnetwork and a network entity in the end system. SNAP specifies a standard method of encapsulating  
IP datagrams and ARP messages on IEEE networks. The SNAP entity in the end system makes use of  
the services of the subnetwork and performs three key functions: data transfer, connection  
management, and QoS selection.  
SNAP  
See sensing interface.  
sniffing interface  
SNMP  
Simple Network Management Protocol. Network management protocol used almost exclusively in  
TCP/IP networks. SNMP provides a means to monitor and control network devices, and to manage  
configurations, statistics collection, performance, and security.  
SNMP Version 2. Version 2 of the network management protocol. SNMP2 supports centralized and  
distributed network management strategies, and includes improvements in the SMI, protocol  
operations, management architecture, and security.  
SNMP2  
Passes traffic through the IPS system without inspection.  
Address of a network device that is sending data.  
software bypass  
source address  
SPAN  
Switched Port Analyzer. Feature of the Catalyst 5000 switch that extends the monitoring abilities of  
existing network analyzers into a switched Ethernet environment. SPAN mirrors the traffic at one  
switched segment onto a predefined SPAN port. A network analyzer attached to the SPAN port can  
monitor traffic from any other Catalyst switched port.  
Loop-free subset of a network topology.  
spanning tree  
SQL  
Structured Query Language. International standard language for defining and accessing relational  
databases.  
Type of RAM that retains its contents for as long as power is supplied. SRAM does not require constant  
refreshing, like DRAM.  
SRAM  
SSH  
Secure Shell. A utility that uses strong authentication and secure communications to log in to another  
computer over a network.  
Secure Socket Layer. Encryption technology for the Internet used to provide secure transactions, such  
as the transmission of credit card numbers for e-commerce.  
SSL  
A DDoS tool that relies on the ICMP protocol.  
Stacheldraht  
State engine  
Statistics Processor  
STP  
Stateful searches of HTTP strings.  
A processor in the IPS. Keeps track of system statistics such as packet counts and packet arrival rates.  
Spanning Tree Protocol. A network protocol that ensures a loop-free topology for any bridged Ethernet  
local area network. STP prevents bridge loops and the broadcast radiation that results from them.  
Spanning tree also allows a network design to include spare (redundant) links to provide automatic  
backup paths if an active link fails without the danger of bridge loops or the need for manual  
enabling/disabling of these backup links.  
A processor in the IPS. Reorders TCP streams to ensure the arrival order of the packets at the various  
stream-based inspectors. It is also responsible for normalization of the TCP stream. The normalizer  
engine lets you enable or disable alert and deny actions.  
Stream Reassembly  
Processor  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
A signature engine that provides regular expression-based pattern inspection and alert functionality for  
multiple transport protocols, including TCP, UDP, and ICMP.  
String engine  
subsignature  
A more granular representation of a general signature. It typically further defines a broad scope  
signature.  
Refers to attaching rubber feet to the bottom of a sensor when it is installed on a flat surface. The rubber  
feet allow proper airflow around the sensor and they also absorb vibration so that the hard-disk drive is  
less impacted.  
surface mounting  
Network device that filters, forwards, and floods frames based on the destination address of each frame.  
The switch operates at the data link layer of the OSI model.  
switch  
A component of the IPS. The IPS 4500 series sensors. have a built in switch that provides external  
monitoring interfaces. The SwitchApp enables the InterfaceApp and sensor initialization scripts to  
communicate with and control the switch.  
SwitchApp  
Denial of Service attack that sends a host more TCP SYN packets (request to synchronize sequence  
numbers, used when opening a connection) than the protocol implementation can handle.  
SYN flood  
The full IPS application and recovery image used for reimaging an entire sensor.  
system image  
T
A Cisco Technical Assistance Center. There are four TACs worldwide.  
TAC  
Terminal Access Controller Access Control System Plus. Proprietary Cisco enhancement to Terminal  
Access Controller Access Control System (TACACS). Provides additional support for authentication,  
authorization, and accounting.  
TACACS+  
TVR. A weight associated with the perceived value of the target. Target value rating is a  
user-configurable value (zero, low, medium, high, or mission critical) that identifies the importance of  
a network asset (through its IP address).  
target value rating  
Transmission Control Protocol. Connection-oriented transport layer protocol that provides reliable  
full-duplex data transmission. TCP is part of the TCP/IP protocol stack.  
TCP  
The TCPDUMP utility is a free network protocol analyzer for UNIX and Windows. It lets you examine  
data from a live network or from a capture file on disk. You can use different options for viewing  
summary and detail information for each packet. For more information, see http://www.tcpdump.org/.  
TCPDUMP  
The interface on the IDSM2 that can send TCP resets. On most sensors the TCP resets are sent out on  
the same sensing interface on which the packets are monitored, but on the IDSM2 the sensing interfaces  
cannot be used for sending TCP resets. On the IDSM2 the TCP reset interface is designated as port 1  
with Catalyst software, and is not visible to the user in Cisco IOS software. The TCP reset action is  
only appropriate as an action selection on those signatures that are associated with a TCP-based service.  
TCP reset interface  
Standard terminal emulation protocol in the TCP/IP protocol stack. Telnet is used for remote terminal  
connection, enabling users to log in to remote systems and use resources as if they were connected to  
a local system. Telnet is defined in RFC 854.  
Telnet  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
A router with multiple, low speed, asynchronous ports that are connected to other serial devices.  
Terminal servers can be used to remotely manage network equipment, including sensors.  
terminal server  
TFN  
Tribe Flood Network. A common type of DoS attack that can take advantage of forged or rapidly  
changing source IP addresses to allow attackers to thwart efforts to locate or filter the attacks.  
Tribe Flood Network 2000. A common type of DoS attack that can take advantage of forged or rapidly  
changing source IP addresses to allow attackers to thwart efforts to locate or filter the attacks.  
TFN2K  
Trivial File Transfer Protocol. Simplified version of FTP that lets files be transferred from one  
computer to another over a network, usually without the use of client authentication (for example,  
username and password).  
TFTP  
TR. A threat rating is a value between 0 and 100 that represents a numerical decrease of the risk rating  
of an attack based on the response action that depicts the threat of an alert on the monitored network.  
threat rating  
Process whereby two protocol entities synchronize during connection establishment.  
three-way  
handshake  
A value, either upper- or lower-bound that defines the maximum/minimum allowable condition before  
an alarm is sent.  
threshold  
Time Processor  
TLS  
A processor in the IPS. Processes events stored in a time-slice calendar. Its primary task is to make stale  
database entries expire and to calculate time-dependent statistics.  
Transport Layer Security. The protocol used over stream transports to negotiate the identity of peers  
and establish encrypted communications.  
Transparent Network Substrate. Provides database applications with a single common interface to all  
industry-standard network protocols. With TNS, database applications can connect to other database  
applications across networks with different protocols.  
TNS  
Physical arrangement of network nodes and media within an enterprise networking structure.  
topology  
TPKT  
Transport Packet. RFC 1006-defined method of demarking messages in a packet. The protocol uses ISO  
transport services on top of TCP.  
Program available on many systems that traces the path a packet takes to a destination. It is used mostly  
to debug routing problems between hosts. A traceroute protocol is also defined in RFC 1393.  
traceroute  
Inference of information from observable characteristics of data flow(s), even when the data is  
encrypted or otherwise not directly available. Such characteristics include the identities and locations  
of the source(s) and destination(s), and the presence, amount, frequency, and duration of occurrence.  
traffic analysis  
Analyzes traffic from nonstandard protocols, such as TFN2K, LOKI, and DDOS.  
Traffic ICMP engine  
trap  
Message sent by an SNMP agent to an NMS, a console, or a terminal to indicate the occurrence of a  
significant event, such as a specifically defined condition or a threshold that was reached.  
Analyzes traffic from nonstandard protocols, such as BO2K and TFN2K.  
Trojan engine  
trunk  
Physical and logical connection between two switches across which network traffic travels. A backbone  
is composed of a number of trunks.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Certificate upon which a certificate user relies as being valid without the need for validation testing;  
especially a public-key certificate that is used to provide the first public key in a certification path.  
trusted certificate  
trusted key  
tune  
Public key upon which a user relies; especially a public key that can be used as the first public key in  
a certification path.  
Adjusting signature parameters to modify an existing signature.  
U
Unique Device Identifier. Provides a unique identity for every Cisco product. The UDI is composed of  
the PID, VID, and SN. The UDI is stored in the Cisco IPS ID PROM.  
UDI  
UniDirectional Link Detection. Cisco proprietary protocol that allows devices connected through  
fiber-optic or copper Ethernet cables connected to LAN ports to monitor the physical configuration of  
the cables and detect when a unidirectional link exists. When a unidirectional link is detected, UDLD  
shuts down the affected LAN port and sends an alert, since unidirectional links can cause a variety of  
problems, such as, spanning tree topology loops.  
UDLD  
User Datagram Protocol. Connectionless transport layer protocol in the TCP/IP protocol stack. UDP is  
a simple protocol that exchanges datagrams without acknowledgments or guaranteed delivery,  
requiring that error processing and retransmission be handled by other protocols. UDP is defined in  
RFC 768.  
UDP  
To direct a router to remove a previously applied block.  
See UDLD.  
unblock  
UniDirectional Link  
Detection  
An unvirtualized sensing interface has not been divided into subinterfaces and the entire interfaces can  
be associated with at most one virtual sensor.  
unvirtualized  
sensing interface  
Uninterruptable Power Source.  
UPS  
UTC  
Coordinated Universal Time. Time zone at zero degrees longitude. Formerly called Greenwich Mean  
Time (GMT) and Zulu time.  
8-bit Unicode Transformation Format. A variable-length character encoding for Unicode. UTF-8 can  
represent every character in the Unicode character set and is backwards-compatible with ASCII.  
UTF-8  
V
VLAN ACL. An ACL that filters all packets (both within a VLAN and between VLANs) that pass  
through a switch. Also known as security ACLs.  
VACL  
Version identifier. Part of the UDI.  
VID  
VIP  
Versatile Interface Processor. Interface card used in Cisco 7000 and Cisco 7500 series routers. The VIP  
provides multilayer switching and runs Cisco IOS. The most recent version of the VIP is VIP2.  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
A logical grouping of sensing interfaces and the configuration policy for the signature engines and  
alarm filters to apply to them. In other words, multiple virtual sensors running on the same appliance,  
each configured with different signature behavior and traffic feeds.  
virtual sensor  
A virtualized interface has been divided into subinterfaces each of which consists of a group of VLANs.  
You can associate a virtual sensor with one or more subinterfaces so that different intrusion prevention  
policies can be assigned to those subinterfaces. You can virtualize both physical and inline interfaces.  
virtualized sensing  
interface  
Hidden, self-replicating section of computer software, usually malicious logic, that propagates by  
infecting—that is, inserting a copy of itself into and becoming part of—another program. A virus  
cannot run by itself; it requires that its host program be run to make the virus active.  
virus  
A signature update specifically addressing viruses.  
virus update  
VLAN  
Virtual Local Area Network. Group of devices on one or more LANs that are configured (using  
management software) so that they can communicate as if they were attached to the same wire, when  
in fact they are located on a number of different LAN segments. Because VLANs are based on logical  
instead of physical connections, they are extremely flexible.  
VLAN Trunking Protocol. Cisco Layer 2 messaging protocol that manages the addition, deletion, and  
renaming of VLANs on a network-wide basis.  
VTP  
CiscoWorks VPN/Security Management Solution. A suite of network security applications that  
combines web-based tools for configuring, monitoring, and troubleshooting enterprise VPN, firewalls,  
network intrusion detection systems and host-based intrusion prevention systems.  
VMS  
Voice over IP. The capability to carry normal telephony-style voice over an IP-based internet with  
POTS-like functionality, reliability, and voice quality. VoIP enables a router to carry voice traffic (for  
example, telephone calls and faxes) over an IP network. In VoIP, the DSP segments the voice signal into  
frames, which then are coupled in groups of two and stored in voice packets. These voice packets are  
transported using IP in compliance with ITU-T specification H.323.  
VoIP  
VPN  
Virtual Private Network(ing). Enables IP traffic to travel securely over a public TCP/IP network by  
encrypting all traffic from one network to another. A VPN uses “tunneling” to encrypt all information  
at the IP level.  
VLAN Trunking Protocol. A Cisco Layer 2 messaging protocol that manages the addition, deletion,  
and renaming of VLANs on a network-wide basis.  
VTP  
One or more attributes of a computer or a network that permit a subject to initiate patterns of misuse  
on that computer or network.  
vulnerability  
W
wide-area network. Data communications network that serves users across a broad geographic area and  
often uses transmission devices provided by common carriers. Frame Relay, SMDS, and X.25 are  
examples of WANs.  
WAN  
WLR. A weight associated with the CSA MC watch list in the range of 0 to 100 (CSA MC only uses  
the range 0 to 35).  
watch list rating  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
A component of the IPS. Waits for remote HTTP client requests and calls the appropriate servlet  
application.  
Web Server  
WHOIS  
A TCP-based query/response protocol used for querying an official database to determine the owner of  
a domain name or an IP address.  
Wireshark is a free network protocol analyzer for UNIX and Windows. It lets you examine data from a  
live network or from a capture file on disk. You can interactively browse the capture data, viewing  
summary and detail information for each packet. Wireshark has several powerful features, including a  
rich display filter language and the ability to view the reconstructed stream of a TCP session. For more  
information, see http://www.wireshark.org.  
Wireshark  
A computer program that can run independently, can propagate a complete working version of itself  
onto other hosts on a network, and can consume computer resources destructively.  
worm  
X
Standard that defines information contained in a certificate.  
X.509  
XML  
eXtensible Markup Language. Textual file format used for data interchange between heterogeneous  
hosts.  
Cross Packet Inspection. Technology used by TCP that allows searches across packets to achieve packet  
and payload reassembly.  
XPI  
Z
A set of destination IP addresses sorted into an internal, illegal, or external zone used by Anomaly  
Detection.  
zone  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
GL-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
I N D E X  
login banners 3-9  
Numerics  
signature variables 7-5  
target value ratings 8-16  
trusted hosts 3-52  
802.1q encapsulation for VLAN groups 4-27  
virtual sensors 5-6, 5-9  
virtual sensors (ASA 5500-X IPS SSP) 18-5  
virtual sensors (ASA 5585-X IPS SSP) 19-5  
administrative tasks notes and caveats 17-2  
administrator role privileges 1-4  
aggregation  
A
AAA authentication  
configuring 3-23  
AAA RADIUS  
functionality 3-29  
limitations 3-29  
accessing  
IPS software 20-2  
service account 3-28, C-5  
access-list command 3-6  
access list misconfiguration C-26  
access lists  
alert frequency 8-33  
operating modes 8-33  
AIC engine  
AIC FTP B-11  
AIC FTP engine parameters (table) B-13  
AIC HTTP B-11  
changing 3-7  
configuring 3-7  
AIC HTTP engine parameters (table) B-12  
described B-11  
account locking  
configuring 3-33  
features B-11  
security 3-33  
signature categories 7-18  
AIC policy enforcement  
default configuration 7-18, B-11  
described 7-18, B-11  
account unlocking configuring 3-34  
ACLs  
described 14-3  
Post-Block 14-21, 14-23  
Pre-Block 14-21, 14-23  
adding  
sensor oversubscription 7-18, B-11  
Alarm Channel  
described 8-3, A-26  
denied attackers 8-36  
event action overrides 8-18  
external product interfaces 11-5  
global parameters 5-12  
hosts to the SSH known hosts list 3-46, 3-47  
risk rating 10-6  
alert and log actions (list) 8-4  
alert frequency  
modes B-7  
alert-frequency command 7-7  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Index  
alert-severity command 7-9  
alert severity configuring 7-9  
allocate-ips command 18-4, 19-4  
ASA 5500-X IPS SSP 18-22  
allow-sensor-block command 14-8  
alternate TCP reset interface  
configuration restrictions 4-9  
designating 4-5  
anomaly-detection load command 9-41  
anomaly detection operational settings  
configuring 9-11, 9-38  
described 9-10  
anomaly detection policies  
copying 9-9  
creating 9-9  
deleting 9-9  
restrictions 4-3  
displaying 9-9  
Analysis Engine  
editing 9-9  
described 5-2  
lists 17-27  
error messages C-23  
errors C-51  
anomaly-detection save command 9-41  
anomaly detection statistics  
clearing 9-47  
IDM exits C-55  
sensing interfaces 4-4  
verify it is running C-20  
virtual sensors 5-2  
displaying 9-47  
Anomaly Detection zones  
illegal 9-20  
anomaly detection 9-1  
asymmetric traffic 9-1, 9-2  
caution 9-1, 9-2  
internal 9-12  
appliances  
GRUB menu 17-3, C-8  
initializing 2-8  
configuration sequence 9-5  
default anomaly detection configuration 9-4  
default configuration (example) 9-4  
described 9-2  
logging in ii-2  
password recovery 17-3, C-8  
resetting 17-44  
detect mode 9-4  
setting system clock 3-38, 17-25  
terminal servers  
enabling 9-8  
event actions 9-6, B-71  
inactive mode 9-4  
described ii-3, 21-15  
setting up ii-3, 21-15  
learning accept mode 9-3  
learning process 9-3  
limiting false positives 9-37  
protocols 9-3  
time sources 3-35, C-15  
upgrading recovery partition 21-7  
application partition  
signatures (table) 9-6, B-72  
signatures described 9-6  
worms  
described A-4  
application partition image recovery 21-14  
application-policy command 7-18  
application policy configuring 7-19  
application policy enforcement described 7-18, B-11  
applications in XML format A-4  
applying software updates C-52  
attacks 9-37  
described 9-3  
zones 9-4  
anomaly detection disabling 9-48, C-19  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
ARC  
number of blocks A-15  
postblock ACL A-16  
preblock ACL A-16  
prerequisites 14-6  
authentication A-15  
blocking  
connection-based A-17  
response A-13  
rate limiting 14-4  
responsibilities A-13  
single point of control A-15  
unconditional blocking A-17  
blocking application 14-2  
blocking not occurring for signature C-41  
Catalyst switches  
supported devices 14-6, A-15  
Telnet A-14  
VACL commands A-19  
troubleshooting C-35  
VACLs A-14  
VLANs A-16  
verifying device interfaces C-40  
verifying status C-36  
checking status 14-4, 14-5  
described A-4  
ARP  
design 14-2  
Layer 2 signatures B-14  
protocol B-14  
device access issues C-39  
enabling SSH C-41  
features A-14  
ARP spoof tools  
dsniff B-14  
firewalls  
ettercap B-14  
ASA 5500-X IPS SSP  
assigning virtual sensors 18-7  
creating virtual sensors 18-5  
initializing 2-13  
connection blocking A-18  
network blocking A-18  
postblock ACL A-16  
preblock ACL A-16  
shun command A-18  
TACACS+ A-18  
logging in ii-4  
memory usage 17-14, 18-11, C-67  
memory usage values (table) 17-14, 18-11, C-67  
no CDP mode support 4-36  
Normalizer engine 18-10, B-38, C-66  
notes and caveats 18-1  
formerly Network Access Controller 14-1  
functions 14-2, A-12  
illustration A-13  
inactive state C-37  
password recovery 17-4, C-10  
resetting the password 17-5, C-10  
sensing interface 18-4  
interfaces A-14  
maintaining states A-16  
master blocking sensors A-14  
maximum blocks 14-2  
misconfigured master blocking sensor C-42  
nac.shun.txt file A-16  
NAT addressing A-15  
session command ii-4  
sessioning in ii-4  
setup command 2-13  
show module command 18-3  
sw-module module 1 recover configure 18-12  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
sw-module module slot_number  
sessioning in ii-5  
password-reset 18-12  
setup command 2-17  
sw-module module slot_number reload 18-12  
sw-module module slot_number reset 18-12  
sw-module module slot_number shutdown 18-12  
task sequence 18-2  
task sequence 18-2, 19-2  
time sources 3-36, C-15  
virtual sensors  
assigning policies 18-5, 19-5  
assigning the interface 18-5, 19-5  
sequence 19-5  
time soruces 3-36, C-15  
verifying initialization 18-3  
virtual sensors  
ASA IPS modules  
assigning policies 18-5, 19-5  
Deny Connection Inline 8-7, 18-2, 19-2  
Deny Packet Inline 8-7, 18-2, 19-2  
Reset TCP Connection 8-7, 18-2, 19-2  
TCP reset packets 8-7, 18-2, 19-2  
ASDM  
assigning the interface 18-5, 19-5  
virtual sensor sequence 18-4, 19-5  
ASA 5585-X IPS SSP  
assigning virtual sensors 19-8  
bypass mode 19-10  
creating virtual sensors 19-5  
hw-module module 1 recover configure 19-12  
resetting passwords 17-6, 17-8, C-11, C-13  
assigning  
hw-module module slot_number  
password-reset 19-12  
interfaces to virtual sensors (ASA 5500-X IPS  
hw-module module slot_number recover boot 19-12  
hw-module module slot_number recover stop 19-12  
hw-module module slot_number reload 19-12  
hw-module module slot_number reset 19-12  
hw-module module slot_number shutdown 19-12  
initializing 2-17  
interfaces to virtual sensors (ASA 5585-X IPS  
policies to virtual sensors (ASA 5500-X IPS  
policies to virtual sensors (ASA 5585-X IPS  
assigning interfaces to virtual sensors 5-5  
assigning policies to virtual sensors 5-5  
asymmetric mode  
installing system image 21-24  
interfaces  
command and control 19-4  
described 19-4  
described 5-4  
normalization 5-4  
port numbers 19-4  
asymmetric traffic  
sensing 19-4  
anomaly detection 9-1, 9-2  
caution 9-1, 9-2  
slot numbers 19-4  
logging in ii-5  
asymmetric traffic and disabling anomaly detection 9-48,  
no CDP mode support 4-36, 19-1  
Normalizer engine 19-10, B-38, C-72  
notes and caveats 19-1  
Atomic ARP engine  
described B-14  
password recovery 17-6, C-11  
resetting the password 17-6, C-12  
session command ii-5  
parameters (table) B-14  
Atomic IP Advanced engine  
described B-15  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
parameters (table) B-17  
restrictions B-16  
RSA authentication 3-48  
automatic setup 2-2  
Atomic IP engine  
automatic update  
described B-25  
DNS servers 3-11  
parameters (table) B-25  
Atomic IPv6 engine  
described B-29  
immediate 21-12  
proxy server 3-11  
automatic upgrade  
Neighborhood Discovery protocol B-29  
signatures B-29  
information required 21-9  
troubleshooting C-52  
autoupdatenow command 21-12  
auto-upgrade-option command 21-8  
attack relevance rating  
calculating risk rating 8-14  
described 8-14, 8-26  
Attack Response Controller  
described A-4  
B
formerly known as Network Access Controller A-4  
backing up  
configuration 16-24, C-2  
current configuration 16-23, C-4  
attack severity rating  
calculating risk rating 8-13  
described 8-13  
backup-config command 16-20  
banner login command 17-18  
basic setup 2-4  
attemptLimit command 3-33  
audit mode  
described 10-9  
testing global correlation 10-9  
authenticated NTP 3-2, 3-35, 3-44, C-15  
authentication  
block connection command 14-32  
block-enable command 14-9  
block hosts command 14-31  
blocking  
local 3-20  
RADIUS 3-20  
addresses never to block 14-19  
block time 14-13  
AuthenticationApp  
authenticating users A-20  
described A-4  
connection 14-32, 14-33  
described 14-2  
login attempt limit A-20  
method A-20  
disabling 14-10  
hosts 14-31  
responsibilities A-20  
secure communications A-21  
sensor configuration A-20  
Authentication pane  
user roles A-30  
list of blocked hosts 14-33  
managing firewalls 14-27  
managing routers 14-23  
managing switches 14-26  
master blocking sensor 14-28  
maximum entries 14-11  
necessary information 14-3  
authorized keys  
defining 3-49  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
notes and caveats 14-1  
prerequisites 14-6  
properties 14-7  
caution for clearing databases 17-9  
CDP mode  
ASA 5500-X IPS SSP 4-36  
ASA 5585-X IPS SSP 4-36, 19-1  
configuring 4-37  
sensor block itself 14-8  
show statistics 14-33  
supported devices 14-6  
types 14-3  
described 4-36  
interfaces 4-36  
user profiles 14-20  
blocking not occurring for signature C-41  
block network command 14-32  
BO  
certificates (IDM) 3-51  
changing 3-30  
access lists 3-7  
CLI inactivity timeout 3-14  
FTP timeout 3-8  
described B-74  
Trojans B-74  
host IP address 3-4  
hostname 3-3  
BO2K  
described B-74  
passwords 3-30  
Trojans B-74  
privilege 3-30  
Bug Toolkit  
web server settings 3-16  
cidDump obtaining information C-101  
CIDEE  
described C-1  
URL C-1  
bypass mode  
defined A-34  
ASA 5500-X IPS SSP 18-9, 18-10, 19-11  
ASA 5585-X IPS SSP 19-10  
configuring 4-34  
example A-34  
IPS extensions A-34  
protocol A-34  
described 4-34  
supported IPS events A-34  
cisco  
bypass-option command 4-34  
default password ii-2  
default username ii-2  
Cisco.com  
C
accessing software 20-2  
downloading software 20-1  
software downloads 20-1  
Cisco IOS rate limiting 14-4  
cisco-security-agents-mc-settings command 11-4  
Cisco Security Intelligence Operations  
described 20-8  
calculating risk rating  
attack relevance rating 8-14  
attack severity rating 8-13  
promiscuous delta 8-14  
signature fidelity rating 8-13  
target value rating 8-14  
watch list rating 8-14  
cannot access sensor C-24  
capture packet files  
Cisco Services for IPS  
service contract 3-55  
notes and caveats 13-1  
capturing live traffic 13-5  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
supported products 3-55  
clear database command 17-9  
clear denied-attackers command 8-36, 17-25  
clear events command 3-36, 8-41, 17-23, C-16, C-101  
clearing  
CollaborationApp described A-4, A-27  
command and control interface  
described 4-3  
list 4-3  
command and control interface described (ASA 5585-X  
IPS SSP) 19-4  
anomaly detection statistics 9-47  
denied attackers statistics 8-37, 17-26  
global correlation statistics 10-14  
OS IDs 8-32  
command line editing (table) 1-6  
command modes 1-8  
anomaly detection configuration 1-8  
event action rules configuration 1-8  
EXEC 1-8  
sensor databases 17-10  
statistics 17-28, C-82  
global configuration 1-8  
privileged EXEC 1-8  
clearing databases caution 17-9  
clear line command 17-19  
clear os-identification command 8-31  
CLI  
service mode configuration 1-8  
signature definition configuration 1-8  
access-list 3-6  
command line editing 1-6  
command modes 1-8  
alert-frequency 7-7  
alert-severity 7-9  
default keywords 1-11  
described A-4, A-30  
allocate-ips 18-4, 19-4  
allow-sensor-block 14-8  
anomaly-detection load 9-41  
anomaly-detection save 9-41  
application-policy 7-18  
attemptLimit 3-33  
error messages D-1  
generic commands 1-10  
password recovery 17-8, C-13  
regular expression syntax 1-8  
CLI behavior 1-5  
autoupdatenow 21-12  
case sensitivity 1-6  
auto-upgrade-option 21-8  
backup-config 16-20  
display options 1-6  
help 1-5  
banner login 17-18  
prompts 1-5  
block connection 14-32  
block-enable 14-9  
recall 1-6  
tab completion 1-5  
block hosts 14-31  
client manifest described A-28  
CLI guide introduction 1-1  
CLI inactivity timeout  
block network 14-32  
bypass-option 4-34  
cisco-security-agents-mc-settings 11-4  
clear database 17-9  
configuring 3-14  
described 3-14  
clear denied-attackers 8-36, 17-25  
clear line 17-19  
cli-inactivity-timeout command 3-14  
CLI session termination 17-19  
clock set command 3-38, 17-25  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
clear os-identification 8-31  
cli-inactivity-timeout 3-14  
clock set 3-38, 17-25  
health-monitor 10-8  
host-ip 3-4  
host-name 3-3  
copy ad-knowledge-base 9-42  
copy anomaly-detection 9-8  
copy backup-config 16-22, C-3  
copy current-config 16-22, C-3  
copy event-action-rules 8-8  
copy iplog 12-7  
hw-module module 1 recover configure 19-12  
hw-module module slot_number  
password-reset 17-6, 19-12, C-12  
hw-module module slot_number recover boot 19-12  
hw-module module slot_number recover stop 19-12  
hw-module module slot_number reload 19-12  
hw-module module slot_number reset 19-12  
hw-module module slot_number shutdown 19-12  
ignore 9-10  
copy license-key 3-56  
copy packet-file 13-6  
copy signature-definition 7-2  
current-config 16-20  
illegal-zone 9-20  
inline-interfaces 4-17  
default service anomaly-detection 9-9  
default service event-action-rules 8-8  
default service signature-definition 7-2  
deny attacker 8-35  
interface-notifications 4-35  
internal-zone 9-12  
ip-log 7-39  
iplog 12-3  
downgrade 21-13  
ip-log-bytes 12-2  
enable-acl-logging 14-14  
enable-detail-traps 15-4  
enable-nvram-write 14-15  
erase 16-24  
ip-log-packets 12-2  
iplog-status 12-5  
ip-log-time 12-2  
ipv6-target-value 8-15  
erase ad-knowledge-base 9-42  
erase license-key 3-58  
learning-accept-mode 9-38  
list anomaly-detection-configurations 9-9, 17-27  
list event-action-rules-configurations 8-8  
list signature-definition-configurations 7-2  
log-all-block-events-and-errors 14-16  
login-banner-text 3-9  
erase packet-file 13-7  
event-action 7-15  
event-action-rules-configurations 17-27  
event-counter 7-10  
external-zone 9-28  
max-block-entries 14-11  
filters 8-21  
max-denied-attackers 8-34  
max-interfaces 14-17  
fragment-reassembly 7-30  
ftp-timeout 3-8  
global-block-timeout 8-34, 14-13  
global-deny-timeout 8-34  
global-filters-status 8-34  
global-metaevent-status 8-34  
global-overrides-status 8-34  
global-parameters 5-12  
global-summarization 8-34  
more current-config 16-1  
never-block-hosts 14-19  
never-block-networks 14-19  
no iplog 12-6  
no ipv6-target-value 8-15  
no service anomaly-detection 9-9  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
no service event-action-rules 8-8  
no service signature-definition 7-2  
no target-value 8-15  
show tech-support 17-40, C-75  
show users 3-31  
show version 17-41, C-78  
sig-fidelity-rating 7-12, 7-14  
signature-definition-configurations 17-27  
snmp-agent-port 15-2  
no variables 8-11  
os-identifications 8-28  
overrides 8-17  
snmp-agent-protocol 15-2  
ssh authorized-key 3-48  
ssh-generate-key 3-50  
packet capture 13-4  
packet-display 13-2  
password 3-18, 3-29  
ssh host-key 3-46, 3-47  
permit-packet-logging 3-26  
physical-interfaces 4-11, 4-22, 4-28  
sshv1-fallback 3-13  
status 7-13  
stream-reassembly 7-37  
subinterface-type 4-22, 4-28  
summertime-option non-recurring 3-40  
summertime-option recurring 3-38  
privilege 3-18, 3-30  
rename ad-knowledge-base 9-42  
reset 17-44  
service anomaly-detection 9-8  
service event-action-rules 8-8  
service signature-definition 7-2  
show ad-knowledge-base diff 9-44, 9-45  
show ad-knowledge-base files 9-40, 9-41  
show clock 3-37, 17-24  
sw-module module 1 recover configure 18-12  
sw-module module slot_number password-reset 17-4,  
sw-module module slot_number reload 18-12  
sw-module module slot_number reset 18-12  
sw-module module slot_number shutdown 18-12  
target-value 8-15  
show configuration 16-1  
telnet-option 3-5  
show context 18-7, 19-8  
terminal 17-20  
show history 17-45  
time-zone-settings 3-42  
tls generate-key 3-53  
tls trusted-host 3-52  
show inspection-load 17-11  
show interfaces 4-38  
trace 17-48  
trap-community-name 15-4  
trap-destinations 15-4  
show interfaces-history 4-40, C-94  
show inventory 17-46  
show module 1 details 19-12, C-58, C-68  
show os-identification 8-31  
show statistics 14-33, 17-28, C-81  
show statistics anomaly-detection 9-47  
show statistics denied-attackers 8-36, 17-25  
show statistics virtual-sensor 17-28, C-23, C-81  
unlock user username 3-34  
username 3-18  
user-profile 14-20  
variables 7-4, 8-11  
virtual-sensor name 5-5, 18-5, 19-5  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
worm-timeout 9-10  
comparing KBs 9-44  
configuration files  
event action filters 8-23  
event actions 7-16  
event counter 7-10  
backing up 16-24, C-2  
external zone 9-29  
ftp-timeout 3-8  
configuration restrictions  
alternate TCP reset interface 4-9  
inline interface pairs 4-9  
inline VLAN pairs 4-9  
interfaces 4-8  
global correlation 10-10, 10-12  
health statistics 17-14  
host blocks 14-31  
host IP address 3-4  
hostname 3-3  
physical interfaces 4-8  
VLAN groups 4-10  
hosts never to block 14-19  
illegal zone 9-20  
configuration sequence  
ASA 5500-X IPS SSP 18-2  
ASA 5585-X IPS SSP 18-2, 19-2  
configured OS mapping (example) 8-28  
configuring  
inline interface pairs 4-17  
inline VLAN groups 4-29  
inline VLAN pairs 4-23  
internal zone 9-12  
IP fragment reassembly 7-31  
IP fragment reassembly parameters 7-30, 7-36  
IP logging 7-39  
AAA authentication 3-23  
access lists 3-7  
account locking 3-33  
account unlocking 3-34  
ACL logging 14-14  
logging all blocking events and errors 14-16  
logical devices 14-20  
login-banner-text 3-9  
manual IP logging 12-4  
master blocking sensor 14-29  
maximum block entries 14-11  
maximum blocking interfaces 14-18  
maximum denied attackers 8-34  
Meta Event Generator 8-34  
network blocks 14-32  
networks never to block 14-19  
NTP servers 3-43  
alert frequency parameters 7-8  
alert severity 7-9  
anomaly detection operational settings 9-11, 9-38  
application policy 7-19, 7-27  
automatic IP logging 12-3  
automatic upgrades 21-10  
blocking  
firewalls 14-27  
routers 14-23  
switches 14-26  
NVRAM write 14-15  
OS maps 8-29  
bypass mode 4-34  
other protocols  
CDP mode 4-37  
external zone 9-35  
cli-inactivity-timeout 3-14  
connection blocking 14-33  
CSA MC IPS interfaces 11-4  
DNS servers 3-11  
illegal zone 9-26  
internal zone 9-18  
packet command restrictions 3-27  
password policy 3-32  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
passwords 3-30  
physical interfaces 4-12  
privilege 3-30  
copy current-config command 16-22, C-3  
copy event-action-rules command 8-8  
copying  
proxy servers 3-11  
sensor sequence 1-2  
sensor to block itself 14-8  
sensor to use NTP 3-44  
signature fidelity rating 7-12, 7-14  
sshv1-fallback 3-13  
status 7-13  
anomaly detection policies 9-9  
event action rules policies 8-8  
IP log files 12-7  
packet files 13-7  
signature definition policies 7-2  
copy iplog command 12-7  
copy license-key command 3-56  
copy packet-file command 13-6  
copy signature-definition command 7-2  
correcting time on the sensor 3-36, C-16  
creating  
summarizer 8-34  
summertime  
non-recurring 3-40  
recurring 3-38  
TCP  
external zone 9-30  
anomaly detection policies 9-9  
Atomic IP Advanced signatures 7-51  
banner logins 17-18  
illegal zone 9-22  
internal zone 9-13  
TCP stream reassembly 7-38  
telnet-option 3-5  
custom signatures 7-40  
event action rules policies 8-8  
event action variables 8-11  
global parameters 5-12  
time zone settings 3-42  
traffic flow notifications 4-35  
UDP  
Meta signatures 7-49  
external zone 9-32  
OS maps 8-29  
illegal zone 9-24  
Post-Block VACLs 14-25  
Pre-Block VACLs 14-25  
service HTTP signatures 7-45  
signature definition policies 7-2  
string TCP signatures 7-42  
string TCP XL signatures 7-52, 7-56  
user profiles 14-20  
internal zone 9-16  
upgrades 21-5  
user profiles 14-20  
web server settings 3-15  
configuring interfaces  
notes and caveats 4-1  
sequence 4-10  
virtual sensors 5-6, 5-9  
control transactions  
characteristics A-9  
request types A-9  
creating the service account 3-28, C-6  
cryptographic account  
Encryption Software Export Distribution  
Authorization from 20-2  
copy ad-knowledge-base command 9-42  
copy anomaly-detection command 9-8  
copy backup-config command 16-22, C-3  
copy command syntax 9-42  
obtaining 20-2  
CSA MC  
configuring IPS interfaces 11-4  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
host posture events 11-2, 11-4  
quarantined IP address events 11-2  
supported IPS interfaces 11-4  
defining signatures 7-1  
deleting  
anomaly detection policies 9-9  
denied attackers list 8-37, 17-26  
event action rules policies 8-8  
event action variables 8-11  
inline interface pairs 4-20  
inline VLAN pairs 4-26  
OS maps 8-31  
CtlTransSource  
described A-4, A-11  
illustration A-12  
Ctrl-N 1-6  
Ctrl-P 1-6  
current-config command 16-20  
current configuration back up 16-24, C-2  
custom signatures  
signature definition policies 7-2  
signature variables 7-5  
target value ratings 8-16  
VLAN groups 4-33  
AIC MIME-type 7-27  
Atomic IP Advanced signature 7-51  
configuration sequence 7-40  
described 7-4  
denied attackers add 8-36  
deny actions (list) 8-5  
Meta signature 7-49  
service HTTP example 7-45  
String TCP 7-42  
deny attacker command 8-35  
deny-packet-inline described 8-6  
detect mode (anomaly detection) 9-4  
device access issues C-39  
diagnosing network connectivity 17-44  
disabling  
String TCP XL 7-52, 7-55  
D
anomaly detection 9-48, C-19  
blocking 14-10  
data nodes B-68  
data structures (examples) A-8  
DDoS  
global correlation 10-14  
password recovery 17-8, C-13  
signatures 7-13  
protocols B-73  
Stacheldraht B-73  
SSHv1 fallback 3-13  
Telnet 3-5  
debug logging enable C-44  
default blocking time 14-13  
default keywords 1-11  
defaults  
disaster recovery C-6  
displaying  
anomaly detection policies 9-9  
anomaly detection policy lists 17-27  
anomaly detection statistics 9-47  
contents of logical file 16-20  
current configuration 16-1  
current submode configuration 16-3  
event action rules policies 8-8  
event actions rules lists 17-27  
password ii-2  
username ii-2  
virtual sensor vs0 5-2  
default service anomaly-detection command 9-9  
default service event-action-rules command 8-8  
default service signature-definition command 7-2  
defining authorized keys 3-49  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
global correlation statistics 10-14  
health status 17-18, C-74  
inspection load 17-11  
interface statistics 4-38  
interface traffic history 4-41, C-95  
IP log contents 12-5  
KB files 9-40  
signature definition policies 7-2  
signature variables 7-5  
target value ratings 8-16  
efficacy  
described 10-5  
measurements 10-5  
enable-acl-logging command 14-14  
enable-detail-traps command 15-4  
enable-nvram-write command 14-15  
enabling  
KB thresholds 9-46  
live traffic 13-3  
OS IDs 8-32  
anomaly detection 9-8  
signatures 7-13  
password recovery setting 17-9, C-14  
PEP information 17-46  
policy lists 17-27  
SSHv1 fallback 3-13  
Telnet 3-5  
signature definition lists 17-27  
statistics 17-28, C-82  
enabling debug logging C-44  
Encryption Software Export Distribution Authorization  
form  
submode settings 17-49  
system clock 3-37, 17-24  
tech support information 17-40, C-75  
cryptographic account 20-2  
described 20-2  
engines  
DNS servers  
AIC FTP B-11  
AIC HTTP B-11  
Atomic ARP B-14  
Atomic IP B-25  
Atomic IP Advanced B-15  
Atomic IPv6 B-29  
Fixed B-30  
configuring 3-11  
DoS tools  
Stacheldraht B-73  
stick B-7  
downgrade command 21-13  
downgrading sensors 21-13  
downloading  
Fixed ICMP B-30  
Fixed TCP B-30  
Fixed UDP B-30  
Flood B-32  
Cisco software 20-1  
duplicate IP addresses C-27  
Flood Host B-32  
Flood Net B-32  
Master B-4  
E
Multi String B-35  
Normalizer B-36  
Service B-40  
editing  
anomaly detection policies 9-9  
event action rules policies 8-8  
event action variables 8-11  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
Service DNS B-40  
Service FTP B-41  
event action filters  
described 8-20  
Service Generic B-42  
Service H225 B-44  
Service HTTP 7-44, B-46  
Service IDENT B-48  
Service MSRPC B-49  
Service MSSQL B-51  
Service NTP B-52  
using variables 8-21  
event action overrides  
described 8-17  
risk rating range 8-17  
event action rules  
described 8-2  
functions 8-2  
Service P2P B-53  
notes and caveats 8-1  
task list 8-7  
Service RPC B-53  
Service SMB Advanced B-55  
Service SNMP B-57  
Service SSH B-58  
event action rules lists display 17-27  
event action rules policies  
copying 8-8  
Service TNS B-59  
creating 8-8  
State B-60  
deleting 8-8  
displaying 8-8  
String ICMP 7-41, B-62  
String TCP 7-41, B-62  
String UDP 7-41, B-62  
Sweep B-68  
editing 8-8  
event actions  
risk ratings 8-14  
threat ratings 8-14  
event actions configure 7-16  
event-counter command 7-10  
event counter configure 7-10  
events  
Sweep Other TCP B-70  
Traffic Anomaly B-71  
Traffic ICMP B-73  
Trojan B-74  
erase ad-knowledge-base command 9-42  
erase command 16-24  
erase license-key command 3-58  
erase packet-file command 13-7  
erasing  
host posture 11-2  
quarantined IP address 11-2  
Event Store  
current configuration 16-24  
clearing events 3-36, C-16  
data structures A-8  
described A-4  
packet files 13-7  
error messages  
described D-1  
examples A-8  
validation D-6  
no alerts C-31  
errors (Analysis Engine) C-51  
evAlert A-9  
responsibilities A-7  
time stamp 3-36, C-16  
timestamp A-7  
event-action command 7-15  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
event types C-98  
submode configuration 16-18  
filters command 8-21  
event variables  
described 8-10  
Fixed engine described B-30  
Fixed ICMP engine parameters (table) B-30  
Fixed TCP engine parameters (table) B-31  
Fixed UDP engine parameters (table) B-32  
Flood engine described B-32  
Flood Host engine parameters (table) B-33  
Flood Net engine parameters (table) B-33  
fragment-reassembly command 7-30  
FTP servers and software updates 21-3  
FTP timeout  
example 8-11  
evError A-9  
evLogTransaction A-9  
evShunRqst A-9  
evStatus A-9  
examples  
ASA failover configuration 18-21, 19-16, C-66, C-72  
default anomaly detection configuration 9-4  
KB histogram 9-37  
password 3-19  
configuring 3-8  
password policy 3-32  
privilege 3-19  
described 3-8  
ftp-timeout command 3-8  
SPAN configuration for IPv6 support 4-16  
System Configuration Dialog 2-3  
username 3-19  
G
external product interfaces  
adding 11-5  
generating  
SSH server host key 3-50  
TLS certificate 3-53  
generic commands 1-10  
global-block-timeout command 8-34, 14-13  
global correlation 10-1  
described 10-2  
described 11-1  
notes and caveats 11-1  
troubleshooting 11-8, C-22  
external zone  
configuring 9-29  
disabling about 10-13  
DNS server 10-7  
configuring other protocols 9-35  
configuring TCP 9-30  
configuring UDP 9-32  
described 9-28  
DNS servers 3-11  
error messages A-29  
features 10-6  
external-zone command 9-28  
goals 10-6  
health metrics 10-8  
health status 10-8  
F
HTTP proxy server 10-7  
false positives described 7-3  
files  
notes and caveats 10-1  
Cisco IPS (list) 20-1  
filtering  
more command 16-17  
Produce Alert 8-5  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
proxy servers 3-11  
hostname  
changing 3-3  
requirements 10-7  
risk rating 10-6  
configuring 3-3  
troubleshooting 10-13, C-18  
update client (illustration) 10-9  
Global Correlation Update  
client described A-28  
host-name command 3-3  
host posture events  
CSA MC 11-4  
described 11-2  
server described A-28  
HTTP/HTTPS servers supported 21-3  
HTTP advanced decoding  
described 5-4  
global-deny-timeout command 8-34  
global-filters-status command 8-34  
global-metaevent-status command 8-34  
global-overrides-status command 8-34  
global parameters  
platform support 5-4  
restrictions 5-4  
HTTP deobfuscation  
adding 5-12  
ASCII normalization 7-44, B-46  
described 7-44, B-46  
creating 5-12  
maximum open IP logs 5-12  
options 5-12  
hw-module module 1 recover configure command 19-12  
hw-module module slot_number password-reset  
global-parameters command 5-12  
global-summarization command 8-34  
GRUB menu password recovery 17-3, C-8  
hw-module module slot_number recover boot  
command 19-12  
hw-module module slot_number recover stop  
command 19-12  
hw-module module slot_number reload command 19-12  
hw-module module slot_number reset command 19-12  
H
H.225.0 protocol B-44  
H.323 protocol B-44  
health-monitor command 10-8  
health statistics configuration 17-14  
health status  
hw-module module slot_number shutdown  
command 19-12  
I
IDAPI  
global correlation 10-8  
health status display 17-18, C-74  
help  
communications A-4, A-32  
described A-4  
functions A-32  
illustration A-32  
responsibilities A-32  
IDCONF  
question mark 1-5  
using 1-5  
host blocks configure 14-31  
host IP address  
described A-33  
example A-33  
RDEP2 A-33  
changing 3-4  
configuring 3-4  
host-ip command 3-4  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
IDIOM  
defined A-32  
messages A-32  
IDM  
normalization 5-4  
pairing interfaces 4-4  
inline TCP session tracking modes described 5-3  
inline VLAN groups  
configuring 4-29  
Analysis Engine is busy C-55  
certificates 3-51  
deleting 4-33  
inline VLAN pair mode  
configuration restrictions 4-9  
described 4-21  
will not load C-54  
ignore command 9-10  
illegal zone  
illustration 4-21  
configuring 9-20  
supported sensors 4-21  
inline VLAN pairs  
configuring other protocols 9-26  
configuring TCP 9-22  
configuring UDP 9-24  
described 9-20  
configuring 4-23  
deleting 4-26  
inspection load  
protocols 9-20  
description 17-11  
illegal-zone command 9-20  
IME time synchronization problems C-57  
inactive mode (anomaly detection) 9-4  
initializing  
displaying 17-11  
installer major version 20-5  
installer minor version 20-5  
installing  
appliances 2-8  
license key 3-56  
ASA 5500-X IPS SSP 2-13  
ASA 5585-X IPS SSP 2-17  
sensors 2-2, 2-4  
system image  
ASA 5500-X IPS SSP 21-22  
ASA 5585-X IPS SSP 21-24  
IPS 4345 21-16  
user roles 2-1, 2-2  
verifying 2-21  
IPS 4360 21-16  
verifying (ASA 5500-X IPS SSP) 18-3  
verifying (IPS SSP) 18-3, 19-3  
initializing the sensor (notes and caveats) 2-1  
inline interface pair mode  
configuration restrictions 4-9  
described 4-16  
IPS 4510 21-20  
IPS 4520 21-20  
InterfaceApp described A-4  
interface configuration sequence 4-10  
interface-notifications command 4-35  
interfaces  
illustration 4-17  
alternate TCP reset 4-2  
command and control 4-2, 4-3  
configuration restrictions 4-8  
described 4-2  
inline interface pairs  
configuring 4-17  
deleting 4-20  
inline-interfaces command 4-17  
inline mode  
displaying live traffic 13-3  
port numbers 4-2  
interface cards 4-4  
sensing 4-2, 4-4  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
slot numbers 4-2  
support (table) 4-6  
IP packet trace 17-48  
IPS 4345  
TCP reset 4-4  
installing system image 21-16  
password recovery 17-3, 17-4, C-8, C-9  
reimaging 21-16  
interface statistics displaying 4-38  
interface traffic history displaying 4-41, C-95  
internal zone  
IPS 4360  
configuring 9-12  
installing system image 21-16  
password recovery 17-3, 17-4, C-8, C-9  
reimaging 21-16  
configuring other protocols 9-18  
configuring TCP 9-13  
configuring UDP 9-16  
described 9-12  
IPS 4510  
installing system image 21-20  
password recovery 17-3, 17-4, C-8, C-9  
reimaging 21-20  
protocols 9-12  
internal-zone command 9-12  
introducing the CLI guide 1-1  
IP fragmentation described B-37  
IP fragment reassembly  
described 7-28  
SwitchApp A-29  
IPS 4520  
installing system image 21-20  
password recovery 17-3, 17-4, C-8, C-9  
reimaging 21-20  
parameters (table) 7-28  
signatures (table) 7-28  
ip-log-bytes command 12-2  
ip-log command 7-39  
iplog command 12-3  
IP log contents  
SwitchApp A-29  
IPS appliances  
Deny Connection Inline 8-7, 18-2, 19-2  
Deny Packet Inline 8-7, 18-2, 19-2  
Reset TCP Connection 8-7, 18-2, 19-2  
TCP reset packets 8-7, 18-2, 19-2  
IPS applications  
displaying 12-5  
viewing 12-5  
IP log files copying 12-7  
IP logging  
summary A-35  
table A-35  
automatic 12-2  
XML format A-4  
configuring 12-2  
IPS clock synchronization 3-36, C-15  
IPS data  
copying files 12-7  
described 7-39, 12-2  
manual 12-4  
types A-8  
XML document A-9  
IPS events  
notes and caveats 12-1  
ip-log-packets command 12-2  
IP logs  
evAlert A-9  
evError A-9  
TCPDUMP 12-2  
evLogTransaction A-9  
evShunRqst A-9  
Wireshark 12-2  
iplog-status command 12-5  
ip-log-time command 12-2  
evStatus A-9  
list A-9  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
types A-9  
K
IPS internal communications A-32  
IPS software  
KB files  
displaying 9-40  
KBs  
application list A-4  
available files 20-1  
comparing 9-44  
configuring device parameters A-5  
directory structure A-34  
Linux OS A-1  
described 9-3  
histogram 9-36  
obtaining 20-1  
retrieving data A-5  
initial baseline 9-3  
manually loading 9-41  
manually saving 9-41  
renaming 9-42, 9-43  
scanner threshold 9-36  
tree structure 9-36  
security features A-5  
tuning signatures A-5  
updating A-5  
user interaction A-5  
versioning scheme 20-2  
IPS software file names  
major updates (illustration) 20-4  
minor updates (illustration) 20-4  
patch releases (illustration) 20-4  
service packs (illustration) 20-4  
IPS SSP  
KB thresholds display 9-46  
keywords  
default 1-11  
show module command 18-3, 19-3  
verifying initialization 18-3, 19-3  
virtual sensors  
L
assigning to security context 19-7  
IPv4  
learning accept mode  
anomaly detection 9-3  
learning-accept-mode command 9-38  
license key  
address format 8-10  
event variables 8-10  
IPv6  
installing 3-56  
address format 8-10  
described B-29  
obtaining 3-54  
trial 3-54  
event variables 8-10  
SPAN ports 4-15  
uninstalling 3-58  
viewing status of 3-54  
licensing  
switches 4-15  
ipv6-target-value command 8-15  
described 3-54  
IPS device serial number 3-54  
Licensing pane  
described 3-54  
limitations for concurrent CLI sessions 18-1, 19-1  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
list anomaly-detection-configurations command 9-9, 17-27  
list event-action-rules-configurations command 8-8, 17-27  
list of blocked hosts 14-33  
show version command A-6  
major updates described 20-3  
managing  
list signature-definition-configurations command 7-2,  
firewalls 14-27  
routers 14-23  
loading KBs 9-41  
log-all-block-events-and-errors command 14-16  
Logger  
switches 14-26  
manifests  
client A-28  
described A-4, A-19  
functions A-19  
server A-28  
manual blocking 14-31, 14-32  
manual block to bogus host C-41  
manually loading  
syslog messages A-19  
logging in  
appliances ii-2  
ASA 5500-X IPS SSP ii-4  
ASA 5585-X IPS SSP ii-5  
notes and caveats ii-1  
sensors  
manually saving  
master blocking sensor  
described 14-28  
not set up properly C-42  
verifying configuration C-42  
Master engine  
Telnet ii-6  
service role ii-2  
terminal servers ii-3, 21-15  
user role ii-1  
alert frequency B-7  
alert frequency parameters (table) B-7  
described B-4  
login banners  
adding 3-9  
event actions B-8  
login-banner-text  
configuring 3-9  
general parameters (table) B-4  
universal parameters B-4  
master engine parameters  
obsoletes B-7  
login-banner-text command 3-9  
LOKI  
described B-73  
promiscous delta B-6  
vulnerable OSes B-7  
max-block-entries command 14-11  
max-denied-attackers command 8-34  
maximum open IP logs 5-12  
max-interfaces command 14-17  
merging configuration files 16-24, C-2  
Meta engine  
protocol B-73  
loose connections on sensors C-22  
M
MainApp  
components A-6  
described A-4, A-6  
host statistics A-6  
responsibilities A-6  
described 7-46, B-33  
parameters (table) B-34  
Signature Event Action Processor 7-46, B-34  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
MIBs supported 15-6, C-18  
minor updates described 20-3  
modes  
described 10-4  
health metrics 10-8  
modes 10-5  
anomaly detection detect 9-4  
anomaly detection learning accept 9-3  
asymmetric 5-4  
requirements 10-4  
SensorBase Network 10-5  
statistics 10-5  
bypass 4-34  
network participation data  
improving signature fidelity 10-5  
understanding sensor deployment 10-5  
never-block-hosts command 14-19  
never-block-networks command 14-19  
no iplog command 12-6  
no ipv6-target-value command 8-15  
normalization described 5-4  
Normalizer engine  
inactive (anomaly detection) 9-4  
inline interface pair 4-16  
inline TCP tracking 5-3  
inline VLAN pair 4-21  
Normalizer 5-4  
promiscuous 4-14  
VLAN groups 4-27  
modifying  
terminal properties 17-20  
monitoring  
described B-37  
IPv6 fragments B-37  
viewer privileges 1-4  
more command 16-20  
filtering 16-17  
modify packets inline 5-3  
parameters (table) B-38  
no service anomaly-detection command 9-9  
no service event-action-rules command 8-8  
no service signature-definition command 7-2  
no target-value command 8-15  
notes and caveats 7-1, 9-1, 10-1  
administrative tasks 17-2  
anomaly detection 9-1  
more current-config command 16-1  
moving  
OS maps 8-30  
Multi String engine  
described B-35  
parameters (table) B-35  
Regex B-35  
ASA 5500-X IPS SSP 18-1  
ASA 5585-X IPS SSP 19-1  
blocking 14-1  
N
capture packet files 13-1  
configuring interfaces 4-1  
event action rules 8-1  
Neighborhood Discovery  
options B-30  
external product interfaces 11-1  
initializing the sensor 2-1  
IP logging 12-1  
types B-30  
network blocks  
configuring 14-32  
network connectivity diagnosis 17-44  
network participation  
data gathered 10-4  
data use (table) 10-3  
logging in ii-1  
setting up the sensor 3-1  
SNMP 15-1  
virtual sensors 5-1  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
NotificationApp  
moving 8-30  
alert information A-9  
other actions (list) 8-6  
other command 9-18, 9-26, 9-34  
output  
described A-4  
functions A-9  
SNMP gets A-9  
clearing current line 1-6  
displaying 1-6  
SNMP traps A-9  
statistics A-11  
overrides command 8-17  
system health information A-10  
no variables command 8-11  
NTP  
P
configuring servers 3-43  
described 3-35, C-15  
P2P networks described B-53  
packet capture command 13-4  
packet command restrictions  
configuring 3-27  
incorrect configuration C-16  
sensor time source 3-43, 3-44  
time synchronization 3-35, C-15  
unauthenticated 3-2, 3-35, 3-44, C-15  
packet display command 13-2  
packet files  
viewing  
TCPDUMP 13-7  
Wireshark 13-7  
O
partitions  
obsoletes field described B-7  
obtaining  
application A-4  
recovery A-4  
command history 17-45  
cryptographic account 20-2  
IPS software 20-1  
passive OS fingerprinting  
components 8-26  
configuring 8-27  
license key 3-54  
described 8-26  
list of blocked hosts and connections 14-33  
used commands list 17-45  
operator role privileges 1-4  
options  
enabled (default) 8-27  
password command 3-18, 3-29  
password policy  
configuring 3-32  
global correlation 10-10, 10-11, 10-13  
os-identifications command 8-28  
OS IDs  
password policy caution 3-32  
password recovery  
appliances 17-3, C-8  
ASA 5500-X IPS SSP 17-4, C-10  
ASA 5585-X IPS SSP 17-6, C-11  
clearing 8-32  
displaying 8-32  
OS information sources 8-27  
OS maps  
described 17-2, C-8  
disabling 17-8, C-13  
displaying setting 17-9, C-14  
creating 8-29  
deleting 8-31  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
GRUB menu 17-3, C-8  
platforms 17-2, C-8  
privilege levels  
administrator 1-3  
operators 1-3  
service 1-3  
viewers 1-3  
promiscuous delta  
calculating risk rating 8-14  
described 7-6, 8-14  
promiscuous delta described B-6  
promiscuous mode  
atomic attacks 4-15  
configuring 4-15  
described 4-14  
illustration 4-15  
packet flow 4-14  
SPAN ports 4-15  
TCP reset interfaces 4-4  
VACL capture 4-15  
prompts  
troubleshooting 17-9, C-14  
verifying 17-9, C-14  
passwords 3-30  
changing 3-30  
configuring 3-30  
policy 3-32  
patch releases described 20-3  
peacetime learning (anomaly detection) 9-3  
PEP information  
default input 1-5  
protocols  
permit-packet-logging command 3-26  
physical connectivity issues C-30  
physical interfaces  
configuring 4-12  
CIDEE A-34  
physical-interfaces command 4-11, 4-22, 4-28  
physical interfaces configuration restrictions 4-8  
ping command 17-43  
platforms concurrent CLI sessions 18-1, 19-1  
policies  
DDoS B-73  
H.323 B-44  
H225.0 B-44  
HTTP 3-15  
passwords 3-32  
ICMPv6 B-15  
IDAPI A-32  
policy lists  
displaying 17-27  
IDCONF A-33  
IDIOM A-32  
Post-Block ACLs 14-21, 14-23  
Pre-Block ACLs 14-21, 14-23  
prerequisites for blocking 14-6  
privilege  
IPv6 B-29  
LOKI B-73  
MSSQL B-51  
changing 3-30  
Neighborhood Discovery B-29  
Q.931 B-44  
configuring 3-30  
privilege command 3-18, 3-30  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
SDEE A-33  
Regex  
described 1-8  
proxy servers  
configuring 3-11  
Multi String engine B-35  
standardized B-1  
regular expression syntax  
described 1-8  
Q
Q.931 protocol  
described B-44  
signatures B-9  
SETUP messages B-44  
table 1-8  
quarantined IP address events described 11-2  
reimaging  
ASA 5500-X IPS SSP 21-22  
described 21-2  
R
IPS 4345 21-16  
RADIUS authentication  
described 3-20  
IPS 4360 21-16  
IPS 4510 21-20  
service account 3-29  
shared secret 3-24, 3-25  
rate limiting  
IPS 4520 21-20  
removing  
ACLs 14-5  
last applied  
described 14-4  
service pack 21-13  
signature update 21-13  
users 3-19  
routers 14-4  
service policies 14-5  
supported signatures 14-4  
raw expression syntax  
described B-65  
rename ad-knowledge-base command 9-42  
renaming  
expert mode B-65  
Raw Regex  
renaming KBs 9-42  
reputation  
expert mode 7-53, 7-56, B-65  
recall  
described 10-3  
illustration 10-4  
servers 10-3  
help and tab completion 1-6  
using 1-6  
reset command 17-44  
reset not occurring for a signature C-50  
resetting  
recover command 21-13  
recovering the application partition image 21-14  
recovery partition  
appliances 17-44  
passwords  
described A-4  
hw-module command 17-6, C-12  
sw-module command 17-4, C-10  
recovery partition upgrade 21-7  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
resetting the password  
ASA 5500-X IPS SSP 17-5, C-10  
ASA 5585-X IPS SSP 17-6, C-12  
restoring the current configuration 16-23, C-5  
retiring  
protocol A-33  
server requests A-33  
searching  
submode configuration 16-18  
security  
signatures 7-13  
account locking 3-33  
risk rating  
information on Cisco Security Intelligence  
Operations 20-8  
Alarm Channel 10-6  
calculating 8-13  
security policies described 7-1, 8-2, 9-2  
sensing interface  
described 8-26  
global correlation 10-6  
reputation score 10-6  
ROMMON  
ASA 5500-X IPS SSP 18-4  
sensing interfaces  
Analysis Engine 4-4  
described 4-4  
ASA 5585-X IPS SSP 21-26  
described 21-15  
interface cards 4-4  
modes 4-4  
password recovery 17-4, C-9  
remote sensors 21-15  
serial console port 21-15  
sensing interfaces described (ASA 5585-X IPS SSP) 19-4  
SensorApp  
Alarm Channel A-24  
Analysis Engine A-24  
described A-4  
event action filtering A-25  
inline packet processing A-24  
IP normalization A-24  
packet flow A-25  
RPC portmapper B-53  
RSA authentication  
processors A-23  
authorized keys 3-48  
RTT  
responsibilities A-23  
risk rating A-25  
described 21-15  
Signature Event Action Processor A-23  
TCP normalization A-24  
SensorBase Network  
described 10-2  
TFTP limitation 21-15  
S
network participation 10-5  
participation 10-2  
saving  
servers 10-2  
scheduling automatic upgrades 21-10  
SDEE  
sensor databases  
clearing 17-10  
described A-33  
HTTP A-33  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
Sensor Key pane  
using NTP time source 3-43  
server manifest described A-28  
service account  
described 3-49  
sensors  
access problems C-24  
application partition image 21-14  
accessing 3-28, C-5  
creating 3-28, C-6  
asymmetric traffic and disabling anomaly  
detection 9-48, C-19  
RADIUS authentication 3-29  
command and control interfaces (list) 4-3  
configuration sequence 1-2  
configuring to use NTP 3-44  
corrupted SensorApp configuration C-34  
disaster recovery C-6  
downgrading 21-13  
troubleshooting A-31  
service anomaly-detection command 9-8  
Service DNS engine  
described B-40  
incorrect NTP configuration C-16  
initializing 2-2, 2-4  
parameters (table) B-40  
Service engine  
interface support 4-6  
IP address conflicts C-27  
logging in  
described B-40  
Layer 5 traffic B-40  
service event-action-rules command 8-8  
Service FTP engine  
Telnet ii-6  
described B-41  
loose connections C-22  
managing  
parameters (table) B-42  
PASV port spoof B-41  
Service Generic engine  
described B-42  
firewalls 14-27  
routers 14-23  
switches 14-26  
no custom signatures B-42  
parameters (table) B-43  
Service H225 engine  
ASN.1PER validation B-44  
described B-44  
misconfigured access lists C-26  
no alerts C-31, C-56  
not seeing packets C-33  
NTP time source 3-44  
NTP time synchronization 3-35, C-15  
partitions A-4  
features B-44  
parameters (table) B-45  
TPKT validation B-44  
Service HTTP engine  
described 7-44, B-46  
parameters (table) B-47  
service HTTP engine  
signature 7-45  
physical connectivity C-30  
preventive maintenance C-2  
reimaging 21-2  
sensing process not running C-28  
setup command 2-2, 2-4, 2-8  
time sources 3-35, C-15  
troubleshooting software upgrades C-53  
upgrading 21-5  
Service IDENT engine  
described B-48  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
parameters (table) B-49  
Service MSRPC engine  
DCS/RPC protocol B-49  
described B-49  
ASA 5585-X IPS SSP ii-5  
setting  
system clock 3-38, 17-25  
setting up  
parameters (table) B-50  
Service MSSQL engine  
described B-51  
notes and caveats 3-1  
terminal servers ii-3, 21-15  
setup  
MSSQL protocol B-51  
parameters (table) B-52  
Service NTP engine  
automatic 2-2  
simplified mode 2-2  
described B-52  
setup command  
user roles 2-1, 2-2  
shared secret  
parameters (table) B-52  
Service P2P engine described B-53  
service packs described 20-3  
service role  
described 3-24, 3-25  
RADIUS authentication 3-24, 3-25  
privileges 1-4  
show ad-knowledge-base diff command 9-44, 9-45  
show ad-knowledge-base files command 9-40, 9-41  
show clock command 3-37, 17-24  
Service RPC engine  
described B-53  
show configuration command 16-1  
show context command 18-7, 19-8  
parameters (table) B-53  
RPC portmapper B-53  
service signature-definition command 7-2  
Service SMB Advanced engine  
described B-55  
show events command 8-39, 17-21, C-98  
show health command 10-9, 17-17, C-74  
show history command 17-45  
showing  
parameters (table) B-55  
Service SNMP engine  
described B-57  
user information 3-31  
show inspection-load command 17-11  
show interfaces command 4-38, C-93  
show interfaces-history command 4-40, C-94  
show inventory command 17-46  
parameters (table) B-57  
Service SSH engine  
described B-58  
show module 18-3  
parameters (table) B-58  
Service TNS engine  
show module 1 details command 19-12, C-58, C-68  
show module command 18-3, 19-3  
described B-59  
show os-identification command 8-31  
show settings command 16-3, 16-18, 17-9, 17-49, C-14  
show statistics anomaly-detection command 9-47  
show statistics command 14-33, 17-28, C-81  
show statistics denied-attackers command 8-36, 17-25  
show statistics virtual-sensor command 17-28, C-23, C-81  
show tech-support command 17-40, C-75  
parameters (table) B-59  
session command  
ASA 5500-X IPS SSP ii-4  
ASA 5585-X IPS SSP ii-5  
sessioning in  
ASA 5500-X IPS SSP ii-4  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
show users command 3-31  
show version command 17-41, C-78  
sig-fidelity-rating command 7-12, 7-14  
signature definition lists  
displaying 17-27  
signature definition policies  
copying 7-2  
Service NTP B-52  
Service P2P B-53  
Service RPC B-53  
Service SMB Advanced B-55  
Service SNMP B-57  
Service SSH engine B-58  
Service TNS B-59  
creating 7-2  
State B-60  
deleting 7-2  
editing 7-2  
Sweep B-68  
signature engines  
Sweep Other TCP B-70  
Traffic Anomaly B-71  
Traffic ICMP B-73  
Atomic B-14  
Atomic ARP B-14  
Atomic IP B-25  
Atomic IP Advanced B-15  
Atomic IPv6 B-29  
described B-1  
Trojan B-74  
signature engine update files described 20-4  
Signature Event Action Filter  
described 8-3, A-26  
parameters 8-3, A-26  
Signature Event Action Handler described 8-3, A-26  
Signature Event Action Override described 8-3, A-26  
Signature Event Action Processor  
Alarm Channel 8-3, A-26  
components 8-3, A-26  
signature fidelity rating  
calculating risk rating 8-13  
configuring 7-12, 7-14  
described 8-13  
Fixed B-30  
Flood B-32  
Flood Host B-33  
Flood Net B-33  
list B-2  
Master B-4  
Multi String B-35  
Normalizer B-37  
Regex  
patterns B-10  
signatures  
syntax B-9  
custom 7-4  
Service B-40  
default 7-4  
Service DNS B-40  
Service FTP B-41  
Service Generic B-42  
Service H225 B-44  
Service HTTP 7-44, B-46  
Service IDENT B-48  
Service MSRPC B-49  
Service MSSQL B-51  
described 7-3  
false positives 7-3  
general parameters 7-6  
rate limits 14-4  
service HTTP 7-45  
string TCP 7-42  
string TCP XL 7-52, 7-56  
subsignatures 7-3  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
TCP reset C-50  
tuned 7-4  
supported HTTP/HTTPS servers 21-3  
SPAN port issues C-30  
specifying  
signature update  
files 20-4  
signature variables  
adding 7-5  
deleting 7-5  
described 7-4  
editing 7-5  
SNMP  
worm timeout 9-11  
worm timout 9-38  
SSH  
adding hosts 3-47  
described 3-46  
security 3-46  
ssh authorized-key command 3-48  
ssh generate-key command 3-50  
ssh host-key command 3-46, 3-47  
SSH known hosts list  
adding hosts 3-46  
SSH Server  
configuring  
agent parameters 15-3  
traps 15-5  
described 15-1  
general parameters 15-2  
private keys A-21  
public keys A-21  
SSH server host key  
generating 3-50  
GetNext 15-1  
notes and caveats 15-1  
supported MIBs 15-6, C-18  
Trap 15-1  
SSHv1 fallback  
disabling 3-13  
snmp-agent-port command 15-2  
snmp-agent-protocol command 15-2  
SNMP traps  
enabling 3-13  
sshv1-fallback  
configuring 3-13  
sshv1-fallback command 3-13  
standards  
described 15-2  
software architecture  
ARC (illustration) A-13  
IDAPI (illustration) A-32  
software downloads Cisco.com 20-1  
software file names  
CIDEE A-34  
IDCONF A-33  
IDIOM A-32  
SDEE A-33  
recovery (illustration) 20-5  
signature/virus updates (illustration) 20-4  
signature engine updates (illustration) 20-5  
system image (illustration) 20-5  
software release examples  
platform identifiers 20-7  
platform-independent 20-6  
software updates  
State engine  
Cisco Login B-60  
described B-60  
LPR Format String B-60  
parameters (table) B-61  
SMTP B-60  
statistic display 17-28, C-82  
status command 7-13  
supported FTP servers 21-3  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
stopping  
IPS interfaces for CSA MC 11-4  
Sweep engine B-68  
IP logging 12-6  
stream-reassembly command 7-37  
String engine described 7-41, B-62  
String ICMP engine parameters (table) B-63  
String TCP engine  
described B-68  
parameters (table) B-69  
Sweep Other TCP engine  
described B-70  
parameters 7-41  
parameters (table) B-71  
SwitchApp  
parameters (table) B-63  
signature example 7-42  
String TCP XL signature example 7-52, 7-55  
String UDP engine parameters (table) B-64  
String XL engine  
described A-29  
switches  
TCP reset interfaces 4-5  
sw-module module 1 recover configure command 18-12  
description B-65  
sw-module module slot_number password-reset  
hardware support 5-12, B-3, B-65  
parameters (table) B-65  
unsupported parameters B-67  
subinterface 0 described 4-27  
subinterface-type command 4-22, 4-28  
submode configuration  
sw-module module slot_number reload command 18-12  
sw-module module slot_number reset command 18-12  
sw-module module slot_number shutdown  
command 18-12  
syntax  
case sensitivity 1-6  
system architecture  
directory structure A-34  
supported platforms A-1  
system clock  
filtering output 16-18  
searching output 16-18  
submode settings display 17-49  
subsignatures described 7-3  
summarization  
displaying 3-37, 17-24  
system clock setting 3-38, 17-25  
system components IDAPI A-32  
System Configuration Dialog  
described 2-2  
described 8-33  
fire-all 8-33  
fire-once 8-33  
global-summarization 8-33  
Meta engine 8-33  
example 2-3  
summary 8-33  
system design (illustration) A-2, A-3  
system images  
summertime  
configuring  
installing  
non-recurring 3-40  
ASA 5500-X IPS SSP 21-22  
IPS 4345 21-16  
recurring 3-38  
summertime-option non-recurring command 3-40  
summertime-option recurring command 3-38  
supported  
IPS 4360 21-16  
IPS 4510 21-20  
IPS 4520 21-20  
FTP servers 21-3  
HTTP/HTTPS servers 21-3  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
Telnet  
disabling 3-5  
enabling 3-5  
telnet-option  
T
tab completion  
using 1-5  
TAC  
command 3-5  
PEP information 17-46  
configuring 3-5  
service account 3-28, A-31, C-5  
show tech-support command 17-40, C-75  
troubleshooting A-31  
target-value command 8-15  
IPv4 8-15  
terminal  
modifying length 17-20  
terminal command 17-20  
terminal server setup ii-3, 21-15  
terminating  
IPv6 8-15  
CLI sessions 17-19  
TFN2K  
target value rating  
calculating risk rating 8-14  
described 8-14, 8-15  
described B-73  
Trojans B-74  
tasks  
TFTP servers  
configuring the sensor 1-2  
tcp command 9-13, 9-21, 9-29  
TCPDUMP  
recommended  
Windows 21-15  
copy packet-file command 13-6  
expression syntax 13-2  
IP logs 12-2  
threat rating  
described 8-14  
packet capture command 13-5  
packet display command 13-2  
TCP fragmentation described B-37  
TCP reset interfaces  
risk rating 8-14  
time  
correction on the sensor 3-36, C-16  
synchronizing IPS clocks 3-36, C-15  
time sources  
conditions 4-5  
described 4-4  
list 4-5  
appliances 3-35, C-15  
ASA 5500-X IPS SSP 3-36, C-15  
ASA 5585-X IPS SSP 3-36, C-15  
time zone settings  
configuring 3-42  
time-zone-settings command 3-42  
TLS  
promiscuous mode 4-4  
switches 4-5  
TCP resets  
not occurring C-50  
TCP stream reassembly  
described 7-31  
parameters (table) 7-32, 7-36  
signatures (table) 7-32, 7-36  
tech support information display 17-40, C-75  
handshaking 3-51  
web server 3-51  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
TLS certificates  
device access issues C-39  
enabling SSH C-41  
generating 3-53  
tls generate-key command 3-53  
tls trusted-host command 3-52  
trace command 17-48  
tracing  
inactive state C-37  
misconfigured master blocking sensor C-42  
verifying device interfaces C-40  
ASA 5500-X IPS SSP  
IP packet route 17-48  
Traffic Anomaly engine  
described B-71  
commands C-58  
failover scenarios 18-20, C-65  
ASA 5585-X IPS SSP  
protocols B-71  
signatures B-71  
failover scenarios 19-16, C-71  
traffic flow stopped 19-15, C-72  
automatic updates C-52  
traffic flow notifications  
configuring 4-35  
described 4-35  
cannot access sensor C-24  
cidDump C-101  
Traffic ICMP engine  
DDoS B-73  
cidLog messages to syslog C-49  
communication C-23  
described B-73  
LOKI B-73  
corrupted SensorApp configuration C-34  
debug logger zone names (table) C-48  
debug logging C-44  
parameters (table) B-74  
TFN2K B-73  
trap-community-name 15-4  
trap-destinations command 15-4  
trial license key 3-54  
Trojan engine  
disaster recovery C-6  
duplicate sensor IP addresses C-27  
enabling debug logging C-44  
external product interfaces 11-8, C-22  
gathering information C-73  
global correlation 10-13, C-18  
IDM  
BO2K B-74  
described B-74  
cannot access sensor C-55  
will not load C-54  
TFN2K B-74  
Trojans  
IME time synchronization C-57  
IPS clock time drift 3-36, C-15  
manual block to bogus host C-41  
misconfigured access list C-26  
no alerts C-31, C-56  
BO2K B-74  
LOKI B-73  
TFN2K B-74  
troubleshooting C-1  
Analysis Engine busy C-55  
applying software updates C-52  
ARC  
password recovery 17-9, C-14  
physical connectivity issues C-30  
preventive maintenance C-2  
reset not occurring for a signature C-50  
blocking not occurring for signature C-41  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
sensing process not running C-28  
sensor events C-98  
latest version C-51  
recovery partition 21-7  
sensors 21-5  
sensor loose connections C-22  
sensor not seeing packets C-33  
sensor software upgrade C-53  
service account 3-28, C-5  
upgrading IPS software  
upgrade notes and caveats 21-1  
URLs for Cisco Security Intelligence Operations 20-8  
username command 3-18  
user-profile command 14-20  
user profiles 14-20  
user roles  
show events command C-97  
show interfaces command C-93  
show statistics command C-81  
show tech-support command C-74, C-75, C-76  
show version command C-78  
software upgrades C-51  
administrator 1-3  
operator 1-3  
SPAN port issue C-30  
service 1-3  
upgrading C-51  
viewer 1-3  
verifying Analysis Engine is running C-20  
verifying ARC status C-36  
trusted hosts add 3-52  
user roles authentication 3-20  
users  
tuned signatures described 7-4  
removing 3-18, 3-19  
using  
debug logging C-44  
TCP reset interfaces 4-5  
U
udp command 9-15, 9-24, 9-32  
unassigned VLAN groups described 4-27  
unauthenticated NTP 3-2, 3-35, 3-44, C-15  
uninstalling the license key 3-58  
unlocking accounts 3-34  
unlock user username command 3-34  
updating the sensor immediately 21-12  
upgrade command 21-4, 21-7  
upgrade files  
V
VACLs  
described 14-3  
Post-Block 14-25  
Pre-Block 14-25  
validation error messages described D-6  
variables command 7-4, 8-11  
IPv4 8-11  
copying 21-7  
displaying 21-7  
IPv6 8-11  
displaying the digest 21-7  
erasing 21-7  
verifying  
password recovery 17-9, C-14  
sensor initialization 2-21  
sensor setup 2-21  
working with 21-7  
upgrade notes and caveats  
upgrading IPS software 21-1  
upgrading  
version display 17-41, C-78  
viewer role privileges 1-4  
application partition 21-13  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
viewing  
described 8-14  
web server  
IP log contents 12-5  
license key status 3-54  
user information 3-31  
described A-4, A-22  
HTTP 1.0 and 1.1 support A-22  
HTTP protocol 3-15  
port (default) 3-1, 3-15  
private keys A-21  
public keys A-21  
SDEE support A-22  
virtualization  
advantages 5-2, C-17  
restrictions 5-3, C-17  
supported sensors 5-3, C-17  
traffic capture requirements 5-3, C-17  
virtual-sensor name command 5-5, 18-5, 19-5  
virtual sensors  
web server settings  
changing 3-16  
adding (ASA 5500-X IPS SSP) 18-5  
adding (ASA 5585-X IPS SSP) 19-5  
ASA 5500-X IPS SSP 18-7  
ASA 5585-X IPS SSP 19-8  
assigning interfaces 5-5  
assigning policies 5-5  
configuring 3-15  
Wireshark  
copy packet-file command 13-6  
IP logs 12-2  
worms  
Blaster 9-2  
creating 5-6, 5-9  
Code Red 9-2  
creating (ASA 5500-X IPS SSP) 18-5  
creating (ASA 5585-X IPS SSP) 19-5  
default virtual sensor 5-2  
described 5-2  
histograms 9-37  
Nimbda 9-2  
protocols 9-3  
Sasser 9-2  
displaying KB files 9-40  
notes and caveats 5-1  
scanners 9-3  
Slammer 9-2  
SQL Slammer 9-2  
worm-timeout command 9-10  
worm timeout specify 9-11, 9-38  
VLAN groups  
802.1q encapsulation 4-27  
configuration restrictions 4-10  
deploying 4-27  
Z
switches 4-27  
VLAN groups mode  
zones  
described 4-27  
external 9-4  
illegal 9-4  
internal 9-4  
vulnerable OSes field described B-7  
W
watch list rating  
calculating risk rating 8-14  
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2  
OL-29168-01  
IN-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Black Decker Cordless Drill SS12D User Manual
Black Decker Hot Beverage Maker JKC900 User Manual
Black Decker Iron IR1925W User Manual
Blaupunkt Car Stereo System Alaska DJ52 User Manual
Bose Home Theater System AM352276 User Manual
Bose Stereo System 321 GS Series III User Manual
Boston Acoustics Car Speaker Neo Type M SE User Manual
Casio Digital Camera GV 10 User Manual
CBC Camcorder ZN L8210NHA User Manual
Chamberlain Cordless Telephone MUOTIU EX User Manual