Cisco 5510 Getting Started Guide - Page 168

Understanding the AIP SSM, How the AIP SSM Works with the Adaptive Security Appliance

Page 168 highlights

Understanding the AIP SSM Chapter 13 Configuring the AIP SSM Understanding the AIP SSM This section includes the following topics: • How the AIP SSM Works with the Adaptive Security Appliance, page 13-2 • Operating Modes, page 13-3 • Using Virtual Sensors, page 13-4 How the AIP SSM Works with the Adaptive Security Appliance The AIP SSM runs a separate application from the adaptive security appliance. It is, however, integrated into the adaptive security appliance traffic flow. The AIP SSM does not contain any external interfaces itself, other than a management interface. When you identify traffic for IPS inspection on the adaptive security appliance, traffic flows through the adaptive security appliance and the AIP SSM in the following way: 1. Traffic enters the adaptive security appliance. 2. Firewall policies are applied. 3. Traffic is sent to the AIP SSM over the backplane. See the "Operating Modes" section on page 13-3 for information about only sending a copy of the traffic to the AIP SSM. 4. The AIP SSM applies its security policy to the traffic, and takes appropriate actions. 5. Valid traffic is sent back to the adaptive security appliance over the backplane; the AIP SSM might block some traffic according to its security policy, and that traffic is not passed on. 6. VPN policies are applied (if configured). 7. Traffic exits the adaptive security appliance. Figure 13-1 shows the traffic flow when running the AIP SSM in inline mode. In this example, the AIP SSM automatically blocks traffic that it identified as an attack. All other traffic is forwarded through the adaptive security appliance. 13-2 Cisco ASA 5500 Series Getting Started Guide 78-19186-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

Chapter 13
Configuring the AIP SSM
Understanding the AIP SSM
13-2
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Understanding the AIP SSM
This section includes the following topics:
How the AIP SSM Works with the Adaptive Security Appliance, page 13-2
Operating Modes, page 13-3
Using Virtual Sensors, page 13-4
How the AIP SSM Works with the Adaptive Security Appliance
The AIP SSM runs a separate application from the adaptive security appliance. It
is, however, integrated into the adaptive security appliance traffic flow. The AIP
SSM does not contain any external interfaces itself, other than a management
interface. When you identify traffic for IPS inspection on the adaptive security
appliance, traffic flows through the adaptive security appliance and the AIP SSM
in the following way:
1.
Traffic enters the adaptive security appliance.
2.
Firewall policies are applied.
3.
Traffic is sent to the AIP SSM over the backplane.
See the
“Operating Modes” section on page 13-3
for information about only
sending a copy of the traffic to the AIP SSM.
4.
The AIP SSM applies its security policy to the traffic, and takes appropriate
actions.
5.
Valid traffic is sent back to the adaptive security appliance over the
backplane; the AIP SSM might block some traffic according to its security
policy, and that traffic is not passed on.
6.
VPN policies are applied (if configured).
7.
Traffic exits the adaptive security appliance.
Figure 13-1
shows the traffic flow when running the AIP SSM in inline mode. In
this example, the AIP SSM automatically blocks traffic that it identified as an
attack. All other traffic is forwarded through the adaptive security appliance.