Cisco 5510 Getting Started Guide - Page 178

inline, promiscuous, fail-close, fail-open, sensor, show ips, AIP SSM. See

Page 178 highlights

Configuring the AIP SSM Chapter 13 Configuring the AIP SSM Step 2 Step 3 Step 4 To add or edit a policy map that sets the action to divert traffic to the AIP SSM, enter the following commands: hostname(config)# policy-map name hostname(config-pmap)# class class_map_name hostname(config-pmap-c)# where the class_map_name is the class map from Step 1. For example: hostname(config)# policy-map IPS hostname(config-pmap)# class IPS To divert the traffic to the AIP SSM, enter the following command: hostname(config-pmap-c)# ips {inline | promiscuous} {fail-close | fail-open} [sensor {sensor_name | mapped_name}] where the inline and promiscuous keywords control the operating mode of the AIP SSM. See the "Operating Modes" section on page 13-3 for more details. The fail-close keyword sets the adaptive security appliance to block all traffic if the AIP SSM is unavailable. The fail-open keyword sets the adaptive security appliance to allow all traffic through, uninspected, if the AIP SSM is unavailable. If you use virtual sensors on the AIP SSM, you can specify a sensor name using the sensor sensor_name argument. To see available sensor names, enter the ips ... sensor ? command. Available sensors are listed. You can also use the show ips command. If you use multiple context mode on the adaptive security appliance, you can only specify sensors that you assigned to the context (see the "Assigning Virtual Sensors to Security Contexts" section on page 13-9). Use the mapped_name if configured in the context. If you do not specify a sensor name, then the traffic uses the default sensor. In multiple context mode, you can specify a default sensor for the context. In single mode or if you do not specify a default sensor in multiple mode, the traffic uses the default sensor that is set on the AIP SSM. If you enter a name that does not yet exist on the AIP SSM, you get an error, and the command is rejected. (Optional) To divert another class of traffic to the AIP SSM, and set the IPS policy, enter the following commands: hostname(config-pmap-c)# class class_map_name2 hostname(config-pmap-c)# ips {inline | promiscuous} {fail-close | fail-open} [sensor sensor_name] 13-12 Cisco ASA 5500 Series Getting Started Guide 78-19186-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

Chapter 13
Configuring the AIP SSM
Configuring the AIP SSM
13-12
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Step 2
To add or edit a policy map that sets the action to divert traffic to the AIP SSM,
enter the following commands:
hostname(config)#
policy-map
name
hostname(config-pmap)#
class
class_map_name
hostname(config-pmap-c)#
where the
class_map_name
is the class map from
Step 1
.
For example:
hostname(config)#
policy-map IPS
hostname(config-pmap)#
class IPS
Step 3
To divert the traffic to the AIP SSM, enter the following command:
hostname(config-pmap-c)#
ips
{
inline
|
promiscuous
} {
fail-close
|
fail-open
} [
sensor
{
sensor_name
|
mapped_name
}]
where the
inline
and
promiscuous
keywords control the operating mode of the
AIP SSM. See the
“Operating Modes” section on page 13-3
for more details.
The
fail-close
keyword sets the adaptive security appliance to block all traffic if
the AIP SSM is unavailable.
The
fail-open
keyword sets the adaptive security appliance to allow all traffic
through, uninspected, if the AIP SSM is unavailable.
If you use virtual sensors on the AIP SSM, you can specify a sensor name using
the
sensor
sensor_name
argument. To see available sensor names, enter the
ips ...
sensor ?
command. Available sensors are listed. You can also use the
show ips
command. If you use multiple context mode on the adaptive security appliance,
you can only specify sensors that you assigned to the context (see the
“Assigning
Virtual Sensors to Security Contexts” section on page 13-9
). Use the
mapped_name
if configured in the context. If you do not specify a sensor name,
then the traffic uses the default sensor. In multiple context mode, you can specify
a default sensor for the context. In single mode or if you do not specify a default
sensor in multiple mode, the traffic uses the default sensor that is set on the AIP
SSM. If you enter a name that does not yet exist on the AIP SSM, you get an error,
and the command is rejected.
Step 4
(Optional) To divert another class of traffic to the AIP SSM, and set the IPS policy,
enter the following commands:
hostname(config-pmap-c)#
class
class_map_name2
hostname(config-pmap-c)#
ips
{
inline
|
promiscuous
} {
fail-close
|
fail-open
} [
sensor
sensor_name
]