Cisco 5510 Getting Started Guide - Page 179

class, global, interface, nameif, Step 3

Page 179 highlights

Chapter 13 Configuring the AIP SSM Configuring the AIP SSM Step 5 where the class_map_name2 argument is the name of a separate class map on which you want to perform IPS inspection. See Step 3 for information about the command options. Traffic cannot match more than one class map for the same action type; so if you want network A to go to sensorA, but want all other traffic to go to sensorB, then you need to enter the class command for network A before you enter the class command for all traffic; otherwise all traffic (including network A) will match the first class command, and will be sent to sensorB. To activate the policy map on one or more interfaces, enter the following command: hostname(config-pmap-c)# service-policy policy_map_name [global | interface interface_ID] hostname where policy_map_name is the policy map you configured in Step 2. To apply the policy map to traffic on all the interfaces, use the global keyword. To apply the policy map to traffic on a specific interface, use the interface interface_ID option, where interface_ID is the name assigned to the interface with the nameif command. Only one global policy is allowed. You can override the global policy on an interface by applying a service policy to that interface. You can only apply one policy map to each interface. 78-19186-01 The following example diverts all IP traffic to the AIP SSM in promiscuous mode, and blocks all IP traffic if the AIP SSM card fails for any reason: hostname(config)# access-list IPS permit ip any any hostname(config)# class-map my-ips-class hostname(config-cmap)# match access-list IPS hostname(config-cmap)# policy-map my-ips-policy hostname(config-pmap)# class my-ips-class hostname(config-pmap-c)# ips promiscuous fail-close hostname(config-pmap-c)# service-policy my-ips-policy global The following example diverts all IP traffic destined for the 10.1.1.0 network and the 10.2.1.0 network to the AIP SSM in inline mode, and allows all traffic through if the AIP SSM card fails for any reason. For the my-ips-class traffic, sensor1 is used; for the my-ips-class2 traffic, sensor2 is used. hostname(config)# access-list my-ips-acl permit ip any 10.1.1.0 255.255.255.0 Cisco ASA 5500 Series Getting Started Guide 13-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

13-13
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 13
Configuring the AIP SSM
Configuring the AIP SSM
where the
class_map_name2
argument is the name of a separate class map on
which you want to perform IPS inspection. See
Step 3
for information about the
command options.
Traffic cannot match more than one class map for the same action type; so if you
want network A to go to sensorA, but want all other traffic to go to sensorB, then
you need to enter the
class
command for network A before you enter the
class
command for all traffic; otherwise all traffic (including network A) will match the
first
class
command, and will be sent to sensorB.
Step 5
To activate the policy map on one or more interfaces, enter the following
command:
hostname(config-pmap-c)#
service-policy
policy_map_name
[
global
|
interface
interface_ID
]
hostname
where
policy_map_name
is the policy map you configured in
Step 2
. To apply the
policy map to traffic on all the interfaces, use the
global
keyword. To apply the
policy map to traffic on a specific interface, use the
interface
interface_ID
option,
where
interface_ID
is the name assigned to the interface with the
nameif
command.
Only one global policy is allowed. You can override the global policy on an
interface by applying a service policy to that interface. You can only apply one
policy map to each interface.
The following example diverts all IP traffic to the AIP SSM in promiscuous mode,
and blocks all IP traffic if the AIP SSM card fails for any reason:
hostname(config)#
access-list IPS permit ip any any
hostname(config)#
class-map my-ips-class
hostname(config-cmap)#
match access-list IPS
hostname(config-cmap)#
policy-map my-ips-policy
hostname(config-pmap)#
class my-ips-class
hostname(config-pmap-c)#
ips promiscuous fail-close
hostname(config-pmap-c)#
service-policy my-ips-policy global
The following example diverts all IP traffic destined for the 10.1.1.0 network and
the 10.2.1.0 network to the AIP SSM in inline mode, and allows all traffic through
if the AIP SSM card fails for any reason. For the my-ips-class traffic, sensor1 is
used; for the my-ips-class2 traffic, sensor2 is used.
hostname(config)#
access-list my-ips-acl permit ip any 10.1.1.0
255.255.255.0