Cisco SA520-K9 Administration Guide - Page 134

Configuring Peer-to-Peer Blocking and Instant Messaging, IPS > IM and P2P Blocking, Options

Page 134 highlights

Intrusion Prevention System Configuring Peer-to-Peer Blocking and Instant Messaging 5 Configuring Peer-to-Peer Blocking and Instant Messaging You can configure the appliance to block Peer-to-Peer (P2P) and Instant Message (IM) traffic on the security appliance. From the IM and P2P blocking page, you can specify what type of P2P and IM applications (such as Gnutella, BitTorrent, AOL, or Yahoo) are blocked. STEP 1 Click IPS > IM and P2P Blocking. STEP 2 Choose the inspection settings for each category or for each signature within each category. • To select an inspection setting for an IPS category, click an option in the category heading row. • To expand the signatures under a category, click the + button next to the category heading. To hide the signatures, click the - button. • To select an inspection setting for an individual signature, click an option in the entry row for that signature. Options: • Disabled: Choose this option to disable checking for this service. • Detect Only: Choose this option to check for attacks on this service and to log a message upon detection.This option is mostly used for troubleshooting purposes • Detect and Prevent: Choose this option to check for and prevent attacks for this service. Upon detection, a message is logged and a preventative action is taken. For IPS messages to be logged, you must configure IPS as the facility. For more information, see Logs Facility and Severity, page 189 STEP 3 Click Apply to save your settings. Cisco SA500 Series Security Appliances Administration Guide 134

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Intrusion Prevention System
Configuring Peer-to-Peer Blocking and Instant Messaging
Cisco SA500 Series Security Appliances Administration Guide
134
5
Configuring Peer-to-Peer Blocking and Instant Messaging
You can configure the appliance to block Peer-to-Peer (P2P) and Instant Message
(IM) traffic on the security appliance. From the IM and P2P blocking page, you can
specify what type of P2P and IM applications (such as Gnutella, BitTorrent, AOL, or
Yahoo) are blocked.
STEP 1
Click
IPS > IM and P2P Blocking
.
STEP
2
Choose the inspection settings for each category or for each signature within each
category.
To select an inspection setting for an IPS category, click an option in the
category heading row.
To expand the signatures under a category, click the
+
button next to the
category heading. To hide the signatures, click the
-
button.
To select an inspection setting for an individual signature, click an option in
the entry row for that signature.
Options:
Disabled
: Choose this option to disable checking for this service.
Detect Only
: Choose this option to check for attacks on this service and to
log a message upon detection.This option is mostly used for
troubleshooting purposes
Detect and Prevent
: Choose this option to check for and prevent attacks
for this service. Upon detection, a message is logged and a preventative
action is taken.
For IPS messages to be logged, you must configure IPS as the facility. For
more information, see
Logs Facility and Severity, page 189
STEP
3
Click
Apply
to save your settings.