<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic thank you Karsten in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804196#M44244</link>
    <description>&lt;P&gt;thank you Karsten&lt;/P&gt;
&lt;P&gt;last question in case of software bypass it can work on interface vlan pair ?&lt;/P&gt;
&lt;P&gt;or require interface pair or this doesn't matter in case of software bypass&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I know that software bypass will work in case of service engine stopped but if device rebooted due to time changing or anything will it work ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 19 Jan 2016 12:46:21 GMT</pubDate>
    <dc:creator>engahmedsaied</dc:creator>
    <dc:date>2016-01-19T12:46:21Z</dc:date>
    <item>
      <title>IPS fail</title>
      <link>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804192#M44239</link>
      <description>&lt;P&gt;hello all,&lt;/P&gt;
&lt;P&gt;I face a &amp;nbsp;problem when IPS fail all network behind it be not accessible,&lt;/P&gt;
&lt;P&gt;so how can I check capability of box to support both&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1-hardware bypass.&lt;/P&gt;
&lt;P&gt;2-software bypass.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804192#M44239</guid>
      <dc:creator>engahmedsaied</dc:creator>
      <dc:date>2019-03-10T13:32:47Z</dc:date>
    </item>
    <item>
      <title>1) Which platform are you</title>
      <link>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804193#M44240</link>
      <description>&lt;P&gt;1) Which platform are you using? Not all support HW-bypass. You should find the needed information in the Data-Sheet of your platform.&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp;In the configuration of you system. And that is (again) dependent of the platform you use.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2016 12:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804193#M44240</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-19T12:21:28Z</dc:date>
    </item>
    <item>
      <title>cisco IPS 4510 - 7.3(4)E4</title>
      <link>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804194#M44241</link>
      <description>&lt;P&gt;cisco IPS 4510 - 7.3(4)E4&lt;/P&gt;
&lt;P&gt;is show tech-support command is useful ?&lt;/P&gt;
&lt;P&gt;I have found that below every interface "hardware bypass capable = NO"&lt;/P&gt;
&lt;P&gt;Is this tells that interface not supported in hardware bypass or hardware not set to that interface&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2016 12:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804194#M44241</guid>
      <dc:creator>engahmedsaied</dc:creator>
      <dc:date>2016-01-19T12:32:55Z</dc:date>
    </item>
    <item>
      <title>There is no HW-bypass on the</title>
      <link>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804195#M44243</link>
      <description>&lt;P&gt;There is no HW-bypass on the 4500 as far as I know. But you can use software-bypass:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ips/7-2/configuration/guide/idm/idmguide72/idm_interfaces.html#pgfId-1169786"&gt;http://www.cisco.com/c/en/us/td/docs/security/ips/7-2/configuration/guide/idm/idmguide72/idm_interfaces.html#pgfId-1169786&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2016 12:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804195#M44243</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-19T12:37:30Z</dc:date>
    </item>
    <item>
      <title>thank you Karsten</title>
      <link>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804196#M44244</link>
      <description>&lt;P&gt;thank you Karsten&lt;/P&gt;
&lt;P&gt;last question in case of software bypass it can work on interface vlan pair ?&lt;/P&gt;
&lt;P&gt;or require interface pair or this doesn't matter in case of software bypass&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I know that software bypass will work in case of service engine stopped but if device rebooted due to time changing or anything will it work ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2016 12:46:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804196#M44244</guid>
      <dc:creator>engahmedsaied</dc:creator>
      <dc:date>2016-01-19T12:46:21Z</dc:date>
    </item>
    <item>
      <title>Yes, it works with vlan pairs</title>
      <link>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804197#M44245</link>
      <description>&lt;P&gt;Yes, it works with vlan pairs. But be aware that the usecase for software bypass is a situation where the software still has full control of the system. If the signatures are updated,&amp;nbsp;bypass can be used to make sure that no traffic is dropped.&lt;/P&gt;
&lt;P&gt;But in every situation where the software doesn't have any control, software bypass can't work. That includes software-updates where the sensor reboots of failed/crashed IPS-software.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2016 13:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804197#M44245</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-19T13:00:28Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804198#M44246</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I had a similar situation where I had a CX Module + Cisco Prime Security Manager with Next Generation IPS.&lt;/P&gt;
&lt;P&gt;At the beginning when the CX Module Fails (IPS) no traffic is allowed.&lt;/P&gt;
&lt;P&gt;I was able to overcome this problem by doing the following changes to the Policy-map:&lt;/P&gt;
&lt;P&gt;I added "cxsc fail-open" this means if the model goes down the firewall will not pass the traffic through the model for inspection any more.&lt;/P&gt;
&lt;P&gt;Initially it was "cxsc fail-close". After I did this change everything went well.&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Best Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 17:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-fail/m-p/2804198#M44246</guid>
      <dc:creator>abdallah malas</dc:creator>
      <dc:date>2016-01-21T17:03:14Z</dc:date>
    </item>
  </channel>
</rss>

