<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic monitor session for IDS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/monitor-session-for-ids/m-p/2530862#M45455</link>
    <description>&lt;P&gt;We currently have a Snort IDS installed in an environment with only one switch. The monitor session config for this is below&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;monitor session 1 source vlan 34&lt;BR /&gt;monitor session 1 destination interface Gi1/5&lt;BR /&gt;monitor session 1 filter packet-type good rx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We are adding another three switches into the environment and would like to sniff traffic from all four switches without and additional IDS devices or NICs if possible. My intention is to configure the new switches as follows...&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;monitor session 1 source vlan 34&lt;BR /&gt;monitor session 1 destination remote vlan 35&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And then alter the config on the switch to which the IDS is connected as follows...&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;monitor session 1 source vlan 34&lt;BR /&gt;monitor session 1 destination remote vlan 35&lt;BR /&gt;monitor session 1 filter packet-type good rx&lt;BR /&gt;monitor session 2 destination interface Gi1/5&lt;BR /&gt;monitor session 2 source remote vlan 35&lt;BR /&gt;monitor session 2 filter packet-type good rx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The original config was done by a former colleague so I just wanted to check whether this was the best way of doing it.&lt;/P&gt;&lt;P&gt;Also, should I remove the &lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;monitor session x filter packet-type good rx&lt;/SPAN&gt;&lt;/SPAN&gt; so that the IDS sees all packets? I would have thought that you want your IDS to see all packets? This command appears to be a default and appears any time I configure a monitoring session.&lt;/P&gt;&lt;P&gt;I'm running cat4500-ipbasek9-mz.122-54.SG1.bin on a Cisco 4948&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:14:18 GMT</pubDate>
    <dc:creator>Tormod Macleod</dc:creator>
    <dc:date>2019-03-10T13:14:18Z</dc:date>
    <item>
      <title>monitor session for IDS</title>
      <link>https://community.cisco.com/t5/network-security/monitor-session-for-ids/m-p/2530862#M45455</link>
      <description>&lt;P&gt;We currently have a Snort IDS installed in an environment with only one switch. The monitor session config for this is below&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;monitor session 1 source vlan 34&lt;BR /&gt;monitor session 1 destination interface Gi1/5&lt;BR /&gt;monitor session 1 filter packet-type good rx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We are adding another three switches into the environment and would like to sniff traffic from all four switches without and additional IDS devices or NICs if possible. My intention is to configure the new switches as follows...&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;monitor session 1 source vlan 34&lt;BR /&gt;monitor session 1 destination remote vlan 35&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And then alter the config on the switch to which the IDS is connected as follows...&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;monitor session 1 source vlan 34&lt;BR /&gt;monitor session 1 destination remote vlan 35&lt;BR /&gt;monitor session 1 filter packet-type good rx&lt;BR /&gt;monitor session 2 destination interface Gi1/5&lt;BR /&gt;monitor session 2 source remote vlan 35&lt;BR /&gt;monitor session 2 filter packet-type good rx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The original config was done by a former colleague so I just wanted to check whether this was the best way of doing it.&lt;/P&gt;&lt;P&gt;Also, should I remove the &lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;monitor session x filter packet-type good rx&lt;/SPAN&gt;&lt;/SPAN&gt; so that the IDS sees all packets? I would have thought that you want your IDS to see all packets? This command appears to be a default and appears any time I configure a monitoring session.&lt;/P&gt;&lt;P&gt;I'm running cat4500-ipbasek9-mz.122-54.SG1.bin on a Cisco 4948&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:14:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitor-session-for-ids/m-p/2530862#M45455</guid>
      <dc:creator>Tormod Macleod</dc:creator>
      <dc:date>2019-03-10T13:14:18Z</dc:date>
    </item>
  </channel>
</rss>

