<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPS Event Monitoring in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457441#M45598</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp;have deployed Cisco ASA 5525 IPS for one of our customer in inline mode in internet block. I am redirecting traffic from ASA towards built-in IPS module using ACL ( permit ip any any), class map and global service policy. I have verified that built-in IPS module is inspecting the traffic as the hits are increasing on ACL, service policy &amp;amp; show stats virtual-sensor.&lt;/P&gt;&lt;P&gt;But there are no events related to end user traffic appearing. I tried to activate RFC 1918 signature ( which is by default retired) just to verify that events are triggering or not and after activating this signature I received lot of events.&lt;/P&gt;&lt;P&gt;However customer wants to see all the traffic being inspected by the IPS so how I can achieve that ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;Mujeeb&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:11:21 GMT</pubDate>
    <dc:creator>rmujeeb81</dc:creator>
    <dc:date>2019-03-10T13:11:21Z</dc:date>
    <item>
      <title>IPS Event Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457441#M45598</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp;have deployed Cisco ASA 5525 IPS for one of our customer in inline mode in internet block. I am redirecting traffic from ASA towards built-in IPS module using ACL ( permit ip any any), class map and global service policy. I have verified that built-in IPS module is inspecting the traffic as the hits are increasing on ACL, service policy &amp;amp; show stats virtual-sensor.&lt;/P&gt;&lt;P&gt;But there are no events related to end user traffic appearing. I tried to activate RFC 1918 signature ( which is by default retired) just to verify that events are triggering or not and after activating this signature I received lot of events.&lt;/P&gt;&lt;P&gt;However customer wants to see all the traffic being inspected by the IPS so how I can achieve that ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;Mujeeb&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:11:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457441#M45598</guid>
      <dc:creator>rmujeeb81</dc:creator>
      <dc:date>2019-03-10T13:11:21Z</dc:date>
    </item>
    <item>
      <title>The AIP-SSM does not support</title>
      <link>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457442#M45600</link>
      <description>&lt;P&gt;The AIP-SSM does not support syslog as an alert format.&lt;/P&gt;&lt;P&gt;The default method to receive alert information from the AIP-SSM is through Security Device Event Exchange (SDEE). Another option is to configure individual signatures in order to generate a SNMP trap as an action to take when they are triggered.&lt;/P&gt;&lt;P&gt;Refer &lt;A href="https://supportforums.cisco.com/discussion/12180461/cisco-asa-5585-syslog-options-ips"&gt;this&lt;/A&gt; discussion&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;"Please rate helpful posts"&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 12:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457442#M45600</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-04-24T12:25:15Z</dc:date>
    </item>
    <item>
      <title> Hi , So how we can forward</title>
      <link>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457443#M45601</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So how we can forward the alert information (SDEE) to the management/monitoring tool ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;</description>
      <pubDate>Sun, 27 Apr 2014 08:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457443#M45601</guid>
      <dc:creator>rmujeeb81</dc:creator>
      <dc:date>2014-04-27T08:14:25Z</dc:date>
    </item>
    <item>
      <title>The IPS sensor is a SDEE</title>
      <link>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457444#M45602</link>
      <description>&lt;P&gt;The IPS sensor is a SDEE provider (with a built-in web server and SDEE servlet). SDEE specifies that events can be transported using the HTTP or HTTP over SSL and TLS protocols. When HTTP or HTTPS is used, SDEE providers act as HTTP servers, while SDEE clients are the initiators of HTTP requests.&lt;/P&gt;&lt;P&gt;When properly configured, clients {such as IME (IPS Manager Express) and CS-MARS} connect to the sensor via HTTPS (TLS/SSL) or HTTP, authenticate, and if successful, exchange data. SDEE is the preferred protocol for data exchange. The sensor's web server and SDEE servlet are both running by-default. As such, generally the only configuration necessary on the sensor is to allow a SDEE client access is to &lt;A href="https://supportforums.cisco.com/document/64051/idsips-top-commonly-encountered-problems-and-solutions"&gt;add a permit entry for the SDEE client's IP address to the sensor's access-list&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;The SDEE server (IPS Module) only processes authorized requests. A request is authorized if is originates from a web server to authenticate the identity of the client and determine the privilege level of the client. SDEE Client (IME) pulls the IPS events.&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;HTH&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;"Please rate helpful posts"&lt;/P&gt;</description>
      <pubDate>Sun, 27 Apr 2014 11:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-event-monitoring/m-p/2457444#M45602</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-04-27T11:07:24Z</dc:date>
    </item>
  </channel>
</rss>

