<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPS host block based on custom criteria in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470620#M45806</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you can do it..&lt;/P&gt;&lt;P&gt;1. Create an access-list with&amp;nbsp; the source subnet/host along with ports you want to take care of.&lt;/P&gt;&lt;P&gt;2. Call that access-list in class-map&lt;/P&gt;&lt;P&gt;3. Call this class-map in policy-map and give the command ips promiscuous fail-open/fail-close.&lt;/P&gt;&lt;P&gt;4. Apply policy-map on particular interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#access−list traffic_for_ips permit tcp host x.x.x.x any eq 22&lt;/P&gt;&lt;P&gt;ciscoasa(config)#class−map ips_class_map&lt;/P&gt;&lt;P&gt;ciscoasa(config−cmap)#match access−list traffic_for_ips&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#policy−map interface-policy&lt;/P&gt;&lt;P&gt;ciscoasa(config−pmap)#class ips_class_map&lt;/P&gt;&lt;P&gt;ciscoasa(config−pmap−c)#ips promiscuous fail−open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!−−− Two decisions need to be made.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!−−− First, does the AIP−SSM function&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!−−− in inline or promiscuous mode?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!−−− Second, does the ASA fail−open or fail−closed?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#service−policy interface_policy interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 09 Feb 2014 05:11:19 GMT</pubDate>
    <dc:creator>Poonam Garg</dc:creator>
    <dc:date>2014-02-09T05:11:19Z</dc:date>
    <item>
      <title>IPS host block based on custom criteria</title>
      <link>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470619#M45803</link>
      <description>&lt;P&gt;Back when I was using Microsoft ISA I was able to setup rules that would (permanently) block a host exhibiting certain behaviour. I am trying to achieve the same using a Cisco ASA IPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have certain special ports open on IP addresses but the common attack ports (22, 3389...) are blocked. I would liek to setup a rule where a host is immediatelly shunned when they try to hit such a port so that the host cannot even proceed to the open ports. To me anyone trying to access these ports is up to no good and should be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to do this on Cisco ASA?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470619#M45803</guid>
      <dc:creator>pdeleanu</dc:creator>
      <dc:date>2019-03-10T13:08:25Z</dc:date>
    </item>
    <item>
      <title>IPS host block based on custom criteria</title>
      <link>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470620#M45806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you can do it..&lt;/P&gt;&lt;P&gt;1. Create an access-list with&amp;nbsp; the source subnet/host along with ports you want to take care of.&lt;/P&gt;&lt;P&gt;2. Call that access-list in class-map&lt;/P&gt;&lt;P&gt;3. Call this class-map in policy-map and give the command ips promiscuous fail-open/fail-close.&lt;/P&gt;&lt;P&gt;4. Apply policy-map on particular interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#access−list traffic_for_ips permit tcp host x.x.x.x any eq 22&lt;/P&gt;&lt;P&gt;ciscoasa(config)#class−map ips_class_map&lt;/P&gt;&lt;P&gt;ciscoasa(config−cmap)#match access−list traffic_for_ips&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#policy−map interface-policy&lt;/P&gt;&lt;P&gt;ciscoasa(config−pmap)#class ips_class_map&lt;/P&gt;&lt;P&gt;ciscoasa(config−pmap−c)#ips promiscuous fail−open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!−−− Two decisions need to be made.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!−−− First, does the AIP−SSM function&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!−−− in inline or promiscuous mode?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!−−− Second, does the ASA fail−open or fail−closed?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#service−policy interface_policy interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Feb 2014 05:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470620#M45806</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-02-09T05:11:19Z</dc:date>
    </item>
    <item>
      <title>IPS host block based on custom criteria</title>
      <link>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470621#M45809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can take an idea for this also:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ips/5.0/configuration/guide/cli/clissm.html#wp1033926"&gt;http://www.cisco.com/en/US/docs/security/ips/5.0/configuration/guide/cli/clissm.html#wp1033926&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Feb 2014 05:54:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470621#M45809</guid>
      <dc:creator>Naveen Kumar</dc:creator>
      <dc:date>2014-02-13T05:54:18Z</dc:date>
    </item>
    <item>
      <title>IPS host block based on custom criteria</title>
      <link>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470622#M45811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sending Traffic to the IPS Module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your model supports the IPS module for intrusion prevention, then you can send traffic to the module for inspection. The IPS module monitors and performs real-time analysis of network traffic by looking for anomalies and misuse based on an extensive, embedded signature library. When the system detects unauthorized activity, it can terminate the specific connection, permanently block the attacking host, log the incident, and send an alert to the device manager. Other legitimate connections continue to operate independently without interruption. For more information, see the documentation for your IPS module. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/mode_contexts.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/mode_contexts.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Feb 2014 13:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-host-block-based-on-custom-criteria/m-p/2470622#M45811</guid>
      <dc:creator>blenka</dc:creator>
      <dc:date>2014-02-21T13:37:58Z</dc:date>
    </item>
  </channel>
</rss>

