<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Attack Response Controller in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/attack-response-controller/m-p/2292890#M53357</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Julio,&lt;/P&gt;&lt;P&gt;yes, I defiened these actions and I added 'log' to see the traffic, but no luck. &lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Hubert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Oct 2013 19:57:36 GMT</pubDate>
    <dc:creator>hubertzw</dc:creator>
    <dc:date>2013-10-16T19:57:36Z</dc:date>
    <item>
      <title>Attack Response Controller</title>
      <link>https://community.cisco.com/t5/network-security/attack-response-controller/m-p/2292888#M53353</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to configure remote blocking on one router interface. I added: ‘device login profile’, ‘blocking device’ and ‘router blocking device interfaces’. I see the IPS established connection with the router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended IP access list IDS_FastEthernet0/1_in_0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit ip host 10.0.10.15 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any (311041 matches) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then I tried ping/udp flood and no one from these attacks are seeing under&amp;nbsp; Monitor-&amp;gt;Events (I enabled ‘show attack response controller events’).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the traffic is going through IPS everything is logged properly; the problem is only with remote device (ARC). Are there any requirements which I missed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rack1IPS# show statistics network-access &lt;/P&gt;&lt;P&gt;Current Configuration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; LogAllBlockEventsAndSensors = true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; EnableNvramWrite = false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; EnableAclLogging = false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; AllowSensorBlock = false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; BlockMaxEntries = 250&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; MaxDeviceInterfaces = 250&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; NetDevice&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type = Cisco&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP = 150.50.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NATAddr = 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Communications = telnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ResponseCapabilities = block&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BlockInterface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; InterfaceName = FastEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; InterfaceDirection = in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; InterfacePostBlock = POST-ACL&lt;/P&gt;&lt;P&gt;State&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; BlockEnable = true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; NetDevice&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP = 150.50.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AclSupport = uses Named ACLs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State = Inactive&lt;/P&gt;&lt;P&gt;Rack1IPS# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried also with post-acl but the results is the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Hubert&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:04:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/attack-response-controller/m-p/2292888#M53353</guid>
      <dc:creator>hubertzw</dc:creator>
      <dc:date>2019-03-10T13:04:04Z</dc:date>
    </item>
    <item>
      <title>Attack Response Controller</title>
      <link>https://community.cisco.com/t5/network-security/attack-response-controller/m-p/2292889#M53355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Hubert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you enable the following actions on the signatures you are trying to fire&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request block host&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt; &lt;SPAN style="background-color: #ffffff; color: #000000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request block connection&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 05:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/attack-response-controller/m-p/2292889#M53355</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-10T05:00:28Z</dc:date>
    </item>
    <item>
      <title>Attack Response Controller</title>
      <link>https://community.cisco.com/t5/network-security/attack-response-controller/m-p/2292890#M53357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Julio,&lt;/P&gt;&lt;P&gt;yes, I defiened these actions and I added 'log' to see the traffic, but no luck. &lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Hubert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 19:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/attack-response-controller/m-p/2292890#M53357</guid>
      <dc:creator>hubertzw</dc:creator>
      <dc:date>2013-10-16T19:57:36Z</dc:date>
    </item>
  </channel>
</rss>

