<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AIP 10 module in ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101592#M54401</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's the purpose of the ACL, to exclude traffic from inside to DMZ and match the rest:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deny ip 192.168.28.0 255.255.255.0 192.168.38.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, instead of excluding the interface, just exclude the traffic, it will be the same but easier to manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Nov 2012 16:10:18 GMT</pubDate>
    <dc:creator>lcambron</dc:creator>
    <dc:date>2012-11-21T16:10:18Z</dc:date>
    <item>
      <title>AIP 10 module in ASA</title>
      <link>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101589#M54391</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've setup the AIP module in my ASA 5520 and all looks good.&amp;nbsp; I now need to do the following, does this config look ok?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to inspect traffic on certain interfaces and exclude certain traffic. For example I don'e want IPS to inspect our replication traffic that passes from the inside to our DMZ6 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway should I enable the gloabal policy or create individual policies per interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class aw-ips&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I need to do the outside, DMZ6 and DMZ4 interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DMZ6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list traffic_for_ips deny ip 192.168.28.0 255.255.255.0 192.168.38.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list traffic_for_ips permit ip any any&lt;/P&gt;&lt;P&gt;class-map &lt;STRONG&gt;DMZ6-ips-policy&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;match access-list traffic_for_ips&lt;/P&gt;&lt;P&gt;policy-map interface_policy&lt;/P&gt;&lt;P&gt;class &lt;STRONG&gt;DMZ6-ips-policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;service-policy interface_policy interface &lt;STRONG&gt;DMZ6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map &lt;STRONG&gt;Outside-ips-policy &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;match any&lt;/P&gt;&lt;P&gt;policy-map interface_policy&lt;/P&gt;&lt;P&gt;class &lt;STRONG&gt;Outside-ips-policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;service-policy interface_policy interface &lt;STRONG&gt;Outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DMZ4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map &lt;STRONG&gt;DMZ4-ips-policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;match any&lt;/P&gt;&lt;P&gt;policy-map interface_policy&lt;/P&gt;&lt;P&gt;class &lt;STRONG&gt;DMZ4-ips-policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;service-policy interface_policy interface &lt;STRONG&gt;DMZ4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you think this will work?&amp;nbsp; I hope the Outside, DMZ6 and DMZ4 will be inspected and traffic from 192.168.28.0/24 to 192.168.38.0/24 wont be inspected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101589#M54391</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2019-03-10T12:49:43Z</dc:date>
    </item>
    <item>
      <title>AIP 10 module in ASA</title>
      <link>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101590#M54393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should work, but you can also confiure just one class and apply it globaly:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list traffic_for_ips deny ip 192.168.28.0 255.255.255.0 192.168.38.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list traffic_for_ips permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map &lt;STRONG&gt;IPS&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;match access-list traffic_for_ips&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class IPS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 02:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101590#M54393</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-11-21T02:25:58Z</dc:date>
    </item>
    <item>
      <title>AIP 10 module in ASA</title>
      <link>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101591#M54398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forgive me if I'm wrong, but I want to just exclude that traffic from the inside to the Dmz6 interfaces, if I use a global class wouldn't this be applied to all interfaces? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also want to be able disable IPS on certain interfaces quickly should the load reach 100%.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 07:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101591#M54398</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2012-11-21T07:40:14Z</dc:date>
    </item>
    <item>
      <title>AIP 10 module in ASA</title>
      <link>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101592#M54401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's the purpose of the ACL, to exclude traffic from inside to DMZ and match the rest:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deny ip 192.168.28.0 255.255.255.0 192.168.38.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, instead of excluding the interface, just exclude the traffic, it will be the same but easier to manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 16:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-10-module-in-asa/m-p/2101592#M54401</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-11-21T16:10:18Z</dc:date>
    </item>
  </channel>
</rss>

