<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ask the Expert: Cisco Intrusion Prevention System (IPS) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065102#M54845</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Damien,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will probably take a bit to debug and unfortunately I am out next week. Will try to get somebody to look at what you have here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to cover a very simplistic case. Are we certain that all traffic is going through this particular virtual sensor?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Sep 2012 20:28:22 GMT</pubDate>
    <dc:creator>Robert Albach</dc:creator>
    <dc:date>2012-09-07T20:28:22Z</dc:date>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065061#M54761</link>
      <description>&lt;P&gt;&lt;IMG style="padding-right: 10px; padding-bottom: 10px;" src="https://community.cisco.com/legacyfs/online/legacy/6/4/1/99146-ralbach.jpg" border="0" alt="Read the bio" hspace="10" width="90" align="left" /&gt;&lt;STRONG&gt;With Robert Albach&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about security best practices and management for the Cisco Intrusion Prevention System (IPS) with Robert Albach. The Cisco Intrusion Prevention System is a context aware threat prevention system for your networked environments. The module unobtrusively detects and prevents problematic traffic from reaching its target; uses contextual inputs to determine the proper level of response; and tightly integrates with the ASA firewall for greater network security.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Robert Albach is a product manager in the Security Business Unit at Cisco, responsible&amp;nbsp; for intrusion prevention offerings. Before joining Cisco in 2010 he held product management positions for intrusion prevention offerings at Hewlett-Packard/TippingPoint. He has more than 15 years of experience with systems management and security product offerings and has presented at the RSA trade show and other security venues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remember to use the rating system to let Robert know if you have received an adequate response.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Robert might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the&amp;nbsp; Security sub-community discussion forum shortly after the event. &lt;STRONG&gt;This event lasts through through September 7, 2012.&lt;/STRONG&gt; Visit this forum often to view responses to your questions and the questions of other community members.&lt;/P&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 13 Feb 2020 20:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065061#M54761</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2020-02-13T20:56:44Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065062#M54764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;I would like to undertand the main differences between a firewall and IDS/IPS system.... Are there any issues that can only be resolved by IDS/IPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Aug 2012 15:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065062#M54764</guid>
      <dc:creator>Carlos Lesaige</dc:creator>
      <dc:date>2012-08-27T15:47:18Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065063#M54765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to expand your question a bit to seperate IDS and IPS slightly from each other. The explanation may be simplistic but I think it is a good starting point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A firewall is primarily about access control. Firewalls such as Cisco's ASA enforces access rules to certain networked elements based on IP addresses found within the header. One can state that devices within a particular CIDR can or cannot access another network device. This can typically be done using IP addresses and ports. There are additional extensions such as those provided by the ASA such as identity, and then with the the ASA-CX application as well. For the most part, operations are to deny all with exceptions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An IDS (Intrusion Detection System) is largely a passive listening system which performs deep packet inspection targeting traffic of interest. In the majority of cases the traffic of interest are varying forms of attack traffic. This attack traffic can range across the entire attack life-cycle and represent a large span of different attack vectors and techniques. As a passive system it may or may not be in-line but largely the system is there to observe and report.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An IPS (Intrusion Prevention System) is an in-line system which also performs deep packet inspection with the intent of both observing and acting on the traffic. The difference from the IDS role is the need to be able to impact the traffic it is interested in. As such it is not passive but unlike the firewall it will only potentially stop or alter traffic that meets its policy statement which is normally an attack threat that is identified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are several impacts that these definitions may have on your placement of devices and how your organization may wish to treat the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I can summarise simplistically:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A firewall denies all traffic except that whose access it allows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An IDS impacts no traffic and reports what it discovers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An IPS allows all traffic except that which is identified as a threat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Aug 2012 18:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065063#M54765</guid>
      <dc:creator>Robert Albach</dc:creator>
      <dc:date>2012-08-27T18:36:13Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065064#M54767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your respnose. Makes a lot of sense. I appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 15:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065064#M54767</guid>
      <dc:creator>Carlos Lesaige</dc:creator>
      <dc:date>2012-08-28T15:51:07Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065065#M54768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you recommend the best book / video to get up and running on the IPS as quick as possible?&amp;nbsp; I'm familiar with the ASA, but now I need to learn the IPS module within the ASA and fast!&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jeff S. &lt;/P&gt;&lt;P&gt;Central, KY&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 20:10:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065065#M54768</guid>
      <dc:creator>JEFF SPRADLING</dc:creator>
      <dc:date>2012-08-28T20:10:34Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065066#M54769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i just try to test one of DOS attack tool(LOIC) in LAB environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but in cisco IME real time monitoring window i am not geeting any alerts regarding this attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am very sure that i am successful in Flooding in the network (cpu of ASA is going more then 60 % at that time)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But there is no event in cisco IME.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you help in this ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prashant &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 11:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065066#M54769</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2012-08-30T11:19:56Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065067#M54770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the delay - it sounds like you are seeking some quick general operational details. Is that fair?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly there are no books that I know of that are specific to the Cisco IPS and up to date. Mr. Deal's book while strong from the pure ASA perspective is a bit dated and both the ASA and IPS has had some significant changes introduced as well as new models with some significant operational differences.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be remiss if I did not mention my coworker's book "Cisco Firewalls" by Alexandrae Moraes. There is not much in terms of the IPS module uniquely but it does cover the newer ASA 5585 models which includes the dedicated IPS blade.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think we may need to combine a book with a few other sources depending on your particular model. Let me know which solution you will need to manage and I will try to pull together a number of sources for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if your actual question was more along the lines of "tell me about general intrusion prevention best practices" then that would be a whole different set of references.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So let me know your platform and I'll try to pull some suggestions together.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 16:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065067#M54770</guid>
      <dc:creator>Robert Albach</dc:creator>
      <dc:date>2012-08-30T16:27:19Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065068#M54771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Prashant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to assume that you are referencing the Low Orbit Ion Cannon attack tool. Is that corrrect?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to first make a broad sweeping comment on the role of IPS and DOS/DDOS and then get to your question. An IPS is not an optimal dedicated DOS/DDOS prevention tool. It is a good means of initially identifying that the attack is starting but it would optimally signal this information upstream to some other device such as the FW, router, or specialized DOS tool. The closer to the source (ISP) the better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now on to your specifics.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco IPS does not have an LION specific signature. While LION is a powerful tool the nature of its attacks are not really unique enough to justify a unique siganture. LION will initiate an attack in either UDP, TCP, or HTTP. There are flood signatures in the 6900 range that may be appropriate to your attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As always with our signatures ensure that the ones of interest are UNRETIRED, ENABLED, and that your actions inlude ALERT. Depending on the signature you may want to elevate the base RISK RATING or&amp;nbsp; use an EVENT ACTION Rule (Overrides) to guarantee a response. Given that you are operating within a lab all the other risk rating contributors are not likely to be there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps and thanks for asking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 17:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065068#M54771</guid>
      <dc:creator>Robert Albach</dc:creator>
      <dc:date>2012-08-30T17:01:23Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065069#M54773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, Robert.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I'm looking for quick operational details on the ASA-SSM-10 module running in an ASA5510 (v8.2), so an out of date book may not be that far off for me at this time. The IDS/IPS is running ver 7.0(2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been tasked to do a review of the rulebase.&amp;nbsp; I've worked on GUI based IDS appliances, and understand the theory of IDS/IPS, but I've never worked on the Cisco ASA IDS/IPS, so I just need basic info on how to get started.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can session into the module from the firewall, but the config is so foriegn to me that I'm not even sure that it's setup and doing anything.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 17:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065069#M54773</guid>
      <dc:creator>JEFF SPRADLING</dc:creator>
      <dc:date>2012-08-30T17:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065070#M54776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm running a 6500 with an Sup-2 720, FWSM and IDSM-2.  Is it possible to monitor/protect the vlan between the firewall and internal router interface, the DMZ, and the external firewall interface?  I'm currently just protecting (running inline) the external interface but every now and then, the IDSM-2 blocks internal users from accessing the internet. When running a report, I see tcp segment overwrite errors. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this was answered previously, please point me to the discussion...&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 21:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065070#M54776</guid>
      <dc:creator>Garrison Botts</dc:creator>
      <dc:date>2012-08-30T21:47:28Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065071#M54777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What, if any, best practices are there for managing IPS AD KB across a "cluster" of IPS SSP's in an ASA HA PAIR ?&lt;/P&gt;&lt;P&gt;I would have thought the logical thing would be for IPS 1 in the active ASA to copy the KB to IPS2 in the standby ASA but Cisco does not provide a mechanism to do this.&amp;nbsp; Do I have to cludge this with an external scp server and expect scripts ?. If so is it a case of copying the current KB from IPS1 (maybe once a day) to an scp server and then at some time later IPS2 copies the KB form the scp server to itself and makes that the current KB.&amp;nbsp; Any advice is greatly appreciated.&amp;nbsp; Wuuld be nice if CSM could manage this....&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 23:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065071#M54777</guid>
      <dc:creator>coffey.j</dc:creator>
      <dc:date>2012-08-30T23:58:56Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065072#M54783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you are correct , iam using Low Orbit Ion Cannon tool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok i wiil try by tuning 6900 range IPS signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just for Knowledge : could you please recommded the dedicated DOS prevention tool .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prashant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 03:36:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065072#M54783</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2012-08-31T03:36:24Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065073#M54788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arbor Networks is a dedicated provider of DOS/DDOS defense capable tools. Their products are frequently used by service providers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 15:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065073#M54788</guid>
      <dc:creator>Robert Albach</dc:creator>
      <dc:date>2012-08-31T15:56:22Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065074#M54794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is an older and lower end product which means the resources available to run a larger number of signatures will be limited relative to the higher end and newer platforms (ASA 5515x) as an example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to guess that this device is positioned at the company's internet edge (most people start there). In 7.1.5 we introduced a set of protection templates which are our default recomendations for deployment environments. That would be a good place to start as a reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 16:05:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065074#M54794</guid>
      <dc:creator>Robert Albach</dc:creator>
      <dc:date>2012-08-31T16:05:12Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065075#M54798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply, but I have to be honest - it doesn't help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I'm looking for a crash course to show me the basics.&amp;nbsp; You mentioned a set of production templates - how do I apply them?&amp;nbsp; How do I see signatures that are there now?&amp;nbsp; They tell me they are running the IPS, but I can't even tell that this is true. What are the commands that divert or copy packets to the IPS module?&amp;nbsp; How do I create an alert to tigger when a specific IP is hit?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, basic information I know - but I just need to get started and don't know where to turn.&amp;nbsp; I know I can read the reams of documentation Cisco put out, but I really just want simple, basic instruction to get me started.&amp;nbsp; I'll pour through the rest when I have more time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate any help you can provide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 23:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065075#M54798</guid>
      <dc:creator>JEFF SPRADLING</dc:creator>
      <dc:date>2012-08-31T23:38:39Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065076#M54801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jeff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just sent you a private message.. Check that out and let me know if it works for you .... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; If not, hit me back up and we'll get you going.... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Sep 2012 01:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065076#M54801</guid>
      <dc:creator>Garrison Botts</dc:creator>
      <dc:date>2012-09-01T01:19:27Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065077#M54802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an operational query. How do i block a root user for accessing certain commands in Unix os . Is there a way through IPS signatures . I want to block Tcp based commands&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 10:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065077#M54802</guid>
      <dc:creator>vkumarg89</dc:creator>
      <dc:date>2012-09-03T10:51:32Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065078#M54806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have AIP-SSM 10 installed in my firewall the question is how I can disable weak cipher for the management, so how I can force that only stron encryption mechanism should be sued for https management session?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 20:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065078#M54806</guid>
      <dc:creator>farkascsgy</dc:creator>
      <dc:date>2012-09-03T20:23:20Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065079#M54808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had posted this as a&amp;nbsp; separate discussion, but just wanted to know your opinion on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to upgrade the AIP SSM 20 to IPS-K9-6.2-4-E4.pkg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that this error as below comes:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Error: execUpgradeSoftware : Connect failed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can confirm the following:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Ping from FTP server to sensor and vice versa is OK&lt;/P&gt;&lt;P&gt;2) FTP server works OK, as i am able to upload/download files from other clients&lt;/P&gt;&lt;P&gt;3) Command given is as upgrade &lt;A href="ftp://anonymous@192.168.1.56/IPS-K9-6.2-4-E4.pkg" rel="nofollow"&gt;ftp://anonymous@192.168.1.56/IPS-K9-6.2-4-E4.pkg&lt;/A&gt;&lt;/P&gt;&lt;P&gt;4) I also created another user in FTP server, tested but same results&lt;/P&gt;&lt;P&gt;5) The FTP server listens on port 21 and does not gets any request.&lt;/P&gt;&lt;P&gt;6) Current image is a bit old i.e. 6.0(4)E2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some information from show version is as:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using 1023815680 out of 2093600768 bytes of available memory (48% usage)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;system is using 17.7M out of 29.0M bytes of available disk space (61% usage)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;application-data is using 39.3M out of 166.8M bytes of available disk space (25% usage)&lt;/P&gt;&lt;P&gt;boot is using 38.4M out of 68.6M bytes of available disk space (59% usage)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Image&amp;nbsp; that i am trying to upload i.e. IPS-K9-6.2-4-E4.pkg. is about 28.6 MB&amp;nbsp; in size, could the issue be related to the disk size (show in bold&amp;nbsp; above)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PG&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2012 10:43:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065079#M54808</guid>
      <dc:creator>Sonugnair_2</dc:creator>
      <dc:date>2012-09-04T10:43:00Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Cisco Intrusion Prevention System (IPS)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065080#M54810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Garris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is an area that I 'm not qualified in the "expert" area and am going to ask on of our Technical Marketing members to help out with for an answer and I have a fear that we may have some kind of collision condition at play.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell me what report you ran where you see the segment overwrite errors? I am interested in knowing what piece of the puzzle is reporting this condition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2012 14:14:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-cisco-intrusion-prevention-system-ips/m-p/2065080#M54810</guid>
      <dc:creator>Robert Albach</dc:creator>
      <dc:date>2012-09-04T14:14:06Z</dc:date>
    </item>
  </channel>
</rss>

