<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Idsm 2- Inline Mode Deployment in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/idsm-2-inline-mode-deployment/m-p/1889971#M55287</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This guide should help you in the IDSM2 inline configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_idsm2.html#wp1187460" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_idsm2.html#wp1187460&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sawan Gupta&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 May 2012 14:13:31 GMT</pubDate>
    <dc:creator>sawgupta</dc:creator>
    <dc:date>2012-05-10T14:13:31Z</dc:date>
    <item>
      <title>Idsm 2- Inline Mode Deployment</title>
      <link>https://community.cisco.com/t5/network-security/idsm-2-inline-mode-deployment/m-p/1889970#M55286</link>
      <description>&lt;P&gt;I would like to configure an IDSM-2 in inline mode, I am having trouble about the deployment, I have a couple of questions;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. If you configure 2 VLANs (existing) as VLAN pairs does this mean the exist connection between the 2 VLANs is broken?&lt;/P&gt;&lt;P&gt;ie they can only communicate to each other via IPS.&lt;/P&gt;&lt;P&gt;2. Where is the best place to deploy this type of IPS?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/idsm-2-inline-mode-deployment/m-p/1889970#M55286</guid>
      <dc:creator>Silindile Dlamini</dc:creator>
      <dc:date>2019-03-10T12:40:25Z</dc:date>
    </item>
    <item>
      <title>Idsm 2- Inline Mode Deployment</title>
      <link>https://community.cisco.com/t5/network-security/idsm-2-inline-mode-deployment/m-p/1889971#M55287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This guide should help you in the IDSM2 inline configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_idsm2.html#wp1187460" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_idsm2.html#wp1187460&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sawan Gupta&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 14:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/idsm-2-inline-mode-deployment/m-p/1889971#M55287</guid>
      <dc:creator>sawgupta</dc:creator>
      <dc:date>2012-05-10T14:13:31Z</dc:date>
    </item>
    <item>
      <title>Idsm 2- Inline Mode Deployment</title>
      <link>https://community.cisco.com/t5/network-security/idsm-2-inline-mode-deployment/m-p/1889972#M55288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In an inline VLAN-pair scenario, the IDSM2 will bridge the VLANs together using VLAN tag swapping.&amp;nbsp; Below is a quick topo sketch of an inline design where this might be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6500 MSFC--VL10--(inside) FWSM (outside)--VLAN 11--IDSM--VLAN 111--RTR--INTERNET&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the example above, the FWSM outside and RTR inside interfaces sit on the same Layer 3 subnet but different Layer 2 VLANs.&amp;nbsp; The IDSM is positioned inline using an inline VLAN-pair.&amp;nbsp; Traffic leaving the FWSM towards the Internet will go into the trunk to the IDSM on VLAN 11.&amp;nbsp; The IDSM will then swap the VLAN tag to 111 before fowarding the packet down the trunk.&amp;nbsp; This process allows the traffic to be influenced into the IDSM for inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/customer/docs/security/ips/7.0/configuration/guide/cli/cli_interfaces.html#wp1047718"&gt;http://www.cisco.com/en/US/customer/docs/security/ips/7.0/configuration/guide/cli/cli_interfaces.html#wp1047718&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 21:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/idsm-2-inline-mode-deployment/m-p/1889972#M55288</guid>
      <dc:creator>Todd Pula</dc:creator>
      <dc:date>2012-05-10T21:48:50Z</dc:date>
    </item>
  </channel>
</rss>

