<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS bypass mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-bypass-mode/m-p/1699647#M65105</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Aman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What model sensor(s) do you have? This is achievable by using the Modular Policy Framework (MPF) on the ASA to forward traffic down to the IPS modules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Blayne Dreier&lt;/P&gt;&lt;P&gt;Cisco TAC Escalation Team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Please check out our Podcasts**&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC Security Show: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/tacsecuritypodcast"&gt;http://www.cisco.com/go/tacsecuritypodcast&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC IPS Media Series: &lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-12758"&gt;https://supportforums.cisco.com/docs/DOC-12758&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Jun 2011 17:58:03 GMT</pubDate>
    <dc:creator>Christopher Dreier</dc:creator>
    <dc:date>2011-06-01T17:58:03Z</dc:date>
    <item>
      <title>IPS bypass mode</title>
      <link>https://community.cisco.com/t5/network-security/ips-bypass-mode/m-p/1699645#M65103</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we configure IPS in such a way that it can bypass traffic (few subnets) and inspect all other traffic in inline mode?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aman&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-bypass-mode/m-p/1699645#M65103</guid>
      <dc:creator>Shaikh Aman Uddin</dc:creator>
      <dc:date>2019-03-10T12:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPS bypass mode</title>
      <link>https://community.cisco.com/t5/network-security/ips-bypass-mode/m-p/1699646#M65104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the traffic is passing thought your sensor it will get inspected.&lt;/P&gt;&lt;P&gt;You can create Event Action Filters or Event Action Overrides to change the sensor default behavior (sending events and potentially blocking traffic).&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ips/7.1/configuration/guide/idm/idm_event_action_rules.html"&gt;http://www.cisco.com/en/US/docs/security/ips/7.1/configuration/guide/idm/idm_event_action_rules.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 15:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-bypass-mode/m-p/1699646#M65104</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2011-05-27T15:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: IPS bypass mode</title>
      <link>https://community.cisco.com/t5/network-security/ips-bypass-mode/m-p/1699647#M65105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Aman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What model sensor(s) do you have? This is achievable by using the Modular Policy Framework (MPF) on the ASA to forward traffic down to the IPS modules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Blayne Dreier&lt;/P&gt;&lt;P&gt;Cisco TAC Escalation Team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Please check out our Podcasts**&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC Security Show: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/tacsecuritypodcast"&gt;http://www.cisco.com/go/tacsecuritypodcast&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC IPS Media Series: &lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-12758"&gt;https://supportforums.cisco.com/docs/DOC-12758&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jun 2011 17:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-bypass-mode/m-p/1699647#M65105</guid>
      <dc:creator>Christopher Dreier</dc:creator>
      <dc:date>2011-06-01T17:58:03Z</dc:date>
    </item>
  </channel>
</rss>

