<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS 4200 Series in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669624#M65277</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At present&amp;nbsp; HTTP CONNECT Tunnel signature are triggered because of users going to internet through proxy server ( ISA), this are knows events for me so either i can disable these signatures or i can summarize this please correct me if i m wrong.????????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 2 more interface on IPS i m planning to connect between the ASA and the Core is the right place OR it should be place ahead of ASA between the corporate internet router and ASA OR between the ISP and the corporate internet router. Suppose if i m placing ahead of ASA the users coming through VPN they will not be inspected by IPS,Please correct me if i m wrong???????????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Apr 2011 08:59:21 GMT</pubDate>
    <dc:creator>adamgibs7</dc:creator>
    <dc:date>2011-04-21T08:59:21Z</dc:date>
    <item>
      <title>IPS 4200 Series</title>
      <link>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669622#M65271</link>
      <description>&lt;P&gt;Hello Dears,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have fresh installed IPS 4200 in Inline interface pair mode, Uptill now i m not getting any packet drops or complains from users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 14pt; "&gt;What else to be done to configure IPS as a Professional setup for corporate Network.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:20:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669622#M65271</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-03-10T12:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPS 4200 Series</title>
      <link>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669623#M65276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now the hard work begins.&lt;/P&gt;&lt;P&gt;Performing analysis on all medium and high severity signatures and performing these actions:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Tuning the signatures - Recurring false positive signatures that fire should be adjusted down in severity of disabled (if completely useless)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Turning on packet captures to learn more about why a signature is fireing and help your analysis.&lt;/P&gt;&lt;P&gt;&amp;nbsp; Remediation - Once you've found an infected host inside your network, clean it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - If the attack is from outside your network, discover how it is getting in and modify the means of access (Firewall, VPN, etc) to prevent future attack vectors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should be plenty to get you started and keep you busy. Don't forget to rinse and repeat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Apr 2011 16:54:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669623#M65276</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2011-04-19T16:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPS 4200 Series</title>
      <link>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669624#M65277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At present&amp;nbsp; HTTP CONNECT Tunnel signature are triggered because of users going to internet through proxy server ( ISA), this are knows events for me so either i can disable these signatures or i can summarize this please correct me if i m wrong.????????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 2 more interface on IPS i m planning to connect between the ASA and the Core is the right place OR it should be place ahead of ASA between the corporate internet router and ASA OR between the ISP and the corporate internet router. Suppose if i m placing ahead of ASA the users coming through VPN they will not be inspected by IPS,Please correct me if i m wrong???????????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Apr 2011 08:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669624#M65277</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-04-21T08:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPS 4200 Series</title>
      <link>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669625#M65278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For your HTTP CONNECT Tunnel signature, you have several choices;&lt;/P&gt;&lt;P&gt;1. Set the severity lower. It will still report and you could look into the evetns if necesary, but not be a critical analysis item.&lt;/P&gt;&lt;P&gt;2. Create an event action filter to remove events if the end point is your proxy server IP. This should remove your false positives, but you won;t see if anyone is tunneling thru your proxy server.&lt;/P&gt;&lt;P&gt;3. Disable the signature and save yourself the analysis effort.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are going to be looking at your signautre events, you ALWAYS want to be inspecting traffic behind yoru firewall. Otherwise you will spend time performing analysis on traffic that may be blocked by your firewall. You will also want to inspect traffic after the VPN encryption has been removed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Apr 2011 16:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4200-series/m-p/1669625#M65278</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2011-04-22T16:13:27Z</dc:date>
    </item>
  </channel>
</rss>

