<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS-4260 Traps in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547527#M66361</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After some research, finally was able to get the sensor traps to work properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had to ensure the sensor was actually sending traps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once configured using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service notification&lt;/P&gt;&lt;P&gt;error-filter warning|error|fatal&lt;BR /&gt;enable-detail-traps true&lt;BR /&gt;enable-notifications true&lt;BR /&gt;trap-destinations &lt;MYADDRESS&gt;&lt;BR /&gt;trap-community-name &lt;TRAPCOMMUNITYNAME&gt;&lt;BR /&gt;trap-port 162&lt;/TRAPCOMMUNITYNAME&gt;&lt;/MYADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I confirmed traps were being sent off the sensor using a tcpdump:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# tcpdump -ni ma0_0 udp and port 162&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also confirmed traps were being obtained on the monitor application - in my case WhatsUp Gold (system trap logs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The strings you want to search for in your monitor application are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;%PassiveMonitor.Payload.Protocol Version=SNMPv2 %PassiveMonitor.Payload.1.3.6.1.4.1.9.9.383.1.3.3=Inline data bypass has started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(this one means the IPS sensor is presently in bypass mode and NOT checking traffic)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;%PassiveMonitor.Payload.Protocol Version=SNMPv2 %PassiveMonitor.Payload.1.3.6.1.4.1.9.9.383.1.3.3=Inline data bypass has stopped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(this means the IPS sensor is no longer in bypass mode)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to make it work, I had to ignore the major and minor event numbers and match on the respective strings only (Inline data bypass ...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another message that might be of interest, just prior to stopping the inspection generated is:&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;%PassiveMonitor.Payload.Protocol Version=SNMPv2 %PassiveMonitor.Payload.1.3.6.1.4.1.9.9.383.1.3.3=Bypass Mode has been enabled, stopping packet inspection.&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;IPS version 7.1 is supposed to be released towards end of the year with additional trap/snmp support (according to Cisco). The above is working on version 6.2.&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;As mentioned in release notes, the following MIBS are the only ones supported:&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;-CISCO-CIDS-MIB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;-CISCO-PROCESS-MIB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;-CISCO-ENHANCED-MEMPOOL-MIB&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11pt; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;-CISCO-ENTITY-ALARM-MIB &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;I'm hoping this information might assist someone else.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Oct 2010 23:33:24 GMT</pubDate>
    <dc:creator>bellg</dc:creator>
    <dc:date>2010-10-20T23:33:24Z</dc:date>
    <item>
      <title>IPS-4260 Traps</title>
      <link>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547523#M66357</link>
      <description>&lt;P&gt;We would like to be able to generate a trap or some how determine if/when our IPS-4260 sensor goes into bypass mode. In addition, we'd like to be able to monitor the CPU, memory, and interface status.. It would appear the 4260 has limited monitoring capabilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the IPS release notes, I have loaded the Cisco-CIDS-MIB, Cisco-PROCESS-MIB, Cisco-ENHANCED-MEMPOOL-MIB, and Cisco-ENTITY-ALARM-MIB into WhatsUp Gold v14.3. However, uncertain what to check for. I can see traps showing up; however, they are not descriptive enough to tell what is what.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do we trap/monitor for bypass mode? Anyone else have traps/monitoring operational on their 4260?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:09:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547523#M66357</guid>
      <dc:creator>bellg</dc:creator>
      <dc:date>2019-03-10T12:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPS-4260 Traps</title>
      <link>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547524#M66358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gary;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; As you have noted, SNMP management of the IPS appliances is quite limited.&amp;nbsp; There is an enhancement request currently filed to increase SNMP monitoring visibility; the enhancement ID is CSCsu08529.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Oct 2010 10:58:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547524#M66358</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-10-11T10:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPS-4260 Traps</title>
      <link>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547525#M66359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. I'm looking into this. Although there is a reference to version 7.1; unknown if that version has the additional SNMP/Trap functionality. I'll continue to explore.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 23:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547525#M66359</guid>
      <dc:creator>bellg</dc:creator>
      <dc:date>2010-10-14T23:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: IPS-4260 Traps</title>
      <link>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547526#M66360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you used an external device to perform your bypass function, such a STP in&lt;/P&gt;&lt;P&gt;a switch, you could have the switch issue a trap when STP reconfigured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For CPU and Memory, you're stuck polling SNMP for them and watching for the threshold to be exceeded externally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Oct 2010 14:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547526#M66360</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2010-10-17T14:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPS-4260 Traps</title>
      <link>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547527#M66361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After some research, finally was able to get the sensor traps to work properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had to ensure the sensor was actually sending traps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once configured using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service notification&lt;/P&gt;&lt;P&gt;error-filter warning|error|fatal&lt;BR /&gt;enable-detail-traps true&lt;BR /&gt;enable-notifications true&lt;BR /&gt;trap-destinations &lt;MYADDRESS&gt;&lt;BR /&gt;trap-community-name &lt;TRAPCOMMUNITYNAME&gt;&lt;BR /&gt;trap-port 162&lt;/TRAPCOMMUNITYNAME&gt;&lt;/MYADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I confirmed traps were being sent off the sensor using a tcpdump:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# tcpdump -ni ma0_0 udp and port 162&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also confirmed traps were being obtained on the monitor application - in my case WhatsUp Gold (system trap logs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The strings you want to search for in your monitor application are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;%PassiveMonitor.Payload.Protocol Version=SNMPv2 %PassiveMonitor.Payload.1.3.6.1.4.1.9.9.383.1.3.3=Inline data bypass has started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(this one means the IPS sensor is presently in bypass mode and NOT checking traffic)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;%PassiveMonitor.Payload.Protocol Version=SNMPv2 %PassiveMonitor.Payload.1.3.6.1.4.1.9.9.383.1.3.3=Inline data bypass has stopped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(this means the IPS sensor is no longer in bypass mode)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to make it work, I had to ignore the major and minor event numbers and match on the respective strings only (Inline data bypass ...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another message that might be of interest, just prior to stopping the inspection generated is:&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;%PassiveMonitor.Payload.Protocol Version=SNMPv2 %PassiveMonitor.Payload.1.3.6.1.4.1.9.9.383.1.3.3=Bypass Mode has been enabled, stopping packet inspection.&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;IPS version 7.1 is supposed to be released towards end of the year with additional trap/snmp support (according to Cisco). The above is working on version 6.2.&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;As mentioned in release notes, the following MIBS are the only ones supported:&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;-CISCO-CIDS-MIB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;-CISCO-PROCESS-MIB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;-CISCO-ENHANCED-MEMPOOL-MIB&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11pt; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;-CISCO-ENTITY-ALARM-MIB &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;I'm hoping this information might assist someone else.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Oct 2010 23:33:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4260-traps/m-p/1547527#M66361</guid>
      <dc:creator>bellg</dc:creator>
      <dc:date>2010-10-20T23:33:24Z</dc:date>
    </item>
  </channel>
</rss>

