<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513534#M66551</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why aren't there any plans to support the CSC AND the IPS module for ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need a complete UTM solution, comparably to Astaro, Watchguard and so on ... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Sep 2010 11:50:56 GMT</pubDate>
    <dc:creator>MaseBarnes</dc:creator>
    <dc:date>2010-09-14T11:50:56Z</dc:date>
    <item>
      <title>ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513528#M66545</link>
      <description>&lt;P&gt;Welcome to the Cisco Networking&amp;nbsp; Professionals Ask the Expert conversation. This is an opportunity to get an update on Intrusion Prevention System with Scott Fringer. Scott Fringer is a Technical Assistance Center engineer on the intrusion detection system team in Research Triangle Park, North Carolina. His team supports Cisco's various intrusion detection/prevention sensors, the Cisco IOS IPS feature set, Cisco Security MARS, Cisco Security Manager, Cisco Security Agent, and the Cisco Anomaly Detector/Guard products. Fringer has represented the Technical Assistance Center at previous Networkers conferences and currently holds CCSP certification.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to use the rating system to let Scott know if you have received an adequate response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott might not be able to answer each question due to the volume expected during this event. Our moderators will post many of the unanswered&amp;nbsp;&amp;nbsp; questions in other discussion forums shortly after the event. This&amp;nbsp; event&amp;nbsp; lasts through September 24, 2010. Visit this forum often to view&amp;nbsp; responses&amp;nbsp; to your questions and the questions of other community&amp;nbsp; members.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:07:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513528#M66545</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2019-03-10T12:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513529#M66546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;My IPS sensor is configured for automatically updating its signatures.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Recently the updates stopped occurring, after working successfully.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;How can I correct this?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Sep 2010 16:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513529#M66546</guid>
      <dc:creator>j.miller_32</dc:creator>
      <dc:date>2010-09-13T16:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513530#M66547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;STRONG&gt;Scott,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;may I ask you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) if the IPS appliances (as other IPS solutions MCAFEE / TIPPING POINT/ ISS )...can drop and/or block the intruders IP without using "external cisco features products" (VLAN maps / ACLs/ shun /...) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) when does tha IPS module for the ASA5505 will support the version 7.x ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) when does the IOS IPS will support the IPv6 IPS feature ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Sep 2010 16:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513530#M66547</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2010-09-13T16:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513531#M66548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roberto;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; To answer your questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Yes, Cisco's IPS appliances (and modules) can perform traffic denial actions directly on the sensor when configured for inline operation.&amp;nbsp; These actions can deny a single packet, just the attacker, the attacker/victim pair, or the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Current plans are in place for the AIP-SSC-5 to be supported in the 7.0(5) release of IPS software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) I am not currently aware of a time-frame to bring IPv6 support to the IOS IPS feature set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt; Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Sep 2010 17:05:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513531#M66548</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-13T17:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513532#M66549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; There are multiple causes for automatic IPS signature updates to stop functioning.&amp;nbsp; Two quick CLI commands can help narrow the troubleshooting process.&amp;nbsp; From the CLI of your sensor, issue the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: terminal, monaco;"&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;show version&lt;/PRE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; This command will allow you to check that the IPS sensor has a valid IPS services license.&amp;nbsp; Specifically, you will note output similar to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Intrusion Prevention System, Version 7.0(2)&lt;SPAN style="color: #008000;"&gt;&lt;STRONG style="text-decoration: underline; "&gt;E3&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: terminal, monaco; "&gt;Host:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: terminal, monaco; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Realm Keys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; key1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: terminal, monaco; "&gt;Signature Definition:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: terminal, monaco; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Signature Update&amp;nbsp;&amp;nbsp;&amp;nbsp; S478.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2010-05-20&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: terminal, monaco; "&gt;OS Version:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.4.30-IDS-smp-bigphys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;SPAN style="font-size: 8pt; font-family: terminal, monaco; "&gt;Platform:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPS-4240-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: terminal, monaco; "&gt;Serial Number:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; JMX00000NS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000; font-size: 8pt; font-family: terminal, monaco; "&gt;&lt;STRONG style="text-decoration: underline; "&gt;Licensed, expired:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24-May-2010 UTC&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; If the license is expired (red text), you will need to work with your Cisco account team or partner to renew the IPS signature support for the IPS sensor.&amp;nbsp; This will allow you to receive a new license key, which should restore signature update functionality.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; One other culprit that can be verified from this output is that you are running the most recent analysis engine software for the IPS sensor (green text).&amp;nbsp; Cisco's signature development team writes signatures to the current version of analysis engine.&amp;nbsp; These signatures will not be compatible with older analysis engine releases.&amp;nbsp; If you are not at the most recent analysis engine release, you can upgrade the IPS software to correct this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; If the license is not expired and you are running the current analysis engine release, the next command will help determine if there is a credential issue or potential connectivity issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;show statistics host&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; At the very end of the output of this command is a section titled,"Auto Update Statistics", you will be able to see the results of the most recent automatic signature update attempt.&amp;nbsp; This output may clearly indicate the credentials are invalid, there was a communication issue or there was not currently an update available (confusingly the output is "Success: No installable auto update package found on server").&amp;nbsp; Corrective action will need to be tailored to this output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Sep 2010 17:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513532#M66549</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-13T17:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513533#M66550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cisco just recently added AAA authentication support for the IPS.&amp;nbsp; While this is a good start, it's limited to the CLI and IDM, and only supports RADIUS.&lt;/P&gt;&lt;OL&gt;&lt;OL&gt;&lt;LI&gt;Is there any plan to add TACACS+ support in the future?&lt;/LI&gt;&lt;LI&gt;Is there any plan to add support for AAA authentication (even RADIUS) for IME?&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help here on the forums, Scott!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 00:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513533#M66550</guid>
      <dc:creator>mikecrowe4ICS_2</dc:creator>
      <dc:date>2010-09-14T00:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513534#M66551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why aren't there any plans to support the CSC AND the IPS module for ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need a complete UTM solution, comparably to Astaro, Watchguard and so on ... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 11:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513534#M66551</guid>
      <dc:creator>MaseBarnes</dc:creator>
      <dc:date>2010-09-14T11:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513535#M66553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cannot provide insight into the decisions made from a product&lt;/P&gt;&lt;P&gt;development standpoint.  My role is that of product support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 12:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513535#M66553</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-14T12:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513536#M66555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for doing this. My question is related to Global Correlation feature in IPS ver 7.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Is there a way to tell how many packets/sessions were actually dropped by this feature in say for example last 24 hrs?&lt;/P&gt;&lt;P&gt;2. Identify the related events generated so I can for example find out which internal machine tried to contact a botnet internet IP?&lt;/P&gt;&lt;P&gt;3. Any other reporting function which would actually indicate global correlation is playing a role in dropping malicious traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only place I see global correlation info is in the actual event generated but I am looking to see if there is a more generic reporting feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;-Hari&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 17:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513536#M66555</guid>
      <dc:creator>hariprasad_n</dc:creator>
      <dc:date>2010-09-14T17:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513537#M66557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hari;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Global correlation brings two methods for responding to potential malicious activity:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;global correlation inspection&lt;/LI&gt;&lt;LI&gt;reputation filtering&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; When GC inspection is utilized, the IPS sensor will adjust the risk rating of a firing signature event based on the reputation score of the attacker IP address.&amp;nbsp; When this action is taken, the details are included in the signature event details.&amp;nbsp; So, you should be able to discern from the signature event both the GC inspection changes and actions taken by the sensor.&amp;nbsp; This will be reported on a per-signature event basis.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; When reputation filtering is utilized, there is no corresponding signature event fired when an attacker is denied; the sensor simply&lt;/P&gt;&lt;P&gt;denies the traffic.&amp;nbsp; You can track the outcome of this activity from the sensor CLI by issuing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;show statistics analysis-engine&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; The last section of the analysis engine statistics covers global correlation activity.&amp;nbsp; It is titled,"GlobalCorrelationStats" and will provide event counts and hosts that were determined as potentially malicious.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Within the IPS Device Manager GUI (IDM) you can add a gadget to the dashboard which provides a graph/table of the percentage of packets denied due to global correlation.&amp;nbsp; It will present a segment for "Traditional IPS Detection", "Global Correlation Inspection" and "Reputation Filtering".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 18:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513537#M66557</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-14T18:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513538#M66559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Michael;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Apologies, it appears my earlier reply via email did not post as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; At this time, I do no have any insight into the planning for implementation of either feature you mention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt; Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 19:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513538#M66559</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-14T19:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513539#M66561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a 3750 series switch. WS-C3750-48TS-E&lt;/P&gt;&lt;P&gt;Wanted to know, does it support routing. Could you please explain the way we can differntiate the different 3750 series switches to support routing.&lt;/P&gt;&lt;P&gt;Could you please provide me the URL to know much about 3750 series switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Bibhuthi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 21:07:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513539#M66561</guid>
      <dc:creator>bibhuthi79</dc:creator>
      <dc:date>2010-09-14T21:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513540#M66563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bibhuthi;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Unfortunately, the Catalyst 3750 is not my area of expertise.&amp;nbsp; You can find out all about the Catalyst 3750 series switches at the following link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/3750"&gt;http://www.cisco.com/go/3750&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; From the initial details on that page, it does appear the Catalyst 3750 supports various IP routing options.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 21:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513540#M66563</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-14T21:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513541#M66564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I need Ip cache flow source and destination. What command would get an output like this on a switch or router:&amp;nbsp;&amp;nbsp;&amp;nbsp; Source.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes 10..x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10..x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 76&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you in advance Jay&lt;/P&gt;&lt;P&gt;Posted from my mobile device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 23:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513541#M66564</guid>
      <dc:creator>jzarifyar</dc:creator>
      <dc:date>2010-09-15T23:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513542#M66565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333;"&gt;Our team is looking at mitigating the risk pertaining to the TLS cipher renegotiation (&lt;/SPAN&gt;&lt;A href="http://isc.sans.org/diary.html?storyid=7534" target="_blank" title="http://isc.sans.org/diary.html?storyid=7534"&gt;&lt;SPAN style="color: #333333;"&gt;&lt;SPAN style="color: red;" title="http://isc.sans.org/diary.html?storyid=7534"&gt;http://isc.sans.org/diary.html?storyid=7534&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: #333333;"&gt; ) through a Cisco IPS (7.0(2) E4 on 4240/4275). Would it be possible for you to shed some light on this subject, is there any signature in particular that would do this job. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are looking at mitigating this risk on any inbound traffic from the internet to our environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 10:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513542#M66565</guid>
      <dc:creator>Partner.bkme</dc:creator>
      <dc:date>2010-09-16T10:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513543#M66566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jay;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; This is not a topic related to Cisco's IPS devices (my area of focus), and is not a question for which I can provide an answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 10:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513543#M66566</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-16T10:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513544#M66568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ali;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; There is not a specific signature for Cisco's IPS sensors to detect an exploit of this vulnerability.&amp;nbsp; Cisco's IntelliShield site (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/security"&gt;http://www.cisco.com/security&lt;/A&gt;&lt;SPAN&gt;) does have a security alert regarding this vulnerability:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewAlert.x?alertId=19361"&gt;http://tools.cisco.com/security/center/viewAlert.x?alertId=19361&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; To determine if a custom signature could be created would require capturing network traffic of the vulnerability being exploited and reviewing the captures to determine if there is any indentifiable/recurrent patterns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; At this time, the best mitigation looks to be implementing the available patches from each vendor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 11:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513544#M66568</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-16T11:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513545#M66571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff; font-size: 10pt; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt;Hello Scott,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt;I’m new to IPS and have a question (it may be dumb, so forgive me).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt;Is there any way to tie together multiple signatures as a type of compilation event? That is, when I see two separate signatures fire, 5606/0 and 16297/1, which turns out to be when an internal user gets prompted to log in at a DMZ system which is not part of the Windows Domain. I hope that makes sense enough to warrant an answer. &lt;SPAN __jive_emoticon_name="blush" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/blush.gif"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt;When I get some training under my belt I'll be dangerous...&lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="1" src="https://community.cisco.com/images/emoticons/laugh.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt;Thanks for helping!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt;LC&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 14:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513545#M66571</guid>
      <dc:creator>lchance</dc:creator>
      <dc:date>2010-09-16T14:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513546#M66573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;LC;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Not a dumb question at all; and they all warrant an answer. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; It is certainly possible to create a signature event based on the occurrence of two separate signatures firing in a specific order.&amp;nbsp; To accomplish this, you will need to make use of the meta signature engine.&amp;nbsp; This engine can combine multiple signatures (meta-components) into a single event when the component signatures fire.&amp;nbsp; You can find out more about the meta engine here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_signature_engines.html#wp1014660"&gt;http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_signature_engines.html#wp1014660&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; So, you can create a new custom signature that is based on the meta engine.&amp;nbsp; Within the signature definition you would add signatures 5606/0 and 16297/1 as components.&amp;nbsp; You would then set various requirements such as component ordering, component count, etc to tune the meta signature to fire based on your requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Good luck with your training and learning - and feel free to come back to the Cisco Support Community with any other questions you may have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 14:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513546#M66573</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-09-16T14:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASK THE EXPERTS - INTRUSION PREVENTION SYSTEMS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513547#M66575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I want to filter the src IP address on a signature.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Is there a way to say 'not equal to a value'?&amp;nbsp; such as !10.10.0.0/16.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 20:53:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-experts-intrusion-prevention-systems/m-p/1513547#M66575</guid>
      <dc:creator>trippi</dc:creator>
      <dc:date>2010-09-17T20:53:30Z</dc:date>
    </item>
  </channel>
</rss>

