<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exclude hosts from IDS? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500380#M67211</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let's say you want to exclude ip address 192.168.1.2 from being&amp;nbsp; scanned. Here is a sample config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;access-list aip-acl extended deny ip host &lt;/SPAN&gt;192.168.1.2&lt;SPAN&gt; any &lt;BR /&gt;access-list aip-acl extended permit ip any any &lt;BR /&gt;class-map aip-class&lt;BR /&gt; match access-list aip-acl&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class aip-class&lt;BR /&gt;&amp;nbsp; ips inline fail-open&lt;BR /&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it is clear now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 Jun 2010 22:19:05 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-06-15T22:19:05Z</dc:date>
    <item>
      <title>Exclude hosts from IDS?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500377#M67202</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA5520 with AIP-SSM module.&amp;nbsp; I inspect in promiscuous mode.&amp;nbsp; Security vulnerability scans create tons of alerts in the IDS system.&amp;nbsp; I'd like to exclude certain IP addresses from the IDS. I tried to modify the inspection policy in ASDM but according to packet trace the packets still go through the IDS.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's the easiest way to do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500377#M67202</guid>
      <dc:creator>ericb_summit</dc:creator>
      <dc:date>2019-03-10T12:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude hosts from IDS?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500378#M67205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the IPS&amp;nbsp; actually still generate alerts for the host, though the class-map has been modified for the specific host traffic not to be sent to the AIP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the packet tracer output, as you may have misread it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This are sample outputs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) If the ACL sends traffic for the AIP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd82d6258, priority=50, domain=ids, deny=false&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;###### Notice how it says DENY=FALSE&amp;nbsp; &amp;gt;&amp;gt; so send to IPS #####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If the ACL does not send traffic to the AIP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd82d8528, priority=50, domain=ids, deny=true&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;##### Notice how it says DENY=TRUE &amp;gt;&amp;gt; so do not send to IDS #####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another way way for accomplishing this is to create event action filter on the AIP itself.&lt;/P&gt;&lt;P&gt;Here is the documentation for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/customer/docs/security/ips/7.0/configuration/guide/idm/idm_event_action_rules.html#wp2034816"&gt;http://www.cisco.com/en/US/customer/docs/security/ips/7.0/configuration/guide/idm/idm_event_action_rules.html#wp2034816&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 02:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500378#M67205</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-15T02:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude hosts from IDS?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500379#M67208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What packet tracer are you using? I don't see this info in ASDM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Additional Information:&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd82d6258, priority=50, domain=ids, deny=false"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking at the Service Policy Rules..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first one is "outside-policy" for "outside-class". In there&amp;nbsp; I have 2 acl.&lt;/P&gt;&lt;P&gt;First one is "do not match" from the netblock I don't want to inspect to any, with rule action ips.&lt;/P&gt;&lt;P&gt;Second one is "match" any any, with rule action ips.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this look right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second one is "globla_policy" "inspection_default", and that has default-inspections with 13 inspect actions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this means that in addition to IPS, the inspect action are also run for traffic coming in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 15:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500379#M67208</guid>
      <dc:creator>ericb_summit</dc:creator>
      <dc:date>2010-06-15T15:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude hosts from IDS?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500380#M67211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let's say you want to exclude ip address 192.168.1.2 from being&amp;nbsp; scanned. Here is a sample config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;access-list aip-acl extended deny ip host &lt;/SPAN&gt;192.168.1.2&lt;SPAN&gt; any &lt;BR /&gt;access-list aip-acl extended permit ip any any &lt;BR /&gt;class-map aip-class&lt;BR /&gt; match access-list aip-acl&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class aip-class&lt;BR /&gt;&amp;nbsp; ips inline fail-open&lt;BR /&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it is clear now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 22:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500380#M67211</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-15T22:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude hosts from IDS?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500381#M67213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you are seeing deny=false in the portion of ips forwarding, then that will mean it is forward to the IPS still, and you probably still have some configuration that forwards the traffic to the ips for the network you did not want inspected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please either try to configure as provided by PK previously, or otherwise provide the service policies (global and interface), class-map, and related access-list you have (CLI commands I mean).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was doing packet tracer through the CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 01:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500381#M67213</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-16T01:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude hosts from IDS?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500382#M67214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK cool, check this out:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Type: IDS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; in&amp;nbsp; id=0xcccb4b60, priority=51, domain=ids, &lt;STRONG&gt;deny=true&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xd07618d8, cs_id=0x0, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=216.35.7.96, mask=255.255.255.224, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;So, that means it bypasses the sensor? Because I'm still getting lots of events with source IPs that show deny=true....&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 14:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500382#M67214</guid>
      <dc:creator>ericb_summit</dc:creator>
      <dc:date>2010-06-16T14:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude hosts from IDS?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500383#M67216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also suggesting the command "sh service-policy flow tcp host &lt;XXX&gt; host &lt;YYY&gt; eq 80" to see if you are hitting the policy for the IPS. You should not.&lt;/YYY&gt;&lt;/XXX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 14:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500383#M67216</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-16T14:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude hosts from IDS?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500384#M67218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please provide the configuration you have for service policy, policy map, class map, and access-list for the traffic redirection t IPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer tools simulation requires you to specify input interface, and maybe there is a flow that you have not simulated where the source ip may still be directed to ips device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 04:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-hosts-from-ids/m-p/1500384#M67218</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-17T04:54:01Z</dc:date>
    </item>
  </channel>
</rss>

