<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AIP-SSM reconnaissance question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398948#M67884</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you modified the ASA's ACLs to allow all ports?&amp;nbsp; Some organization's AC policies allow only minimal access, and the ASA's ACLs might be denying the traffic before it can even be analyzed by the IPS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Mar 2010 19:23:18 GMT</pubDate>
    <dc:creator>bnidacoc</dc:creator>
    <dc:date>2010-03-17T19:23:18Z</dc:date>
    <item>
      <title>AIP-SSM reconnaissance question</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398946#M67881</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am doing some NMAP regular recoinnassance tests through our ASA w/IPS.&amp;nbsp; These tests are unfortunately going through the IPS even after enabling drop on signatures 3002, 2157, and 4003.&amp;nbsp; Wireshark applications show that NMAP uses tcp as opposed to UDP specified on signature 4003.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please assist.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398946#M67881</guid>
      <dc:creator>marcusbrutus</dc:creator>
      <dc:date>2019-03-10T11:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: AIP-SSM reconnaissance question</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398947#M67883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can customize the signature based on TCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Mar 2010 20:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398947#M67883</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-03-16T20:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: AIP-SSM reconnaissance question</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398948#M67884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you modified the ASA's ACLs to allow all ports?&amp;nbsp; Some organization's AC policies allow only minimal access, and the ASA's ACLs might be denying the traffic before it can even be analyzed by the IPS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Mar 2010 19:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398948#M67884</guid>
      <dc:creator>bnidacoc</dc:creator>
      <dc:date>2010-03-17T19:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: AIP-SSM reconnaissance question</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398949#M67886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No ACL dropping packets.&amp;nbsp; With the IPS on in fail-open, nmap scans still go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Mar 2010 18:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398949#M67886</guid>
      <dc:creator>marcusbrutus</dc:creator>
      <dc:date>2010-03-18T18:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: AIP-SSM reconnaissance question</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398950#M67887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the IPS configured in promiscuous or inline mode?&lt;/P&gt;&lt;P&gt;What is the event action for the signature# that matches the NMAP traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Mar 2010 04:46:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-reconnaissance-question/m-p/1398950#M67887</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-19T04:46:34Z</dc:date>
    </item>
  </channel>
</rss>

