<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring ASA 5520 to work with SSM-20 IPS module in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794775#M7252</link>
    <description>Well I just tried again and I do see it. I see they section it off and maybe I didn't see it before. I initially tried typing it in and it didn't work but maybe I typed it in wrong. I understand it is an older product but I would like to know more about it beside certification.&lt;BR /&gt;&lt;BR /&gt;Thanks though for the help.&lt;BR /&gt;&lt;BR /&gt;ASA(config)# policy-map global_policy&lt;BR /&gt;ASA(config-pmap)# class IPS&lt;BR /&gt;ASA(config-pmap-c)# ?&lt;BR /&gt;&lt;BR /&gt;MPF policy-map class configuration commands:&lt;BR /&gt;exit Exit from MPF class action configuration mode&lt;BR /&gt;help Help for MPF policy-map class/match submode commands&lt;BR /&gt;no Negate or set default values of a command&lt;BR /&gt;police Rate limit traffic for this class&lt;BR /&gt;priority Strict scheduling priority for this class&lt;BR /&gt;quit Exit from MPF class action configuration mode&lt;BR /&gt;service-policy Configure QoS Service Policy&lt;BR /&gt;set Set connection values&lt;BR /&gt;shape Traffic Shaping&lt;BR /&gt;user-statistics configure user statistics for identity firewall&lt;BR /&gt;&amp;lt;cr&amp;gt;&lt;BR /&gt;csc Content Security and Control service module&lt;BR /&gt;flow-export Configure filters for NetFlow events&lt;BR /&gt;inspect Protocol inspection services&lt;BR /&gt;ips Intrusion prevention services&lt;BR /&gt;ASA(config-pmap-c)# ips ?&lt;BR /&gt;&lt;BR /&gt;mpf-policy-map-class mode commands/options:&lt;BR /&gt;inline Inline mode IPS&lt;BR /&gt;promiscuous Promiscuous mode IPS&lt;BR /&gt;&lt;BR /&gt;configure mode commands/options:&lt;BR /&gt;df-bit Set IPsec DF policy&lt;BR /&gt;fragmentation Set IPsec fragmentation policy&lt;BR /&gt;ikev1 Set IKEv1 settings&lt;BR /&gt;ikev2 Set IKEv2 settings&lt;BR /&gt;security-association Set security association parameters&lt;BR /&gt;ASA(config-pmap-c)# ips</description>
    <pubDate>Tue, 05 Feb 2019 04:57:09 GMT</pubDate>
    <dc:creator>wseyller</dc:creator>
    <dc:date>2019-02-05T04:57:09Z</dc:date>
    <item>
      <title>Configuring ASA 5520 to work with SSM-20 IPS module</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794710#M7248</link>
      <description>&lt;P&gt;Using this equipment in my home lab for study purposes.&lt;/P&gt;&lt;P&gt;I attempted to follow instructions I have found to send the asa traffic to the ips module for inspection.&amp;nbsp; I command is missing for me.&lt;/P&gt;&lt;P&gt;Commands I input on the asa:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list IPS extended permit ip any any&lt;/P&gt;&lt;P&gt;class-map IPS&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;match access-list IPS&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;class IPS&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ips inline fail-open&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The last line under "class IPS"&amp;nbsp; I see the "ips" comand but "inline" is not available.&lt;/P&gt;&lt;P&gt;These are the only options I have after "ips"&lt;/P&gt;&lt;P&gt;df-bit Set IPsec DF policy&lt;BR /&gt;fragmentation Set IPsec fragmentation policy&lt;BR /&gt;ikev1 Set IKEv1 settings&lt;BR /&gt;ikev2 Set IKEv2 settings&lt;BR /&gt;security-association Set security association parameters&lt;/P&gt;&lt;P&gt;Output of:&amp;nbsp; show modules&lt;/P&gt;&lt;P&gt;Mod Card Type Model Serial No.&lt;BR /&gt;---- -------------------------------------------- ------------------ -----------&lt;BR /&gt;0 ASA 5510 Adaptive Security Appliance ASA5510 JMX1211L128&lt;BR /&gt;1 ASA 5500 Series Security Services Module-20 ASA-SSM-20 JAF10450514&lt;/P&gt;&lt;P&gt;Mod MAC Address Range Hw Version Fw Version Sw Version&lt;BR /&gt;---- --------------------------------- ------------ ------------ ---------------&lt;BR /&gt;0 001e.f762.c01e to 001e.f762.c022 2.0 1.0(11)2 9.1(7)23&lt;BR /&gt;1 0019.0665.4b9d to 0019.0665.4b9d 1.0 1.0(11)2 7.0(2)E3&lt;/P&gt;&lt;P&gt;Mod SSM Application Name Status SSM Application Version&lt;BR /&gt;---- ------------------------------ ---------------- --------------------------&lt;BR /&gt;1 IPS Up 7.0(2)E3&lt;/P&gt;&lt;P&gt;Mod Status Data Plane Status Compatibility&lt;BR /&gt;---- ------------------ --------------------- -------------&lt;BR /&gt;0 Up Sys Not Applicable&lt;BR /&gt;1 Up Up&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794710#M7248</guid>
      <dc:creator>wseyller</dc:creator>
      <dc:date>2020-02-21T16:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA 5520 to work with SSM-20 IPS module</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794730#M7249</link>
      <description>What is the problem. ?&lt;BR /&gt;</description>
      <pubDate>Tue, 05 Feb 2019 03:28:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794730#M7249</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-02-05T03:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA 5520 to work with SSM-20 IPS module</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794739#M7250</link>
      <description>&lt;P&gt;I don't think the old style IPS is included on any of the current certification blueprints. It is past end-of-life.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You shouldn't spend too much time studying it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That said, the commands you cited should be available. Here is the output from one of my ASAs:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;asa-5512(config-pmap)# class-map IPS
asa-5512(config-cmap)# match any
asa-5512(config-cmap)# policy-map global_policy
asa-5512(config-pmap)#      class IPS          
asa-5512(config-pmap-c)# ?

MPF policy-map class configuration commands:
  cluster          Specify actions related to clustering
  csc              Content Security and Control service module
  cxsc             Send traffic to CXSC blade
  exit             Exit from MPF class action configuration mode
  flow-export      Configure filters for NetFlow events
  help             Help for MPF policy-map class/match submode commands
  inspect          Protocol inspection services
  ips              Intrusion prevention services
  no               Negate or set default values of a command
  police           Rate limit traffic for this class
  priority         Strict scheduling priority for this class
  quit             Exit from MPF class action configuration mode
  set              Set connection values
  sfr              Send traffic to SFR blade
  user-statistics  configure user statistics for identity firewall
asa-5512(config-pmap-c)# ips ?

mpf-policy-map-class mode commands/options:
  inline       Inline mode IPS
  promiscuous  Promiscuous mode IPS

configure mode commands/options:
  df-bit                Set IPsec DF policy
  fragmentation         Set IPsec fragmentation policy
  ikev1                 Set IKEv1 settings
  ikev2                 Set IKEv2 settings
  inner-routing-lookup  Enable IPsec inner routing lookup
  profile               Set ipsec profile settings
  security-association  Set security association parameters
asa-5512(config-pmap-c)# ips inline ?

mpf-policy-map-class mode commands/options:
  fail-close  Block traffic if IPS card fails
  fail-open   Permit traffic if IPS card fails
asa-5512(config-pmap-c)#            
&lt;/PRE&gt;</description>
      <pubDate>Tue, 05 Feb 2019 03:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794739#M7250</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-02-05T03:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA 5520 to work with SSM-20 IPS module</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794740#M7251</link>
      <description>&lt;P&gt;You should see inline and&amp;nbsp;promiscuous options under&amp;nbsp;mpf-policy-map-class mode commands/options when you put an question mark after IPS.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 03:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794740#M7251</guid>
      <dc:creator>Ashish Jhaldiyal</dc:creator>
      <dc:date>2019-02-05T03:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA 5520 to work with SSM-20 IPS module</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794775#M7252</link>
      <description>Well I just tried again and I do see it. I see they section it off and maybe I didn't see it before. I initially tried typing it in and it didn't work but maybe I typed it in wrong. I understand it is an older product but I would like to know more about it beside certification.&lt;BR /&gt;&lt;BR /&gt;Thanks though for the help.&lt;BR /&gt;&lt;BR /&gt;ASA(config)# policy-map global_policy&lt;BR /&gt;ASA(config-pmap)# class IPS&lt;BR /&gt;ASA(config-pmap-c)# ?&lt;BR /&gt;&lt;BR /&gt;MPF policy-map class configuration commands:&lt;BR /&gt;exit Exit from MPF class action configuration mode&lt;BR /&gt;help Help for MPF policy-map class/match submode commands&lt;BR /&gt;no Negate or set default values of a command&lt;BR /&gt;police Rate limit traffic for this class&lt;BR /&gt;priority Strict scheduling priority for this class&lt;BR /&gt;quit Exit from MPF class action configuration mode&lt;BR /&gt;service-policy Configure QoS Service Policy&lt;BR /&gt;set Set connection values&lt;BR /&gt;shape Traffic Shaping&lt;BR /&gt;user-statistics configure user statistics for identity firewall&lt;BR /&gt;&amp;lt;cr&amp;gt;&lt;BR /&gt;csc Content Security and Control service module&lt;BR /&gt;flow-export Configure filters for NetFlow events&lt;BR /&gt;inspect Protocol inspection services&lt;BR /&gt;ips Intrusion prevention services&lt;BR /&gt;ASA(config-pmap-c)# ips ?&lt;BR /&gt;&lt;BR /&gt;mpf-policy-map-class mode commands/options:&lt;BR /&gt;inline Inline mode IPS&lt;BR /&gt;promiscuous Promiscuous mode IPS&lt;BR /&gt;&lt;BR /&gt;configure mode commands/options:&lt;BR /&gt;df-bit Set IPsec DF policy&lt;BR /&gt;fragmentation Set IPsec fragmentation policy&lt;BR /&gt;ikev1 Set IKEv1 settings&lt;BR /&gt;ikev2 Set IKEv2 settings&lt;BR /&gt;security-association Set security association parameters&lt;BR /&gt;ASA(config-pmap-c)# ips</description>
      <pubDate>Tue, 05 Feb 2019 04:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-5520-to-work-with-ssm-20-ips-module/m-p/3794775#M7252</guid>
      <dc:creator>wseyller</dc:creator>
      <dc:date>2019-02-05T04:57:09Z</dc:date>
    </item>
  </channel>
</rss>

