<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query on SSM (as IPS) on ASA (5505/5510/5520)  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/query-on-ssm-as-ips-on-asa-5505-5510-5520/m-p/1146506#M77496</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suspect the module would analyze because it is my experience that inbound traffic on an interface is decrypted, then ACLs are applied on the decrypted traffic.  And as people here have said that the IPS works post ACL, I believe that inbound traffic is processed like this;  decryption -&amp;gt; access control -&amp;gt; inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, you mention spam and I am not sure if you are talking about the IPS modules, as I had thought they did not prevent spam.  Although they could prevent some malicious attachments.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Mar 2009 17:32:17 GMT</pubDate>
    <dc:creator>bnidacoc</dc:creator>
    <dc:date>2009-03-20T17:32:17Z</dc:date>
    <item>
      <title>Query on SSM (as IPS) on ASA (5505/5510/5520)</title>
      <link>https://community.cisco.com/t5/network-security/query-on-ssm-as-ips-on-asa-5505-5510-5520/m-p/1146505#M77495</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have ASA terminating the VPN clients (remote access or L2L vpn), and if I have SSM installed on ASA (to act as IPS), will this ASA successfully be able to perform real-time spam/virus filtering even for the encrypted traffic that is coming through the remote client VPN  or client via L2L vpn.? if so, any special license also needed for the ASA..?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-on-ssm-as-ips-on-asa-5505-5510-5520/m-p/1146505#M77495</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2019-03-10T11:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Query on SSM (as IPS) on ASA (5505/5510/5520)</title>
      <link>https://community.cisco.com/t5/network-security/query-on-ssm-as-ips-on-asa-5505-5510-5520/m-p/1146506#M77496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suspect the module would analyze because it is my experience that inbound traffic on an interface is decrypted, then ACLs are applied on the decrypted traffic.  And as people here have said that the IPS works post ACL, I believe that inbound traffic is processed like this;  decryption -&amp;gt; access control -&amp;gt; inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, you mention spam and I am not sure if you are talking about the IPS modules, as I had thought they did not prevent spam.  Although they could prevent some malicious attachments.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Mar 2009 17:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-on-ssm-as-ips-on-asa-5505-5510-5520/m-p/1146506#M77496</guid>
      <dc:creator>bnidacoc</dc:creator>
      <dc:date>2009-03-20T17:32:17Z</dc:date>
    </item>
  </channel>
</rss>

