<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS sensor 4260 blocking ISA trafiic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050985#M78236</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the answer!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled alert sending for every signature that did something to the traffic. but nothing was triggered that denied any attackers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will use the commands you gave to further troubleshoot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know what could cause a 3737/0 signature with a calculated risk of 95% to droppedPacket, deniedFlow, tcpOneWayResetSent  when in the signature actions is just alert and the VS0 should just drop packets when the risk is above 90 % ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thak you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Nov 2008 15:55:09 GMT</pubDate>
    <dc:creator>dragnia_s</dc:creator>
    <dc:date>2008-11-28T15:55:09Z</dc:date>
    <item>
      <title>IPS sensor 4260 blocking ISA trafiic</title>
      <link>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050983#M78231</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recently installed a 4260 IPS sensor. It is used to inspect traffic between a ISA server and the LAN. The ISA is formed from 3 real servers in NLB. &lt;/P&gt;&lt;P&gt;Each server is connected to 2 switches through 4 cables 2 in each switch, one  in the internet VLAN and one in the IPS VLAN.&lt;/P&gt;&lt;P&gt;For some reason when i inspect the traffic it blocks the ISA traffic. No signature seems to be triggered but the traffic from the ISA server stops.&lt;/P&gt;&lt;P&gt; When i capture packets on the vs0 sensor i don't see any traffic from the ISA server for 5 to 10 min and after that it starts again to function. &lt;/P&gt;&lt;P&gt; The IPS inspects on two redundant pairs traffic that travels from the LAN to the ISA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IPS versionn is 6.1 E2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideeas on what is causing this?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050983#M78231</guid>
      <dc:creator>dragnia_s</dc:creator>
      <dc:date>2019-03-10T11:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: IPS sensor 4260 blocking ISA trafiic</title>
      <link>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050984#M78233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are a number of signatures in the 13xx series which have actions of deny or modify packet inline without a produce alert action.  It is possible these are firing (silently).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried looking at 'sh stat denied-attackers' to see if those IPs are being blocked?  Also, you can look at 'sh stat virtual-sensor' in the "SigEvent Preliminary Stage Statistics" &amp;amp; "SigEvent Action Override Stage Statistics" areas.  Those will tell you which sigs are firing and which actions are being taken.  Watch for "deny-packet-inline" &amp;amp; "deny-attacker-inline" to increment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2008 15:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050984#M78233</guid>
      <dc:creator>attmidsteam</dc:creator>
      <dc:date>2008-11-28T15:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPS sensor 4260 blocking ISA trafiic</title>
      <link>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050985#M78236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the answer!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled alert sending for every signature that did something to the traffic. but nothing was triggered that denied any attackers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will use the commands you gave to further troubleshoot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know what could cause a 3737/0 signature with a calculated risk of 95% to droppedPacket, deniedFlow, tcpOneWayResetSent  when in the signature actions is just alert and the VS0 should just drop packets when the risk is above 90 % ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thak you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2008 15:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050985#M78236</guid>
      <dc:creator>dragnia_s</dc:creator>
      <dc:date>2008-11-28T15:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPS sensor 4260 blocking ISA trafiic</title>
      <link>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050986#M78240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are being hit with the default option of the the Event Action Override feature.  It adds a 'Deny Packet Inline' action to any signature with a risk of 90-100.  Type 'setup' on the sensor, do you see a section like this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service event-action-rules rules0&lt;/P&gt;&lt;P&gt;overrides&lt;/P&gt;&lt;P&gt;override-item-status Enabled&lt;/P&gt;&lt;P&gt;risk-rating-range 90-100&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2008 16:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050986#M78240</guid>
      <dc:creator>attmidsteam</dc:creator>
      <dc:date>2008-11-28T16:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPS sensor 4260 blocking ISA trafiic</title>
      <link>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050987#M78243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the event action override feature is on. But it should just dey packet inline not do a tcpOneWayResetSent or does deny packet inline will trigger all of these actions droppedPacket, deniedFlow, tcpOneWayResetSent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added an exception for this rule for any attacker that tries this attack on the ISA IP but it didn't help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is 'setup' the right command to view this? I mostly use the IDM and it shows the event action overide for risk rating above 90% to drop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2008 16:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050987#M78243</guid>
      <dc:creator>dragnia_s</dc:creator>
      <dc:date>2008-11-28T16:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPS sensor 4260 blocking ISA trafiic</title>
      <link>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050988#M78248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't help you with IDM as we usually use CSM to manage our sensors (many hundreds).  You could disable the event action override and see what happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(via CLI)&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;service event-action-rules rules0&lt;/P&gt;&lt;P&gt;overrides deny-packet-inline&lt;/P&gt;&lt;P&gt;override-item-status Disabled&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;(yes)&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2008 16:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050988#M78248</guid>
      <dc:creator>attmidsteam</dc:creator>
      <dc:date>2008-11-28T16:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPS sensor 4260 blocking ISA trafiic</title>
      <link>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050989#M78252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i figured it out, &lt;/P&gt;&lt;P&gt;the traffic was asymmetric, the same packets were entering on the diffrent pairs because of the Spanning Tree but the ISA was answering just once,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This happened when the evasion protection mode was set as strict:&lt;/P&gt;&lt;P&gt;strict-If a packet is missed for any reason, all packets after the missed packet are not&lt;/P&gt;&lt;P&gt;processed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured the sensor to expect  asymmetric traffic, not strict&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service analysis-engine&lt;/P&gt;&lt;P&gt;virtual-sensor vs0&lt;/P&gt;&lt;P&gt;inline-TCP-evasion-protection-mode asymmetric&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and everything worked fine.&lt;/P&gt;&lt;P&gt;Because the ISA was configured in NLB broadcast mode we couldnt stop the packets from being doubled and sent to the second pair. So finaly I redesigned the network and only one pair is used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Dec 2008 09:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-sensor-4260-blocking-isa-trafiic/m-p/1050989#M78252</guid>
      <dc:creator>dragnia_s</dc:creator>
      <dc:date>2008-12-11T09:05:13Z</dc:date>
    </item>
  </channel>
</rss>

