<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ips to csc ssm  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619950#M87447</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does your ASA config look like?&lt;/P&gt;&lt;P&gt;Was it setup to send traffic to IPS?  Is it configured Promiscuous mode or Inline mode?&lt;/P&gt;&lt;P&gt;ACL, Class-Map, Policy-Map defined and applied?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find configuration guide here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df98.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df98.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you are running 5.0(2) code.  It is very old and buggy.  Latest code in 5.x track is 5.1(4).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edward&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 26 Feb 2007 04:53:17 GMT</pubDate>
    <dc:creator>edwakim</dc:creator>
    <dc:date>2007-02-26T04:53:17Z</dc:date>
    <item>
      <title>ips to csc ssm</title>
      <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619946#M87443</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;I have a ASA 5520 running IPS but with no license .But I have a trend micro with all the required license .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to erase  the IPS module that is running in the inline mode   and instead install and configure the trend micro instead of the existing ips configuration ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619946#M87443</guid>
      <dc:creator>rajbhatt</dc:creator>
      <dc:date>2019-03-10T10:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: ips to csc ssm</title>
      <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619947#M87444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have CSC license, you should be able to reimage your SSM module and use it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a0080693b38.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a0080693b38.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please make sure you remove the ips related commands in ASA before doing so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edward&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Feb 2007 13:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619947#M87444</guid>
      <dc:creator>edwakim</dc:creator>
      <dc:date>2007-02-20T13:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: ips to csc ssm</title>
      <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619948#M87445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your answere &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Feb 2007 05:25:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619948#M87445</guid>
      <dc:creator>rajbhatt</dc:creator>
      <dc:date>2007-02-21T05:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: ips to csc ssm</title>
      <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619949#M87446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;There was an attack on the servers with blaster worm(quite old and known worm) and the IPS was not able to detect it .&lt;/P&gt;&lt;P&gt;Is there a command to find out the Ip address of the attacker and see if IPS recognised the attack or not or some logging info that i can see .&lt;/P&gt;&lt;P&gt;It was also not able to prevent it also.&lt;/P&gt;&lt;P&gt;What are the revelant commands related to it .&lt;/P&gt;&lt;P&gt;I am pasting my config .Is this config functional at all as it was unable to detect the attack ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Feb 2007 04:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619949#M87446</guid>
      <dc:creator>rajbhatt</dc:creator>
      <dc:date>2007-02-26T04:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: ips to csc ssm</title>
      <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619950#M87447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does your ASA config look like?&lt;/P&gt;&lt;P&gt;Was it setup to send traffic to IPS?  Is it configured Promiscuous mode or Inline mode?&lt;/P&gt;&lt;P&gt;ACL, Class-Map, Policy-Map defined and applied?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find configuration guide here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df98.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df98.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you are running 5.0(2) code.  It is very old and buggy.  Latest code in 5.x track is 5.1(4).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edward&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Feb 2007 04:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619950#M87447</guid>
      <dc:creator>edwakim</dc:creator>
      <dc:date>2007-02-26T04:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: ips to csc ssm</title>
      <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619951#M87448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Edward,&lt;/P&gt;&lt;P&gt;Thanks for ur reply.&lt;/P&gt;&lt;P&gt;yes traffic goes to IPS .It is in inline mode with acl policy map class map and it is applied to the outside interface .&lt;/P&gt;&lt;P&gt;What I need to know is the command to check if IPS detcted the attack and also what is the ip address of the attacker and what are the signatures present on the ips and stattus of those signatures .Basically need to find out if the IPS is fuctional or not with the current config ?&lt;/P&gt;&lt;P&gt;And do u have  a sample real life config of a functional IPS ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Feb 2007 09:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619951#M87448</guid>
      <dc:creator>rajbhatt</dc:creator>
      <dc:date>2007-02-26T09:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: ips to csc ssm</title>
      <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619952#M87449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Any on has any leads ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2007 17:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619952#M87449</guid>
      <dc:creator>rajbhatt</dc:creator>
      <dc:date>2007-02-27T17:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: ips to csc ssm</title>
      <link>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619953#M87450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'sh stat v' will show you if the sensor is working or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are many ways to see the alert details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in CLI you can do 'sh events alert' and you can use '?' to fine tune your search.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e) sh events alert past 02:00 -&amp;gt; show any alerts for last 2 hours&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use IEV, SecMon (VMS) or MARS to view them as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edward&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2007 18:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-to-csc-ssm/m-p/619953#M87450</guid>
      <dc:creator>edwakim</dc:creator>
      <dc:date>2007-02-27T18:15:16Z</dc:date>
    </item>
  </channel>
</rss>

