<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IDSM-2 - Promiscuous Mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/idsm-2-promiscuous-mode/m-p/667998#M87735</link>
    <description>&lt;P&gt;I would like my  IDSM-2 to run in a Promiscuous Mode ( and not INLINE mode)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can i configure it so that it works on the - " Block Nothing,Monitor Everything" principle.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need the blade to "Never" block the upstream devices like routers and Firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way,how will the IDSM running in Promiscuous Mode even "know" of upstream routers and other network devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks !!!&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 10:26:04 GMT</pubDate>
    <dc:creator>rpsrekhi3</dc:creator>
    <dc:date>2019-03-10T10:26:04Z</dc:date>
    <item>
      <title>IDSM-2 - Promiscuous Mode</title>
      <link>https://community.cisco.com/t5/network-security/idsm-2-promiscuous-mode/m-p/667998#M87735</link>
      <description>&lt;P&gt;I would like my  IDSM-2 to run in a Promiscuous Mode ( and not INLINE mode)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can i configure it so that it works on the - " Block Nothing,Monitor Everything" principle.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need the blade to "Never" block the upstream devices like routers and Firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way,how will the IDSM running in Promiscuous Mode even "know" of upstream routers and other network devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks !!!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/idsm-2-promiscuous-mode/m-p/667998#M87735</guid>
      <dc:creator>rpsrekhi3</dc:creator>
      <dc:date>2019-03-10T10:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: IDSM-2 - Promiscuous Mode</title>
      <link>https://community.cisco.com/t5/network-security/idsm-2-promiscuous-mode/m-p/667999#M87736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find how to configure IDSM-2 to run promiscuous mode here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df92.html#wp1030752" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df92.html#wp1030752&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there, you can find IOS vs. CatOS configuration as well as SPAN vs. VACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once that is done, you can find configuration guide here regarding IPS software.  I will list both CLI and IDM in case you prefer one over the other...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CLI -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df7d.html#wp1033699" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df7d.html#wp1033699&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IDM -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a00804cf4c2.html#wp1031960" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a00804cf4c2.html#wp1031960&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In promiscuous mode, unless you configure blocking with blocking device, it will never block anything by default. Even with blocking, you can configure never-block addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CLI -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df77.html#wp1031471" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df77.html#wp1031471&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IDM -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a00804d1374.html#wp1037905" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a00804d1374.html#wp1037905&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IDSM will not know about which is what (upstream routers and other network devices) unless you specify them in 'never block' or 'blocking devices'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edward&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2007 02:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/idsm-2-promiscuous-mode/m-p/667999#M87736</guid>
      <dc:creator>edwakim</dc:creator>
      <dc:date>2007-01-24T02:10:27Z</dc:date>
    </item>
  </channel>
</rss>

