<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with first time IPS configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676690#M88122</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It might not necessarily because of bidirectional scanning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to active inbound traffic inspection first, and see the results (performance, ability to detect violations@matching signatures and user response). If the web response (browsing) improved, than you can now start looking at the outbound inspection. If nothing is changed ,then you can start reviewing the IPS inspection config again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, the tips is, do one thing at a time before enabling other features/stuffs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 09 Dec 2006 02:10:05 GMT</pubDate>
    <dc:creator>a.kiprawih</dc:creator>
    <dc:date>2006-12-09T02:10:05Z</dc:date>
    <item>
      <title>Help with first time IPS configuration</title>
      <link>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676689#M88118</link>
      <description>&lt;P&gt;I just installed  an AIP-SSM module in our ASA 5520 firewall (protecting a school district). I successfully configured it to scan all traffic sent both directions with the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list IPS extended permit ip any any &lt;/P&gt;&lt;P&gt;class-map ips-class&lt;/P&gt;&lt;P&gt; match access-list IPS&lt;/P&gt;&lt;P&gt;policy-map ips-policy&lt;/P&gt;&lt;P&gt; class ips-class&lt;/P&gt;&lt;P&gt;  ips inline fail-open&lt;/P&gt;&lt;P&gt;no service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy ips-policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also configured it to Deny Attacker Inline when RR=75-100. Figured that was a simple configuration to get things started. However, we noticed that some websites were running very slowly after I implemented these settings. What is causing this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the other option would be to reconfigure to only scan incoming traffic initiated from the outside to help protect the district from incoming attacks. But I thought it would be more responsible of me to configure it to scan both ways to protect external hosts from an attack that a student could initiate from a school computer. Is this really necessary or am I creating headaches for myself?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676689#M88118</guid>
      <dc:creator>vbutler</dc:creator>
      <dc:date>2019-03-10T10:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: Help with first time IPS configuration</title>
      <link>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676690#M88122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It might not necessarily because of bidirectional scanning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to active inbound traffic inspection first, and see the results (performance, ability to detect violations@matching signatures and user response). If the web response (browsing) improved, than you can now start looking at the outbound inspection. If nothing is changed ,then you can start reviewing the IPS inspection config again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, the tips is, do one thing at a time before enabling other features/stuffs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Dec 2006 02:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676690#M88122</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-09T02:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help with first time IPS configuration</title>
      <link>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676691#M88124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response. I found DocID 71204 and based on that I modified the IPS config as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list IPS permit ip interface outside any&lt;/P&gt;&lt;P&gt;class-map ips-class&lt;/P&gt;&lt;P&gt; match access-list IPS&lt;/P&gt;&lt;P&gt;policy-map ips-policy&lt;/P&gt;&lt;P&gt; class ips-class&lt;/P&gt;&lt;P&gt;  ips inline fail-open&lt;/P&gt;&lt;P&gt;service-policy global_policy global (put the default back)&lt;/P&gt;&lt;P&gt;service-policy ips-policy interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But now the IPS doesn't appear to be doing anything, so I must have done something wrong. I modified signatures 2000 and 2004 with an RR=100 so that any incoming pings should be seen as a high-level attack and the incoming IP denied. If I go back to the original config this test works, but not with this config (which according to the Cisco doc should send any incoming traffic initiated from outside to the IPS).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Dec 2006 22:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676691#M88124</guid>
      <dc:creator>vbutler</dc:creator>
      <dc:date>2006-12-12T22:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Help with first time IPS configuration</title>
      <link>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676692#M88126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I think it could be better to add the ips-class into the global_policy, to obtain the inspection action and the ips action, like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class ips-class&lt;/P&gt;&lt;P&gt; ips inline fail-open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;bye&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2007 09:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676692#M88126</guid>
      <dc:creator>r.spiandorello</dc:creator>
      <dc:date>2007-06-27T09:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: Help with first time IPS configuration</title>
      <link>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676693#M88128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the suggestion. I never did get the IPS working - had to put it on hold when I couldn't figure it out and never got back to it. I'm looking forward to trying this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2007 14:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-first-time-ips-configuration/m-p/676693#M88128</guid>
      <dc:creator>vbutler</dc:creator>
      <dc:date>2007-06-27T14:05:50Z</dc:date>
    </item>
  </channel>
</rss>

