<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tcp Reset question - IPS Sensor 4255 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-reset-question-ips-sensor-4255/m-p/434528#M90932</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure sensors to send TCP reset packets to try to reset a network connection between an attacker host and its intended target host. In some installations when the interface is operating in promiscuous mode, the sensor may not be able to send the TCP reset packets over the same sensing interface on which the attack was detected. In such cases, you can associate the sensing interface with an alternate TCP reset interface and any TCP resets that would otherwise be sent on the sensing interface when it is operating in promiscuous mode, are instead sent out on the associated alternate TCP reset interface.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_installation_guide_chapter09186a008055fc77.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_installation_guide_chapter09186a008055fc77.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 19 Dec 2005 18:50:28 GMT</pubDate>
    <dc:creator>smalkeric</dc:creator>
    <dc:date>2005-12-19T18:50:28Z</dc:date>
    <item>
      <title>Tcp Reset question - IPS Sensor 4255</title>
      <link>https://community.cisco.com/t5/network-security/tcp-reset-question-ips-sensor-4255/m-p/434527#M90931</link>
      <description>&lt;P&gt;I have this sensor doing tcp resets, the question I have is if I add a network to the "never block addresses" will the sensor still send tcp resets even though the network is in the never block? if so how do I tell the sensor to not block certain ip addresses..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-reset-question-ips-sensor-4255/m-p/434527#M90931</guid>
      <dc:creator>pmichaelson</dc:creator>
      <dc:date>2019-03-10T09:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Tcp Reset question - IPS Sensor 4255</title>
      <link>https://community.cisco.com/t5/network-security/tcp-reset-question-ips-sensor-4255/m-p/434528#M90932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure sensors to send TCP reset packets to try to reset a network connection between an attacker host and its intended target host. In some installations when the interface is operating in promiscuous mode, the sensor may not be able to send the TCP reset packets over the same sensing interface on which the attack was detected. In such cases, you can associate the sensing interface with an alternate TCP reset interface and any TCP resets that would otherwise be sent on the sensing interface when it is operating in promiscuous mode, are instead sent out on the associated alternate TCP reset interface.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_installation_guide_chapter09186a008055fc77.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_installation_guide_chapter09186a008055fc77.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Dec 2005 18:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-reset-question-ips-sensor-4255/m-p/434528#M90932</guid>
      <dc:creator>smalkeric</dc:creator>
      <dc:date>2005-12-19T18:50:28Z</dc:date>
    </item>
  </channel>
</rss>

