<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ips 4255 interface pair in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418747#M91395</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm deploying IPS 4255 (5.0.4) at my customer site. I put the IPS between the internet router and firewall.&lt;/P&gt;&lt;P&gt;Gi0/2 connected to firewall and Gi0/3 connected to router. Is it correct setup?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use default signature configuration.&lt;/P&gt;&lt;P&gt;After deployed the user can't browse the internet and we saw that there are some of the customer public IP listed in the Actived Host Block. Is it default behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Janto&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:42:00 GMT</pubDate>
    <dc:creator>jcin</dc:creator>
    <dc:date>2019-03-10T09:42:00Z</dc:date>
    <item>
      <title>ips 4255 interface pair</title>
      <link>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418747#M91395</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm deploying IPS 4255 (5.0.4) at my customer site. I put the IPS between the internet router and firewall.&lt;/P&gt;&lt;P&gt;Gi0/2 connected to firewall and Gi0/3 connected to router. Is it correct setup?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use default signature configuration.&lt;/P&gt;&lt;P&gt;After deployed the user can't browse the internet and we saw that there are some of the customer public IP listed in the Actived Host Block. Is it default behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Janto&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418747#M91395</guid>
      <dc:creator>jcin</dc:creator>
      <dc:date>2019-03-10T09:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: ips 4255 interface pair</title>
      <link>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418748#M91396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On appliances, the sensing interfaces are disabled by default. On modules, the sensing interfaces are always enabled and cannot be disabled.  The sensing interface does not have an IP address assigned to it and is therefore invisible to attackers. This lets the sensor monitor the data stream without letting attackers know they are being watched. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_configuration_guide_chapter09186a0080459225.html" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_configuration_guide_chapter09186a0080459225.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Oct 2005 17:09:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418748#M91396</guid>
      <dc:creator>bbaley</dc:creator>
      <dc:date>2005-10-21T17:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: ips 4255 interface pair</title>
      <link>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418749#M91397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Janto,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the action you can take is to put the public IP used by your customer to go out to the Internet under excluded IP that IDS will never block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some signatures by default are set to perform blocking action when it sees 'attack'. This could be why the public IP was blocked as it matches criteria falls under those signatures, e.g spoofing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Oct 2005 08:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418749#M91397</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2005-10-25T08:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: ips 4255 interface pair</title>
      <link>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418750#M91398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to exclude my public IP addresses?&lt;/P&gt;&lt;P&gt;Is it by configuring the event action rules?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Janto&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Oct 2005 00:34:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-4255-interface-pair/m-p/418750#M91398</guid>
      <dc:creator>jcin</dc:creator>
      <dc:date>2005-10-26T00:34:14Z</dc:date>
    </item>
  </channel>
</rss>

