<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSM IPS Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssm-ips-configuration/m-p/485932#M95147</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. I thought things were a bit odd. I'm not sure why they would put out a document for such a situation instead of one that would be helpful to most people, but your answer is very clear. Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Nov 2005 19:04:47 GMT</pubDate>
    <dc:creator>JHaynes4</dc:creator>
    <dc:date>2005-11-03T19:04:47Z</dc:date>
    <item>
      <title>SSM IPS Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ssm-ips-configuration/m-p/485930#M95145</link>
      <description>&lt;P&gt;I have a couple of questions regarding the ASA that deal with the SSM module. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have read the document "Configuring ASA-SSM" and am confused by the command logic. I realize that you need to specify a service-policy globally that defines the traffic being sent to the SSM module. My concern is that the configuration document lists as one of it's steps to define an ACL for the IPS traffic and then apply it to an interface before configuring the class map, policy map, and service-policy. Why would this ACL need to be applied to an interface when it is being used for defining IPS traffic? Shouldn't the ASA send whatever traffic is defined globally in the service-policy to the SSM without attaching the ACL to an interface? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, on the ASA factory default configuration there is a service-policy defined as: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default &lt;/P&gt;&lt;P&gt;match default-inspection-traffic &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;policy-map global_policy &lt;/P&gt;&lt;P&gt;class inspection_default &lt;/P&gt;&lt;P&gt;inspect dns maximum-length 512 &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;service-policy global_policy global &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, if I define a global service-policy for the SSM I would lose this default service-policy as only one global service policy is allowed. Is the default service-policy providing the fixup protocol services as in the PIX that I am used to seeing? If so do I lose this functionality by applying a global service-policy for IPS/ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the length of the post and thanks for your help in advance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssm-ips-configuration/m-p/485930#M95145</guid>
      <dc:creator>JHaynes4</dc:creator>
      <dc:date>2019-03-10T09:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSM IPS Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ssm-ips-configuration/m-p/485931#M95146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The configuration in the IPS User's Guide is just one method for settings up the ASA to send packets to the SSM.&lt;/P&gt;&lt;P&gt;It is an extremely basic configuration on the ASA where all the ASA is doing is copying packets to the SSM and the ASA is not doing any of it's firewall functionality.  &lt;/P&gt;&lt;P&gt;This configuration is only practical if the ASA was purchased and used only for housing the SSM and sending it traffic ( a rare deployment in the field ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your ASA is already configured for firewall functionality then the only additional command(s) that need to be added to your config are:&lt;/P&gt;&lt;P&gt;ips inline|promiscuous fail-open|fail-close&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take your existing policy-map and for every class in that policy you will need to decide if the traffic should be monitored promiscuously, inline, or not monitored by the SSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your example, if you wanted to monitor all of the traffic inline on the SSM and want to continue passing traffic if the SSM fails.  Then simply add the line "ips inline fail-open" within the existing "class inspection_default".&lt;/P&gt;&lt;P&gt;NOTE: If you change the policy you need to understand that the new policy will only affect new connections and not existing connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only reason you would have to create additional acls and class maps using the acls would be if you did not want all of the traffic monitored inline by the SSM.&lt;/P&gt;&lt;P&gt;If you want different traffic monitored promiscuous and other inline (or not monitored), then you need to include additional classes in your policy-map so that a different ips configuration line can be added for each class.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2005 16:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssm-ips-configuration/m-p/485931#M95146</guid>
      <dc:creator>marcabal</dc:creator>
      <dc:date>2005-11-03T16:22:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSM IPS Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ssm-ips-configuration/m-p/485932#M95147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. I thought things were a bit odd. I'm not sure why they would put out a document for such a situation instead of one that would be helpful to most people, but your answer is very clear. Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2005 19:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssm-ips-configuration/m-p/485932#M95147</guid>
      <dc:creator>JHaynes4</dc:creator>
      <dc:date>2005-11-03T19:04:47Z</dc:date>
    </item>
  </channel>
</rss>

