<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IDS and Dot1q in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ids-and-dot1q/m-p/401517#M96313</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i dont think there is any requirement of trunks when using ids sniffing port.. it only uses spanning/remote spanning for capturing packets.. it is not going to forward any data traffic/vlan traffic , which negates the use of a trunk.. you can have one sniffing interface for each vlan or mirror all vlan traffic onto an interface..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 May 2005 08:26:20 GMT</pubDate>
    <dc:creator>sachinraja</dc:creator>
    <dc:date>2005-05-02T08:26:20Z</dc:date>
    <item>
      <title>IDS and Dot1q</title>
      <link>https://community.cisco.com/t5/network-security/ids-and-dot1q/m-p/401516#M96312</link>
      <description>&lt;P&gt;Does IDS understand Dot1q? If it does, is there any configuration needed on IDS when it's sniffing multiple vlans? Does the interface on the switch which connects to the sniffing port of the IDS need to have Dot1q trunking configured?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ids-and-dot1q/m-p/401516#M96312</guid>
      <dc:creator>bgrove2913</dc:creator>
      <dc:date>2019-03-10T09:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: IDS and Dot1q</title>
      <link>https://community.cisco.com/t5/network-security/ids-and-dot1q/m-p/401517#M96313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i dont think there is any requirement of trunks when using ids sniffing port.. it only uses spanning/remote spanning for capturing packets.. it is not going to forward any data traffic/vlan traffic , which negates the use of a trunk.. you can have one sniffing interface for each vlan or mirror all vlan traffic onto an interface..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 May 2005 08:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ids-and-dot1q/m-p/401517#M96313</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-05-02T08:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: IDS and Dot1q</title>
      <link>https://community.cisco.com/t5/network-security/ids-and-dot1q/m-p/401518#M96314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The sensor is able to interpret 802.1q trunk headers to tell what vlan the packet came in on, and will report the vlan number in the alert.&lt;/P&gt;&lt;P&gt;This feature of the sensor is always on, and no commands are needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is the switch port that would need to be configured as an 802.1q trunk port in order to send trunk packets to the sensor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For promiscuous mode, making the switch port a trunk port is not enough.  In addition the switch would need to be configured to send traffic to the sensor using span (or VACL Capture if it is a Cat 6500).&lt;/P&gt;&lt;P&gt;The span command may contain additional parameters in order to send the spanned packets with trunk headers.&lt;/P&gt;&lt;P&gt;You will need to read your switch's manuals to determine what commands are needed on your switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For inline mode, the easiest scenario is to setup your 2 switches (or a switch and a router or firewall etc..) to be connected to each other through an 802.1q trunk port.&lt;/P&gt;&lt;P&gt;Once everything is running fine, then place your sensor between the 2 switches in the middle of that 802.1q trunk port.&lt;/P&gt;&lt;P&gt;The sensor will analyze the packets and pass them on without modification.  The vlan header of the packets would be passed through without modification, and the underlying IP packet would be fully analyzed. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 May 2005 15:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ids-and-dot1q/m-p/401518#M96314</guid>
      <dc:creator>marcabal</dc:creator>
      <dc:date>2005-05-02T15:44:55Z</dc:date>
    </item>
  </channel>
</rss>

