<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS IPS and VMS and shunning in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481245#M99201</link>
    <description>&lt;P&gt;Installed 12.3.14T2 (advanced security) on 2811 router with new &lt;/P&gt;&lt;P&gt;VMS update to the IDS Management Center (2.1) to support IOS IPS SDEE event monitoring. When I configure a specific signature, there is no option to shun. Only alert, block or reset. Where do you configure the dynamic shuning or "local shun action" that seems to be in all the "new features" of the IOS IPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring the signature to block, alert or reset works fine. Just no options to shun. Also the IPS device does not show up in the device list under Monitoring on VMS, even though it shows up as a device in Monitoring Center Device Page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe this is where the problem may lie. &lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:30:15 GMT</pubDate>
    <dc:creator>MICHAEL YOUNG</dc:creator>
    <dc:date>2019-03-10T09:30:15Z</dc:date>
    <item>
      <title>IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481245#M99201</link>
      <description>&lt;P&gt;Installed 12.3.14T2 (advanced security) on 2811 router with new &lt;/P&gt;&lt;P&gt;VMS update to the IDS Management Center (2.1) to support IOS IPS SDEE event monitoring. When I configure a specific signature, there is no option to shun. Only alert, block or reset. Where do you configure the dynamic shuning or "local shun action" that seems to be in all the "new features" of the IOS IPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring the signature to block, alert or reset works fine. Just no options to shun. Also the IPS device does not show up in the device list under Monitoring on VMS, even though it shows up as a device in Monitoring Center Device Page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe this is where the problem may lie. &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:30:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481245#M99201</guid>
      <dc:creator>MICHAEL YOUNG</dc:creator>
      <dc:date>2019-03-10T09:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481246#M99202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is block not the same as shun&lt;/P&gt;&lt;P&gt;ie. block = shun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2005 03:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481246#M99202</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2005-06-21T03:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481247#M99204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To Block something in IDS/IPS means to block any connection until affending signature action is stopped. The IPS IOS Signatures will immediately block if configured that way, whenever it "sees" the signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shunning is different. It will block just the effected port....ie tcp port 137 from source host to destination etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, it will do this for a configurable pre-defined period or will start shunning when a positive signature is detected in a certain number of seconds. This is to prevent "false positive" blocking of legit traffic....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to know how this is done on the IPS IOS (It works fine on the IDSM2 blades, etc.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2005 09:18:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481247#M99204</guid>
      <dc:creator>MICHAEL YOUNG</dc:creator>
      <dc:date>2005-06-21T09:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481248#M99205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;the concepts of IP blocking and shunning are identical for me.&lt;/P&gt;&lt;P&gt;Can any one clarify more and more the difference?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2005 09:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481248#M99205</guid>
      <dc:creator>abouzidzineb</dc:creator>
      <dc:date>2005-06-21T09:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481249#M99206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the official explanation from Cisco....not mine...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Types of actions IPS Performs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;Send an alarm&lt;/P&gt;&lt;P&gt;&amp;#149;Drop the packet&lt;/P&gt;&lt;P&gt;&amp;#149;Reset the connection &lt;/P&gt;&lt;P&gt;&amp;#149;Local shunning&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Local shunning is a dynamic ACL that allows undesirable traffic to be blocked sooner.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2005 10:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481249#M99206</guid>
      <dc:creator>MICHAEL YOUNG</dc:creator>
      <dc:date>2005-06-21T10:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481250#M99207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The IPS IOS Device "shun" places an ACL-type block on the interface from which the attacking traffic is entering the router to more quickly defend the network from attack traffic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2005 10:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481250#M99207</guid>
      <dc:creator>MICHAEL YOUNG</dc:creator>
      <dc:date>2005-06-21T10:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481251#M99209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IOS versions before 12.3(14)T support the following&lt;/P&gt;&lt;P&gt;actions for IOS IPS:&lt;/P&gt;&lt;P&gt;- alarm&lt;/P&gt;&lt;P&gt;- drop (drop just the offending packet)&lt;/P&gt;&lt;P&gt;- reset (reset tcp connection - works for tcp only)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Version 12.3(14)T and later (including 12.4 versions) added support for the "local shunning" through two different actions:&lt;/P&gt;&lt;P&gt;- denyFlowInline&lt;/P&gt;&lt;P&gt;- denyAttackerInline&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DenyFlowInline creates an ACL that drops all traffic on that connection for a certain idle-timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DenyAttackerInline creates an ACL that drops all traffic from that source address (including other connections from that source address) for a certain idle-timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2005 17:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481251#M99209</guid>
      <dc:creator>daftary</dc:creator>
      <dc:date>2005-08-18T17:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481252#M99210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have VMS 2.3, and I have IOS IPS with version 12.4(3). I have that features in my VMS (denyFlowInline and denyAttackerInline).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured the signature ICMP Echo Req (ID 2004) with first denyFlowInline and then with denyAttackerInline. It´s works like "drop" action.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn´t see the automatic ACL configured in the IOS IPS. So, I thougt that denyAttackerInline could block my telnet session if I send ping of my PC, but it not happened. I can ping the device, the device drop´s the ICMP because of the signature, but It doesn´t block any other connection of my PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank´s.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Oct 2005 16:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481252#M99210</guid>
      <dc:creator>mgarciar</dc:creator>
      <dc:date>2005-10-26T16:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481253#M99211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not sure how you checked the automatic ACLs created by IOS IPS. You should use the following show cmd for that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"show ip access-list dynamic"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Oct 2005 23:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481253#M99211</guid>
      <dc:creator>daftary</dc:creator>
      <dc:date>2005-10-26T23:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481254#M99212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are doing 2 things.....denyFlowInline and denyAttackerInline. The first action is being taken and &lt;/P&gt;&lt;P&gt;the second doesn't get a chance to take an action because the first action has already taken care of the attack. Change the action to denyAttackerInline and run your test again. You should get dynamic ACL's created...use the "show ip access-lists dynamic" to see the acl's....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Oct 2005 04:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481254#M99212</guid>
      <dc:creator>MICHAEL YOUNG</dc:creator>
      <dc:date>2005-10-27T04:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IPS and VMS and shunning</title>
      <link>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481255#M99213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I used just denyAttackerInline and the access dynamic list is applied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank´s.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Nov 2005 01:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ips-and-vms-and-shunning/m-p/481255#M99213</guid>
      <dc:creator>mgarciar</dc:creator>
      <dc:date>2005-11-05T01:53:54Z</dc:date>
    </item>
  </channel>
</rss>

