cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
732
Views
0
Helpful
1
Replies

aip-ssm default behaviour

mulhollandm
Level 1
Level 1

folks

i've only realised that my aip-ssm only reports on traffic which is passed through the firewall acl

my requirement is that i log all attempted intrusions regardless of whether they are permitted through the firewall or not

does anyone know if i can change the default behaviour of the asa to let the module see the all traffic hitting the external interface?

thanks to anyone taking the time to reply

1 Reply 1

Dustin Ralich
Cisco Employee
Cisco Employee
i've only realised that my aip-ssm only reports on traffic which is passed through the firewall acl

does anyone know if i can change the default behaviour of the asa to let the module see the all traffic hitting the external interface?

The architecture is such that only traffic that is allowed through the ASA is passed to the AIP-SSM/AIP-SSC for inspection. The idea being that there is no reason to tie up more resources inspecting traffic that has already been dropped/denied.

my requirement is that i log all attempted intrusions regardless of whether they are permitted through the firewall or not

If the ASA itself is dropping traffic, a syslog message should be generated/logged. Between the ASA logs and the sensor module logs, you should have what you need.

Review Cisco Networking for a $25 gift card