01-05-2006 09:15 AM - edited 03-10-2019 01:49 AM
I'm trying to create a list of signatures to apply to an outside interface of my 2851. It's connected to the Internet, and all I'm allowing is ICMP echo, esp, ahp, udp (non-500-isakmp & isakmp), and tcp (ssh).
What I'm trying to do is create a list which will only scan for vulnerabilities associated with the protocols/ports I have opened on the router.
Does anyone have any advice on how to go about maintaining a list (at the moment all I have is the SDM and CLI).
Many thanks,
Michael
01-11-2006 09:01 AM
The signature list displays the signatures available in the SDF. Review the signatures and choose the ones you want to import. If you want to import all the signatures, click Select All. The signature list area has three columns:Name: This is the name of the signature, for example, Cisco IOS Interface DoS.Deployed: If the signature is already loaded on the router, this column says Yes; if not it says No.Import: To import the signature, check the box.
For more information refer to the following url:
01-12-2006 04:11 AM
Thanks for the info and the link. I guess my next question is how do I decide which signatures are worth applying if I'm only allowing VPN tunnels and icmp?
Do you know if there are any docs which give advice on how to choosing signatures?
Many thanks,
Michael
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide