ā09-15-2010 06:26 AM - edited ā03-10-2019 05:07 AM
Hi All,
I'm testing IDSM2 witht the lateset IOS on a CAT 6504 with SUP72010GE. The setup is using the promiscouse mode VACL, and traffic is being captured by the IDSM2 i can see the traffic in the Event Dasboard etc. I wish to configure the IDS to send a tcp reset for the attacks. Under IPS Policies with the actions i added the Reset TCP Connection. But I'm Stuck There.
From the documentation that i reviewed it was stated that i need to assign another interface for the tcp reset and allow the vlan\s that i'm capturing.
Could any one help with this issue.
Thanks
Etienne
ā09-16-2010 04:36 PM
Etienne;
The IDSM-2's TCP reset port is port 1 as discussed in the configuration guide:
http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_idsm2.html#wp1059158
By ensuring that port 1 is in the correct VLAN(s), it should be able to source TCP resets when that action is assigned to a signature.
Scott
ā09-17-2010 12:04 AM
The comments in the User Guide only apply to Cat OS, and only apply to promiscuous mode. Cat OS provides multiple different config options that could prevent TCP resets from working properly, however in Native IOS with the special "intrusion-detection module" commands take care of these issues automatically without the user having to do anything.
The IDSM2 has two data ports (a.k.a. "sensing interfaces"), and a separate tcp-reset interface. In native IOS you do not need to configure the
tcp-reset interface, either on the IDSM2 or on the switch. It is automatically added to all necessary vlans by the switch.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide