12-14-2004 01:36 AM - edited 03-10-2019 01:11 AM
Hallo,
I've following Issue:
Reset from IDS dont work when Reset interface attached to IOS running switch, or IDSM2 Blade is in IOS Switch.
I've found many configuration examples how configure reset from IDS but all of them characterize ONLY
how to configure CAT OS switch,not IOS.
1.I've configured Sygnature to be Reset,
2.I've started Attack from Internet to DMZ Server
3.IDS Matched Attack, send 100 resets in both directions, to server and to me. I can see it on IDS CLI, and on switch port input packets are increase.
4.But the resets packets never arrive me or server.
12-14-2004 10:06 AM
Native IOS is more restrictive than Cat OS.
If you are monitoring using VACL Capture in Native IOS then the capture is not allowed to receive ingress packets (the tcp resets):
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/12_1e/swconfig/secure.htm#wp1066900
The capture port supports only egress traffic. No traffic can enter the switch through a capture port.
The same is also true if you are using Span in Native IOS:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/12_1e/swconfig/span.htm#wp1020380
When you configure a port as a SPAN destination port, it can no longer receive any traffic.
So a IDS-4210 connected to a Native IOS switch and monitoring with either VACL Capture or Span will not be able to send resets into the switch.
The IDSM-2, however, should not have this issue.
The IDSM-2 does not send resets back out the same port that is being used for monitoring.
Instead the IDSM-2 has a separate reset port.
In Cat OS this reset port is
The reset port is (by default) a 802.1q trunk port of all vlans.
So the IDSM-2 should be able to monitor with either VACL Capture or Span and still be able to send TCP Resets to reset the connections.
We have, however, discovered recently that there is one vlan where this does not work. Vlan 1 traffic is not being properly reset. Vlan 1 is being treated differently by the data port monitoring the traffic, and the reset port. One of the ports is using 802.1q trunk headers for vlan 1 while the other port does not. So the resets are being rejected by the switch.
So if you are monitoring on vlan 1 then the resets won't work, but the resets should work for all other vlans.
(This affects only Native IOS).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide