cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
982
Views
3
Helpful
1
Replies

Verify IPS setup

Heath Mote
Level 1
Level 1

I am very new to the Cisco IPS front and have setup a ASA 5510 with the SSM-10 IPS module.  We have one interface enabled with multiple VLANs on this interface.  I have setup the IPS, to the best of my abilities, and I believe it is correct as inline fail open in an active/standby asa setup.  Is there any way to verify that traffic is flowing properly to this IPS module?  Also, the reason I mentioned out setup is because this IPS version, as I understand it, will not allow for VLAN pairs, so when I set the policy to inspect all traffic, is this traffic inspected between all VLANs.  One other mystery is that when I view my IPS interfaces (one management and one not)  the one that is not setup as management is showing unpaired.

I know this was a lot, so let me recap:

- How do I verify my setup is functioning as inteded where all traffic between all VLANs is being inspected.                 

- Why is my non-management interface showing "unpaired"

- Looking through all the Cisco documentation, I noticed mention of "contexts"; I don't see any reference to these contexts within the IDM.  This is just for my knowledge, but maybe necessary for the setup...I just don't know. 

Thanks!

1 Accepted Solution

Accepted Solutions

Eddy Duran
Level 1
Level 1

Hello Heat Mote,

Regarding your questions:

- How do I verify my setup is functioning as inteded where all traffic between all VLANs is being inspected?

Since you are using an IPS module,  the traffic matched by the class configued on the ASA is the one being inspected, you can set up a capture on the dataplane Interface (Interface used to send traffic from the ASA to IPS) using this command:

capture ips int asa_dataplane buffer 15000000

Verify the capture by using:

show capture ips

The output should display packets from every VLAN.

- Why is my non-management interface showing "unpaired"?

The ASA IPS modules (ASA 5500 AIP SSM, ASA 5500-X IPS SSP, and ASA 5585-X IPS SSP) do not support inline VLAN pairs.

You can associate VLANs in pairs on a physical interface. This is known as inline VLAN pair mode. Packets received on one of the paired VLANs are analyzed and then forwarded to the other VLAN in the pair. Since the module only has one sensing interface, that is why it is shown as Unpaired.

The documentation is talking about "security contexts". You can partition a single ASA into multiple virtual devices, known as security contexts. Each context is an independent device, with its own security policy, interfaces, and administrators. Multiple contexts are similar to having multiple standalone devices. Many features are supported in multiple context mode, including routing tables, firewall features, IPS, and management.

Please rate the answer if you find it useful.

View solution in original post

1 Reply 1

Eddy Duran
Level 1
Level 1

Hello Heat Mote,

Regarding your questions:

- How do I verify my setup is functioning as inteded where all traffic between all VLANs is being inspected?

Since you are using an IPS module,  the traffic matched by the class configued on the ASA is the one being inspected, you can set up a capture on the dataplane Interface (Interface used to send traffic from the ASA to IPS) using this command:

capture ips int asa_dataplane buffer 15000000

Verify the capture by using:

show capture ips

The output should display packets from every VLAN.

- Why is my non-management interface showing "unpaired"?

The ASA IPS modules (ASA 5500 AIP SSM, ASA 5500-X IPS SSP, and ASA 5585-X IPS SSP) do not support inline VLAN pairs.

You can associate VLANs in pairs on a physical interface. This is known as inline VLAN pair mode. Packets received on one of the paired VLANs are analyzed and then forwarded to the other VLAN in the pair. Since the module only has one sensing interface, that is why it is shown as Unpaired.

The documentation is talking about "security contexts". You can partition a single ASA into multiple virtual devices, known as security contexts. Each context is an independent device, with its own security policy, interfaces, and administrators. Multiple contexts are similar to having multiple standalone devices. Many features are supported in multiple context mode, including routing tables, firewall features, IPS, and management.

Please rate the answer if you find it useful.

Review Cisco Networking for a $25 gift card