4240 IPS blocking queries with Pix 515E

I have activated the lock on the 4240 and put locking as our Pix 515E. When I look at the Configurations of Signature quite a few Signature Actions are set to alert only produce. If blocking is enabled you also go and the Actions of signing the Deny value or TCP Reset? So far my attackers show dosen't IPS refused and he detected the high level of traffic which I assume must now be blocked. Thanks John

Yes, go under the signatures that you want and enable blocking for them as an action. Globally blocking configuration (setting the blocking device, the interface, the connection of the device information, etc.), does not actually blocked on the sensor itself, we must still go and activate the blocking of this particular signature. When this particular GIS fires in the future, the sensor it will block on the device that you configured.

Be very careful with blocking, the reason that we're not blocking simply all the signatures, it is that it would be very dangerous to blindly add access lists to a device that will stop traffic. You must first make sure that you don't get any number of false positives on the signatures and end up blocking valid traffic. In addition, on a busy sensor you could easily overrun detector and locking to writing and deleting 1000's of top access lists. And finally, although probably not, blocking can even be used as an attack denial of service, where an attacker, if they know what signatures you block, can usurp packages past your sensor so that it denies traffic to our legitimate guests.

You have to look at what signatures you really want to block, and then enable blocking on them individually.

Tags: Cisco Security

Similar Questions

  • VPN with ASA 5500 VPN with PIX 515E vs

    I wonder what are the differences between the use of an exisitng PIX 515E for VPN remote users as appossed to acquire an ASA 5500 VPN remote users? Information or advice are appreciated to help me lean toward one or the other.

    Craig

    According to the version of the code that you run on the PIX on the PIX or ASA VPN features must be the same. So if the choice is not based on differences in features, what else would help guide the choice? You can consider if the existing PIX has sufficient resources to add the extra processing VPN load or if you should put that on another box. You might consider that the PIX is an older product range, and his end is near, while the ASA is the product that is the strategic replacement for the PIX. Given a choice I probably prefer to use a technology newer than the old technology. I also believe that the ASA will give you more choice of technology to go forward (a way of better growth) while the PIX provides current capacity but no path of growth.

    On the other hand, there is the aspect of consider that using the existing PIX does not need not to buy something new and ASA would be an expense you have to cover in the budget. And for some people the budget constraint is an important consideration.

    HTH

    Rick

  • Problem of NAT with PIX 515E

    I configured a PIX 515E, OS 7.0 (1) f? PAT r dynamic of the inside of the network to the external ip address of the PIX. I also configured for icmp access lists from inside to outside and inside. All traffic (www, dns, ftp, etc.) works very well except ping. Whenever I do a ping from host inside to any address outside, I get the following error messages:

    6. August 24, 2006 11:10:52 | 609002: duration of disassembly-outside local host: 193.222.224.104 0:00:10

    6. August 24, 2006 11:10:52 | 302021: connection of disassembly ICMP for faddr gaddr laddr 8994/FDFR001 212.203.90.59/9 193.222.224.104/0

    6. August 24, 2006 11:10:50 | 302021: connection of disassembly ICMP for faddr 193.222.224.104/0 gaddr 212.203.90.59/8 laddr FDFR001/8993

    4. August 24, 2006 11:10:50 | 106023: Deny icmp src, dst outside: 193.222.224.104 inside: 212.203.90.59 (type 0, code 0) by access-group "outside_access_in".

    6. August 24, 2006 11:10:50 | 302020: ICMP connection built for faddr gaddr laddr 8994/FDFR001 212.203.90.59/9 193.222.224.104/0

    6. August 24, 2006 11:10:48 | 302021: connection of disassembly ICMP for faddr 193.222.224.104/0 gaddr 212.203.90.59/7 laddr FDFR001/8992

    4. August 24, 2006 11:10:48 | 106023: Deny icmp src, dst outside: 193.222.224.104 inside: 212.203.90.59 (type 0, code 0) by access-group "outside_access_in".

    6. August 24, 2006 11:10:48 | 302020: ICMP connection built for faddr 193.222.224.104/0 gaddr 212.203.90.59/8 laddr FDFR001/8993

    6. August 24, 2006 11:10:46 | 302021: connection of disassembly ICMP for faddr 193.222.224.104/0 gaddr 212.203.90.59/6 laddr FDFR001/8991

    4. August 24, 2006 11:10:46 | 106023: Deny icmp src, dst outside: 193.222.224.104 inside: 212.203.90.59 (type 0, code 0) by access-group "outside_access_in".

    6. August 24, 2006 11:10:46 | 302020: ICMP connection built for faddr 193.222.224.104/0 gaddr 212.203.90.59/7 laddr FDFR001/8992

    6. August 24, 2006 11:10:44 | 302021: connection of disassembly ICMP for faddr 193.222.224.104/0 gaddr 212.203.90.59/5 laddr FDFR001/8990

    4. August 24, 2006 11:10:44 | 106023: Deny icmp src, dst outside: 193.222.224.104 inside: 212.203.90.59 (type 0, code 0) by access-group "outside_access_in".

    6. August 24, 2006 11:10:44 | 302020: ICMP connection built for faddr 193.222.224.104/0 gaddr 212.203.90.59/6 laddr FDFR001/8991

    4. August 24, 2006 11:10:42 | 106023: Deny icmp src, dst outside: 193.222.224.104 inside: 212.203.90.59 (type 0, code 0) by access-group "outside_access_in".

    6. August 24, 2006 11:10:42 | 302020: ICMP connection built for faddr 193.222.224.104/0 gaddr 212.203.90.59/5 laddr FDFR001/8990

    6. August 24, 2006 11:10:42 | 609001: built outside local host: 193.222.224.104

    What could be the problem?

    Thank you, Meg

    It's only to predict the responses of echo at all on the external interface. If you do the following ACL on the outside, it should work...

    outside_access_in list extended access permit icmp any any echo response

  • PIX-515E-R-BUN MEM upgrade with PIX-515-MEM-32

    Hi all

    is it maybe possible to upgrade the PIX 515E - r

    with this release of PIX-515-MEM-32, without having to pay

    for all PIX-525-SW-R-UR = update license.

    Concerning

    Richard

    The PIX will recognize this new memory but the configuration is not supported. The upgrade of UR's memory, but also an update of license for several interfaces, failover, etc... Unless you want to add these features to your PIX, it is not necessary to upgrade memory. 32 MB is more than enough for a PIX 515R.

    Does that help?

    Scott

  • UAL IP on a PIX 515E with 6.2 (2)

    Sorry, I have not found this in a search. I need to understand how to connect what specific host IPs access only. I have a 6.2 (2) running of PIX 515E and no other devices to use for this - no router, etc., nor lead us auth servers. I have used the parameter "log" on router ACL several times but do not see that in this version of PIX. Thanks in advance.

    Hi Brian,.

    The feature of logging for PIX ACL not brought up to version 6.3. The following link has some info on it:

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/PIX/pix_sw/v_63/63rnotes/pixrn63.htm#wp68356

    I'm afraid you will have to upgrade to get this functionality.

    Hope that help - rate pls post if it does.

    Paresh

  • PIX 515E with 7.1 SMTP banner (2) changed to 220 * how to disable the fix?

    We have a PIX 515E firewall and the SMTP banner is changed to 220 *.

    I need to disable this and I can't use the command "no fixup protocol SMTP" as it is not present in 7.1.

    Any suggestions?

    Kind regards

    Keyvan

    This is done under the map class 'class-map inspection_default' in this version of the PIX OS.

    pls rate if useful!

  • Cisco VPN Client Authentication - PIX 515E-UR

    Hi all

    I need your expert help on the following issues I have:

    1. I would like to create more than 1 client VPN on my PIX-515E groups. This is so that I can give a different part of the internal network access to different type of VPN connection. For example, I want a group to have no XAUTH, while the other group must use RADIUS XAUTH. Is it possible for me to do this? I see the PIX automatically enable RADIUS on both groups of VPN clients.

    2. the RADIUS server is a Microsoft ISA with IAS server and it is located on the PIX inside interface. The VPN endpoint is external interface of the PIX. Is there a problem with this Setup? Do I need to have the RADIUS server that is located on the external interface?

    3 can. what command I use to debug RADIUS authentication?

    Thanks in advance for your help.

    Hi vincent,.

    (1) you can use the vpngroup *-authentication server ipaddress to specify the IP address of the Radius Server on a particular group... If you do not specify this, the authentication of the user is made locally... also check for vpngroup * order of user authentication

    (2) there should be no problem with the installation of your... should work fine... If the RADIUS is outdoors, it is subject to many attacks... so have it inside...

    (3) use the "RADIUS session debug" or "debug aaa authentication..."

    I hope this helps... all the best... the rate of responses if found useful

    REDA

  • PIX 515E failover

    I have a pair of PIX 515E (6.3) running in failover mode. They are currently connected to a single chassis base. We are upgrading our network with the heart, dual 6500's. Is there a way to connect each PIX to a separate kernel (1 PIX - Core1, PIX 2 - Core2) to allow a failure of the base?

    Core 1 and Core 2 will have a L2 link between them. If the current active PIX is connected to Core1 and Core 1 dies, this would not lead to support PIX failover. All LAN traffic would go through Core 2, but since he does not have an active path to the active PIX 1, traffic would drop. My reasoning is correct?

    Is there a way to connect the PIX to two cores running V6.3?

    Hello

    If you use the cable-based failover, you can change the basis of LAN failover.

    Read http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/failover.html#wp1024836

    I hope this helps.

    Best regards.

    Massimiliano.

  • Cisco VPN Client behind PIX 515E,-> VPN concentrator

    I'm trying to configure a client as follows:

    The user is running Cisco VPN Client 4.0. They are behind a 6.1 PIX 515E (4), and I need to connect to a VPN concentrator located outside of our network. We use PAT for address translation. As far as I know, to allow ipsec through Firewall 1 tunnel, I need to upgrade the pix to 6.3 and activate "fixup protocol esp-ike.

    Is there another way to do this? I am also curious to know how much more easy/better this will work if we were dealing with pptp.

    You don't necessarily need to fixup protocol esp-ike active. The remote Hub there encapsulation NAT - T enabled so that clients behind the NAT can run?

  • PIX 515E and remote access VPN

    I use a PIX 515E with: ASDM Version: 5,0000 51 PIX Version: 8.0 (4) and configure it with remote access VPN.

    I would like to get an email every time that a user login (and or disconnection) to the VPN. Remote clients use the Cisco VPN Client.

    Any help is appreciated,

    Hello

    Here is a link to the email configuration when you log in to the ASA/PIX: http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#anc7

    Then you can create a list of message to send the logs only for the connection/disconnection of the VPN user: http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#anc18

    There is a wire that is linked here: https://supportforums.cisco.com/discussion/10798976/asa-email-logging-issue

  • Question of PIX 515E

    Hi all

    We just bought a PIX 515E and try to use it, but got a number of questions. Here's the NVA of show:

    PIX-151st #show version

    Cisco PIX Firewall Version 6.3 (1)

    Cisco PIX Device Manager Version 3.0 (1)

    Updated Thursday 19 March 03 11:49 by Manu

    PIX-515E up to 5 hours and 15 minutes

    Material: PIX-515E, 64 MB RAM, Pentium II 433 MHz processor

    Flash E28F128J3 @ 0 x 300, 16 MB

    BIOS Flash AM29F400B @ 0xfffd8000, 32 KB

    0: ethernet0: the address is 000f.2457.4b12, irq 10

    1: ethernet1: the address is 000f.2457.4b13, irq 11

    Features licensed:

    Failover: enabled

    VPN - A: enabled

    VPN-3DES-AES: enabled

    Maximum Interfaces: 6

    Cut - through Proxy: enabled

    Guardians: enabled

    URL filtering: enabled

    Internal hosts: unlimited

    Flow: IKE peers unlimited: unlimited

    This PIX has a failover license only (FO).

    Problem is that we cannot ping inner harbor, if we do not switch light, but this is a unique machine. Here's another message once we turn on the switch:

    PIX-515E # config t

    WARNING *.

    Configuration of replication is NOT performed the unit from standby to Active unit.

    Configurations are no longer synchronized.

    PIX-515e (config) #.

    Please help solve this problem. I wonder if we buy the wrong license? Thank you very much.

    you have in your possession a PIX failover. That's why says in the "sh run".

    This device is intended to be used only as a failover for a live device. It will work as a live PIX, but behave badly. It is cheaper than a PIX with an unrestricted license, as it is not intended to be used as a standalone device. Check with the one that you bought to get the situation sorted.

    Good luck

    Steve

  • ASDM 5.02 on PIX-515E

    When I use ASDM to administer my PIX-515E (v7.0), I get messages from 2 following error if I update the screen after being inactive in the session for about 2-3 minutes about:

    Error message 1

    ASDM is temporarily unable to communicate with the firewall.

    Error message 2

    ASDM is unable to reach the PIX. Please check the configuration and your connection and try again by clicking the Refresh button.

    These messages were recently and I don't know why. Is there an ASDM idle session time-out setting? I could not found.

    Thank you

    Bill Fanning

    Hello

    What version of Java are you using. If you have Java 1.6, can you go back to 1.5 and see if the problem goes away.

    Also, here is the URL indicating the operating system for client PC and browser requirements

    http://www.Cisco.com/en/us/partner/docs/security/ASA/asa70/asdm50/release/notes/RN505.html#wp231810

    I hope it helps.

    Kind regards

    Arul

    * Please note all useful messages *.

  • PIX 515e Install

    I am installing a PIX 515e with an ADSL router. I have all the IP addresses for the router etc. I'm trying to connect to a network on the interface internal of the PIX. (Please bare with me as I am new on the firewall!)

    I ping the network firewall, but I can not access to the internet. The initial configuration for the PIX documentation implies that by default, it has access form the firewall but no! I'm obviously missing something here, i.e. of Thompson the network to route requests through the firewall interent! ???

    Sorry to be so simplistic but I'm learning all the time!

    Thanks for any help.

    Robin

    After you enter the acl to allow ping, can you ping now?

    Watch newspaper reveal something?

    For DNS and testing, create a static on the PIX for your DNS server. For example "x.x.x.x (indoor, outdoor) static 192.168.0.x netmask 255.255.255.255" where x.x.x.x is a public IP address and 192.168.0.x is your dns server. Then let the outside to your DNS server dns - "access-list 101 permit host udp/tcp host x.x.x.x eq 53 z.z.z.z ' where z.z.z.z is a public dns server (or use one for testing) and x.x.x.x IP NAT'ed to your dns server. See what is happening, look in your journal.

    What version of PIX you run.

    Let know use.

    Steve

  • Using PIX 515E configuration require

    Dear all,

    Hi.Actually I need help for PIX 515E.Pls. check out the scenario, design & suggest?

    Pls. find the details following and configuration of VLAN attached router.

    # I want to put as

    «Spend my LAN on CISCO 2900 (range 172.16.29.X IP...» (25 PCs) - VLAN router - CISCO PIX - ISP public IP.

    # Now it's

    "My LAN on CISCO 2900 - VLAN (external) router - ISP.

    Details of router & PIX:

    #Router inside the IP - 172.16.29.1 (inside property intellectual as it is very critical that cannot be changed)

    Outdoor #Router ip - what ip should I use? (I tried with 1.1.1.1 255.255.255.0)

    #PIX outside intellectual property - what ip should I use? (My ISP IP?-j' tried with 208.144.230.197 which is currently outside of my router)

    #PIX within the intellectual property - what ip should I use? (I tried with 1.1.1.2 255.255.255.0)

    Connection ISP #My is directly from the ISP GW to an ethernet cat 5 on my router VLAN

    #I would allow www, FTP, web-based like Yahoomail... etc... & Messenger services

    VLAN router Config:

    Current configuration: 1028 bytes

    !

    version 12.3

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    hostname VLANRouter

    !

    boot-start-marker

    boot-end-marker

    !

    activate the gcsroot password

    !

    No aaa new-model

    IP subnet zero

    !

    !

    no record of conflict ip dhcp

    DHCP excluded-address IP 172.16.29.1 172.16.29.240

    DHCP excluded-address IP 172.16.29.250 172.16.29.254

    !

    IP dhcp pool dhcppool

    network 172.16.29.0 255.255.255.0

    DNS-server 208.144.230.1 208.144.230.2

    router by default - 172.16.29.1

    !

    !

    !

    !

    controller E1 0/0

    !

    controller E1 0/1

    !

    !

    interface FastEthernet0/0

    IP 208.144.230.197 255.255.255.224

    NAT outside IP

    automatic duplex

    automatic speed

    !

    interface FastEthernet0/1

    IP 172.16.29.1 255.255.255.0

    IP nat inside

    automatic duplex

    automatic speed

    !

    IP nat inside source list 7 interface FastEthernet0/0 overload

    IP http server

    IP classless

    IP route 0.0.0.0 0.0.0.0 208.144.230.200

    !

    !

    access-list 7 permit 172.16.29.0 0.0.0.255

    !

    Line con 0

    line to 0

    line vty 0 4

    opening of session

    !

    !

    !

    end

    All advice is appreciated.

    Kind regards

    Hiren s Mehta.

    ORG Informatics Ltd.

    Bamako, MALI

    AFRICA

    Hi hiren,.

    See the answers below:

    #Router inside the IP - 172.16.29.1 (inside property intellectual as it is very critical that cannot be changed)

    When you upgrade the PIX router inbetween and your switch, you must put the PIX inside IP like 172.16.29.1 and change the router within the subnet to someother pool. Do the PAT on the PIX, rather than the router.

    Outdoor #Router ip - what ip should I use? (I tried with 1.1.1.1 255.255.255.0)

    Router outside the property intellectual property will be that given by the ISP... The ISP would have given a public IP address for the WAN link. This cannot be changed.

    #PIX outside intellectual property - what ip should I use? (My ISP IP?-j' tried with 208.144.230.197 which is currently outside of my router)

    PIX outside IP must be comprehensive. ISP would have given you a LAN subnet. Use it. In this case, inside the interface of the router has an IP address from that subnet even...

    #PIX within the intellectual property - what ip should I use? (I tried with 1.1.1.2 255.255.255.0)

    PIX inside must be 172.16.29.1, which will be the default gateway for all PCs. If you change this subnet, then the PC should have an IP address on the same subnet that has decided.

    Connection ISP #My is directly from the ISP GW to an ethernet cat 5 on my router VLAN

    didn't get it... is that on the internet router or switch?

    #I would allow www, FTP, web-based like Yahoomail... etc... & Messenger services

    If all these must be permitted from inside to outside, you have not open anything... by default, all traffic to the inside outside is allowed (except if you put a list of access denied)...

  • Limited SMTP outgoing with PIX

    I want to restrict SMTP out to our mail server in the DMZ. We have a PIX 515E between our internal network and an external router 2650. I want to restrict all machines except the sending SMTP outgoing mail server but always allow SMTP to the mail server. As the PIX only supports the inbound ACL that I have to configure the ACL on the external router or is there a way of WHAT PIX for this? Thank you.

    If the SMTP box is on the DMZ of the 515e int, you can write an ACL for indoor int the 515e that blocks all the tcp any any EQ 25.

    That's assuming that you do not use SMTP from the client PC to the e-mail server in dmz, if you start the acl by a statement authorizing the smtp to smtp server traffic and the following statement must be a refusal all to smtp 25.

    Finally, if you do not have an existing ACL inside int, probably have an ip address allowed any any statement to permit all other traffic to proceed

Maybe you are looking for