Mode Inline JOINT-2

Hello

I work with the JOINT-2, we have Cisco 6509 with CSM and FWSM, we plan JOINT-2 in Inline mode and now I want to track the traffic that arrives through Interface from outside the context of FW (which is nothing but a VLAN A, B VLAN, Vlan C. on MSFC)

Data flow: JOINT - ISP RTR - internal RTR - FWSM - MSFC CSM.

JOINT version is 5.1 (4) S257.0,.

It will support only two VLANS (IN and OUT) on the access mode.

My problem is that I don't know how to analyze the traffic of 3 numbers of VLANS (A, B, C).

Cisco 6509 - Version 12.2 (18) SXF7,.

You can use the mode to pair for the VLAN inline to monitor traffic entering on VLAN specific. For example

You have VLAN 100 200 and 300 on MSFC that you want to watch inline.

You must configure the VLAN 101 201 and 301 (L2 only) and send the VLAN 100-101 200-201 300-301 to JOINT-2.

You then create pairs VLAN on JOINT-2 module as below

1 pair of VLAN 100-101-1

2 pair of VLAN 200-201-2

3 - VLAN 300-301 - pair 3

Then set over three pairs of virtual sensor and will monitor this traffic for online operation.

Inline VLAN pair mode is based on VLANs, so it doesn't really matter if them VLANS are behind or front of the FWSM.

See you soon,.

Vinod

Tags: Cisco Security

Similar Questions

  • Impossible mode Inline on AIP - SSM

    I try to get my SSM module is running in inline with an ASA5520 mode. In a political configuration service inline mode is selected, however on the IPS says background basket interface Promisicuous.

    Am I missing something obvious?

    Edit:

    The lines of configuration specific all look ok:

    outside-class class-map

    match any

    outside-policy policy-map

    IPS description

    Outdoor category

    IPS inline help

    You encounter a bug in the IDM.

    IDM is incorrectly assuming that the interface is in Promiscuous and promiscuity.

    The sensor itself is considered just an interface monitored rather than online or promiscuity. Each package will have a header attached by the ASA that determines whether or not the packet should be monitored inline or promiscuity.

    This is fixed in IDM then she calls it just a substantive interface basket instead of incorrectly assume that it's an interface of promiscuity.

  • Traffic is not through the JOINT-2 module in 6509

    Hello

    I have a similar issue when you set up the JOINT-2 in inline mode. My scenario is that I want to deploy mode inline JOINT-2 between two VLANs (vlan 20 and vlan 30). When traffic to vlan 20 vlan 30 and vice versa so I should be spending applied the JOINT-2. I have configured the module time unit (6500 and JOINT-2) according to the cisco configuration guide, but unfortunately it does not work. I don't get the newspaper in the action of JOINT-2 configured on JOINT-2.

    For information and review, I enclose all the config with the snapshots of the IDM.

    config on 6509 switch:

    intrusion detection module 1 management access port - vlan 90

    intrusion detection module 1 data-1 access port - vlan 20

    intrusion detection module 1 data-2 access port - vlan 30

    int vlan 20

    10.20.1.1 Add IP 255.255.255.0

    int vlan 30

    10.30.1.1 Add IP 255.255.255.0

    int vlan 90

    10.90.1.1 Add IP 255.255.255.0

    Please advise.

    Thank you

    Aman

    JOINT is a connection device

    You have configured a different IP subnet on two interfaces VLAN level 3. You must have the same IP subnet on two VLANs (inside the JOINT and METHOD) outside.

    Normally, you will have a layer 3 VLAN for the first VLAN and the second VIRTUAL LAN will not all layer 3 VIRTUAL LAN interfaces, and this is where you put your servers. Traffic would be as such:

    Server 10.20.1.2 (default gateway 10.20.1.1) - VLAN 30 - JOINT - VLAN 20 - SVI VLAN 20 10.20.1.1

    If you need to pass traffic through JOINT between two L3 Lass, you need separate L3 in two VRF Lass, and the two Lass must be in the same IP subnet.

  • IDSM2 on the inline 6500 IOS mode support?

    Hello

    I have a JOINT-2 running IPS5.1 (1 d) (recently updated to 4.x) software that sits on a 6500 IOS.

    The IPS Device Manager shows gi0/7 and gi0/8 as well in Promiscuous mode. There is no option to change the inline mode and pair them up.

    Is it so that JOINT-2 currently supports only Promiscuous mode?

    If so, this module is always as IDS despite the execution of IPS5.1. Is it not? What is the advantage that I get after upgrade from 4.x to 5.1?

    -Vasanth

    There are 2 pieces of the puzzle.

    There is the JOINT-2 version and it takes in charge, but also the native IOS of Cat 6 K version and that it supports.

    Supports the v5.1 (1 d) JOINT-2

    (a) promiscuous mode.

    (b) mode InLine Interface pair (2 interfaces are matched to online tracking) and also

    (c) pair online mode of Vlan (2 VLANS on a single interface is matched for online tracking, you will also see it called inline-on-a-stick)

    But for these features to be used, the code switch must also support the configuration on the side of the switch of the JOINT-2 for each of these 3 features.

    Native versions of IOS prior to 12.2 (18) SXE will only support the Promiscuous on JOINT-2 mode.

    12.2 (18) SXE and later versions support Interface InLine mode on JOINT-2 pair.

    No native IOS version does currently support InLine Vlan pair on JOINT-2 mode (a new versions native IOS with this support is currently in development).

    For inlining (IPS), you need to run a Native IOS version 12.2 (18) SXE and later and on the JOINT-2 run IPS versions 5.1 (or even older 5.0).

    (NOTE: Cat OS 8.5 (1) takes in charge the 3 modes of JOINT-2.) Therefore, if you use cat instead of the native IOS OS, then run version 8.5 (1) to have access to all the features of IPS 5.1 (1) on the JOINT-2)

    If you run a Native IOS version prior to 12.2 (18) SXE and the JOINT-2 then it can run in "Promiscuous" mode even if 5.1 (1) is responsible for the JOINT-2.

    However, even in "Promiscuous" mode the IPS 5.1 (1) software has a few advantages.

    There are several engines and engine parameters are only supported in version 5.1 and not the version 4.0. (So there are several signatures that are either one) not yet created for sensors 4.x, or b) signature 4.x is not as precise as the signature of 5.x in new engines.

    (These new engines are proved invaluable in writing signatures to detect some of the new attacks that came out last year).

    There are of course other benefits:

    For example:

    (1) risk of note to best aid priority to alerts.

    (2) fitlering more flexible mechanism for alerts that allows individual actions of fitlering

    The 2 features above are only 2 of the new features that have been added in 5.0 and 5.1 that apply both of promiscuity and online modes.

  • IDSM2 in inline mode

    Hi all

    There are 2 VLANS configured in the switch of 7600 namely 200 and 300. In order to make the switch to pass these traffic vlan by JOINT (IPS inline mode), the following was configured.intrusion - detection module 2 ports data 1 trunk allowed - vlan 200 300. Apart from that, are there any requirements for the same thing. The IOS in the 7600 switch is 12.2 (18) SXF4.

    Thanking you

    Anantha Subramanian Natarajan

    You can have up to 255 pairs of vlan on Gig0/7 (date-port 1) and a 255 vlan pairs on concert 0/8 (data-port 2).

    But be aware that with version 5.0/5.1 on JOINT 2 JOINT-2 will deal with all these pairs as if they were on the same network. This can lead to confusion on the sensor if the packets are routed and run through 2 or more pairs of vlan inline.

    So if you are going to deploy in situations where routing could cause packets go through more than one pair of vlan inline then I recommend you to run the IPS version 6.0.

    IPS 6.0 can support up to 4 virtual devices. You can have a different configuration of the peg and filter in each virtual sensor.

    If a single deployment of 4 pairs of vlan online you can place a pair of vlan inline in each of the 4 virtual sensors.

    If you deployed more than 4 virtual probe, there was also an additional feature added to IPS 6.0 help manipulate it.

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/csids/csids13/cliguide/clianeng.htm#wp1038004

    You must set the Session TCP tracking Mode "Vlan only" or "Interface and Vlan" and say this track JOINT-2 the TCP Sessions only by pair of vlan inline and avoid the problem with 5.0/5.1.

    Pair Interface InLine mode is very similar to the pair of Vlan InLine. It will pair 2 VLANS.

    The difference is in how to obtain VLAN paired.

    Mode Inline Interface pair you would 0/7 and 8/0 (data port 1 and 2) to access the ports. Each port would be for just a single vlan. Place you 0/7 on a vlan of the pair and place of 0/8 on the second VLAN of the pair. The JOINT-2 would then monitor the traffic between the 2 VLAN just as it does InLine Vlan pair mode. But instead of passed back and forth on 2 VLAN of a single trunk port, they went back between the 2 access ports.

    Since it's access ports, you are limited to only one set of VLANS when you InLine Interface pair mode. While InLine Vlan pair gives you up to 510 vlan pairs.

    So I do not recommend using InLine Interface on JOINT-2 pair Mode.

    FYI: even if it has an advantage when running on a device. And the device can connect between 2 switches (a JOINT-2 can not because it is inside the switch). In this respect between the 2 switches trunk can carry 4094 VLANS. So place a device pair InLine INterface mode between 2 switches in a trunk port has some advantages.

  • How JOINT can monitor interface FWSM

    Hello

    Three VLANs have been affected to the FWSM: 2 (outside), 3 (DMZ) and 4 (on the inside).

    Now, I would like to make an interface in mode inline monitoring traffic entering FWSM inside the interface.

    As the FWSM inside the interface makes sense, how can I set up JOINT monitoring.

    Rgds

    Yes the JOINT will FILL the two VLANS, there will be no ROUTING here since the two VLANS won't be in the same subnet

    You want to assign the sub-inteface 1 you created to the vs0 (virtual sensor). For each new sub-inteface you add (to a physical interface) you need to go and the virtual sensor.

    Just use the GUI, it will do everything very intuitive.

    Concerning

    Farrukh

  • Virtual sensors IPS

    Hello

    1. can I use the sensor default virtual vs0 for incoming traffic on all interfaces.

    2. How can I assign interfaces to the AIP - SSM module.

    3. How can I assign interafces to the JOINT module.

    I'm assuming that the assigned interfaces are those on which inline inspection is carried out.

    The AIP - SSM is not "both" of these modes. This applies only to sensors/JOINT AFAIK.

    The AIP is inwardly 'connected' to the ASA and has only two modes of deployment instead of three, here is a brief description of EAC:

    #Is the AIP - SSM module to operate or be deployed in inline mode or promiscuous?

    * "Promiscuous" mode means that data is copied to the AIP - SSM while ASA passes the original data to the destination. The AIP - SSM in promiscuous mode can be considered an intrusion (IDS) detection system. In this mode, the trigger package (the package that causes the alarm) can still reach the destination. Fleeing can take place and stop the extra packages to reach the destination, but the triggering packet is not stopped.

    * Mode Inline means that the ASA transmits data to the AIP - SSM for inspection. If the data meets the AIP - SSM inspection requirements, data refers to the ASA in order to continue to be processed and sent to the destination. The AIP - SSM mode inline can be considered as a system of prevention of intrusion (IPS). Unlike promiscuous mode, mode inline (IPS) can actually stop the trigger packet to reach the destination.

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00807335ca.shtml

    Concerning

    Farrukh

  • WRE54G - disconnects from the WRT54G

    I am now on my third WRE54G.  The symptoms that are after configuration of the RE, it connects with the router and I am able to PING with and without attached ethernet.  Life is good.   Wireless laptop connects with RE and then crashes after 2 minutes.  A repair the laptop wireless adapter to force it to reconnect to the router (to signal loss).  On a wired desktop I am able to ping without ethernet. Power cycling the RE start the cycle.

    With WPA - PSK AES, channel 11, G-Mode only, 3600 for renewal group, broadcast of the SSID to the coast.  Blue on blue lights all the time.

    After spending the afternoon on the phone with a very patient guy from tech support, we found that the setting MODE on the WRE54G to G-ONLY has been the cause of the problem.  I changed the MODE of JOINT and now the WRE54G and the WRT54G are very happy with each other.

  • Sharing the burden of the IDS/IPS

    Hi experts,

    Since it is possible to implement some IDS features on routers and PIX, along with the ID is, in a network where all 3 of these devices exist, is it interesting to implement some features on routers and PIX IDS?

    And, if so, what factors are to be considered in deciding what signatures are enabled on what device?

    In this type of scenario, which are considered best practices?

    Thank you very much

    It is possible to do what you ask. Note that the signature on the IPS appliance is a bigger, more complete than other devices together. The exact mix depends on your network configuration. I would say a finer granularity of inspection closer you to your network. For example, the PIX can perform basic firewall functions and filter most of the low-level, floods and general port scans probe. Some routers are good for the limitation of the flow, the traffic shaping, etc. Then the IPS can inspect flows coming into this challenge, focusing on all traffic that could hurt you (beyond knocking on your front door of firewall). Of course, this is just a scenario. Some people can't stand not knowing what to try to knock on the front door. Others do not want the hassle of trying to reconstitute the papers from three different pieces of equipment so they put things in different orders, such as IOS IPS, PIX. Another focus of exploration is what device you can use as a blocking device, the PIX or IOS router (or IP addresses in the case of mode inline operation).

    Cisco means the blueprint of network SECURITY as a job, starting point architecture. The entire library of SECURITY white papers can be found here:

    http://www.Cisco.com/en/us/partner/NetSol/ns340/ns394/ns171/ns128/networking_solutions_package.html

  • Bandwidth limitations

    My current setup is two CAT 6500 with 1 JOINT installed in each follow-up networks VIRTUAL by SPAN. My question is what happens when there is say 'too much' traffic? the traffic is not qued is it? or is it left alone to pass. I don't want to introduce any latency/bottlenecks on the network. I can't find the documents on how they react to situations like this. Any help would be great thanks.

    Normally, if the network traffic monitored / flow is high and exceeds the SPAN ability, other traffic flows just, not kept in the queue and delayed then the flow of traffic.

    He is a MAJOR character where it will be only to capture a snapshot to transmit traffic, and it works very well in conjunction with the promiscuous mode of JOINT that monitor traffic in passive mode.

    Passive mode may not drop packets to block an attempt to network intrusion, but can send TCP resets to both sides of the network connection to try to break the connection.

    http://www.Cisco.com/en/us/partner/products/HW/vpndevc/PS4077/products_configuration_guide_chapter09186a008055df92.html#wp1067335

    HTH

    AK

  • Newbie Qustions

    I just got a project which includes the installation and configuration of devices IPS-4240. I used the IPS modules in the ASA devices in the past, but the dedicated devices are new for me. So I really have a few basic questions

    1 are these devices purely IPS, or they perform tasks of IDS so if configured correctly?

    2 - where in the path of data should they be placed, my solution is web hosting with a firewall, load ballancer and IPS?

    3 do not operate devices IPS to L2 or L3?

    The IPS-4240 can be used in conjunction with a derivation of NetOptics or ShoreMicro switch.

    The ByPass switch would be connected inbetween 2 network devices (typically between a firewall or router and a switch).

    Then, there are 2 additional ports on the bypass switch that are then connected to 2 ports of the sensor.

    2 sensor ports must be configured as a pair of InLine Interface.

    If the sensor is in the way of traffic, then traffic from the firewall in the bypass switch will be sent to the probe on the 1st port. The sensor analyzes the packets and transfers on the 2nd port on the bypass switch. The bypass switch passes on the main switch.

    The same for traffic from the main switch.

    The bypass switch transmits packets at the 2nd port of the sensor. Packet is parsed and passed through the 1 port. The bypass switch then passes the packet on the firewall.

    However, if the probe stops passing traffic (sensor loses connection, sensor is turned off or sensor stops just processing for some reason any), then the bypass switch will detect that the traffic to and from the sensor has stopped.

    The bypass switch will then connect the firewall and switch directly to each other and as you say it, it acts like a cable transmission.

    The same happens also if the bypass switch power is lost.

    So for the IPS 4215 IPS-4235, IPS-4250, IPS-4240, IPS-4255 it requires a switch of derivation of NetOptics or ShoreMicro for this feature.

    The IPS-4260 and IPS-4270, however, have this functionality integrated directly into their 4 port copper TX NIC GE so a bypass switch it is not necessary when using these cards. (Ignore the switch always needed for 2 network interface cards GE fiber ports)

    We call the function above material ByPass where avoidance can happen even with loss of power on the sensor.

    The sensor also supports a feature we call SOFTWARE ByPass. With software ByPass the driver for the CARD itself will pass through even the analytical engine should stop analysis for some reason any.

    In most situations the sensor still has the power and the software bypass road takes care to pass traffic through and it is basically just power failure or sensor reboot of the situations in which a hardware bypass feature is used.

    All the sensor platforms are supported by the features of circumvention software.

    Also understand that the sensor supports 3 types of InLine monitoring mode.

    (1) in mode InLine Interface pair where 2 interfaces are paired together for the follow-up online. Hardware bypass switches (or the NIC of ByPass of material in the IPS-4260 and IPS-4270) can be used in mode InLine Interface pair.

    (2) the InLine Vlan pair mode where 2 VLANS on a single interface is paired together for the follow-up online. Because only a single NETWORK adapter is used there is no ByPass material support for InLine Vlan pair mode.

    (3) designated chassis mode InLine for Modules. For our PURPOSE - IPS (module to the router) and AIP - SSM (module for the SAA), it is the chassis configuration (router or ASA) that determines whether a package can be monitored online or not.

    There is no ByPass hardware support for modules.

    HOWEVER, the router and the ASA supported by a configuration "rescue" where if the sensor module fails then the router / ASA is able to continue the traffic passing through even if the sensor module has failed. If the configuration of 'rescue' can be considered the equivalent of the sensor module of the function of derivation of material for devices.

    In all 3 modes of monitoring online above, IPS software does support the functionality of circumvention software.

  • 4240, blocking some of the traffic between the VLANS local

    I have an IPS 4240 in interface mode inline between our firewall switches and kernel in the periphery. This connection is a trunk with 2 port VLAN, lets call them A and b. everything works fine 100% between the VLANS (the firewall makes routing inter - vlan) except for SSH/telnet of VLAN A VLAN B, which is a big problem.

    Everything works fine, including:

    Web/443/TFTP from A to B

    SSH/Telnet from B to a.

    SSH/Telnet to nowhere A share around the world

    SSH/Telnet from other networks to B

    I removed the IPS of the equation, and everything is back to normal, so something must be up with the PPE.

    This is a new deployment... so the sensor uses its default configuration. I don't see anything stuck. About the only thing that has been set up are the interfaces. I tried different values in the field VLAN by default in menu interface configuration does not, and I don't think it's related to the configuration of VLANS since https/web and everything works fine.

    What I'm missing here? Any ideas?

    Thanks AOT

    There were a few [normalizer engine] signatures that will drop the traffic without alerting. I don't know if they still do, but check for active sigs that use the normalizer engine and is not an alert action.

  • you have to turn the standardization IDS engine.

    Hi all.

    I would like to know how can stop us cisco ids engine nomalization? Is this a complicated or not?

    We have a problem when we allow the engine to nomalization of cisco on the ID which is inline mode. part of the asymmetric traffic will be dropped.

    So we'll disable cisco nomalization, now.

    Please give us advice for us.

    Thank you.

    Hi Syjeon,

    You can set the mode of standard-setter for the virtual sensor in question 'Protection of Mode' asymmetric to relax the TCP normalization if the sensor is the asymmetric traffic inspection:

    http://www.Cisco.com/en/us/docs/security/IPS/7.0/Configuration/Guide/CLI/cli_virtual_sensors.html#wp1034136

    You'll want to change the "'-TCP-escape-protection-mode inline" option "strict" to "asymmetric" to each of the virtual sensors see asymmetric traffic. "

    -Justin

  • ASA IPS Test

    If my ASA IPS is in promiscous mode, I can demonstrate block/fall of traffic for any signature?

    I'm sure mode inline, it is possible, but is it possible with promiscous mode because in this mode, the traffic is just duplicated and sent to IPS.

    Clarify the inability of the promiscuous mode to shunt - I don't think it's correct; the two inline and

    modes of promiscuity WILL block offending traffic.

    Cisco has been very explicit in their documentation to describe the mechanics of how promiscuous mode circuit; specifically it will block traffic using the dynamic ACL, but the time is perhaps NOT as robust as the online mode. What they fail to describe, this is exactly how the ACL deny are inserted in the ASA running config. Here, I confess that I need better clarification of Cisco.

    That means some of the traffic will pass before the dynamic ACL is set up, therefore they recommend always online mode that puts the ASA in a locked mode so to speak of the software world where no traffic passes until the SSM returns it to the ASA for the transfer.

  • Can I use a reference WITH clause in a JOIN?

    Is the syntactically correct query?

    WITH abc AS

    (

    SELECT a.col1 d,

    e a.col2

    substr(a.Col1,2) f

    FROM table1 a JOIN

    Table 1 b ON a.col1 = b.col1

    WHERE a.col2! = b.col2

    )

    SELECT id, name, date of birth, ssn

    FROM table3 LEFT OUTER JOIN (SELECT DISTINCT abc.d of ABC WHERE abc.f = 'EF') / * Please note the addition of the WHERE clause in the veiw inline * /.

    ON table3.id = abc.d

    I try to use "abc" with a JOIN. Are there restrictions WITH clause?

    Thank you!

    Post edited by: user11951344

    Hello

    user11951344 wrote:

    I apologize I addded the WHERE clause too in mode inline "abcd" (in your query) to understand the purpose. The purpose of doing an OUTER JOIN of "abc" with table3 is to check the "EF" State = abc.f. Please note the Add where clause to update in my original question now.

    I see the changes, but everything in #5 response still applies.  There is no need to make a join in this case.  The output depends entirely on table3.  You will get the same results no matter what, if anything it either, is in table1, so any reference to table1 does that complicate the query and makes probably slower.

Maybe you are looking for

  • ITunes files is not found

    Recently, I moved my itunes library from the main drive on an external drive. Files moved in all ok but there is an exclamation mark next to most of the files. I know that I can locate individually each of the files, but it will take forever. Is ther

  • Don't Tweet using firefox

    When I try to tweet, I get the message "your account cannot be allowed to perform this action. Please refresh the page and try again." This is using firefox 17.1.1 on a toshiba laptop with Windows 7. It has happened to these days. Just a MS explore -

  • Compaq Presario CQ 57-339wm: windows 7 32/64 repair restore DVD, it can solve problems with HP CC 57-339wm notebook

    Recovery Windows 7 32/64 bit, repair, installation DVD. It can help to solve problems with my PC. If so, how?

  • Legal Affairs and third party security vulnerabilities

    Two Questions: 1 since I installed sp2 my OS is now a fraudulent copy (even if it is bought through Microsoft) and to add insult to injury, my security software does not work properly. Any ideas? 2 why is it always the end-user who is treated like di

  • HP stream 13-c110nr: socket m2 on USB/AUDIO card

    Hello Card USB/AUDIO (partnumber 792769-001), I bought for my HP that has a socket m2.Interface of m2 which is provided by this Council - M.2 SATA, PCIe m2 or M2 USB?Thanks in advance for the answer.