SSM - ips on asa

2 asa with module ips is in place in our centres. one of the modules in them seem is not present.
However the two s ACLs for ips on primary & secondary the asa have hitcnts increases.
These have been set up by one of my previous colleagues and I am not exposed to things ips.
Appreciate if someone can help me understand why the acl shows hits in asa with no actually present ips & it saves at the present time, if yes how to find them.

I would like to configure IP addresses entirely in the asa elementary school and see its results. Please tell us how this can be done with
all orders to check the configuration, or what else should be configured.

Primary FW:

The Application name of the SSM status Version of the Application of SSM mod
--- ------------------------------ ---------------- --------------------------
1 IPS 2.0000 does not apply S240.0

chk - Ips access-list extended permit ip any a (hitcnt = 2945667)

++++++++++++++++++++

Secondary FW:

The Application name of the SSM status Version of the Application of SSM mod
--- ------------------------------ ---------------- --------------------------

chk - Ips access-list extended permit ip any a (hitcnt = 1984842)

Hello

The switch still works fine because that IPS modules on both the ASAs are "down". In addition, on the secondary if you see hit acl number increasing, there is no packets redirected to IPS modules, as seen in 'show service-policy '.

I don't know why the output of "show the modu" doesn't show any IPS module if we can see in 'show failover' and «modu 1 det» It seems that the IPS in the ASA high school has no images installed on it. Try to put back in place and re-imaging IPS module on the secondary and primary school and see if this helps to raise the status.

http://www.Cisco.com/en/us/docs/security/IPS/7.0/Configuration/Guide/CLI/cli_system_images.html#wp1230355

Thank you and best regards,

Assia

Tags: Cisco Security

Similar Questions

  • The ACE IPS Cisco and Cisco ASA AIP - SSM (IPS)

    Is there a difference between the features offered by the Cisco ACE IPS and Cisco ASA AIP - SSM (IPS) devices?

    Can we do without Cisco ASA AIP - SSM (IPS) of 'only' configuration/implementation Cisco ACE IPS.

    Cisco AVS/ACE emphasis on commissioning and to secure web-based applications. IP addresses do not focus on just the web applications and trying to get the multiple layers of the OSI stack. Consider the IPS as a general practitioner and the ACE/AVS as an eye surgeon, or something :)

    Here is the response from Cisco itself:

    http://www.Cisco.com/en/us/prod/collateral/modules/ps2706/ps6906/prod_qas0900aecd8045867c_ps6492_Products_Q_and_A_Item.html

    Q: how is Cisco AVS Firewall application differs from an intrusion prevention system (IPS)?

    A. IPSs are solid solutions of protection against targeted attacks of known vulnerabilities in major platforms such as Windows, Solaris, Apache or Microsoft Internet Information Services (IIS). Cisco AVS excels to protect against targeted attacks Web sites or enterprise applications. These applications can be built custom internal applications or software vendor. Signatures and security patches are generally not available for these types of applications, and building these security levels in each application, it would be almost impossible.

    Q: how is Cisco AVS Firewall application differs by a network firewall?

    A. The Cisco AVS 3120 and Firewall network such as the Firewall of Cisco PIX® and Cisco ASA 5500 Series Adaptive Security appliances are complementary products. The application Cisco AVS Firewall secures Web applications; excellent network in the network security firewall. and the Cisco AVS provides defense in depth for Web applications.

    Firewall network apply policy networks, IP addresses and ports; they have a wide range of application for many different protocols layer features. The firewall can and will be deployed in many locations, including the edge, edge of the enterprise network, branch, etc. Cisco AVS imposed the policy on data HTTP as URL, headers and parameters. Cisco AVS is deployed in the data center in front of Web applications

    Concerning

    Farrukh

  • Recover password of the IPS module (ASA)

    Dear experts,
     
    I have an ASA 5500 series with AIP SSM (IPS module), the username and password are lost.
     
    According to cisco portal, there are two approaches to recover the password:
    1 using the CLI command: hw-module module reset slot_number password;
    2. with the help of ASDM--> tools--> 'IPS password reset.
     
    Not sure whether the two commands to achieve the same result (retrieve password) or they may have different results (i.e. need to reset the module).
     
    The device is online, reset module is not privileged.
     
    After checking the information from the internet, it offers to reset the IPS module. Any problem will be produced if the IPS module is not reset?

    RDG
     
    Anita

    Hi Anita,.

    You can try using:

    HW-module module slot_number password reset

    Who will reset just the IPS to its default username/password:

    Cisco and cisco

    You can access the ASA CLI IPS:

    session 1

    Then type cisco and cisco (username/password)

    For example, you could add a new password.

    Don't forget to evaluate and select the right answer.

  • IPS of ASA journals collection

    Hello

    How can I collect newspapers of the IPS of the ASA? My firewall is ASA 5515 x, 9.1 (5) with module version IPS 4,0000 E4. Please let me know the commands to view the logs of IPS, also, how can I monitor these logs?

    Kind regards

    Martin

    You must use either:

    a. Device Manager IPS (basically ASDM pointed toward the IPS vs ASA address address and used real time connect to the visualization and the configuraiton)

    (b) IPS Manager Express (keeps newspapers even when not active GUI, allows to manage several IPS), or

    cisco Security Manager.

    The first two are free tools for IPS unique or small facilities, and the third is a licensed - the company-wide product.

  • The AIP - SSM to unused ASA connection interface

    Hi people,

    Perhaps, someone has already raised this issue, but I was unable to find anything relevant. We have an ASA with an unused interface (gig0/3). The sensor of the AIP - SSM is physically connected to this interface with the following IP settings:

    Sensor (192.168.2.2/30,192.168.2.1)---interface ASA (192.168.2.1/30)

    It's basically point to point connectivity, and I can reach the ASA of the sensor and the other way around.

    This design is dictated by the lack of a free port on the switch.

    Technically, it should work without any problems, but I can't seem to be able to reach the sensor. There is a switch between my PC and the sensor and the switch has the corresponding static route added. I can reach the switch sensor.

    Is there a security feature hidden I don't know that prevent communication with the sensor.

    And ACL of the sensor allows the traffic to all networks (0.0.0.0/0)

    With the sensor acl set to 0.0.0.0/0, the sensor must be allowing connectivity.

    You can use the 'View of package' command on the sensor to look at packets on the interface command and control to see if the packets are what makes the sensor.

    You say that you have a static route on your switch for the switch reach your sensor. Do you know if your PC is configured to use the switch as the computer's default router. If the PC is to use a different default router, then the other router should also the static route.

    The other possibility is that the SAA itself can be deny traffic.

    Since this is an ASA connected to the MSS interface, the traffic must be routed through the ASA. Standard firewall rules apply to this traffic. The security level of the interfaces can prevent traffic, and an ACL may be necessary in order to allow the circulation of your PC be routed to the SSM.

    NOTE: If you don't want to have to worry about roads, the other alternative is to make the network between the ASA and SSM to be an isolated network that only 2 machines know.

    You can then use PAT static to map a port on the inside of the ASA interface with the address of the SSM 443 https port and map a second port of the SAA within the interfaces to the address of the SSM SSH port.

    How your home PC would simply plug the ASA IP using these specific ports and the ASA would do the translation of port and transmit on the MSS.

    The SSM address could also be dynamically PAT would have on the SAA within the address, so SSM could start the connection to other machines on the inside network.

    Another alternative if you have addresses available on your inside network IP is to use static NAT instead of PAT. And just go forward and has the ASA statically map an IP network on IP of the SSM on the network that only the ASA and the SSM inside could know.

    In both cases the network between the ASA and SSM would not routable at, and you wouldn't have to worry of reproducing static routes anywhere.

    SIDE NOTE: A separate network for the SSM you Becase you will also need to NAT or PAT address of the SSM for the ASA to outside interface. In this way the SSM will be able to connect to Internet to download cisco.com auto updates, and/or pull overall correlation of servers cisco information. It's probably the same configuration that you would already other internal addresses, and just to be sure, you cover the SSM since you have it on a separate subnet.

  • IPS module - ASA 5585 x

    Dears

    I have set up the module IPS with the Setup command and are initialized, but when I tried to access the IPS via ASA ASDM and save any changes he continues to tell me that I don't have sufficient rights?

    Please check the gasket and advise what causes this case?

    Connect with a user "admin". But there is more "Viewer" - rights for this user. Open a session in the sensor with the default 'cisco' user and the password you provided when you first login and change the user role of the user "admin" to "administrator."

  • the upgrade of IPS chains, ASA-SSM - 10 module

    I'll have a difficult time, the upgrade of the module ASA IPS SSM-10. I down loaded the IPS-GIS-s327-req - e1.pkg to the FTP Win XP (my workstation). The following does not work: http://download-sj.cisco.com/cisco/ciscosecure/ips/6.x/sigup/IPS-sig-S327.readme.txt

    "error: execUpgradeSoftware: connection failed. Any suggestion would be appreciated.

    Also, have you been able to update your signature?

  • Cisco ASA 5520, 8.02, 4GE SSM, IPS?

    I have an ASA 5520 with 4GE SSM module.

    The ASDM, I see IPS basic signatures... anyway to upgrade these signatures, add to, etc.?

    Not really, you must purchase the AIP - SSM module for this.

    Concerning

    Farrukh

  • SSM IPS blocking via ASA

    I've set up my asa ASA a blockage in my ssm10 device. This part works fine. The problem is that I had defined local networks in the area of "never block addresses" configuration. Shortly after, the ASA had actually avoided an address that was part of this configuration of "never block addresses. This work of configuration when using ASA, or it only works for IOS?

    If it doesn't work, the alternative is to write an Action event filter to avoid the block host action?

    When the display must indicate versions of software that you use.

    There is a bug known in 5.1 7 and earlier versions, where the block never does not block of addresses that are in a network address in the red list of never.

    CSCeh83037

    However, this problem has been fixed in the 6.0 before the release of 6.0 (1).

    So if running 5.1, then you are probably on this known issue.

    But if current execution 6.0 maybe it's a new show.

    And as you said by using a filter event Action to prevent demand block in the first place to these addresses is a good workaround. This work around is also listed in the release notes for this bug mentioned above.

  • Updated AIP-SSM-10 on ASA 5510

    Hello

    I want to upgrade the IPS module in an ASA 5510, and I have a few questions. The AIP - SSM is running E3 479.0 1.0000 and I have a valid account of the ORC etc for this.

    1. What is the version of the software on the question of the ASA?
    2. When I look in the software downloads< ips="" there="" are="" .pkg="" and="" .img="" files.="" i="" want="" to="" upgrade="" to="" 6.3(3)e4.="" do="" i="" have="" to="" re-image="" the="" ips="">
    3. AFAIK redefinition to wipe the device so I just reload the config after, right?
    4. I guess I can apply any update after going to E4?
    5. Can you give me links for this upgrade?

    see you soon

    Let me give some clarification on a few points:

    2. There is no need to recreate the image on the device using the .img file.  You can improve the mechanism of maintenance of your existing configuration using the .pkg file.  It is the recommended method for upgrading to Cisco IPS devices/modules.  The .img file to recreate the image should only be used to restore the default device.

    5 here are links for the upgrade of the probe using a .pkg file.  For updates through the IDM user interface:

    http://www.Cisco.com/en/us/docs/security/IPS/6.2/configuration/guide/IDM/idm_sensor_management.html#wp2126670

    For upgrades via the CLI:

    http://www.Cisco.com/en/us/docs/security/IPS/6.2/configuration/guide/CLI/cli_system_images.html#wp1142504

    Another point of clarification; current releases of IPS software supported on the AIP-SSM-10 are (taking into account you are currently running 6.2 (1) E3):

    6.2 (3) E4

    7.0 (4) E4

    You can go directly to each output.

    Scott

  • IPS in ASA 5510 killing upload speed

    I've recently updated by a circuit of ethernet metro 20 MB for a 100 Mb connection.  My ASA 5510 severely limits the my download speed.  I narrowed down it to the IPS module.  If I stop to send traffic to the IPS, I get speeds of download between 50-85 Mbps.  If I start sending through again, my download speeds are between 3-7 Mbps.  In both cases, my speeds range between 70-92 MB/s, so it's really affecting only my upload speed.  Is there anything I can do for my traffic IPS, so I can still use my modules and still take advantage of the speed upload huge we pay for?

    Here is some info from my ASA:

    I am matching all traffic:

    allow traffic_for_ips to access extensive ip list a whole

    Here is my policy and class parameters:

    class-map inspection_default
    match default-inspection-traffic
    class-map-botnet-DNS
    match eq field udp port
    class-map ips_class_map
    corresponds to the traffic_for_ips access list
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the ftp
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    inspect the preset_dns_map dns
    class ips_class_map
    IPS inline help
    botnet-policy policy-map
    botnet-DNS class
    inspect the snoop-filter-dynamic dns
    !
    global service-policy global_policy
    service-policy botnet-policy to the outside interface

    If anyone has any ideas, I'd love to hear them.  Thank you.

    Created: May 13, 2011 18:49 created by: Chevrel, customer Aastha(AACHAUDH,265429) was experiencing slow download speeds (3-7 Mbps) on in ASA 5510 IPS module. Download the range of speeds between 70-92 MB/s

    Used the workaround for the bug No. CSCsv69844 , i.e. to set the depth of Regex to 800000 (Please note that this workaround should not serve with the recommendation and approval of the ATC.)

  • Automatic update AIP-SSM-10 and ASA 5510 (Beginner)

    I see that it is possible to automate the updates of the ASA 5510 and AIP SSM via FTP on my own server. Is it possible to automate the download directly from Cisco.com?

    Thank you!

    Jeremy

    Jeremy, the answer to your question is correct, as far as the Cisco products are concerned. So I wrote a PERL app that does exactly that, and I published an article about it in the June 2007 issue of Sys Admin magazine. Here's the article online: http://www.samag.com/documents/s=10128/sam0706a/0706a.htm

    And it is also on my site, with a tar of scripts to:

    http://www.LHB-consulting.com/pages/apps/index.html

    Good luck.

    -Lisa

  • AIP - SSM upgrade for ASA active / active

    Hello world!

    I need help on improving the aip - ssm modules to E4 on two s asa who are active/active state. I'll be able to do this without downtime? What are the considerations?

    AIPs are independent of the resumption of the SAA, however, the SAA can consider the status of the AIP in passage of failover, which means it can failover

    If it detects a module AIP descending on the active device.

    The best method for upgrading in this situation will be the status of active failover Setup for all groups on the SAA primary, then upgrade the AIP of the ASA high school.

    Once the agreement in principle of the school is completely updated and functional, then set all groups to be active with the ASA failover secondary.

    Then the primary AIP.

    Once the primary AIP is completely level and working, you can then restore the status of the ASAs failover, by setting the active failover for the Group on the ASAs specific you want them to be active on...

    Kind regards

  • Monitor IPS Cisco ASA

    Hello

    I have configured the IPS in my ASA 5520, but I can't find my IPS is working or not. The only thing I can see CPU usage in IDM. Can you help me please how I can view the IPS module activity? I have installed IDM & ASDM in my PC.

    Thank you.

    Concerning

    Mauduit

    Please check the Inspection by IDM or IPS CLI (see the virtual sensor stats).

    Using the "show stats-sensor virtual", it also shows, the number of packets is processed, what signatures are updated with fire, etc..

    Kind regards

    Sawan Gupta

  • SSM - IPS 6.03E1 unwanted blocking

    Hi all

    I do some tests in the laboratory and came across something that is interesting to me:

    I activated sigs 2000 and 2004 to test that the ips inspects traffic and checked the action for these 2 sigs as producealert only. Worked well with sev alert information. However, when the TES to quick raisng SPI begins to block icmp packets, even though the action related to the signature is produced alert. Why the IPS blocks this traffic? I'm missing something here. As always, help is appreciated.

    There is a default event-action-override for deny-package-inline that is added to all events with a side of risk of 90 or higher.

    When you run the Setup program on the sensor, one of the last questions is "parameters of prevention threatens to change by default? [None] ».

    If you answer 'no', then the default value remains active. Your signatures of 2000 and 2004 will generate a risk score greater than 90 if you change high gravity and therefore will be automatically denied.

    If you answer "Yes" then you are provided the option to disable these default settings.

    For this configuration option see step 20 of this article:

    http://www.Cisco.com/en/us/docs/security/IPS/6.2/configuration/guide/CLI/cli_initializing.html#wp1072155

    To learn more about action overrides events refer to:

    http://www.Cisco.com/en/us/docs/security/IPS/6.2/configuration/guide/CLI/cli_event_action_rules.html#wp1085984

Maybe you are looking for