22-8
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 22 Managing the AIP SSM and CSC SSM
Managing the AIP SSM
Diverting Traffic to the AIP SSM
To identify traffic to divert from the adaptive security appliance to the AIP SSM, perform the following
steps. In multiple context mode, perform these steps in each context execution space.
Step 1
To identify the traffic that you want to be inspected by the AIP SSM, add one or more class maps using
the
class-map
command according to the
“Creating a Layer 3/4 Class Map for Through Traffic” section
on page 21-3
.
For example, you can match all traffic using the following commands:
hostname(config)#
class-map IPS
hostname(config-cmap)#
match any
To match specific traffic, you can match an access list:
hostname(config)#
access list IPS extended
permit ip any 10.1.1.1 255.255.255.255
hostname(config)#
class-map IPS
hostname(config-cmap)#
match access-list IPS
Step 2
To add or edit a policy map that sets the action to divert traffic to the AIP SSM, enter the following
commands:
hostname(config)#
policy-map
name
hostname(config-pmap)#
class
class_map_name
hostname(config-pmap-c)#
where the
class_map_name
is the class map from
Step 1
.
For example:
hostname(config)#
policy-map IPS
hostname(config-pmap)#
class IPS
Step 3
To divert the traffic to the AIP SSM, enter the following command:
hostname(config-pmap-c)#
ips
{
inline
|
promiscuous
} {
fail-close
|
fail-open
} [
sensor
{
sensor_name
|
mapped_name
}]
where the
inline
and
promiscuous
keywords control the operating mode of the AIP SSM. See the
“Operating Modes” section on page 22-2
for more details.
The
fail-close
keyword sets the adaptive security appliance to block all traffic if the AIP SSM is
unavailable.
The
fail-open
keyword sets the adaptive security appliance to allow all traffic through, uninspected, if
the AIP SSM is unavailable.
If you use virtual sensors on the AIP SSM, you can specify a sensor name using the
sensor
sensor_name
argument. To see available sensor names, enter the
ips ... sensor ?
command. Available sensors are
listed. You can also use the
show ips
command. If you use multiple context mode on the security
appliance, you can only specify sensors that you assigned to the context (see the
“Assigning Virtual
Sensors to Security Contexts” section on page 22-6
). Use the
mapped_name
if configured in the context.
If you do not specify a sensor name, then the traffic uses the default sensor. In multiple context mode,
you can specify a default sensor for the context. In single mode or if you do not specify a default sensor
in multiple mode, the traffic uses the default sensor that is set on the AIP SSM. If you enter a name that
does not yet exist on the AIP SSM, you get an error, and the command is rejected.
Step 4
(Optional) To divert another class of traffic to the AIP SSM, and set the IPS policy, enter the following
commands:
hostname(config-pmap-c)#
class
class_map_name2
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......