
10-3
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
78-16527-01
Chapter 10 Configuring Blocking
Blocking Prerequisites
Blocking Prerequisites
Before you configure blocking, make sure you do the following:
•
Analyze your network topology to understand which devices should be blocked by which sensor,
and which addresses should never be blocked.
Caution
Two sensors cannot control blocking on the same device. If this situation is needed, configure one sensor
as the master blocking sensor
to manage the devices and the other sensors can forward their block
requests to the master blocking sensor. For the procedure, see
Configuring the Sensor to be a Master
Blocking Sensor, page 10-25
.
•
Gather the usernames, device passwords, enable passwords, and connections types (Telnet or SSH)
needed to log in to each device.
•
Know the interface names on the devices.
•
Know the names of the Pre-Block ACL or VACL and Post-Block ACL or VACL if needed.
•
Understand which interfaces should and should not be blocked and in which direction (in or out).
You do not want to accidentally shut down an entire network.
Supported Blocking Devices
By default, Network Access Controller supports up to 250 devices in any combination. The following
devices are supported by Network Access Controller:
•
Cisco series routers using Cisco IOS 11.2 or later (ACLs):
–
Cisco 1600 series router
–
Cisco 1700 series router
–
Cisco 2500 series router
–
Cisco 2600 series router
–
Cisco 2800 series router
–
Cisco 3600 series router
–
Cisco 3800 series router
–
Cisco 7200 series router
–
Cisco 7500 series router
•
Catalyst 5000 switches with RSM with IOS 11.2(9)P or later (ACLs)
•
Catalyst 6500 switches and 7600 routers with IOS 12.1(13)E or later (ACLs)
•
Catalyst 6500 switches 7600 routers with Catalyst software version 7.5(1) or later (VACLs)
–
Supervisor Engine 1A with PFC
–
Supervisor Engine 1A with MSFC1
–
Supervisor Engine 1A with MFSC2
–
Supervisor Engine 2 with MSFC2
–
Supervisor Engine 720 with MSFC3