
10-15
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
78-16527-01
Chapter 10 Configuring Blocking
Configuring Blocking Properties
Step 5
Verify the number of maximum interfaces:
sensor(config-net-gen)#
show settings
general
-----------------------------------------------
log-all-block-events-and-errors: true default: true
enable-nvram-write: false default: false
enable-acl-logging: false default: false
allow-sensor-block: false <defaulted>
block-enable: true <defaulted>
block-max-entries: 250 <defaulted>
max-interfaces: 50 default: 250
master-blocking-sensors (min: 0, max: 100, current: 0)
-----------------------------------------------
Step 6
Return the setting to the default of 250:
sensor(config-net-gen)#
default
max-interfaces
Step 7
Verify the default setting:
sensor(config-net-gen)#
show settings
general
-----------------------------------------------
log-all-block-events-and-errors: true default: true
enable-nvram-write: false default: false
enable-acl-logging: false default: false
allow-sensor-block: false <defaulted>
block-enable: true <defaulted>
block-max-entries: 250 <defaulted>
max-interfaces: 250 <defaulted>
master-blocking-sensors (min: 0, max: 100, current: 0)
----------------------------------------------
Step 8
Exit network access mode:
sensor(config-net-gen)#
exit
sensor(config-net)#
exit
Apply Changes:?[yes]:
Step 9
Press
Enter
to apply the changes or type
no
to discard them.
Configuring Addresses Never to Block
Use the
never-block-hosts
and the
never-block-networks
commands in the service network access
submode to configure hosts and network that should never be blocked.
The following options apply:
•
ip_address
—IP address of the device that should never be blocked.
•
ip_address
/
netmask
—
IP address of the network that should never be blocked. The format for is
A.B.C.D./nn.
You must tune your sensor to identify hosts and networks that should never be blocked, not even
manually, because you may have a trusted network device whose normal, expected behavior appears to
be an attack. Such a device should never be blocked, and trusted, internal networks should never be
blocked.