23-18
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 23 Preventing Network Attacks
Configuring IP Audit for Basic IPS Support
TCP out 64.101.68.161:4300 in 10.86.194.60:23 idle 0:00:00 bytes 1297 flags UIO
Step 2
To shun connections from the source IP address, enter the following command:
hostname(config)#
shun
src_ip
[
dst_ip src_port dest_port
[
protocol
]] [
vlan
vlan_id
]
If you enter only the source IP address, then all future connections are shunned; existing connections
remain active.
To drop an existing connection, as well as blocking future connections from the source IP address, enter
the destination IP address, source and destination ports, and the protocol. By default, the protocol is 0
for IP.
For multiple context mode, you can enter this command in the admin context, and by specifying a
VLAN ID that is assigned to an interface in other contexts, you can shun the connection in other
contexts.
Step 3
To remove the shun, enter the following command:
hostname(config)#
no shun
src_ip
[
vlan
vlan_id
]
Configuring IP Audit for Basic IPS Support
The IP audit feature provides basic IPS support for a security appliance that does not have an AIP SSM.
It supports a basic list of signatures, and you can configure the security appliance to perform one or more
actions on traffic that matches a signature.
To enable IP audit, perform the following steps:
Step 1
To define an IP audit policy for informational signatures, enter the following command:
hostname(config)#
ip audit name
name
info
[
action
[
alarm
] [
drop
] [
reset
]]
Where
alarm
generates a system message showing that a packet matched a signature,
drop
drops the
packet, and
reset
drops the packet and closes the connection. If you do not define an action, then the
default action is to generate an alarm.
Step 2
To define an IP audit policy for attack signatures, enter the following command:
hostname(config)#
ip audit name
name
attack
[
action
[
alarm
] [
drop
] [
reset
]]
Where
alarm
generates a system message showing that a packet matched a signature,
drop
drops the
packet, and
reset
drops the packet and closes the connection. If you do not define an action, then the
default action is to generate an alarm.
Step 3
To assign the policy to an interface, enter the following command:
ip audit interface
interface_name policy_name
Step 4
To disable signatures, or for more information about signatures, see the
ip audit signature
command in
the
Cisco Security Appliance Command Reference
.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......