EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Getting Started Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #179 background imageLoading...
Page #179 background image
13-13
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 13 Configuring the AIP SSM
Configuring the AIP SSM
where the class_map_name2 argument is the name of a separate class map on
which you want to perform IPS inspection. See
Step 3 for information about the
command options.
Traffic cannot match more than one class map for the same action type; so if you
want network A to go to sensorA, but want all other traffic to go to sensorB, then
you need to enter the class command for network A before you enter the class
command for all traffic; otherwise all traffic (including network A) will match the
first class command, and will be sent to sensorB.
Step 5 To activate the policy map on one or more interfaces, enter the following
command:
hostname(config-pmap-c)# service-policy policy_map_name [global |
interface interface_ID]
hostname
where policy_map_name is the policy map you configured in Step 2. To apply the
policy map to traffic on all the interfaces, use the global keyword. To apply the
policy map to traffic on a specific interface, use the interface interface_ID option,
where interface_ID is the name assigned to the interface with the nameif
command.
Only one global policy is allowed. You can override the global policy on an
interface by applying a service policy to that interface. You can only apply one
policy map to each interface.
The following example diverts all IP traffic to the AIP SSM in promiscuous mode,
and blocks all IP traffic if the AIP SSM card fails for any reason:
hostname(config)# access-list IPS permit ip any any
hostname(config)# class-map my-ips-class
hostname(config-cmap)# match access-list IPS
hostname(config-cmap)# policy-map my-ips-policy
hostname(config-pmap)# class my-ips-class
hostname(config-pmap-c)# ips promiscuous fail-close
hostname(config-pmap-c)# service-policy my-ips-policy global
The following example diverts all IP traffic destined for the 10.1.1.0 network and
the 10.2.1.0 network to the AIP SSM in inline mode, and allows all traffic through
if the AIP SSM card fails for any reason. For the my-ips-class traffic, sensor1 is
used; for the my-ips-class2 traffic, sensor2 is used.
hostname(config)# access-list my-ips-acl permit ip any 10.1.1.0
255.255.255.0

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals