SlideShare a Scribd company logo
1 of 70
CCNA Security v2.0
Chapter 5:
Implementing Intrusion Prevention
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
5.0 Introduction
5.1 IPS Technologies
5.2 IPS Signatures
5.3 Implement IPS
5.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Explain zero-day attacks.
• Understand how to monitor, detect and stop attacks.
• Describe the advantages and disadvantages of IDS and IPS.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Advantages of an IDS:
• Works passively
• Requires traffic to be mirrored
in order to reach it
• Network traffic does not pass
through the IDS unless it is
mirrored
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
IPS:
• Implemented in an inline mode
• Monitors Layer 3 and Layer 4
traffic
• Can stop single packet attacks
from reaching target
• Responds immediately, not
allowing any malicious traffic to
pass
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Advantages IDS:
• No impact on network
• No network impact if there is a
sensor failure
• No network impact if there is a
sensor overload
Advantages IPS:
• Stops trigger packets
• Can use stream normalization
techniques
Disadvantages IDS:
• Response action cannot stop
trigger
• Correct tuning required for
response actions
• More vulnerable to network
security evasion techniques
Disadvantages IPS:
• Sensor issues might affect
network traffic
• Sensor overloading impacts the
network
• Some impact on network
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 10
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Cisco IPS AIM and Network
Module Enhanced (IPS NME)
Cisco ASA AIP-SSM
Cisco IPS 4300 Series Sensors
Cisco Catalyst 6500 Series IDSM-2
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Factors affecting the IPS sensor selection and deployment:
• Amount of network traffic
• Network topology
• Security budget
• Available security staff to manage IPS
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Inline Mode
Promiscuous Mode
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 17
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Traffic Sniffing Using
a Switch
Traffic Sniffing Using
a Hub
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Cisco SPAN Commands:
• Monitor session command – used to associate a source port and a destination
port with a SPAN session.
• Show monitor command – used to verify the SPAN session.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Upon completion of the section, you should be able to:
• Understand IPS signature characteristics
• Explain IPS signature alarms
• Manage and monitor IPS
• Understand the global correlation of Cisco IPS devices
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 22
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
A signature is a set of rules that an IDS and an IPS use to detect typical
intrusion activity.
Signatures have three distinct attributes:
• Type
• Trigger (alarm)
• Action
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Signatures are categorized as either:
• Atomic – this simplest type of signature consists of a single packet, activity, or
event that is examined to determine if it matches a configured signature. If
yes, an alarm is triggered and a signature action is performed.
• Composite – this type of signature identifies a sequence of operations
distributed across multiple hosts over an arbitrary period of time.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
• As new threats are identified, new signatures must be created and
uploaded to an IPS.
• A signature file contains a package of network signatures.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Cisco IOS defines five micro-engines:
• Atomic – Signatures that examine simple packets.
• Service – Signatures that examine the many services that are attacked.
• String - Signatures that use regular expression-based patterns to detect
intrusions.
• Multi-string – Supports flexible pattern matching and Trend Labs signatures.
• Other – Internal engine that handles miscellaneous signatures.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Benefits:
• It uses underlying routing
infrastructure to provide an
additional layer of security.
• It is inline and is supported on a
broad range of routing platforms.
• It provides threat protection at all
entry points to the network when
used in combination with Cisco
IDS, Cisco IOS Firewall, VPN,
and NAC solutions
• The size of the signature
database used by the devices
can be adapted to the amount of
available memory in the router.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Understanding Alarm Types:
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Summary of Action Categories:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Generating an Alert:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Logging the Activity:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Dropping or Preventing the Activity:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Resetting the Connection and Blocking the Activity:
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 41
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
IPS Planning and Monitoring Considerations:
• Management method
• Event correlation
• Security staff
• Incident response plan
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 46
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Goals of global correlation:
• Dealing intelligently with alerts to improve effectiveness
• Improving protection against known malicious sites
• Sharing telemetry data with the SensorBase Network to improve visibility of
alerts and sensor actions on a global scale
• Simplifying configuration settings
• Automatic handling of security information uploads and downloads
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Network participation gathers the following data:
• Signature ID
• Attacker IP address
• Attacker port
• Maximum segment size
• Victim IP address
• Victim port
• Signature version
• TCP options string
• Reputation score
• Risk rating
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Upon completion of this section, you should be able to:
• Understand how to configure Cisco IOS IPS with CLI
• Explain how to verify and monitor IPS
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 53
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Step 1. Download the IOS IPS files.
Step 2. Create an IOS IPS configuration directory in Flash.
Step 3. Configure an IOS IPS crypto key.
Step 4. Enable IOS IPS.
Step 5. Load the IOS IPS signature package to the router.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Retiring an Individual Signature:
Retiring a Signature Category:
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 62
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 64
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Show commands to verify the IOS IPS configuration:
• show ip ips
• show ip ips all
• show ip ips configuration
• show ip ips interfaces
• show ip ips signatures
• show ip ips statistics
Clear commands to disable IPS:
• clear ip ips configuration
• clear ip ips statistics
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Chapter Objectives:
• Describe IPS technologies and how they are implemented.
• Explain IPS Signatures.
• Describe the IPS implementation process.
Thank you.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
• Remember, there are
helpful tutorials and user
guides available via your
NetSpace home page.
(https://www.netacad.com)
• These resources cover a
variety of topics including
navigation, assessments,
and assignments.
• A screenshot has been
provided here highlighting
the tutorials related to
activating exams, managing
assessments, and creating
quizzes.
1
2

More Related Content

What's hot

Ccna security v2 instructor_ppt_ch11
Ccna  security v2 instructor_ppt_ch11Ccna  security v2 instructor_ppt_ch11
Ccna security v2 instructor_ppt_ch11SalmenHAJJI1
 
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9Babaa Naya
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5Babaa Naya
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusRassul Ismailov
 
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Yuichi Ito
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkJeff Squyres
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewallAnwesh Dixit
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMBill McGee
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceAlfredo Boiero Sanders
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.Priyanka Aash
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Infrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and FaultsInfrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and FaultsDiego Kreutz
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services Felipe Lamus
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXCisco Canada
 

What's hot (20)

Ccna security v2 instructor_ppt_ch11
Ccna  security v2 instructor_ppt_ch11Ccna  security v2 instructor_ppt_ch11
Ccna security v2 instructor_ppt_ch11
 
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewall
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 
CV Steve Shawcross
CV Steve ShawcrossCV Steve Shawcross
CV Steve Shawcross
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
 
Infrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and FaultsInfrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and Faults
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Icnd210 s04l02
Icnd210 s04l02Icnd210 s04l02
Icnd210 s04l02
 

Similar to Ccna sv2 instructor_ppt_ch5

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8SalmenHAJJI1
 
It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1newbie2019
 
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8newbie2019
 
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9SalmenHAJJI1
 
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
 
It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11newbie2019
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of TomorrowCisco Canada
 
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxCCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxRichardChecca1
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air ControlEnergySec
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...Mail.ru Group
 
Chapter 4 Network Access
Chapter 4 Network AccessChapter 4 Network Access
Chapter 4 Network Accessnewbie2019
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecRobb Boyd
 
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7newbie2019
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Internet of everything
Internet of everything Internet of everything
Internet of everything Jayesh Pai
 

Similar to Ccna sv2 instructor_ppt_ch5 (20)

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1
 
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8
 
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9
 
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
 
It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptxCCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
 
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxCCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptx
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air Control
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
 
Chapter 4 Network Access
Chapter 4 Network AccessChapter 4 Network Access
Chapter 4 Network Access
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 

Recently uploaded

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 

Ccna sv2 instructor_ppt_ch5

  • 1. CCNA Security v2.0 Chapter 5: Implementing Intrusion Prevention
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 5.0 Introduction 5.1 IPS Technologies 5.2 IPS Signatures 5.3 Implement IPS 5.4 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Explain zero-day attacks. • Understand how to monitor, detect and stop attacks. • Describe the advantages and disadvantages of IDS and IPS.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Advantages of an IDS: • Works passively • Requires traffic to be mirrored in order to reach it • Network traffic does not pass through the IDS unless it is mirrored
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 IPS: • Implemented in an inline mode • Monitors Layer 3 and Layer 4 traffic • Can stop single packet attacks from reaching target • Responds immediately, not allowing any malicious traffic to pass
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Advantages IDS: • No impact on network • No network impact if there is a sensor failure • No network impact if there is a sensor overload Advantages IPS: • Stops trigger packets • Can use stream normalization techniques Disadvantages IDS: • Response action cannot stop trigger • Correct tuning required for response actions • More vulnerable to network security evasion techniques Disadvantages IPS: • Sensor issues might affect network traffic • Sensor overloading impacts the network • Some impact on network
  • 10. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 10
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 Cisco IPS AIM and Network Module Enhanced (IPS NME) Cisco ASA AIP-SSM Cisco IPS 4300 Series Sensors Cisco Catalyst 6500 Series IDSM-2
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Factors affecting the IPS sensor selection and deployment: • Amount of network traffic • Network topology • Security budget • Available security staff to manage IPS
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 Inline Mode Promiscuous Mode
  • 17. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 17
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 Traffic Sniffing Using a Switch Traffic Sniffing Using a Hub
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 Cisco SPAN Commands: • Monitor session command – used to associate a source port and a destination port with a SPAN session. • Show monitor command – used to verify the SPAN session.
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Upon completion of the section, you should be able to: • Understand IPS signature characteristics • Explain IPS signature alarms • Manage and monitor IPS • Understand the global correlation of Cisco IPS devices
  • 22. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 22
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 A signature is a set of rules that an IDS and an IPS use to detect typical intrusion activity. Signatures have three distinct attributes: • Type • Trigger (alarm) • Action
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 Signatures are categorized as either: • Atomic – this simplest type of signature consists of a single packet, activity, or event that is examined to determine if it matches a configured signature. If yes, an alarm is triggered and a signature action is performed. • Composite – this type of signature identifies a sequence of operations distributed across multiple hosts over an arbitrary period of time.
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 • As new threats are identified, new signatures must be created and uploaded to an IPS. • A signature file contains a package of network signatures.
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 Cisco IOS defines five micro-engines: • Atomic – Signatures that examine simple packets. • Service – Signatures that examine the many services that are attacked. • String - Signatures that use regular expression-based patterns to detect intrusions. • Multi-string – Supports flexible pattern matching and Trend Labs signatures. • Other – Internal engine that handles miscellaneous signatures.
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
  • 28. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 28
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33 Benefits: • It uses underlying routing infrastructure to provide an additional layer of security. • It is inline and is supported on a broad range of routing platforms. • It provides threat protection at all entry points to the network when used in combination with Cisco IDS, Cisco IOS Firewall, VPN, and NAC solutions • The size of the signature database used by the devices can be adapted to the amount of available memory in the router.
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 Understanding Alarm Types:
  • 35. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36 Summary of Action Categories:
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37 Generating an Alert:
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38 Logging the Activity:
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39 Dropping or Preventing the Activity:
  • 40. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40 Resetting the Connection and Blocking the Activity:
  • 41. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 41
  • 42. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42 IPS Planning and Monitoring Considerations: • Management method • Event correlation • Security staff • Incident response plan
  • 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
  • 46. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 46
  • 47. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47 Goals of global correlation: • Dealing intelligently with alerts to improve effectiveness • Improving protection against known malicious sites • Sharing telemetry data with the SensorBase Network to improve visibility of alerts and sensor actions on a global scale • Simplifying configuration settings • Automatic handling of security information uploads and downloads
  • 48. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
  • 49. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49 Network participation gathers the following data: • Signature ID • Attacker IP address • Attacker port • Maximum segment size • Victim IP address • Victim port • Signature version • TCP options string • Reputation score • Risk rating
  • 50. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
  • 51. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
  • 52. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52 Upon completion of this section, you should be able to: • Understand how to configure Cisco IOS IPS with CLI • Explain how to verify and monitor IPS
  • 53. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 53
  • 54. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54 Step 1. Download the IOS IPS files. Step 2. Create an IOS IPS configuration directory in Flash. Step 3. Configure an IOS IPS crypto key. Step 4. Enable IOS IPS. Step 5. Load the IOS IPS signature package to the router.
  • 55. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
  • 56. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
  • 57. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
  • 58. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
  • 59. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
  • 60. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
  • 61. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61 Retiring an Individual Signature: Retiring a Signature Category:
  • 62. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 62
  • 63. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
  • 64. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 64
  • 65. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65 Show commands to verify the IOS IPS configuration: • show ip ips • show ip ips all • show ip ips configuration • show ip ips interfaces • show ip ips signatures • show ip ips statistics Clear commands to disable IPS: • clear ip ips configuration • clear ip ips statistics
  • 66. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
  • 67. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
  • 68. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68 Chapter Objectives: • Describe IPS technologies and how they are implemented. • Explain IPS Signatures. • Describe the IPS implementation process.
  • 70. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70 • Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com) • These resources cover a variety of topics including navigation, assessments, and assignments. • A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes. 1 2

Editor's Notes

  1. 5.1.1.1 Zero Day Attacks
  2. 5.1.1.2 Monitor for Attacks
  3. 5.1.1.3 Detect and Stop Attacks
  4. 5.1.1.4 Similarities Between IDS and IPS
  5. 5.1.1.5 Advantages and Disadvantages of IDS and IPS
  6. 5.1.2.1 Host-Based and Network-Based IPS
  7. 5.1.2.2 Network-Based IPS Sensors
  8. 5.1.2.3 Cisco’s Modular and Appliance-Based IPS Solutions, Figures 1 - 4 5.1.2.4 Cisco’s Modular and Appliance-Based IPS Solutions (Cont.)
  9. 5.1.2.5 Choose an IPS Solution
  10. 5.1.2.6 IPS Advantages and Disadvantages
  11. 5.1.2.7 Modes of Deployment
  12. 5.1.3.1 Port Mirroring
  13. 5.1.3.2 Cisco SPAN
  14. 5.1.3.3 Configuring Cisco SPAN Using Intrusion Detection
  15. 5.2.1.1 Signature Attributes
  16. 5.2.1.2 Signature Types
  17. 5.2.1.3 Signature File
  18. 5.2.1.4 Signature Micro-Engines
  19. 5.2.1.5 Acquire the Signature File 5.2.1.6 Activity – Identify IPS Signature Type
  20. 5.2.2.1 Signature Alarm
  21. 5.2.2.2 Pattern-Based Detection
  22. 5.2.2.3 Anomaly-Based Detection
  23. 5.2.2.4 Policy-Based and Honey Pot-Based Detection
  24. 5.2.2.5 Benefits of the Cisco IOS IPS Solution
  25. 5.2.2.6 Alarm Triggering Mechanisms 5.2.2.7 Activity – IPS Signature Alarms
  26. 5.2.3.1 Signature Actions
  27. 5.2.3.2 Manage Generated Alerts
  28. 5.2.3.3 Log Activities for Later Analysis
  29. 5.2.3.4 Deny the Activity
  30. 5.2.3.5 Reset, Block, and Allow Traffic 5.2.3.6 Activity – Identify the IPS Signature Action
  31. 5.2.4.1 Monitor Activity
  32. 5.2.4.2 Monitoring Considerations
  33. 5.2.4.3 Secure Device Event Exchange
  34. 5.2.4.4 IPS Configuration Best Practices
  35. 5.2.5.1 Cisco Global Correlation
  36. 5.2.5.2 Cisco SensorBase Network
  37. 5.2.5.3 Cisco Security Intelligence Operation
  38. 5.2.5.4 Reputations, Blacklists, and Traffic Filters 5.2.5.5 Reputations, Blacklists, and Traffic Filters (Cont.)
  39. 5.2.5.4 Reputations, Blacklists, and Traffic Filters 5.2.5.5 Reputations, Blacklists, and Traffic Filters (Cont.)
  40. 5.3.1.1 Implement IOS IPS
  41. 5.3.1.2 Download the IOS IPS Files 5.3.1.3 IPS Crypto Key 5.3.1.4 Enable IOS IPS 5.3.1.5 Load the IPS Signature Package in RAM
  42. Page 5.3.1.3
  43. Page 5.3.1.4
  44. Page 5.3.1.4 (cont.)
  45. 5.3.1.5 Load the IPS Signature Package in RAM
  46. 5.3.1.5 Load the IPS Signature Package in RAM (Cont.) 5.3.1.6 Activity – Implementing IPS
  47. 5.3.2.1 Retire and Unretire Signatures
  48. 5.3.2.2 Change Signature Actions
  49. 5.3.3.1 Verify IOS IPS
  50. 5.3.3.2 Report IPS Alerts
  51. 5.3.3.3 Enable SDEE
  52. 5.4.1.1 Packet Tracer – Configure an IOS IPS Using CLI 5.4.1.2 Lab – Configure an IOS IPS Using CLI
  53. https://www.netacad.com