[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

INLINE CISCO IPS

Posted on 2013-01-23
1
Medium Priority
?
501 Views
Last Modified: 2013-11-29
Hi,

I have CISCO VSS with many vlans. I would like to implement Cisco  FW and Cisco IPS  so all the traffic can pass through these devices.Any ideas how to design this setup or any related docs ?

Thanks
0
Comment
Question by:1w3
1 Comment
 
LVL 5

Accepted Solution

by:
Leeeee earned 2000 total points
ID: 38810785
There's a few options you can look at, if you want all internet bound traffic to pass through the IPS/FW, simply place a default route on the core pointing to the firewall that connects to the internet edge router. All traffic will be subject to inspection.

Inline placement is also a consideration. The below is a guide focused more on standalone IPS, but you could make it work with the IPS module in the firewall:

http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5729/ps5713/ps4077/prod_white_paper0900aecd806e724b.html

http://www.caysec.com/2010/09/intrusion-prevention-best-practice-ips.html
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question