Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

ASA 5510 CSC-SSM 10 Module

Posted on 2014-11-05
4
Medium Priority
?
47 Views
Last Modified: 2016-07-17
i have one cisco ASA 5510 firewall with CSC-SSM 10 Module, which i use for filtering, its working good, i am sending all the the traffic to CSC-SSM module for scanning,  i do not want to send some destination traffic to CSC-SSM 10 module for scanning, those destinations are two ip addresses, if traffic is going to these two ip addresses, i do not want ASA to send that traffic to CSC-SSM module.
0
Comment
Question by:Ajeet Kumar
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 25

Accepted Solution

by:
Ken Boone earned 2000 total points
ID: 40424089
So in your config you should have something like this:

access-list IPS permit ip any any

class-map my_ips_class
 match access-list IPS
 class-map all_traffic
  match access-list all_traffic
 class-map inspection_default
  match default-inspection-traffic
 !
 !
 policy-map my-ids-policy
  class my-ips-class
   ips promiscuous fail-close
 !
 service-policy my-ids-policy global


BTW.. this sample was taken from : http://www.cisco.com/c/en/us/td/docs/security/ips/6-0/configuration/guide/cli/cliguide/cliSSM.html#wp1030972

So what you need to do is change your IPS access-list.
Instead of  just this:

access-list IPS permit ip any any

do this
access-list IPS deny ip any host x.x.x.x
access-list IPS deny ip host x.x.xx any
access-list IPS deny ip any host y.y.y.y
access-list IPS deny ip host y.y.y.y any
access-list IPS permit ip any any

x.x.x.x and y.y.y.y are the two destination or sources you do not want to scan.  Make sure the ACL is in that order with the permit ip any any at the bottom.
0
 
LVL 25

Expert Comment

by:Ken Boone
ID: 41714584
I provided a valid solution in my comments.  I gave an example with detailed instructions.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
How does someone stay on the right and legal side of the hacking world?
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question