Modules Ips
Modules Ips
This chapter describes how to configure the ASA IPS module. The ASA IPS module might be a physical
module or a software module, depending on your ASA model. For a list of supported ASA IPS modules
per ASA model, see the Cisco ASA Compatibility Matrix:
http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html
This chapter includes the following sections:
• Information About the ASA IPS module, page 62-1
• Licensing Requirements for the ASA IPS module, page 62-5
• Guidelines and Limitations, page 62-5
• Default Settings, page 62-6
• Configuring the ASA IPS module, page 62-6
• Monitoring the ASA IPS module, page 62-20
• Troubleshooting the ASA IPS module, page 62-21
• Configuration Examples for the ASA IPS module, page 62-25
• Feature History for the ASA IPS module, page 62-25
Figure 62-1 ASA IPS module Traffic Flow in the ASA: Inline Mode
ASA
Main System
Firewall VPN
inside Policy Decryption
outside
Diverted Traffic
Block
IPS inspection
251157
IPS
Operating Modes
You can send traffic to the ASA IPS module using one of the following modes:
• Inline mode—This mode places the ASA IPS module directly in the traffic flow (see Figure 62-1).
No traffic that you identified for IPS inspection can continue through the ASA without first passing
through, and being inspected by, the ASA IPS module. This mode is the most secure because every
packet that you identify for inspection is analyzed before being allowed through. Also, the ASA IPS
module can implement a blocking policy on a packet-by-packet basis. This mode, however, can
affect throughput.
• Promiscuous mode—This mode sends a duplicate stream of traffic to the ASA IPS module. This
mode is less secure, but has little impact on traffic throughput. Unlike inline mode, in promiscuous
mode the ASA IPS module can only block traffic by instructing the ASA to shun the traffic or by
resetting a connection on the ASA. Also, while the ASA IPS module is analyzing the traffic, a small
amount of traffic might pass through the ASA before the ASA IPS module can shun it. Figure 62-2
shows the ASA IPS module in promiscuous mode. In this example, the ASA IPS module sends a
shun message to the ASA for traffic it identified as a threat.
Figure 62-2 ASA IPS module Traffic Flow in the ASA: Promiscuous Mode
ASA
Main System
Firewall VPN
inside Policy Decryption outside
Shun
message
Copied Traffic
IPS inspection
251158
IPS
ASA
Context Main System
1
Context
2
Context
3
Sensor Sensor
1 2
251160
IPS
Figure 62-4 shows a single mode ASA paired with multiple virtual sensors (in inline mode); each defined
traffic flow goes to a different sensor.
ASA
Main System
Traffic 1
Traffic 2
Traffic 3
IPS
– ASA 5510, ASA 5520, ASA 5540, ASA 5580, ASA 5585-X—The IPS management interface
is a separate external Gigabit Ethernet interface. If you cannot use the default address (see the
“Default Settings” section on page 62-6), you can change the interface IP address and other
network parameters. See the “Configuring Basic IPS Module Network Settings” section on
page 62-10. The IPS management IP address can be on the same network as the ASA (connected
through a switch), or on a different network (through a router). If you use a different network,
be sure to set the IPS gateway as appropriate.
– ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, ASA 5555-X—These models run the
ASA IPS module as a software module. The IPS management interface shares the
Management 0/0 interface with the ASA. Separate MAC addresses and IP addresses are
supported for the ASA and ASA IPS module. You must perform configuration of the IPS IP
address within the IPS operating system (using the CLI or ASDM). However, physical
characteristics (such as enabling the interface) are configured on the ASA. You can change the
interface IP address and other network parameters. You should set the default gateway to be an
upstream router instead of the ASA management interface. Because the ASA management
interface does not allow through-traffic, traffic destined to another network is not allowed
through the ASA. See the “Configuring Basic IPS Module Network Settings” section on
page 62-10.
– ASA 5505—You can use an ASA VLAN to allow access to an internal management IP address
over the backplane. See the “(ASA 5505) Configuring Basic Network Settings” section on
page 62-11 to change the network settings.
The ASA IPS module requires a separate Cisco Services for IPS license in order to support signature
updates. All other updates are available without a license.
Model Guidelines
• See the Cisco ASA Compatibility Matrix for information about which models support which
modules:
http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html
• The ASA 5505 does not support multiple context mode, so multiple context features, such as virtual
sensors, are not supported on the AIP SSC.
• The ASA IPS module for the ASA 5510 and higher supports higher performance requirements,
while the ASA IPS module for the ASA 5505 is designed for a small office installation. The
following features are not supported for the ASA 5505:
– Virtual sensors
– Anomaly detection
– Unretirement of default retired signatures
Additional Guidelines
You cannot change the software type installed on the module; if you purchase an ASA IPS module, you
cannot later install other software on it.
Default Settings
Table 62-1 lists the default settings for the ASA IPS module.
Parameters Default
Management VLAN (ASA 5505 only) VLAN 1
Management IP address 192.168.1.2/24
Management hosts (ASA 5505 only) 192.168.1.5 through 192.168.1.254
Gateway 192.168.1.1/24 (the default ASA management IP address)
Username cisco
Password cisco
Step 1 Cable the ASA and IPS management interfaces. See the “Connecting Management Interface Cables”
section on page 62-7.
Step 2 Depending on your ASA model:
• (ASA 5510 and higher) Configure basic network settings for the IPS module. See the “(ASA 5510
and Higher) Configuring Basic Network Settings” section on page 62-11.
• (ASA 5505) Configure the management VLAN and IP address for the IPS module. See the “(ASA
5505) Configuring Basic Network Settings” section on page 62-11.
Step 3 (ASA 5512-X through ASA 5555-X; may be required) Install the software module. See the “(ASA
5512-X through ASA 5555-X) Installing the Software Module” section on page 62-14.
Step 4 On the module, configure the inspection and protection policy, which determines how to inspect traffic
and what to do when an intrusion is detected. See the “Configuring the Security Policy on the ASA IPS
module” section on page 62-14.
Step 5 (ASA 5510 and higher, optional) On the ASA in multiple context mode, specify which IPS virtual
sensors are available for each context (if you configured virtual sensors). See the “Assigning Virtual
Sensors to a Security Context (ASA 5510 and Higher)” section on page 62-15.
Step 6 On the ASA, identify traffic to divert to the ASA IPS module. See the “Diverting Traffic to the ASA IPS
module” section on page 62-17.
Guidelines
Detailed Steps
ASA 5505
The ASA 5505 does not have a dedicated management interface. You must use an ASA VLAN to access
an internal management IP address over the backplane. For a factory default configuration, connect the
management PC to one of the following ports: Ethernet 0/1 through 0/7, which are assigned to VLAN 1.
Security
Services Console
Card Slot
Cisco ASA SSC-05 STATUS
POWER 2
48VDC
RESET
1
7 POWER over ETHERNET 6 5 4 3 2 1 0
Management PC
(IP Address from DHCP)
PC (IP Address
from DHCP)
331181
ASA 5510, ASA 5520, ASA 5540, ASA 5580, ASA 5585-X (Physical Module)
Connect to the ASA Management 0/0 interface and the IPS Management 1/0 interface.
1
R OT A RM T N 1 0 D 1 D 0 RESET
SFP1 SFP0 7 6 5 4 3 2 1 0 1 MGMT 0 USB PW AC PS PS HD HD
BO AL VP AUX CONSOLE
1
R O T
A RM T N 1 0 D1 D0 RESET
SFP1 SFP0 7 6 5 4 3 2 1 0 1 MGMT 0 USB PW AC PS PS HD HD
BO AL VP AUX CONSOLE
331182
What to Do Next
• (ASA 5510 and higher) Configure basic network settings. See the “(ASA 5510 and Higher)
Configuring Basic Network Settings” section on page 62-11.
• (ASA 5505) Configure management interface settings. See the “(ASA 5505) Configuring Basic
Network Settings” section on page 62-11.
Detailed Steps
Command Purpose
Telnet session. Accesses the module using Telnet. You are prompted for the username and
For a physical module (for example, the password. The default username is cisco, and the default password is cisco.
ASA 5585-X): Note The first time you log in to the module, you are prompted to change
session 1 the default password. Passwords must be at least eight characters
long and cannot be a word in the dictionary.
For a software module (for example, the
ASA 5545-X):
session ips
Example:
hostname# session 1
Note (ASA 5512-X through ASA 5555-X) If you cannot session to the module, then the IPS module is not
running. See the “(ASA 5512-X through ASA 5555-X) Installing the Software Module” section on
page 62-14, and then repeat this procedure after you install the module.
Detailed Steps
Command Purpose
Step 1 Session to the IPS module according to the
“Sessioning to the Module from the ASA”
section on page 62-9.
Step 2 setup Runs the setup utility for initial configuration of the ASA IPS
module. You are prompted for basic settings.
Example:
sensor# setup
Note Perform this configuration on the ASA 5505, not on the ASA IPS module.
Prerequisites
When you change the IPS VLAN and management address from the default, be sure to also configure
the matching ASA VLAN and switch port(s) according to the procedures listed in Chapter 7, “Starting
Interface Configuration (ASA 5505).” You must define and configure the VLAN for the ASA so the IPS
management interface is accessible on the network.
Restrictions
Do not configure NAT for the management address if you intend to access it using ASDM. For initial
setup with ASDM, you need to access the real address. After initial setup (where you set the password
on the ASA IPS module), you can configure NAT and supply ASDM with the translated address for
accessing the ASA IPS module.
Detailed Steps
Command Purpose
Step 1 interface vlan number Specifies the current management VLAN for which you want to
disable IPS management. By default, this is VLAN 1.
Example:
hostname(config)# interface vlan 1
Step 2 no allow-ssc-mgmt Disables IPS management for the old VLAN so that you can
enable it for a different VLAN.
Example:
hostname(config-if)# no allow-ssc-mgmt
Step 3 interface vlan number Specifies the VLAN you want to use as the new IPS management
VLAN.
Example:
hostname(config)# interface vlan 20
Step 4 allow-ssc-mgmt Sets this interface as the IPS management interface.
Example:
hostname(config-if)# allow-ssc-mgmt
Command Purpose
Step 5 hw-module module 1 ip ip_address netmask Configures the management IP address for the ASA IPS module.
gateway Make sure this address is on the same subnet as the ASA VLAN
IP address. For example, if you assigned 10.1.1.1 to the VLAN for
Example: the ASA, then assign another address on that network, such as
hostname# hw-module module 1 ip 10.1.1.2 10.1.1.2, for the IPS management address.
255.255.255.0 10.1.1.1
If the management station is on a directly-connected ASA
network, then set the gateway to be the ASA IP address assigned
to the IPS management VLAN. In the above example, set the
gateway to 10.1.1.1. If the management station is on a remote
network, then set the gateway to be the address of an upstream
router on the IPS management VLAN.
Note These settings are written to the IPS application
configuration, not the ASA configuration. You can view
these settings from the ASA using the show module
details command.
Examples
The following example configures VLAN 20 as the IPS management VLAN. This VLAN is restricted
to management traffic only. Only the host at 10.1.1.30 can access the IPS management IP address. VLAN
20 is assigned to switch port Ethernet 0/0. When you connect to ASDM on ASA interface 10.1.1.1,
ASDM then accesses the IPS on 10.1.1.2.
hostname(config)# interface vlan 1
hostname(config-if)# no allow-ssc-mgmt
Detailed Steps
Step 1 To view the IPS module software filename in flash memory, enter:.
hostname# dir disk0:
For example, look for a filename like IPS-SSP_5512-K9-sys-1.1-a-7.1-4-E4.aip. Note the filename; you
will need this filename later in the procedure.
Step 2 If you need to copy a new image to disk0, download the image from Cisco.com to a TFTP server, and
then enter:
hostname# copy tftp://server/file_path disk0:/file_path
For other server types, see the “Downloading a File to a Specific Location” section on page 81-3.
Step 3 To identify the IPS module software location in disk0, enter the following command:
hostname# sw-module module ips recover configure image disk0:file_path
Step 4 To install and load the IPS module software, enter the following command:
hostname# sw-module module ips recover boot
Step 5 To check the progress of the image transfer and module restart process, enter the following command:
hostname# show module ips details
The Status field in the output indicates the operational status of the module. A module operating
normally shows a status of “Up.” While the ASA transfers an application image to the module, the Status
field in the output reads “Recover.” When the ASA completes the image transfer and restarts the module,
the newly transferred image is running.
Detailed Steps
Step 1 Access the ASA IPS module CLI using one of the following methods:
• Session from the ASA to the ASA IPS module. See the “Sessioning to the Module from the ASA”
section on page 62-9.
• Connect to the IPS management interface using SSH. If you did not change it, the default
management IP address is 192.168.1.2. The default username is cisco, and the default password is
cisco. See the “Information About Management Access” section on page 62-4 for more information
about the management interface.
Step 2 Configure the IPS security policy according to the IPS documentation.
To access all documents related to IPS, go to:
http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_documentation_roadmaps_list.ht
ml
Step 3 (ASA 5510 and higher) If you configure virtual sensors, you identify one of the sensors as the default.
If the ASA does not specify a virtual sensor name in its configuration, the default sensor is used.
Step 4 When you are done configuring the ASA IPS module, exit the IPS software by entering the following
command:
sensor# exit
If you sessioned to the ASA IPS module from the ASA, you return to the ASA prompt.
What to Do Next
• For the ASA in multiple context mode, see the “Assigning Virtual Sensors to a Security Context
(ASA 5510 and Higher)” section on page 62-15.
• For the ASA in single context mode, see the “Diverting Traffic to the ASA IPS module” section on
page 62-17.
Note You do not need to be in multiple context mode to use virtual sensors; you can be in single mode and use
different sensors for different traffic flows.
Prerequisites
For more information about configuring contexts, see the “Configuring Multiple Contexts” section on
page 5-14.
Detailed Steps
Command Purpose
Step 1 context name Identifies the context you want to configure. Enter this command in
the system execution space.
Example:
hostname(config)# context admin
hostname(config-ctx)#
Step 2 allocate-ips sensor_name [mapped_name] Enter this command for each sensor you want to assign to the context.
[default]
The sensor _name argument is the sensor name configured on the
ASA IPS module. To view the sensors that are configured on the ASA
IPS module, enter allocate-ips ?. All available sensors are listed. You
Example: can also enter the show ips command. In the system execution space,
hostname(config-ctx)# allocate-ips
the show ips command lists all available sensors; if you enter it in the
sensor1 highsec
context, it shows the sensors you already assigned to the context. If
you specify a sensor name that does not yet exist on the ASA IPS
module, you get an error, but the allocate-ips command is entered as
is. Until you create a sensor of that name on the ASA IPS module, the
context assumes the sensor is down.
Use the mapped_name argument as an alias for the sensor name that
can be used within the context instead of the actual sensor name. If
you do not specify a mapped name, the sensor name is used within
the context. For security purposes, you might not want the context
administrator to know which sensors are being used by the context.
Or you might want to genericize the context configuration. For
example, if you want all contexts to use sensors called “sensor1” and
“sensor2,” then you can map the “highsec” and “lowsec” sensors to
sensor1 and sensor2 in context A, but map the “medsec” and
“lowsec” sensors to sensor1 and sensor2 in context B.
The default keyword sets one sensor per context as the default
sensor; if the context configuration does not specify a sensor name,
the context uses this default sensor. You can only configure one
default sensor per context. If you want to change the default sensor,
enter the no allocate-ips sensor_name command to remove the
current default sensor before you allocate a new default sensor. If you
do not specify a sensor as the default, and the context configuration
does not include a sensor name, then traffic uses the default sensor as
specified on the ASA IPS module.
Step 3 changeto context context_name Changes to the context so you can configure the IPS security policy
as described in “Diverting Traffic to the ASA IPS module” section on
page 62-17.
Example:
hostname# changeto context customer1
hostname/customer1#
Examples
The following example assigns sensor1 and sensor2 to context A, and sensor1 and sensor3 to context B.
Both contexts map the sensor names to “ips1” and “ips2.” In context A, sensor1 is set as the default
sensor, but in context B, no default is set so the default that is configured on the ASA IPS module is used.
hostname(config-ctx)# context A
hostname(config-ctx)# allocate-interface gigabitethernet0/0.100 int1
hostname(config-ctx)# allocate-interface gigabitethernet0/0.102 int2
hostname(config-ctx)# allocate-interface gigabitethernet0/0.110-gigabitethernet0/0.115
int3-int8
hostname(config-ctx)# allocate-ips sensor1 ips1 default
hostname(config-ctx)# allocate-ips sensor2 ips2
hostname(config-ctx)# config-url ftp://user1:passw0rd@10.1.1.1/configlets/test.cfg
hostname(config-ctx)# member gold
What to Do Next
Change to each context to configure the IPS security policy as described in “Diverting Traffic to the ASA
IPS module” section on page 62-17.
Prerequisites
In multiple context mode, perform these steps in each context execution space. To change to a context,
enter the changeto context context_name command.
Detailed Steps
Command Purpose
Step 1 class-map name Creates a class map to identify the traffic for which you want to
send to the ASA IPS module.
If you want to send multiple traffic classes to the ASA IPS
Example: module, you can create multiple class maps for use in the security
hostname(config)# class-map ips_class policy.
Step 2 match parameter Specifies the traffic in the class map. See the “Identifying Traffic
(Layer 3/4 Class Maps)” section on page 32-12 for more
information.
Example:
hostname(config-cmap)# match access-list
ips_traffic
Step 3 policy-map name Adds or edits a policy map that sets the actions to take with the
class map traffic.
Example:
hostname(config)# policy-map ips_policy
Step 4 class name Identifies the class map you created in Step 1.
Example:
hostname(config-pmap)# class ips_class
Command Purpose
Step 5 ips {inline | promiscuous} {fail-close | Specifies that the traffic should be sent to the ASA IPS module.
fail-open} [sensor {sensor_name |
mapped_name}] The inline and promiscuous keywords control the operating
mode of the ASA IPS module. See the “Operating Modes” section
on page 62-2 for more details.
Example: The fail-close keyword sets the ASA to block all traffic if the ASA
hostname(config-pmap-c)# ips promiscuous IPS module is unavailable.
fail-close
The fail-open keyword sets the ASA to allow all traffic through,
uninspected, if the ASA IPS module is unavailable.
(ASA 5510 and higher) If you use virtual sensors, you can specify
a sensor name using the sensor sensor_name argument. To see
available sensor names, enter the ips {inline | promiscuous}
{fail-close | fail-open} sensor ? command. Available sensors are
listed. You can also use the show ips command. If you use
multiple context mode on the ASA, you can only specify sensors
that you assigned to the context (see the “Assigning Virtual
Sensors to a Security Context (ASA 5510 and Higher)” section on
page 62-15). Use the mapped_name if configured in the context.
If you do not specify a sensor name, then the traffic uses the
default sensor. In multiple context mode, you can specify a default
sensor for the context. In single mode or if you do not specify a
default sensor in multiple mode, the traffic uses the default sensor
that is set on the ASA IPS module. If you enter a name that does
not yet exist on the ASA IPS module, you get an error, and the
command is rejected.
Step 6 (Optional) If you created multiple class maps for IPS traffic, you can specify
class name2 another class for the policy.
See the “Feature Matching Within a Service Policy” section on
page 32-3 for detailed information about how the order of classes
Example: matters within a policy map. Traffic cannot match more than one
hostname(config-pmap)# class ips_class2 class map for the same action type; so if you want network A to
go to sensorA, but want all other traffic to go to sensorB, then you
need to enter the class command for network A before you enter
the class command for all traffic; otherwise all traffic (including
network A) will match the first class command, and will be sent
to sensorB.
Command Purpose
Step 7 (Optional) Specifies that the second class of traffic should be sent to the ASA
ips {inline | promiscuous} {fail-close | IPS module.
fail-open} [sensor {sensor_name | Add as many classes as desired by repeating these steps.
mapped_name}]
Example:
hostname(config-pmap-c)# ips promiscuous
fail-close
Step 8 service-policy policymap_name {global | Activates the policy map on one or more interfaces. global applies
interface interface_name} the policy map to all interfaces, and interface applies the policy
to one interface. Only one global policy is allowed. You can
override the global policy on an interface by applying a service
Example: policy to that interface. You can only apply one policy map to
hostname(config)# service-policy each interface.
tcp_bypass_policy outside
Command Purpose
show module Displays the status.
show module {1 | ips} details Displays additional status information. Specify 1 for a physical module
and ips for a software module.
show module {1 | ips} recover Displays the network parameters for transferring an image to the module.
Specify 1 for a physical module and ips for a software module.
Examples
The following is sample output from the show module details command, which provides additional
information for an ASA with an SSC installed:
hostname# show module 1 details
Getting details from the Service Module, please wait...
ASA 5500 Series Security Services Card-5
Hardware version: 0.1
Serial Number: JAB11370240
Firmware version: 1.0(14)3
Software version: 6.2(1)E2
MAC Address Range: 001d.45c2.e832 to 001d.45c2.e832
App. Name: IPS
App. Status: Up
App. Status Desc: Not Applicable
App. Version: 6.2(1)E2
Data plane Status: Up
Status: Up
Mgmt IP Addr: 209.165.201.29
Mgmt Network Mask: 255.255.224.0
Mgmt Gateway: 209.165.201.30
Mgmt Access List: 209.165.201.31/32
209.165.202.158/32
209.165.200.254/24
Mgmt Vlan: 20
Note Do not use the upgrade command within the module software to install the image.
Prerequisites
• Physical module—Be sure the TFTP server that you specify can transfer files up to 60 MB in size.
Note This process can take approximately 15 minutes to complete, depending on your network
and the size of the image.
• Software module—Copy the image to the ASA internal flash (disk0) before completing this
procedure.
Note Before you download the IPS software to disk0, make sure at least 50% of the flash memory
is free. When you install IPS, IPS reserves 50% of the internal flash memory for its file
system.
Detailed Steps
Command Purpose
Step 1 For a physical module (for example, the ASA Specifies the location of the new image.
5585-X):
For a physical module—This command prompts you for the URL
hw-module module 1 recover configure for the TFTP server, the management interface IP address and
netmask, gateway address, and VLAN ID (ASA 5505 only).
For a software module (for example, the ASA These network parameters are configured in ROMMON; the
5545-X): network parameters you configured in the module application
sw-module module ips recover configure configuration are not available to ROMMON, so you must set
image disk0:file_path them separately here.
For a software module—Specify the location of the image on the
Example: local disk.
hostname# hw-module module 1 recover
configure You can view the recovery configuration using the show module
Image URL [tftp://127.0.0.1/myimage]: {1 | ips} recover command.
tftp://10.1.1.1/ids-newimg
Port IP Address [127.0.0.2]: 10.1.2.10
In multiple context mode, enter this command in the system
Port Mask [255.255.255.254]: 255.255.255.0 execution space.
Gateway IP Address [1.1.2.10]: 10.1.2.254
VLAN ID [0]: 100
Step 2 For a physical module: Installs and loads the IPS module software.
hw-module module 1 recover boot
Example:
hostname# hw-module module 1 recover boot
Step 3 For a physical module: Checks the progress of the image transfer and module restart
show module 1 details process.
The Status field in the output indicates the operational status of
For a software module: the module. A module operating normally shows a status of “Up.”
show module ips details While the ASA transfers an application image to the module, the
Status field in the output reads “Recover.” When the ASA
completes the image transfer and restarts the module, the newly
Example:
transferred image is running.
hostname# show module 1 details
Detailed Steps
Command Purpose
sw-module module ips uninstall Permanently uninstalls the software module image and associated
configuration.
Example:
hostname# sw-module module ips uninstall
Module ips will be uninstalled. This will
completely remove the
disk image associated with the sw-module including
any configuration
that existed within it.
Detailed Steps
Command Purpose
For a physical module (for example, the ASA 5585-X): Resets the module password to cisco.
hw-module module 1 password-reset
Example:
hostname# hw-module module 1 password-reset
Detailed Steps
Command Purpose
For a physical module (for example, the ASA Reloads the module software.
5585-X):
hw-module module 1 reload
Example:
hostname# hw-module module 1 reload
For a physical module: Performs a reset, and then reloads the module.
hw-module module 1 reset
Example:
hostname# hw-module module 1 reset
Detailed Steps
Command Purpose
For a physical module (for example, the ASA Shuts down the module.
5585-X):
hw-module module 1 shutdown
Example:
hostname# hw-module module 1 shutdown
The following example diverts all IP traffic destined for the 10.1.1.0 network and the 10.2.1.0 network
to the AIP SSM in inline mode, and allows all traffic through if the AIP SSM fails for any reason. For
the my-ips-class traffic, sensor1 is used; for the my-ips-class2 traffic, sensor2 is used.
hostname(config)# access-list my-ips-acl permit ip any 10.1.1.0 255.255.255.0
hostname(config)# access-list my-ips-acl2 permit ip any 10.2.1.0 255.255.255.0
hostname(config)# class-map my-ips-class
hostname(config-cmap)# match access-list my-ips-acl
hostname(config)# class-map my-ips-class2
hostname(config-cmap)# match access-list my-ips-acl2
hostname(config-cmap)# policy-map my-ips-policy
hostname(config-pmap)# class my-ips-class
hostname(config-pmap-c)# ips inline fail-open sensor sensor1
hostname(config-pmap)# class my-ips-class2
hostname(config-pmap-c)# ips inline fail-open sensor sensor2
hostname(config-pmap-c)# service-policy my-ips-policy interface outside
Platform
Feature Name Releases Feature Information
AIP SSM 7.0(1) We introduced support for the AIP SSM for the ASA 5510,
5520, and 5540.
The following command was introduced: ips.
Virtual sensors (ASA 5510 and higher) 8.0(2) Virtual sensor support was introduced. Virtual sensors let
you configure multiple security policies on the ASA IPS
module.
The following command was introduced: allocate-ips.
Table 62-2 Feature History for the ASA IPS module (continued)
Platform
Feature Name Releases Feature Information
AIP SSC for the ASA 5505 8.2(1) We introduced support for the AIP SSC for the ASA 5505.
The following commands were introduced:
allow-ssc-mgmt, hw-module module ip, and hw-module
module allow-ip.
Support for the ASA IPS SSP-10, -20, -40, and 8.2(5)/ We introduced support for the ASA IPS SSP-10, -20, -40,
-60 for the ASA 5585-X 8.4(2) and -60 for the ASA 5585-X. You can only install the ASA
IPS SSP with a matching-level SSP; for example, SSP-10
and ASA IPS SSP-10.
Note The ASA 5585-X is not supported in Version 8.3.
Support for Dual SSPs for SSP-40 and SSP-60 8.4(2) For SSP-40 and SSP-60, you can use two SSPs of the same
level in the same chassis. Mixed-level SSPs are not
supported (for example, an SSP-40 with an SSP-60 is not
supported). Each SSP acts as an independent device, with
separate configurations and management. You can use the
two SSPs as a failover pair if desired.
Note When using two SSPs in the chassis, VPN is not
supported; note, however, that VPN has not been
disabled.
Support for the ASA IPS SSP for the ASA 8.6(1) We introduced support for the ASA IPS SSP software
5512-X through ASA 5555-X module for the ASA 5512-X, ASA 5515-X, ASA 5525-X,
ASA 5545-X, and ASA 5555-X.
We introduced or modified the following commands:
session, show module, sw-module.